=Paper=
{{Paper
|id=None
|storemode=property
|title=ABC-BN: A Tool for Building, Maintaining and Using Bayesian Networks in an Environmental Management Application
|pdfUrl=https://ceur-ws.org/Vol-818/paper14.pdf
|volume=Vol-818
}}
==ABC-BN: A Tool for Building, Maintaining and Using Bayesian Networks in an Environmental Management Application==
ABC-BN: A tool for building, maintaining and using Bayesian networks in an environmental management application Ann E. Nicholson, Owen Woodberry, Adrian Moorrees, Alicia Lucas Steven Mascaro, Kevin Korb Biodiversity and Ecosystem Services Bayesian Intelligence Pty Ltd. 2/8 Nicholson Street 2/21 The Parade, Clarinda East Melbourne, VIC 3002, Australia VIC, 3169, Australia Abstract tion (ABC) as a central resource for managing threat- ened species and communities (DSE, 2009). It facili- The Victorian state government Department tates the management of actions documented in Action of Sustainability and Environment has a web- Statements prepared under the Flora and Fauna Guar- based application called Actions for Biodi- antee Act 1988 and Recovery Plans prepared under versity Conservation (ABC) as a central re- the Environment Protection and Biodiversity Conser- source for managing over 400 threatened vation Act 1999. ABC currently holds information on species and communities. ABC maintains in- more than 400 threatened species and communities1 formation for species and communities at in- and over 8,000 management actions at approximately dividual locations, including lists of threats 2000 locations across Victoria. ABC maintains infor- (to species and communities), actions (to mation for species and communities at individual lo- mitigate threats) and population and habi- cations, including lists of threats (to species), actions tat factors. Here we describe an extension to (to mitigate threats) and population and habitat fac- ABC, a tool for building Bayesian networks tors. By bringing together information from a range of for selected populations of threatened species sources, ABC is intended to make significant improve- and occurrences of threatened communities, ments in both knowledge about threatened species and to model the interactions between actions, communities and the transfer of that knowledge. The threats and population and habitat factors. recording of actions implemented for populations and The tool, called ABC-BN, also allows users communities enables the development of prioritized to do what-if scenario reasoning, and is inte- lists of actions to be made on an increasingly sound grated with ongoing monitoring and report- basis by land and water managers. Reporting on out- ing. Unlike most ecological BN modelling to comes provides a basis for applying adaptive manage- date, which typically takes months or years ment, whereby the effectiveness of management can to produce a single, often complex, BN, for be improved based on the current and previous out- a specific problem, the aim here was to pro- comes for a population. By 2004, ABC Stage 1 was duce a tool that would facilitate the develop- operational and able to report on whether an action to ment, maintenance and use of a large number ameliorate a threat had been carried out. ABC Stage of quite simple standardized BNs, specialized 2 (deployed in 2006), incorporated the facility to pre- for particular instances. We describe the in- pare actions plans within the system. However ABC cremental development of ABC-BN over 3 did not support any modelling of interactions between years. A prototype version was evaluated actions, threats and outcome factors and had no pre- in 2009 by building models for 100 species, dictive capability. More importantly, it was not able and the completed ABC-BN was deployed in to report on the status of a species or community for April, 2011. which there was little or no data collected, in a way that was comparable across the state. Bayesian networks (BNs) (Pearl, 1988; Jensen and 1 INTRODUCTION Nielsen, 2007), are becoming increasingly popular for The Victorian state government Department of Sus- 1 The FFG Act 1988 defines a community as “a type tainability and Environment (DSE) has a web-based of assemblage which is wholly or substantially made up of application called Actions for Biodiversity Conserva- taxa of flora or fauna existing together in the wild”. environmental and ecological monitoring and risk as- ABC is a web-based interface to a database applica- sessment (see § 5.2.3 in Korb and Nicholson, 