Research Article  Open Access
Stefano Beretta, Mauro Castelli, Ivo Gonçalves, Roberto Henriques, Daniele Ramazzotti, "Learning the Structure of Bayesian Networks: A Quantitative Assessment of the Effect of Different Algorithmic Schemes", Complexity, vol. 2018, Article ID 1591878, 12 pages, 2018. https://doi.org/10.1155/2018/1591878
Learning the Structure of Bayesian Networks: A Quantitative Assessment of the Effect of Different Algorithmic Schemes
Abstract
One of the most challenging tasks when adopting Bayesian networks (BNs) is the one of learning their structure from data. This task is complicated by the huge search space of possible solutions and by the fact that the problem is NPhard. Hence, a full enumeration of all the possible solutions is not always feasible and approximations are often required. However, to the best of our knowledge, a quantitative analysis of the performance and characteristics of the different heuristics to solve this problem has never been done before. For this reason, in this work, we provide a detailed comparison of many different stateoftheart methods for structural learning on simulated data considering both BNs with discrete and continuous variables and with different rates of noise in the data. In particular, we investigate the performance of different widespread scores and algorithmic approaches proposed for the inference and the statistical pitfalls within them.
1. Introduction
Bayesian networks (BNs) have been applied to several different fields, ranging from the water resource management [1] to the discovery of gene regulatory networks [2, 3]. The task of learning a BN can be divided into two subtasks: (1) structural learning, i.e., identification of the topology of the BN, and (2) parametric learning, i.e., estimation of the numerical parameters (conditional probabilities) for a given network topology. In particular, the most challenging task of the two is the one of learning the structure of a BN. Different methods have been proposed to face this problem, and they can be classified into two categories [4–6]: (1) methods based on detecting conditional independences, also known as constraintbased methods, and (2) score + search methods, also known as scorebased approaches. It must be noticed that hybrid methods have also been proposed in [7] but, for the sake of clarity, here, we limit our discussion to the two mainstream approaches to tackle the task.
As discussed in [8], the input of the former algorithms is a set of conditional independence relations between subsets of variables, which are used to build a BN that represents a large percentage (and, whenever possible, all) of these relations [9]. However, the number of conditional independence tests that such methods should perform is exponential and, thus, approximation techniques are required.
Although constraintbased learning is an interesting approach, as it is close to the semantic of BNs, most of the developed structure learning algorithms fall into the scorebased method category, given the possibility of formulating such a task in terms of an optimization problem. As the name implies, these methods have two major components: (1) a scoring metric that measures the quality of every candidate BN with respect to a dataset and (2) a search procedure to intelligently move through the space of possible networks, as this space is enormous. More in detail, as shown in [10, 11], searching this space for the optimal structure is an NPhard problem, even when the maximum number of parents for each node is constrained.
Hence, regardless of the strategy to learn the structure, one wishes to pursue, greedy local search techniques and heuristic search approaches need to be adopted to tackle the problem of inferring the structure of BNs. However, to the best of our knowledge, a quantitative analysis of the performance of these different techniques has never been done. For this reason, here, we provide a detailed assessment of the performance of different stateoftheart methods for structural learning on simulated data, considering both BNs with discrete and continuous variables and with different rates of noise in the data. More precisely, we investigate the characteristics of different scores proposed for the inference and the statistical pitfalls within both the constraintbased and scorebased techniques. Furthermore, we study the impact of various heuristic search approaches, namely, hill climbing, tabu search, and genetic algorithms.
We notice that, although we here aim to cover some of the main ideas in the area of structure learning of BNs, several interesting topics are beyond the scope of this work [12]. In particular, we refer to a more general formulation of the problem [6], and we do not consider, for example, contexts where it is possible to exploit prior knowledge in order to make the tasks computationally affordable [13]. At the same time, in this work, we do not investigate in detail performance related to causal interpretations of the BNs [14].
This work extends previous investigation performed in the same area [15, 16] and is structured as follows. In the next two sections, we provide a background on both Bayesian networks and heuristic search techniques (see Section 2 and Section 3). In Section 4, we describe the results of our study, and in Section 5, we conclude the paper.
2. Bayesian Networks
BNs are graphical models representing the joint distribution over a set of random variables through a direct acyclic graph (DAG) , where the nodes in represent the variables, and the arcs encode any statistical dependence among them. Similarly, the lack of arcs among variables subsumes statistical independence. In this DAG, the set of variables with an arc toward a given node is its set of “parents.” Formally, a Bayesian network [6] is defined as a pair over the variable , with arcs and realvalued parameter . When the structure of a BN is known, it is possible to compute the joint distribution of all the variables as the product of the conditional distributions on each variable given its parents. where is a probability density function.
