Probability Elicitation in Influence Diagram Modeling by Using Interval Probability

Total Page:16

File Type:pdf, Size:1020Kb

Probability Elicitation in Influence Diagram Modeling by Using Interval Probability International Journal of Intelligence Science, 2012, 2, 89-95 http://dx.doi.org/10.4236/ijis.2012.24012 Published Online October 2012 (http://www.SciRP.org/journal/ijis) Probability Elicitation in Influence Diagram Modeling by Using Interval Probability Xiaoxuan Hu1,2, He Luo1,2, Chao Fu1,2 1School of Management, Hefei University of Technology, Hefei, China 2Key Laboratory of Process Optimization and Intelligent Decision-Making, Ministry of Education, Hefei, China Email: [email protected] Received May 29, 2012; revised July 31, 2012; accepted August 10, 2012 ABSTRACT In decision modeling with influence diagrams, the most challenging task is probability elicitation from domain experts. It is usually very difficult for experts to directly assign precise probabilities to chance nodes. In this paper, we propose an approach to elicit probability effectively by using the concept of interval probability (IP). During the elicitation process, a group of experts assign intervals to probabilities instead of assigning exact values. Then the intervals are combined and converted into the point valued probabilities. The detailed steps of the elicitation process are given and illustrated by constructing the influence diagram for employee recruitment decision for a China’s IT Company. The proposed approach provides a convenient and comfortable way for experts to assess probabilities. It is useful in influ- ence diagrams modeling as well as in other subjective probability elicitation situations. Keywords: Influence Diagram; Probability Elicitation; Interval Probability; Decision-Making 1. Introduction To deal with the imprecision and inconsistence of sub- jective probabilities, quite a few methods are developed An influence diagram (ID) [1] is a directed acyclic graph to guide experts correctly giving probabilities, such as for modeling and solving decision problems under un- using visual tools like probability scale [8], probability certainty. It provides a more compact way to represent wheel [9] and scaled probability bar [10], adapting Ana- complex decision situations than a decision tree does. In lytic Hierarchy Process (AHP) [11]. Wiegmann gives an recent years, influence diagrams have been used as ef- overview of the popular elicitation methods [12]. fective modeling tools for Bayesian decision analysis. In this paper, we focus on probability elicitation for The work of constructing an influence diagram can be influence diagrams. We present a new approach to elicit divided into two sub-works: The first one is to build the probabilities from experts. Our approach does not require influence diagram structure; the other one is to assign experts to give point-valued probabilities but to give in- parameters to all kinds of nodes, including assigning terval-valued probabilities instead. Because in daily life, conditional probabilities for chance nodes, acquiring the it is unrealistic to expect experts to provide exact values utilities for value nodes and generating decision al- of many probabilities. They are used to describing prob- terna-tives for decision nodes. The whole work is chal- abilities by verbal or other inexact expressions, such as lenging and time consuming, and a number of difficulties “possible”, “rare” or “likely”. Each expression is an im- may be faced. Bielza et al. have discussed the important precise or fuzzy description of probability that actually issues in modeling with influence diagrams [2-4]. means an interval of probability. Cano and Moral pointed During the entire construction process, the assignment out that imprecise probability model such as interval of conditional probabilities for chance nodes is consid- probability is more useful than exact probability model in ered the most difficult problem. There are two common many situations [13]. The experts would be more con- used solutions to get probability values: learning from fident and feel more comfortable to deal with intervals data or acquiring from experts. In the machine learning probabilities. So, we apply the concept of interval proba- community, many algorithms have been presented to bility [14-18] to elicit probabilities, and we combine learn probabilities from data [5-7]. However, in many multiple experts’ judgments to increase the accuracy of real-world applications, we do not have available data set the final results. and have to elicit probabilities from experts. The prob- The paper is organized as follows: In Section 2, we abilities are thus called subjective probabilities. briefly introduce influence diagrams. Section 3 shows the Copyright © 2012 SciRes. IJIS 90 X. X. HU ET AL. basic concept of interval probabilities. In Section 4, we mation arc from the node “weather forecast” to the deci- describe our approach of probabilities elicitation from sion node, and a relevance arc from the node “weather experts. First we introduce the entire process of the ap- forecast” to the node “weather”. Bob’s utility varies with proach, and then give the details of each step. In Section various instances of decisions and weather conditions. 