2010 for tion. It is based around entities called items, which a recent survey). There have been a number of mod- may be flora or fauna species, communities, or poten- elling guidelines published (e.g., Varis and Kuikka, tially threatening processes. Within ABC, there are 1999; Borsuk et al., 2004; Renken and Mumby, 2009), different types of users, with different responsibilities while Uusitalo (2007) reviews their features and use in and access levels. ABC is based on recording informa- modelling environmental applications. In 2008, DSE tion about each item at each location (linked with a decided to extend ABC with BN technology, to pro- GIS) it is found; there is a location monitor respon- vide the capacity to model the interactions between sible for recording the management and monitoring. actions, threats and outcomes and overall status, and The item monitor oversees the information about allow users to do what-if predictive and diagnostic sce- each item, while system administrators have ad- nario reasoning. These additional capacities would be ditional responsibilities such as appointing monitors integrated with ongoing monitoring and reporting. and adding actions and threats to the global lists. Fi- nally, there are various stakeholders (e.g., members In most ecological BN modelling to date the knowledge of other government organizations, NGOs, community engineering paradigm is to develop a single, often com- groups, academics and researchers), who can be given plex BN, for a specific problem, which typically takes access to the information in ABC, but may not make months or years to complete (e.g., Pollino et al., 2007; changes. Smith et al., 2007; Chee et al., 2005). Here, in con- trast, the aim was to produce a tool that would fa- For each item, the ABC database contains informa- cilitate the development, maintenance and use of BNs tion about the threats that have been identified at for specific populations and occurrences of species and each location, which are ranked along two dimensions, communities with a high priority within ABC, rather “‘likelihood” and “impact”, representing priorities. than entire species and communities. It records actions (from a central list of possible ac- tions) that have been identified as potentially useful This aim led to some key design decisions. First, the to reduce threats to the item at that location. Fi- tool would be for use by the DSE so-called monitors nally, monitors must record monitored information in – DSE scientists and Biodiversity Officers – already actions taken, the status of threats, and various out- maintaining information in ABC about the species comes, which are observations relating to the species for which they were responsible. The BN technology populations or community occurrences, or the habitat would be hidden from these users. Second, the tool which can be monitored. This information facilitates would support the building of simple BNs using a tem- the prioritizing of species and communities based on plate that enforced a certain causal structure between the importance of the location and contributions of actions, threats and outcomes. actions to mitigate threats. In this paper, we describe the incremental develop- ment of the tool, called ABC-BN, over a 3 year pe- riod, with the challenges of changes to the underlying 3 ARCHITECTURE BN template, and a number of substantial additions to the tool requirements. We give an overview of the The key requirement for ABC-BN was that it be com- ABC-BN’s functionality, which is based on the itera- pletely aligned with the existing ABC application, tive, incremental knowledge engineering of BNs Laskey with the same web interface, the same types of users, and Mahoney (2000) A prototype version was evalu- and model the same action, threat and outcome infor- ated in 2009 by building models for 100 species, and mation in the ABC database. the completed ABC-BN was deployed in April 2011. Figure 1 shows the system architecture for integration of ABC and ABC-BN. ABC-BN is invoked via a menu tab from ABC, with the current item as well as the 2 ACTIONS FOR BIODIVERSITY user ID, passed to ABC-BN. From that point, ABC- CONSERVATION (ABC) BN interacts directly with the users via their browser, with uploads and downloads of BN models allowed via The first version of ABC was developed for DSE by a shared DSE file system. ABC-BN is a TOMCAT Spatial Vision, a software company specialising in GIS application, implemented using JavaServer Pages