However, even if we consider the simplest case of binary variables, the number of parameters in each conditional probability table is still exponential in size. For example, in the case of binary variables, the total number of parameters needed to compute the full joint distribution is of size , where is the cardinality of the parent set of each node. Notice that, if a node does not have parents, the total number of parameters to be computed is 1, which corresponds to its marginal probability.
Moreover, the usage of the symmetrical notion of conditional dependence poses further limitations to the task of learning the structure of a BN: two arcs and in a network can in fact equivalently denote dependence between variables and ; this leads to the fact that two DAGs having a different structure can sometimes model an identical set of independence and conditional independence relations (Iequivalence). This yields to the concept of Markov equivalence class as a partially directed acyclic graph where the arcs that can take either orientation are left undirected [6]. In this case, all the structures within the Markov equivalence class are equivalently “good” in representing the data, unless a causal interpretation of the BN is given [17].
In the literature, there are two families of methods to learn the structure of a BN from data. The idea behind the first group of methods is the one of learning the conditional independence relations of the BN from which, in turn, the network is learned. These methods are often referred to as constraintbased approaches. The second group of methods, the socalled scorebased approaches, formulates the task of structure learning as an optimization problem, with scores aimed at maximizing the likelihood of the data given the model. However, both the approaches are known to lead to NPhard formulations and, because of this, heuristic methods need to be used to find near optimal solutions with high probability, in a reasonably small number of iterations.
2.1. ConstraintBased Approaches
We now briefly describe the main idea behind this class of approaches. For a detailed discussion of this topic, we refer to [9, 18].
This class of methods is aimed at building a graph structure to reflect the dependence and independence relations in the data that match the empirical distribution. Notwithstanding, the number of conditional independence tests that such algorithms would have to perform among any pair of nodes to test all possible relations is exponential and, because of this, the introduction of some approximations is required.
We now provide some details on two constraintbased algorithms that have been proven to be efficient and of widespread usage: the PC algorithm [9] and the Incremental Association Markov Blanket (IAMB) [18].
2.1.1. The PC Algorithm
This algorithm [9] starts with a fully connected graph and, on the basis of pairwise independence tests, it iteratively removes all the extraneous edges. To avoid an exhaustive search of separating sets, the edges are ordered to consider the correct ones early in the search. Once a separating set is found, the search for that pair ends. The PC algorithm orders the separating sets by increasing values of size , starting from 0 (the empty set) until (where is the number of variables). The algorithm stops when every variable has less than neighbors since it can be proven that all valid sets must have already been chosen. During the computation, the bigger the value of is, the larger the number of separating sets must be considered. However, as gets big, the number of nodes with degree or higher must have dwindled considerably. Thus, in practice, we only need to consider a small subset of all the possible separating sets.
2.1.2. Incremental Association Markov Blanket Algorithm
Another constraintbased learning algorithm uses the Markov blankets [6] to restrict the subset of variables to test for independence. Thus, when this knowledge is available in advance, we do not need to test a conditioning on all possible variables. A widely used and efficient algorithm for Markov blanket discovery is IAMB which, for each variable , keeps track of a hypothesis set , which is the set of nodes that may be parents of . The goal is, for a given , to obtain at the end of the algorithm, a Markov blanket of equals to . IAMB consists of a forward and a backward phase. During the forward phase, it adds all the possible variables into that could be in , while in the backward phase, it removes all the false positive variables from the hypothesis set, leaving the true . The forward phase begins with an empty for each . Then, iteratively, variables with a strong association with (conditioned on all the variables in ) are added to the hypothesis set. This association can be measured by a variety of nonnegative functions, such as mutual information. As grows large enough to include , the other variables in the network will have very little association with , conditioned on . At this point, the forward phase is complete. The backward phase starts with that contains and false positives, which will have small conditional associations, while true positives will associate strongly. Using this test, the backward phase is able to iteratively remove the false positives, until all but the true negatives are eliminated.
2.2. ScoreBased Approaches
These approaches is aimed at maximizing the likelihood of a set of observed data , which can be computed as the product of the probability of each observation. Since we want to infer a model that best explains the observed data, we define the likelihood of observing the data given a specific model as
Practically, however, for any arbitrary set of data, the most likely graph is always the fully connected one, since adding an edge can only increase the likelihood of the data, i.e., this approach overfits the data. To overcome this limitation, the likelihood score is almost always combined with a regularization term that penalizes the complexity of the model in favor of sparser solutions [6].
