Next Article in Journal
Data Hiding Based on a Two-Layer Turtle Shell Matrix
Next Article in Special Issue
Pre-Rationalized Parametric Designing of Roof Shells Formed by Repetitive Modules of Catalan Surfaces
Previous Article in Journal / Special Issue
A Novel Approach for Evaluation of Projects Using an Interval–Valued Fuzzy Additive Ratio Assessment (ARAS) Method: A Case Study of Oil and Gas Well Drilling Projects
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid MCDM Technique for Risk Management in Construction Projects

by
Kajal Chatterjee
1,*,
Edmundas Kazimieras Zavadskas
2,
Jolanta Tamošaitienė
2,
Krishnendu Adhikary
1 and
Samarjit Kar
1
1
Department of Mathematics, National Institute of Technology, Durgapur 713209, India
2
Faculty of Civil Engineering, Vilnius Gediminas Technical University, Sauletekio al. 11, LT-1022 Vilnius, Lithuania
*
Author to whom correspondence should be addressed.
Symmetry 2018, 10(2), 46; https://doi.org/10.3390/sym10020046
Submission received: 24 November 2017 / Revised: 30 January 2018 / Accepted: 9 February 2018 / Published: 13 February 2018
(This article belongs to the Special Issue Civil Engineering and Symmetry)

Abstract

:
Multi-stakeholder based construction projects are subject to potential risk factors due to dynamic business environment and stakeholders’ lack of knowledge. When solving project management tasks, it is necessary to quantify the main risk indicators of the projects. Managing these requires suitable risk mitigation strategies to evaluate and analyse their severity. The existence of information asymmetry also causes difficulties with achieving Pareto efficiency. Hence, to ensure balanced satisfaction of all participants, risk evaluation of these projects can be considered as an important part of the multi-criteria decision-making (MCDM) process. In real-life problems, evaluation of project risks is often uncertain and even incomplete, and the prevailing methodologies fail to handle such situations. To address the problem, this paper extends the analytical network process (ANP) methodology in the D numbers domain to handle three types of ambiguous information’s, viz. complete, uncertain, and incomplete, and assesses the weight of risk criteria. The D numbers based approach overcomes the deficiencies of the exclusiveness hypothesis and completeness constraint of Dempster–Shafer (D–S) theory. Here, preference ratings of the decision matrix for each decision-maker are determined using a D numbers extended consistent fuzzy preference relation (D-CFPR). An extended multi-attributive border approximation area comparison (MABAC) method in D numbers is then developed to rank and select the best alternative risk response strategy. Finally, an illustrative example from construction sector is presented to check the feasibility of the proposed approach. For checking the reliability of alternative ranking, a comparative analysis is performed with different MCDM approaches in D numbers domain. Based on different criteria weights, a sensitivity analysis of obtained ranking of the hybrid D-ANP-MABAC model is performed to verify the robustness of the proposed method.