and applications. Stage I became operational in 2004, with the NeticaJ Java API.2 The BNs and ABC-BN specific the Stage II in place from 2006. The addition of ABC- information are stored in new tables added to the ABC BN, to be developed by Bayesian Intelligence, became Oracle database. part of Stage III, along with enhancements to ABC 2 itself, to be delivered by Spatial Vision. www.norsys.com Figure 2: ABC-BN development phases Upload (Strict Standard) Upload (Standard) Upload (Non-Standard) Add New Edit Existing Edit Edit Draft Draft (Strict Standard / Standard) (Non-Standard) Submit Submitted Reject (Strict Standard / Standard) Recommend Recommended (Strict Standard / Standard) Approve Approved (Strict Standard / Standard) Supercede Archived (Strict Standard / Standard) Figure 1: System architecture for the integration of Figure 3: Model lifecycle ABC and ABC-BN 3.1 Incremental and Iterative Development (by a new approved model) it becomes archived. Fig- ABC-BN was designed and built incrementally, follow- ure 3 shows the model lifecycle. ing the prototype-based spiral software development Two user roles were added for ABC-BN: (1) Model cycle advocated by Brookes (1995) and Boehm (1988). administrators have privileged access to the ABC- There were three main phases (see Figure 2): a pre- BN module, notably approving models and the abil- liminary scoping phase, then two main design and de- ity to edit the ABC-BN global settings, upload Netica velopment phases. These were due to (1) changes to BNs to the system, and delete any model; (2) Out- the underlying BN template and (2) a number of sub- come monitors are nominated by the model admin- stantial additions to the tool functionality. istrators for each item location.3 Outcome monitors may build and submit models for approval, while item monitors are responsible for recommending models. 4 USER ROLES AND MODEL MANAGEMENT Table 1 summarizes the user roles within ABC-BN., while Figure 12 shows the model management page.4 ABC-BN provides model management and an approval workflow, together with an audit history. The BN models are managed for each item location; there may be many draft models, but only one approved model 3 This is because they may be someone other than the at any one time. Models must go through a three step location monitor. submission process: submitted → recommended 4 Figures showig screen shots of ABC-BN are placed to- → approved. When an approved model is superseded gether at the end of the paper. Table 1: User roles Role Abbr. Comments Model Ad- MA Full access to the ABC-BN module. Table 2: Elicitation algorithm ministrator Able to create, submit, recommend and approve models. Item Moni- IM Access all models. Able to submit Module Sub-module Algorithm tor and recommend models for locations -create standard template under the item. model Outcome OM Access all models. Able to create and Structure: Name: -name the model Monitor submit models for item location. Threat: -select threats to be included Any (Other) M Access all models. in the model Monitor Actions -for each threat variable Stakeholder SH Access only Approved models. & Asset -select action variables affect- ing this threat Factors: -select asset factor variables affected by this threat 5 MODEL BUILIDNG States: -for all action, threat and asset factor variables -select a state space ABC-BN supports all stages of the BN elicitation pro- -if optional state description cess. The elicitation algorithm is shown in Table 2. -give description Additional -for each threat and asset fac- Navigation around the elicitation process is flexible, tor variable the user may move to any module, and any sub-module Links: -select other variables, of the same type, affected by this within that module (using tab menus). Thus it pro- variable vides the iterative and incremental BN construction CPTs: -for all threat, asset factor and query variables process advocated by many (e.g., Laskey and Ma- -for each parent state combi- honey, 2000; Korb and Nicholson, 2010; Boneh, 2010). nation -select verbal cues for each Figure 4 shows an example of a BN created within the state system.5 Scenarios: -test model with scenarios tool 5.1 Structure ABC-BN supports building models specific to each item location, based on a pre-defined structure tem- plate, incorporating actions, threats and asset factors in the ABC database. This template evolved over ABC-BN’s development phases as shown in Figure 5: Phase 1: Template contains only threats, which