As already mentioned, such an optimization problem leads to intractability, due to the enormous search space of the valid solutions. Because of this, the optimization task is often solved with heuristic techniques. Before moving on to describe the main heuristic methods employed to face such complexity (see Section 3), we now give a short description of a particularly relevant and known score, called Bayesian Information Criterion (BIC) [19], as an example of scoring function adopted by several the scorebased methods.
2.2.1. The Bayesian Information Criterion
BIC uses a score that consists of a loglikelihood term and a regularization term that depend on a model and data : where denotes the data, denotes the number of samples, and denotes the number of parameters in the model. We recall that in this formulation, the BIC score should be maximized. Since, in general, depends on the number of parents of each node, it is a good metric for model complexity. Moreover, each edge added to increases the complexity of the model. Thus, the regularization term based on favors graphs with fewer edges and, more specifically, fewer parents for each node. The term log essentially weighs the regularization term. The effect is that the higher the weight, the more sparsity will be favored over “explaining” the data through maximum likelihood.
Notice that the likelihood is implicitly weighted by the number of data points since each point contributes to the score. As the sample size increases, both the weight of the regularization term and the “weight” of the likelihood increase. However, the weight of the likelihood increases faster than that of the regularization term. This means that, with more data, the likelihood will contribute more to the score, and we may trust our observations more and have less need for regularization. Statistically speaking, BIC is a consistent score [6]. Consequently, contains the same independence relations as those implied by the true structure.
3. Heuristic Search Techniques
We now describe some of the main stateoftheart search strategies that we took into account in this work. In particular, as stated in Section 1, we considered the following search methods: hill climbing, tabu search, and genetic algorithms.
3.1. Hill Climbing
Hill climbing (HC) is one of the simplest iterative techniques that have been proposed for solving optimization problems. While HC consists of a simple and intuitive sequence of steps, it is a good search scheme to be used as a baseline for comparing the performance of more advanced optimization techniques.
Hill climbing shares with other techniques (like simulated annealing [20] and tabu search [21]) the concept of neighborhood. Search methods based on this latter concept are iterative procedures in which a neighborhood is defined for each feasible solution , and the next solution is searched among the solutions in . Hence, the neighborhood is a function that assigns to each solution in the search space a (nonempty) subset of .
The sequence of steps of the hill climbing algorithm, for a maximization problem w.r.t. a given objective function , are the following: (1)Choose an initial solution in (2)Find the best solution in (i.e., the solution such that for every in )(3)If , then stop; else, set and go to step 2
As it is clear from the aforementioned algorithm, hill climbing returns a solution that is a local maximum for the problem at hand. This local maximum does not generally correspond to the global minimum for the problem under exam, that is, hill climbing does not guarantee to return the best possible solution for a given problem. To counteract this limitation, more advanced neighborhood search methods have been defined. One of these methods is tabu search, an optimization technique that uses the concept of “memory.”
3.2. Tabu Search
Tabu search (TS) is a metaheuristic that guides a local heuristic search procedure to explore the solution space beyond local optimality. One of the main components of this method is the use of an adaptive memory, which creates a more flexible search behavior. Memorybased strategies are therefore the main feature of TS approaches, founded on a quest for “integrating principles,” by which alternative forms of memory are appropriately combined with effective strategies for exploiting them.
Tabus are one of the distinctive elements of TS when compared to hill climbing or other local search methods. The main idea in considering tabus is to prevent cycling when moving away from local optima through nonimproving moves. When this situation occurs, something needs to be done to prevent the search from tracing back its steps to where it came from. This is achieved by declaring tabu (disallowing) moves that reverse the effect of recent moves. For instance, let us consider a problem where solutions are binary strings of a prefixed length, and the neighborhood of a solution consists of the solutions that can be obtained from by flipping only one of its bits. In this scenario, if a solution has been obtained from a solution by changing one bit , it is possible to declare a tabu to avoid to flip back the same bit of for a certain number of iterations (this number is called the tabu tenure of the move). Tabus are also useful to help in moving the search away from previously visited portions of the search space and, thus, perform more extensive exploration.
As reported in [22], tabus are stored in a shortterm memory of the search (the tabu list) and usually, only a fixed limited quantity of information is recorded. It is possible to store complete solutions, but this has a negative impact on the computational time required to check whether a move is a tabu or not and, moreover, it requires a vast amount of space. The second option (which is the one commonly used) involves recording the last few transformations performed to obtain the current solution and prohibiting reverse transformations.
While tabus represent the main distinguished feature of TS, this feature can introduce other issues in the search process. In particular, the use of tabus can prohibit attractive moves, or it may lead to an overall stagnation of the search process, with a lot of moves that are not allowed. Hence, several methods for revoking a tabu have been defined [23], and they are commonly known as aspiration criteria. The simplest and most commonly used aspiration criterion consists of allowing a move (even if it is tabu) if it results in a solution with an objective value better than that of the current bestknown solution (since the new solution has obviously not been previously visited).