1. Introduction

In recent decades, projects in the construction sector have become more complex and risky due to the diverse nature of activities among global companies [1,2,3,4,5,6,7,8]. In comparison to other sectors, construction projects encounter more risks due to uncertainties occurring because of various construction practices, working conditions, mixed cultures and political conditions between host and home countries [9,10,11,12]. Thus, in this scenario, risk management can be considered a vital part of the decision-making process in construction projects. These projects may involve many stakeholders, in addition to uncertain socio-economic conditions at the project site, bringing big challenges to practitioners of the industry in recent decades [13,14]. Construction project failure may cause higher costs and time over-runs, requiring a systematic risk assessment and evaluation procedure to classify and respond to changes [15,16].
Thus, prioritisation among construction based risk portfolios, and finding suitable risk mitigation strategies for construction projects, can be introduced as multi-criteria decision making (MCDM) problems. Researchers have recently proposed new methods for prioritising risks in construction based projects [10,17,18,19]. In addition, the increasing dynamism of construction projects has resulted in extensive impreciseness and subjectivities in this risk investigation procedure. With respect to the identification of risk criteria, a methodology is needed to sort and prioritise criteria weights, based on specific environments and domain experts’ judgment. In the real world, since various uncertainties occur in the decision-making process due to subjective and qualitative judgment of decision-makers (DMs), so it is essential to develop a more optimised technique that can handle various types of uncertainties [15,20,21,22,23,24].
In this scenario, a proper decision-making methodology is required to solve multiple conflicting interdependent criteria when evaluating risks in construction projects. In recent years, the number of papers related to analytic hierarchy process (AHP) and analytic network process (ANP) methods, considering supplier selection procedure, has increased substantially [25,26,27,28,29]. However, increasing the number of criteria or comparison levels causes confusion in decision makers’ (DMs) judgments, resulting in incomplete decision-making and inconsistency in the evaluator’s judgments, thus reducing strategy selection ability. Under these circumstances, Herrera-Viedma et al. [30] proposed consistent fuzzy preference relations (CFPR) to evade inconsistency in the decision-making process, and thus models have been developed with CFPR structuring of the problem of multi-criteria knowledge based strategy selection both with AHP [31] and ANP [32,33]. The CFPR methodology requires less time, has computational simplicity, and also guarantees consistency of decision matrices. However, as CFPR is based on complete and certain information, there always exists a possible inconsistency risk due to the inability of DMs to deal with overcomplicated objects [34].
It is obvious that the approaches mentioned above can play a vital role under some special circumstances, but it also reveals more uncertainties due to the subjective judgment of experts’ assessment. For fuzzy set theory it is difficult to determine in advance membership function values before making any decision in an uncertain and vague environment [8]. Interval theory has the same deficiency [23]. In addition, the frame of discernment and basic probability assignment (BPS) present in dempster–shafer (D–S) evidence theory limits its ability to represent incomplete information in uncertain situations [34,35]. In order to overcome the above shortcomings and effectively handle various uncertain and incomplete information, D numbers [36], a special kind of random set, is applied in the construction of CFPR. The D-CFPR [34] method expresses the expert’s linguistic preference values using D numbers, and can also be converted to traditional CFPR. In recent years, papers related to D numbers based MCDM methods have begun to appear, viz. D numbers based vlse kriterijumska optimizacija i kompromisno resenje (D-VIKOR) [37], D number based grey relational projection (D-GRP) [38], D numbers based analytic hierarchy process (D-AHP) [39,40], D numbers based technique for order of preference by similarity to ideal solution (D-TOPSIS) [41], and D numbers based decision-making trial and evaluation laboratory (D-DEMATEL) [42].
Besides managing the various risks associated with construction projects, this study also attempts to categorise and assess their risk mitigation strategies, thus setting up a proper framework that is accountable to investors in the construction sector. Thus, a survey on risk mitigation strategies is performed, based on the recent works [9,23,43], to alleviate construction projects risks. Based on the above considerations, this paper also develops an extended version of the MABAC methodology in an uncertain and incomplete decision environment, in order to evaluate risk mitigation strategies in construction based projects. Some papers related to MABAC have been published in recent years, viz. traditional DEMATEL-MABAC [44], pythagorean fuzzy MABAC [45], interval type 2 fuzzy MABAC [46], interval-valued intuitionistic fuzzy MABAC [47], and the fuzzy AHP-MABAC model [48].
Thus, the key motivation of this paper is to develop a D numbers based ANP-MABAC decision-making methodology for prioritising construction project risks, and to find suitable mitigating strategies in uncertain and incomplete decision environments. In this paper, we choose the ANP methodology due to its ability to represent the potential interactions, interdependences, and feedback among the risk based criteria and sub-criteria. Hesamamiri et al. [33] developed a systematic framework combining ANP and CFPR to properly assess and select a knowledge management strategy.
In this paper, CFPR is taken into the decision matrix under D-ANP to find the priority vectors of the criteria for uncertain and incomplete environments. Thus, the main objectives of this research are as follows:
  • Categorise and describe proper risk issues concerning various socio-economic, technical, and geo-political based sectors correlated to construction projects.
  • Develop a logical structure incorporating a D-CFPR based ANP model for risk prioritisation during construction.
  • Identify and prioritise risk response factors in the construction industry based on the D-MABAC methodology.
This paper is organised as follows: Section 2 offers an outline of construction projects along with a review of risk assessment in the sector. Section 3 briefly discusses the preliminaries of D–S evidence theory and D numbers theory, along with their properties. In Section 4, algorithmic methodologies of D-CFPR, D-ANP, and D-MABAC are discussed. Section 5 demonstrates the effectiveness of the above methodology by presenting a numerical example on risk prioritisation and responses in the construction sector. A discussion based on sensitivity analysis is given in Section 6. Finally, the conclusions and future direction of the present research are given in Section 7.