are par- ents of a ThreatTrend node, with values {Improving, Stable, Worsening} Phase 2: Template contains Action nodes (all root nodes) which are parents of the Threat nodes, which are in turn parents of AssetFactor nodes, as well as two Trend nodes. Phase 3: Trend nodes modelling change now replaced by Status nodes representing absolute val- ues: {Severe,Moderate,Negligible} for Threat- Status and {Good, Fair, Poor} for AssetSta- tus. The elicitation process builds only BNs that follow this so-called strict standard template, which limits the complexity of the networks and ensures they are easily analyzed for reporting (based on the Status nodes).6 Figure 5: ABC-BN’s templates from Phase 1 (above) and Phase 3 (below). The Phase 2 template was as for 5 This BN was produced by Phil Papas and Di Crowther Phase 3, but contained Trend nodes, instead of Status of DSE, Biodiversity and Ecosystem Services, Arthur Ry- nodes. lah Institute. 6 ABC-BN also allows uploading of BNs (for example, constructed in Netica) that do not follow the strict stan- Figure 4: An example complete BN created within ABC-BN. ure 13). Once the Threat nodes are selected, the user then selects the associated Action and Asset- Factor nodes for each (see Figure 14). 5.2 Parameter Elicitation Eliciting the parameters of the BN, the conditional probabilities, is recognised as a difficult task. For each node, there is distribution for each combination of val- ues of the parent variables; this is exponential in the Figure 6: Threat Ranking page. number of parent variables. It can be hard for experts to express their experience/opinion in numbers, and they are often inconsistent. Hence the decision was The BN nodes are selected from the values already made for ABC-BN to support the alternative qualita- in the database for that item and location. The dis- tive assessment of probabilities using verbal anchors, crete state space for each node is selected from a global developed by van der Gaag et al. (1999), and imple- list (intended to provide consistency across the system, mented in the Verbal Elicitor tool (Hope et al., 2002). and maintained by the Model Administrator), divided The user is presented with scenario descriptions (about into “types”; for example the “Choice” type could have combination of parent values) and a selection of com- alternatives {Yes,No} and {Done,NotDone}, while an mon chance tags, e.g., “certain”, “likely” or “impos- example “Amount” type is {High, Medium, Low}. sible”. In this way actual probability values are not The user first selects threats from a list of threats for required or shown to the expert. ABC-BN contains that item. Administrators can assign a threat to one a so-called verbal map (which is maintained by the of two ranks based on the impact and likelihood of a Model Administrator) which maps verbal cues to prob- threat, (see Figure 6), which changes the way threats abilities (see Figure 15). are presented on the Threat Selector page (see Fig- For Phase 2, ABC-BN provided only this qualitative elicitation, and the users could not see the probabil- dard: (1) standard models, which are similar to the strict ities stored into the CPT.7 Feedback from the users standard structure, but without any constraints on the during the Phase 2 evaluation indicated that this was links, and may be submitted for approval; (2) non-standard 7 models can be any Netica BN, but may not be submitted That is, unless they downloaded the BN for viewing in for approval, as they can’t be analyzed for reporting. Netica! Figure 8: Example of table parameter elicitation: (above) Verbal cue; (below) Number “any” state.8 Users can switch between a single ques- tion (i.e., a parent state combination) and the full table view. ABC-BN also provides visualization of the pa- rameter elicitation progress, incorporating a summary table (not shown) with colour coding for questions that are either complete, incomplete or in need of revision (i.e., when there have been structural changes). 