The basic TS algorithm, considering the maximization of the objective function , works as follows: (1)Randomly select an initial solution in the search space , and set and , where is the best solution so far, and the iteration counter(2)Set and generate the subset of the admissible neighborhood solutions of (i.e., nontabu or allowed by aspiration)(3)Choose the best in and set (4)If , then set (5)Update the tabu and the aspiration conditions(6)If a stopping condition is met, then stop; else, go to step 2.
The most commonly adopted conditions to end the algorithm are when the number of iterations () is larger than a maximum number of allowed iterations or if no changes to the best solution have been performed in the last iterations (as it is in our tests).
Specifically, in our experiments, we modeled for both HC and TS the possible valid solutions in the search space as a binary adjacency matrix describing acyclic directed graphs. The starting point of the search is the empty graph (i.e., without any edge), and the search is stopped when the current best solution cannot be improved with any move in its neighborhood.
The algorithms then consider a set of possible solutions (i.e., all the directed acyclic graphs) and navigate among them by means of 2 moves: insertion of a new edge or removal of an edge currently in the structure. We also recall that in the literature, many alternatives are proposed to navigate the search space when learning the structure of Bayesian network (see [24, 25]). But, for the purpose of this work, we preferred to stick with the classical (and simpler) ones.
3.3. Genetic Algorithms
Genetic algorithms (GAs) [26] are a class of computational models that mimic the process of natural evolution. GAs are often viewed as function optimizers although the range of problems to which GAs have been applied is quite broad. Their peculiarity is that potential solutions that undergo evolution are represented as fixed length strings of characters or numbers. Generation by generation, GAs stochastically transform sets (also called populations) of candidate solutions into new, hopefully improved, populations of solutions, with the goal of finding one solution that suitably solves the problem at hand. The quality of each candidate solution is expressed by using a userdefined objective function called fitness. The search process of GAs is shown in Figure 1.
To transform a population of candidate solutions into a new one, GAs make use of particular operators that transform the candidate solutions, called genetic operators: crossover and mutation. Crossover is traditionally used to combine the genetic material of two candidate solutions (parents) by swapping a part of one individual (substring) with a part of the other. On the other hand, mutations introduce random changes in the strings representing candidate solutions. In order to be able to use GAs to solve a given optimization problem, candidate solutions must be encoded into strings and, often, also the genetic operators (crossover and mutation) must be specialized for the considered context.
GAs have been widely used to learn the BN structure considering the search space of the DAGs. In the large majority of the works [27–32], the GA encodes the connectivity matrix of the BN structure in its individuals. This is the same approach used in our study. Our GA follows the common structure: (1)Generate the initial population(2)Repeat the following operations until the total number of generations is reached: (a)Select a population of parents by repeatedly applying the parent selection method(b)Create a population of offspring by applying the crossover operator to each set of parents(c)For each offspring, apply one of the mutation operators with a given mutation probability(d)Select the new population by applying the survivor selection method(3)Return the best performing individual
Unless stated otherwise, the following description is valid for both GA variants (discrete and continuous). The initialization method and the variation operators used in our GA ensure that every individual is valid, i.e., each individual is guaranteed to be an acyclic graph. The initialization method creates individuals with exactly connections between variables, where is the total number of variables. A connection is only added if the graph remains acyclic. The nodes being connected are selected with uniform probability from the set of variables. In the continuous variant, since the input data is normalized, the value associated with each connection is randomly generated between 0.0 and 1.0, with uniform probability. The crossover operates over two parents and returns one offspring. The offspring is initially a copy of the first parent. Afterward, a node with at least one connection is selected from the second parent and all the valid connections starting from this node are added to the offspring.
Three mutation operators are considered in our GA implementation: add connection mutation, remove connection mutation, and perturbation mutation. The first two are applied in both GA variants, while the perturbation mutation is only applied in the continuous variant. The offspring resulting from the add connection mutation operator differs from the parent in having an additional connection. The newly connected nodes are selected with uniform probability. In the continuous variant, the value associated with the new connection is randomly generated between 0.0 and 1.0 with uniform probability. Similarly, the offspring resulting from the remove connection mutation operator differs from the parent in having one less connection. The nodes to be disconnected are selected with uniform probability. The perturbation mutation operator applies Gaussian perturbations to the values associated with at most N/2 connections. The total number of perturbations may be less than N/2 if the individual being mutated has less than N/2 connections. Each value is perturbed following a Gaussian distribution having mean 0.0 and standard deviation 1.0. Any resulting value below 0.0 or above 1.0 is bounded to 0.0 or 1.0, respectively. Regardless of the GA variant, mutation is applied with a probability of 0.25. When a mutation is being applied, the specific mutation operator is selected with uniform probability from the available options (two in the discrete variant and three in the continuous variant). The mutation operator of the GA works by applying the perturbation to the existing values associated to each edge of the solutions. Since such modification to the value should not be highly disruptive, a common choice is to employ a Gaussian probability distribution having mean 0 and standard deviation 1.