5, we illustrate our approach by a real application: estab- The evaluation of an influence diagram is to find the lishing an influence diagram model for employee re- best alternative by comparing the expected utility (EU) cruitment decision for a China’s IT company. Finally, we among every decision alternatives. Suppose Dj is a deci- give a conclusion in Section 6. sion node with a set of decision alternativesdLd1,,n . First we calculate the EU of each decision alternative di: 2. Influence Diagram EUdd,ii U cj P cj e (1) An influence diagram can be defined as a four-tuple [19] j in which e represents the evidences. IDGXPU ,,,r Then we select the best alternative d* in dLd,, , such that, 1 n which satisfies 1) G = (V, E) is a directed acyclic graph (DAG), with * nodes V and edges E. V are partitioned into three sets, V dE arg max Udi (2) =VVCDUV. VC, VD and VU are the set of chance nodes, decision nodes and value nodes, respectively. The The original evaluation approach is to unfold an in- dependence relations and information precedence among fluence diagram into a decision tree. Obviously it is inef- all the nodes are encoded in E. ficient. Shachter presents a way to evaluate influence diagrams with two operations: node-removal and arc- 2) X is a set of variables. X = X CD X , XC is a set of reversal [20]. By recursively using the two operations, an random variables, and each variable in XC is represented influence diagram is transformed into a diagram with by a chance node of G. XD is a set of decision variables, only a utility node. The utilities for individual decision and each variable in XD is represented by a decision node of G . alternatives are computed during the process. F. Jensen et 3) Pr is a set of conditional probability distributions. al. describe a way to convert an influence diagram into a junction tree [21], and then the message passing algo- Each random variable CXiC associates with a dis- rithm is operated on the junction tree for calculating the tribution PiiCParC. 4) U is a set of utility functions. Each value node expected utility. Zhang describes a method to reduce VViiU1, 2 contains one utility function u(Xpa(vi)). influence diagrams evaluation into Bayesian network In influence diagrams, the chance nodes are repre- inference problems [22], so that many Bayesian network sented by circulars, and each chance node associates with inference algorithms can be used to evaluate influence a probability distribution. The decision nodes are rectan- diagrams. gles. Each decision node has a set of alternatives. The value nodes are diamonds. The parameters of each value 3. Interval Probability node show the utility of various outcomes according to The theory of imprecise probability has received much the decision makers. Directed arcs in influence diagrams attention [13-17,23-26]. Interval probability is a major have different meanings. Arcs pointing to decision nodes expression of imprecise probability that has been used in are called information arcs, which indicate information uncertain reasoning [14,18], decision making [15,16], precedence. An information arc from a chance node A to a decision node B denotes that variable A will be ob- and some other applications. It is an extension of classi- servable before the decision is made. Arcs pointing to cal probability so that can be adapted in more complex chance nodes are called relevance arcs, which represent uncertain situations. the dependency between the variables and their parents. Definition 1. (Interval probability) [14,17,27]: Let Ω be The missing arc between two chance nodes means condi- tional independence. Weather Watch prain( ) 0.15 {,}yes no An example of an influence diagram is shown in Fig- forecast the game? ure 1. Bob is going to decide whether to go to watch a football game tomorrow. The only factor he considering p(|)0.90 rain rain is the weather. If there is no rain, he will go; otherwise he p(| rain no rain )0.05 u(, yes rain )0 prefers to stay at home. He has a weather forecast sensor, u(, yes no rain )10 0 Weather Utility from which he can know whether it will rain or not to- unorain(, )60 morrow. But the sensor has a small probability to make unonorain(, )20 wrong forecast. As shown in Figure 1, there is an infor- Figure 1. An influence diagram. Copyright © 2012 SciRes. IJIS X. X. HU ET AL. 91 a sample space, A aii 1, 2,..., n be a σ-field of , Setp 1. Selection of domain experts random events in Ω a set of intervals Laii, Ua is called interval probabilities if it satisfies the following Domain conditions: experts iLaUa,0 ii 1 (3) Four criteria n Appropriate experts ipa,,ii LaUa i, such that pai 1; (4) i1 the software tool ipaLa,inf ii pP , Setp 2. Elicitation interval probabilities from the experts ipaUa,sup ii (5) pP Semi interval probabilities wherePp | LapaUaiii i, The linear The intervals satisfy conditions (3)-(5) are also called programming model reachable probability intervals [14] or F-probability [17].