6 Reasoning in ABC-BN Figure 7: Example of single question parameter elici- ABC-BN’s reasoning component (developed in Phase tation: (above) Verbal cue; (below) Number 2), called “Scenarios”, allows the user to enter any combination of exact or likelihood evidence and pro- vides a visualization of the posterior distributions af- ter belief updating. The screen is layed out in four quite frustrating. Also, by their very nature, the prob- columns – Actions, Threats, Asset Factors, and Sta- abilities elicited using verbal tags will be inaccurate, tus – corresponding to the layers in the BN template, as the cues are limited to only some probabilities, while the arcs in the underlying network are hidden. and they are nearly always changed during normaliza- is shown in Figure 9. tion. Hence in Phase 3 the parameter elicitation was To enter evidence, the user clicks on a node’s “Add changed to a hybrid system, combining both qualita- Evidence...” button, which changes the node view to tive and quantitative elicitation, catering for an itera- show a slider for evidence. This rectangular slider is tive stepwise refinement of the probabilities. split into as many parts as there are states, where Basic elicitation is done via single questions, where the the length of each part represents the probability of user can switch between “Words” and “Numbers”; an a state. The user can either drag the dividers, or en- example of these alternatives, for a Fire threat node, ter number values, to enter the desired likelihood evi- with a single Backburning action parent node, is dence. Alternatively, the user can simply select a state shown in Figure 7. In single question mode, the “Con- if the evidence is exact. tinue” option takes the user to the next combination of In Phase 3, the reasoner was extended with a simi- parent values - that is, the next row in the CPT. Note larity analysis report, which summarizes the current that the user is told the question is “X/Y”, meaning scenario, that is, the model and the entered set of ev- Xth question out of Y total questions. idence; an example is shown in Figure 10. As well as Feedback on the Phase 2 prototype also indicated that reporting the calculated probabilities for all the nodes, the users found it hard to “calibrate” their answers column 1 shows the difference between the posteriors when answering these single questions, so Phase 3 in- and the initial distribution (before evidence was en- cluded an alternative table interface, allowing visual- tered), while column 2 shows differences between the isation and flexible navigation of the CPT (in either final distribution and distribution given only the Ac- word or number form). An example is shown in Fig- tion node evidence. ure 8. Navigation of the table can be done by either 8 The “any” state is useful if one parent (or a set of clicking on a summary table, or by selecting a parent parents) dominate in a particular combination, rendering state combination via drop down boxes , including an other parents inconsequential. Figure 9: Scenario tester page Figure 10: Similarity analysis report terior probabilities of the two Status nodes (given the evidence), plus metadata on all included factors (ac- tions, threats and asset factors), such as the source of the information (observed data, expert or/and litera- ture). As well as reports on individual items, the system also produces a summary table with categorization, across a user-specified set of items; an example is shown in Figure 11. This table is an aggregation of the clas- sification using the highest posterior probabilities for Status nodes computed for each BN, given the out- comes evidence added by the monitor. Results are defined as Inconclusive if the difference between the two most probable states is less than the “inconclusive threshold”, a global variable (modifiable by adminis- trators). Figure 11: Outcome summary page 8 EVALUATION 7 OUTCOME SUMMARY The prototype developed in Phase 2 was trialled in This component was added in Phase 3, integrating the May-June, 2009 in 5 elicitation workshops around the BN models with the monitoring and reporting func- state. It was used to generate BNs of 100 threat- tions of ABC. For each model, the user enters evidence ened species and communities. In these trials, the for the BN, for any of the Action, Threat or Asset- facilitators were DSE personnel9 overseeing the devel- Factor nodes, along with meta-data. This evidence is opment of ABC-BN, while the workshop participants stored in the database with the BN. The model is then were other ABC monitors. These gave very positive re-run with this evidence, and an Outcome Report is 9 The facilitators were authors Moorrees and Lucas – produced. This report contains a summary of the pos- ABC administrators, as well as item and location monitors. feedback, as well as suggestions for improvement that DSE (2009). Actions for biodiversity conservation (abc): were adopted for Phase 3. Managing our threatened species