In terms of parameters, a population of size 100 is used, with the evolutionary process being able to perform 100 generations. Parents are selected by applying a tournament of size 3. The survivor selection is elitist in the sense that it ensures that the best individual survives to the next generation.
4. Results and Discussion
We made use of a large set of simulations on randomly generated datasets with the aim of assessing the characteristics of the stateoftheart techniques for structure learning of BNs.
We generated data for both the case of discrete (2 values, i.e., 0 or 1) and continuous (we used 4 levels, i.e., 1, 2, 3, and 4) random variables. Notice that, for computational reasons, we discretized our continuous variables using only 4 categories. For each of them, we randomly generated both the structure (i.e., 100 weakly connected DAGs having 10 and 15 nodes) and the related parameters (we generated random values in (0, 1) for each entry of the conditional probability tables attached to the network structure) to build the simulated BNs. We also considered 3 levels of density of the networks, namely, 0.4, 0.6, and 0.8, of the complete graph. For each of these scenarios, we randomly sampled from the BNs’ several datasets of different size, based on the number of nodes. Specifically, for networks of 10 variables, we generated datasets of 10, 50, 100, and 500 samples, while for 15 variables, we considered datasets of 15, 75, 150, and 750 samples. Furthermore, we also considered additional noise in the samples as a set of random entries (both false positives and false negatives) in the dataset. We recall that, based on sample size, the probability distribution encoded in the generated datasets may be different from the one subsumed by the related BN. However, here, we also consider additional noise (besides the one due to sample size) due, for example, to errors in the observations. We call noisefree, the datasets in which such an additional noise is not applied. To this extent, we considered noisefree dataset (noise rate equals 0%) and dataset with an error rate of 10% and 20%. In total, this led us to a total number of 14400 random datasets.
For all of them, we considered both the constraintbased and the scorebased approaches to structural learning. From the former category of methods, we considered the PC algorithm [9] and the IAMB [18]. We recall that these methods return a partially directed graph, leaving undirected the arcs that are not unequivocally directable. In order to have a fair comparison with the scorebased method which returns DAGs, we randomly resolved the ambiguities, by generating random solutions (i.e., DAGs) consistent with the statistical constraints by PC and IAMB (that is, we select a random direction for the undirected arcs).
Moreover, among the scorebased approaches, we consider 3 maximum likelihood scores, namely, loglikelihood [6], BIC [19], and AIC [33] (for continuous variables we used the corresponding Gaussian likelihood scores). For all of them, we repeated the inference on each configuration by using HC, TS, and GA as search strategies.
This led us to 11 different methods to be compared, for a total of 158400 independent experiments. To evaluate the obtained results, we considered both false positives (FP) (i.e., arcs that are not in the generative BN but that are inferred by the algorithm) and false negatives (FN) (i.e., arcs that are in the generative BN but that are not inferred by the algorithm). Also, with TP (true positives) being the arcs in the generative model and TN (true negatives) the arcs that are not in the generative model, for all the experiments, we considered the following metrics:
4.1. Results of the Simulations
In this section, we comment on the results of our simulations. As anticipated, we computed precision, recall (sensitivity), and specificity, as well as accuracy and Hamming distance, to assess the performance and the underfit/overfit tradeoff of the different approaches. Overall, from the obtained results, it is straightforward to notice that methods including more edges in the inferred networks are also more subject to errors in terms of accuracy, which may also resemble a bias of this metric that tends to penalize solutions with false positive edges rather than false negatives. On the other hand, since a typical goal of the problems involving the inference of BNs is the identification of novel relations (that is, proposing novel edges in the network), underfitting approaches could be more effective in terms of accuracy, but less useful in practice.
With a more careful look, the first evidence we obtained from the simulations is that the two parameters with the highest impact on the inferred networks are the density and the number of nodes (i.e., network size). For this reason, we first focused our attention on these two parameters, and we analyzed how the different tested combinations of methods and scores behave.