Recommended publications
  • IFIP Advances in Information and Communication Technology 364
    IFIP Advances in Information and Communication Technology 364 Editor-in-Chief A. Joe Turner, Seneca, SC, USA Editorial Board Foundations of Computer Science Mike Hinchey, Lero, Limerick, Ireland Software: Theory and Practice Bertrand Meyer, ETH Zurich, Switzerland Education Arthur Tatnall, Victoria University, Melbourne, Australia Information Technology Applications Ronald Waxman, EDA Standards Consulting, Beachwood, OH, USA Communication Systems Guy Leduc, Université de Liège, Belgium System Modeling and Optimization Jacques Henry, Université de Bordeaux, France Information Systems Jan Pries-Heje, Roskilde University, Denmark Relationship between Computers and Society Jackie Phahlamohlaka, CSIR, Pretoria, South Africa Computer Systems Technology Paolo Prinetto, Politecnico di Torino, Italy Security and Privacy Protection in Information Processing Systems Kai Rannenberg, Goethe University Frankfurt, Germany Artificial Intelligence Tharam Dillon, Curtin University, Bentley, Australia Human-Computer Interaction Annelise Mark Pejtersen, Center of Cognitive Systems Engineering, Denmark Entertainment Computing Ryohei Nakatsu, National University of Singapore IFIP – The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress held in Paris the previous year. An umbrella organi- zation for societies working in information processing, IFIP’s aim is two-fold: to support information processing within ist member countries and to encourage technology transfer to developing nations. As ist mission statement clearly states, IFIP’s mission is to be the leading, truly international, apolitical organization which encourages and assists in the development, ex- ploitation and application of information technology for the benefit of all people. IFIP is a non-profitmaking organization, run almost solely by 2500 volunteers. It operates through a number of technical committees, which organize events and publications.
    [Show full text]
  • Structured and Knowledge Based System Design
    MODERN THEORY OF INFORMATION - STRUCTURED AND KNOWLEDGE BASED SYSTEM DESIGN SAID KRAYEM ZLÍN 2016 ABSTRACT This keynote will address the challenges in the digital engineering field with a specific focus on analyzing security and harnessing the gaps that exist and the progress that needs to be made in the coming decade. The state–based Event-B formal method relies on the concept of correct step-by-step development ensured by discharging corresponding proof obligations. The CommonKADS methodology is a collection of structured methods for building knowledge-based systems. A key component of CommonKADS is the library of generic inference models which can by applied to tasks of specified types. These generic models can either be used as frameworks for knowledge acquisition or to verify the completness of models developed by an analysis of the domain. Key words: System, Knowledge Representation, Expert System Design, Knowledge-based Systems, Knowledge Engineering, Formal Methods, events, action, machine and context ACKNOWLEDGEMENT The most important person I would like to thank is my room-mate Susan. Having Susan as a room-mate gives you the freedom to pursue your individual interest. Furthermore, she gives you the feeling that you can do something useful. CONTENTS INTRODUCTION ............................................................................................................... 8 1 SYSTEM DEFINITION .............................................................................................. 9 1.1 SYSTEM ENGINEERING .........................................................................................