and communities. http://www.dse.vic.gov.au/DSE/nrenpa.nsf/LinkView Phase 3 was deployed early April, 2011, with the first /487AAFDF542DDAC6CA25703F001C16FEB44D7EEB86E4BDFD round of outcomes for 100 models due at the end of CA257115001408B8. June. We intend to undertake a more formal evalua- Hope, L., A. Nicholson, and K. Korb (2002). Knowledge tion of both the tool, and of the individual models de- engineering tools for probability elicitation. Technical veloped by it. The tool can be evaluated by measuring report 2002/111, School of Computer Science and Soft- ware Engineering, Monash University. the rate of elicitation (e.g. number of models, number of parameters), with qualitative feedback from the ex- Jensen, F. V. and T. D. Nielsen (2007). Bayesian networks and decision graphs (2nd ed.). New York: Springer Ver- perts regarding their level of comfort using the tool. lag. The quality of the models is harder to assess, but we Korb, K. B. and A. E. Nicholson (2010). Bayesian artificial intend to have a selection (10%) reviewed by experts intelligence (2nd ed.). Chapman & Hall/CRC. not involved in the elicitation or approval process. Laskey, K. and S. Mahoney (2000). Network engineering for agile belief network models. IEEE: Transactions on 9 CONCLUSION Knowledge and Data Engineering 12 (4), 487–498. Pearl, J. (1988). Probabilistic Reasoning in Intelligent Sys- tems. San Mateo, CA: Morgan Kaufmann. We have described ABC-BN, a tool for building, main- taining and using Bayesian networks in an existing en- Pollino, C., O. Woodberry, A. Nicholson, K. Korb, and B. T. Hart (2007). Parameterisation of a Bayesian vironmental management application. In contrast to network for use in an ecological risk management case most knowledge engineering of ecological applications study. Environmental Modelling and Software 22 (8), to date, ABC-BN supports the construction of a large 1140–1152. number of simple, standardized BNs over a relatively Renken, H. and P. J. Mumby (2009). Modelling the dy- short time period. It supports iterative and incremen- namics of coral reef macroalgae using a Bayesian belief tal model construction, including hybrid qualitative network approach. Ecological Modelling 220 (9-10), 1305 and quantitative parameter elicitation. It allows users – 1314. to do what-if predictive and diagnostic scenario rea- Smith, C., A. Howes, B. Price, and C. McAlpine (2007). soning, and the BN models are integrated with mon- Using a Bayesian belief network to predict suitable habi- tat of an endangered mammalThe Julia Creek dunnart itoring data and reporting, providing outcome status (Sminthopsis douglasi). Biological Conservation 139, reports for both individual items as well as status sum- 333–347. maries for sets of items. Overall, the tool allows man- Uusitalo, L. (2007). Advantages and challenges of Bayesian agers to estimate the costs associated with actions to networks in environmental modelling. Ecological Mod- mitigate threats and objectively assess the relative im- elling 203 (3-4), 312–318. portance of actions for different species populations van der Gaag, L. C., S. Renooij, C. L. M. Witteman, and community occurrences. B. M. P. Aleman, and B. G. Taal (1999). How to elicit many probabilities. San Francisco, CA, pp. 647–654. Varis, O. and S. Kuikka (1999). Learning Bayesian decision References analysis by doing: lessons from environmental and nat- Boehm, B. W. (1988). A spiral model of software develop- ural resources management. Ecological Modelling 119, ment and enhancement. IEEE Computer , 61–72. 177–195(19). Boneh, T. (2010). Ontology and Bayesian decision net- works for supporting the meteorological forecasting pro- cess. Ph. D. thesis, Clayton School of Information Tech- nology, Monash University. Borsuk, M., C. Stow, and K. Reckhow (2004). A Bayesian network of eutrophication models for synthesis, pre- diction, and uncertainty analysis. Ecological Mod- elling 173 (2-3), 219–239. Brooks, F. (1995). The Mythical Man-Month: Essays on Software Engineering (Second ed.). Reading, MA: Addison-Wesley. Chee, Y., M. Burgman, and J. Carey (2005). Use of a Bayesian network decision tool to manage environmental flows in the Wimmera river, Victoria. Report No. 4, LWA/MDBC Project UMO43: Delivering Sustainability Through Risk Management, University of Melbourne, Australia. Figure 12: Model management page Figure 13: Threat selector page Figure 14: Action and Asset Factor selector page Figure 15: Verbal cues page Figure 16: Example outcome page