As shown in Figure 2, all the approaches seem to perform better when dealing with lowdensity networks, in fact, for almost all the methods, the accuracy is higher for density equal to 0.4, while it is lower for density equal to 0.8. Since each edge of the network is a parameter that has to be “learned,” it is reasonable to think that the more edges are present in the BN, the harder becomes the problem to be solved when learning it. Moreover, we can also observe that the results in terms of accuracy obtained for BN of discrete variables are slightly better than those achieved on the continuous ones. To this extent, the only outlier is the loglik score combined with hill climbing and with tabu search on datasets with continuous variables, for which the trend is the opposite, w.r.t. that of all the other approaches. In fact, in both these cases, the accuracy is higher on highdensity datasets, and this is likely due to a very high overfit of the approach. It is interesting to notice that genetic algorithms (combined with the loglik score) is less affected by this problem, and this trend will also be shown in the next analyses.
In addition to the accuracy, we also computed the Hamming distance between the reconstructed solutions and the BNs used to generate the data, in order to quantify the errors of the inference process. This analysis showed that, besides the network density, also the number of nodes (parameters to be learned) influences the results, as reported in Figure 3. It is interesting to observe that, in the adopted experimental setup, we set the number of samples to be proportional to the number of nodes of the network, that is, for 10 nodes; in the same configurations, we have a lower number of samples, compared to the ones for 15 nodes. From a statistical point of view alone, we would expect the problem to be easier when having more samples to build the BN, since this would lead to more statistical power and, intuitively, should compensate for the fact that with 15 nodes, we have more parameters to learn than the ones for the case of 10 nodes. While this may be the case (in fact, we have similar accuracy for both 10 and 15 nodes), we also observe a constantly higher Hamming distance with more nodes. In fact, when dealing with more variables, we observed a shift in the performance, that is, even when the density is low, we observe more errors manifesting with higher values in terms of Hamming distance. This is due to the fact that, when increasing the number of variables, we also increase the complexity of the solutions.
A further analysis we performed was devoted to assessing the impact of both overfit and underfit. As it is possible to observe from the plots in Figures 4 and 5, we obtain two opposite behaviors, namely, the combinations of scores and search strategies show evident different trends in terms of sensitivity (recall), specificity, and precision. In detail, iamb and pc tend to underfit, since they both produce networks with consistently low density. While they achieve similar (high) results in terms of accuracy (see Figure 2), their trend toward underfit does not make them suited for the identification of novel edges, rather being more indicated for descriptive purposes. On the other hand, the loglik score, (mostly) independently from the adopted search technique, consistently overfits. Both these behaviors can be observed in the violin plots of Figures 4 and 5: for each density, we can observe that iamb/pc results have very low recall values, while the distribution of the results of the loglik score is centered on higher values.
The other two scores, i.e., AIC and BIC, present a better tradeoff between overfit and underfit, with BIC being less affected by the overfit, while AIC reconstructing slightly denser networks. Once again, this tradeoff between the two regularizators is well known in the literature and points to AIC being more suited for predictions while BIC for descriptive purposes.
Another relevant result of our analysis is the characterization of the performance of genetic algorithms in terms of sensitivity (recall). Specifically, it must be noticed that for all the three regularizators, genetic algorithms achieve similar results of both precision and specificity if compared with both hill climbing and tabu search, but in terms of sensitivity (recall), it presents reduced overfit. In fact, as it is possible to observe in the plots of Figures 4 and 5 for each score (i.e., loglik, AIC, and BIC), the sensitivity results of genetic algorithms are lower than those of both hill climbing and tabu search, highlighting the reduced impact of overfit.
In summary, we can draw the following conclusions. (i)Dense networks are harder to learn (see Figure 2)(ii)The number of nodes affects the complexity of the solutions, leading to higher Hamming distance (number of errors) even if with similar accuracy (see Figures 2 and 3)(iii)Networks with continuous variables are harder to learn compared to the binary ones (see Figure 2)(iv)iamb and pc algorithms tend to underfit, while loglik overfits (see Figures 4 and 5)(v)Genetic algorithms tend to reduce underfit (see Figures 4 and 5)
We conclude the section by providing values by Mann–Whitney U test [34] in support of such claims in Table 1. The claim for greater and less values, i.e., accuracy, is performed with the onetail test alternatives.

The tests are performed on all the configurations of our simulations.
5. Conclusions
Bayesian networks are a widespread technique to model dependencies among random variables. A challenging problem when dealing with BNs is the one of learning their structures, i.e., the statistical dependencies in the data, which may sometime pose a serious limit to the reliability of the results.