    [Show full text]
  • Time Series Data Analysis Using Probabilistic and Neural Network
    Time series data analysis using probabilistic and neural network Chiu-Che Tseng1 1Department of Computer Science and Information Systems Texas A&M University – Commerce, TX 75429, U.S.A. Abstract We explored several ways to reduce the complexity of the investment decision deliberation that might cause the investors to lose money under urgent Artificial intelligence decision support system is situations, and, at the same time, to provide the always a popular topic in providing the human user highest quality investment recommendations possible. with an optimized decision recommendation when For portfolio management, Strong [16], Reilly operating under uncertainty in complex environments. and Norton [13] and Jones [9] brought several The particular focus of our discussion is to compare traditional portfolio management strategies. And different methods of artificial intelligence decision Sycara, et al. [17] focused on using distributed agents support systems in the investment domain – the goal to manage investment portfolios. Their system of investment decision-making is to select an optimal deployed a group of agents with different portfolio that satisfies the investor’s objective, or, in functionality and coordinated them under case-based other words, to maximize the investment returns situations. They modeled the user, task and situation under the constraints given by investors. In this study as different cases, so their system activated the we applied several artificial intelligence systems like distributed agents for information gathering, filtering Influence Diagram (a special type of Bayesian and processing based on the given case. Their network) and Neural Network to get experimental approach mainly focused on portfolio monitoring comparison analysis to facilitate users to intelligently issues and has no mechanism to deal with uncertainty.
    [Show full text]
  • COMPUTER BASED PRESCRIPTIVE DECISION SUPPORT Ari Riabacke
    COMPUTER BASED PRESCRIPTIVE DECISION SUPPORT Ari Riabacke Department of Information technology and Media Fibre Science and Communication Network Mid Sweden University R–02–33 ISSN 1650-5387-2002:10 September 2002 Licentiate Thesis Department of Information technology and Media Mid Sweden University R-02-33 ISSN 1650-5387 2002:10 © 2002 Ari Riabacke Printed in Sweden 2002, Tryckeriet, Mid Sweden University I am based on a true story. To my wife Malin, our children Mi and Philippa and to Isak the proud big brother. Abstract The overall aim of this thesis is to study in what type of decision situations (involving risk and uncertainty) managers encounter problems and pitfalls, and to propose formalised methods for handling such situations. Traditionally, at least from an academic perspective, utility theory and the principle of maximising the expected utility has had a great influence on decision-making in such contexts. Even though this principle is often useful when evaluating a decision situation, it is not necessarily, despite what has often been claimed, the definition of rationality. And other approaches are definitely worth considering. The thesis has three main components. It develops a compilation of normative, descriptive and prescriptive theories within the area of risk taking and decision-making. Thereafter follows an empirical study examining some aspects of how managers define risk, how they handle risk, how they make risky decisions and how the organisational context affects the decision- making processes. This part contains an analysis of how managers make their choices from different risky prospects. Taking this into account, the third part brings attention to some of the problematic features of evaluation through utility theory and tries to constructively relax the demand for precise data in situations where only imprecise data are available.
    [Show full text]
  • Applications of Decision and Utility Theory in Multi-Agent Systems
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering, Department CSE Technical reports of 9-13-2004 Applications of Decision and Utility Theory in Multi-Agent Systems Xin Li University of Nebraska, [email protected] Leen-Kiat Soh University of Nebraska, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/csetechreports Part of the Computer Sciences Commons Li, Xin and Soh, Leen-Kiat, "Applications of Decision and Utility Theory in Multi-Agent Systems" (2004). CSE Technical reports. 85. https://digitalcommons.unl.edu/csetechreports/85 This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in CSE Technical reports by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. University of Nebraska–Lincoln, Computer Science and Engineering Technical Report TR-UNL-CSE-2004-0014 Issued 9/13/2004 Applications of Decision and Utility Theory in Multi-Agent Systems Xin Li, Leen-Kiat Soh Department of Computer Science and Engineering University of Nebraska–Lincoln {xinli, lksoh}@cse.unl.edu September 2004 Abstract This report reviews the applications of decision-related theories (decision theory, utility theory, probability theory, and game theory) in various aspects of multi-agent systems. In recent years, multi-agent systems (MASs) have become a highly active research area as multi-agent systems have a wide range of applications. However, most of real-world environments are very complex and of uncertainty. An agent’s knowledge about the world is rather incomplete and uncertain.
    [Show full text]