Despite their extensive use in a vast set of fields, to the best of our knowledge, a quantitative assessment of the performance of different stateoftheart methods to learn the structure of BNs has never been performed. In this work, we aim to go in the direction of filling this gap and we presented a study of different stateoftheart approaches for structural learning of Bayesian networks on simulated data, considering both discrete and continuous variables.
To this extent, we investigated the characteristics of 3 different likelihood scores, combined with 3 commonly used search strategy schemes (namely, genetic algorithms, hill climbing, and tabu search), as well as 2 constraintbased techniques for the BN inference (i.e., iamb and pc algorithms).
Our analysis identified the factors having the highest impact on the performance, that is, density, number of variables, and variable type (discrete vs continuous). In fact, as shown here, these settings affect the number of parameters to be learned, hence complicating the optimization task. Furthermore, we also discussed the overfit/underfit tradeoff of the different tested techniques with the constraintbased approaches showing trends toward underfitting and the loglik score showing high overfit. Interestingly, in all the configurations, genetic algorithms showed evidence of reducing the overfit, leading to denser structures.
Overall, we place our work as a starting effort to better characterize the task of learning the structure of Bayesian networks from data, which may lead in the future to a more effective application of this approach. In particular, we focused on the more general task of learning the structure of a BN [6], and we did not dwell on several interesting domainspecific topics, which we leave for future investigations [12–14].
Data Availability
The datasets used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was also financed through the Regional Operational Programme CENTRO2020 within the scope of the project CENTRO010145FEDER000006.
References
 S.S. Leu and Q.N. Bui, “Leak prediction model for water distribution networks created using a Bayesian network learning approach,” Water Resources Management, vol. 30, no. 8, pp. 2719–2733, 2016. View at: Publisher Site  Google Scholar
 F. Dondelinger, S. Lèbre, and D. Husmeier, “Nonhomogeneous dynamic Bayesian networks with Bayesian regularization for inferring gene regulatory networks with gradually timevarying structure,” Machine Learning, vol. 90, no. 2, pp. 191–230, 2013. View at: Publisher Site  Google Scholar
 W. Young, A. E. Raftery, and K. Yeung, “Fast Bayesian inference for gene regulatory networks using ScanBMA,” BMC Systems Biology, vol. 8, no. 1, p. 47, 2014. View at: Publisher Site  Google Scholar
 W. Buntine, “A guide to the literature on learning probabilistic networks from data,” IEEE Transactions on Knowledge and Data Engineering, vol. 8, no. 2, pp. 195–210, 1996. View at: Publisher Site  Google Scholar
 R. Daly, Q. Shen, and S. Aitken, “Learning Bayesian networks: approaches and issues,” The Knowledge Engineering Review, vol. 26, no. 02, pp. 99–157, 2011. View at: Publisher Site  Google Scholar
 D. Koller and N. Friedman, Probabilistic Graphical Models: Principles and Techniques, MIT Press, 2009.
 G. A. P. Saptawati and B. Sitohang, “Hybrid algorithm for learning structure of Bayesian network from incomplete databases,” in IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005, pp. 741–744, Beijing, China, 2005, IEEE. View at: Publisher Site  Google Scholar
 P. Larrañaga, H. Karshenas, C. Bielza, and R. Santana, “A review on evolutionary algorithms in Bayesian network learning and inference tasks,” Information Sciences, vol. 233, pp. 109–125, 2013. View at: Publisher Site  Google Scholar
 P. Spirtes, C. N. Glymour, and R. Scheines, Causation, Prediction, and Search, MIT press, 2000.
 D. M. Chickering, “Learning Bayesian networks is NPcomplete,” in Learning from Data, pp. 121–130, Springer, 1996. View at: Publisher Site  Google Scholar
 D. M. Chickering, D. Heckerman, and C. Meek, “Largesample learning of Bayesian networks is NPhard,” Journal of Machine Learning Research, vol. 5, pp. 1287–1330, 2004. View at: Google Scholar
 M. Drton and M. H. Maathuis, “Structure learning in graphical modeling,” Annual Review of Statistics and Its Application, vol. 4, no. 1, pp. 365–393, 2017. View at: Publisher Site  Google Scholar
 F. M. Stefanini, “Chain graph models to elicit the structure of a Bayesian network,” The Scientific World Journal, vol. 2014, Article ID 749150, 12 pages, 2014. View at: Publisher Site  Google Scholar
 C. HeinzeDeml, M. H. Maathuis, and N. Meinshausen, “Causal structure learning,” Annual Review of Statistics and Its Application, vol. 5, no. 1, pp. 371–391, 2018. View at: Publisher Site  Google Scholar
 S. Beretta, M. Castelli, I. Gonçalves, I. Merelli, and D. Ramazzotti, “Combining Bayesian approaches and evolutionary techniques for the inference of breast cancer networks,” in Proceedings of the 8th International Joint Conference on Computational Intelligence, pp. 217–224, Porto, Portugal, 2016. View at: Publisher Site  Google Scholar
 S. Beretta, M. Castelli, and R. Dondi, “Parameterized tractability of the maximumduo preservation string mapping problem,” Theoretical Computer Science, vol. 646, pp. 16–25, 2016. View at: Publisher Site  Google Scholar
 T. S. Verma and J. Pearl, “Equivalence and synthesis of causal models,” in Proceedings of the Sixth Annual Conference on Uncertainty in Artificial Intelligence (UAI '90), pp. 220–227, Cambridge, MA, USA, 1991. View at: Google Scholar
 I. Tsamardinos, C. F. Aliferis, A. R. Statnikov, and E. Statnikov, “Algorithms for large scale Markov blanket discovery,” in FLAIRS Conference, vol. 2, pp. 376–380, St. Augustine, FL, USA, 2003. View at: Google Scholar
 G. Schwarz, “Estimating the dimension of a model,” The Annals of Statistics, vol. 6, no. 2, pp. 461–464, 1978. View at: Publisher Site  Google Scholar
 C.R. Hwang, “Simulated annealing: theory and applications,” Acta Applicandae Mathematicae, vol. 12, pp. 108–111, 1988. View at: Google Scholar
 F. Glover, “Tabu search—part I,” ORSA Journal on Computing, vol. 1, no. 3, pp. 190–206, 1989. View at: Publisher Site  Google Scholar
 M. Gendreau and J.Y. Potvin, Eds., Handbook of Metaheuristics, Springer, 2010. View at: Publisher Site
 F. Glover, “Tabu search: a tutorial,” Interfaces, vol. 20, no. 4, pp. 74–94, 1990. View at: Publisher Site  Google Scholar
 D. M. Chickering, “Learning equivalence classes of Bayesiannetwork structures,” Journal of Machine Learning Research, vol. 2, pp. 445–498, 2002. View at: Google Scholar
 M. Teyssier and D. Koller, “Orderingbased search: a simple and effective algorithm for learning Bayesian networks,” 2012, https://arxiv.org/abs/1207.1429. View at: Google Scholar
 D. E. Goldberg and J. H. Holland, “Genetic algorithms and machine learning,” Machine Learning, vol. 3, no. 2/3, pp. 95–99, 1988. View at: Publisher Site  Google Scholar
 C. Cotta and J. Muruzábal, “Towards a more E.cient evolutionary induction of Bayesian networks,” in International Conference on Parallel Problem Solving from Nature, pp. 730–739, Granada, Spain, 2002. View at: Publisher Site  Google Scholar
 S. van Dijk, D. Thierens, and L. C. van der Gaag, “Building a GA from design principles for learning Bayesian networks,” in Genetic and Evolutionary Computation Conference, pp. 886–897, Chicago, IL, USA, 2003. View at: Publisher Site  Google Scholar
 R. Etxeberria, P. Larrañaga, and J. M. Picaza, “Analysis of the behaviour of genetic algorithms when learning Bayesian network structure from data,” Pattern Recognition Letters, vol. 18, no. 1113, pp. 1269–1273, 1997. View at: Publisher Site  Google Scholar
 K.J. Kim, J.O. Yoo, and S.B. Cho, “Robust inference of Bayesian networks using speciated evolution and ensemble,” in International Symposium on Methodologies for Intelligent Systems, pp. 92–101, Saratoga Springs, NY, USA, 2005. View at: Publisher Site  Google Scholar
 M. Mascherini and F. M. Stefanini, “MGA: a genetic algorithm to search for the best conditional Gaussian Bayesian network,” in International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCAIAWTIC'06), pp. 61–67, Vienna, Austria, 2005. View at: Publisher Site  Google Scholar
 P. Larrañaga, M. Poza, Y. Yurramendi, R. H. Murga, and C. M. H. Kuijpers, “Structure learning of Bayesian networks by genetic algorithms: a performance analysis of control parameters,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 9, pp. 912–926, 1996. View at: Publisher Site  Google Scholar
 H. Akaike, “Information theory and an extension of the maximum likelihood principle,” in Selected Papers of Hirotugu Akaike, pp. 199–213, Springer, 1998. View at: Publisher Site  Google Scholar
 H. B. Mann and D. R. Whitney, “On a test of whether one of two random variables is stochastically larger than the other,” The Annals of Mathematical Statistics, vol. 18, no. 1, pp. 50–60, 1947. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2018 Stefano Beretta et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.