2. Risks in Construction Projects

2.1. An Overview

The construction industry in general, as well as individual construction projects, deals with various threats, which are called risks. Risk assessment in construction projects has been applied differently from project to project (using various models of risk assessment) to evaluate the risk in certain activities of the project [49]. However, the socio-economic complexity involved in construction events makes it more risk prone, so that there may be negative effects on project sustainability [23]. Due to various complex factors, the construction industry is highly diverse and heterogeneous, experiencing a great deal of dynamic change with global sourcing and increasing price competition [50].
To overcome these risks, contractors have generally used high mark-ups, but this approach is no longer effective, as their margins have become smaller [51]. In recent decades, the stages involved in construction projects have become far more complex in nature, due to technological upgrading and stakeholder pressure, and are characterised by a number of uncertainties, which have a negative influence on the projects [52]. As risk free construction projects are impossible in real life, a controlled risk assessment procedure is required to manage various risks in the projects. The aim of this study is to highlight the main risks that construction projects face and the risk mitigation strategies used to manage them.

2.2. Previous Studies on Risk Assessment in Construction Projects

There have been substantial developments over the last four decades in research related to construction project management. Projects have been considered that are either exposed to risks, or have apparently inherited risk due to the participation of several stakeholders (as owners, contractors and designers); see [53] among others. For classifying and managing risks effectively, many methodologies have been suggested in the literature. In this section, a list of the existing approaches to construction project risk management is now briefly summarised.
Wang et al. [4] developed an alien eyes’ risk (AER) model, categorising the project risks and their mutual relationships, and proposing a qualitative risk mitigation framework. Schieg [17] adopted a risk management process in construction project management, concentrating more on personal area risks. Zavadskas et al. [23] presented risk assessment based on the MCDM method and applying TOPSIS grey and grey number based complex proportional assessment (COPRAS-G). Wen [54] integrated rough sets and artificial neural networks (ANN) for risk evaluation of construction projects. Fouladgar et al. [55] proposed a risk evaluation outline faced during tunneling operations based on fuzzy TOPSIS methodology. Taroun and Yang [56] hybridised the dempster–shafer (D–S) theory of evidence and evidential reasoning algorithm for structuring personal experience and professional judgment with a spreadsheet-based decision support system. Mohammadi and Tavakolan [25] combined fuzzy logic and AHP in traditional failure mode effect analysis (FMEA) for construction project risk assessment. Serpella et al. [18] applied a knowledge-based approach, based on a three-fold arrangement and risk management function, to address project risks in the construction management sector. Ebrat and Ghodsi [14] identified the risks in construction projects based on the adaptive neuro fuzzy inference system and stepwise regression model for the evaluation of project risks. Taylan et al. [15] proposed hybrid methodologies combining fuzzy AHP and fuzzy TOPSIS and applied the relative importance index method to prioritise the project risks based on the data obtained. Iqbal et al. [9] considered two types of risk management technique during project execution, viz. preventive techniques (to manage risk before the start of the project) and remedial techniques (after occurrence of the risk). Vafadarnikjoo et al. [24] developed an intuitive fuzzy decision-making trial and evaluation laboratory (DEMATEL) to prioritise risks associated with construction projects by using the risk breakdown structure. Ahmadi et al. [27] analysed the criteria for prioritising potential risk events and quantified it using fuzzy AHP. The best response action for a risk event is then identified with respect to the same criteria using a scope expected deviation index. Santos and Jungles [19] evaluate the completion of construction project risk by considering the correlation of delay and the schedule performance index along with any time over-run. Shin et al. [28] made a comparative analysis of AHP and fuzzy AHP to evaluate the potential risk factors at the construction site of a nuclear power plant. Kao et al. [57] proposed an integrated fuzzy ANP based balanced scorecard system for evaluation of relevant bilateral factors in Taiwanese construction projects. Burcar Dunovic et al. [58] assessed large infrastructure projects by integrating the risk impact cumulative distribution curve based MCDM approach. Yousefi et al. [59] proposed a neural network model for predicting emerging time and cost claims applied to Iranian construction projects. Valipour et al. [60] presented a fuzzy cybernetic ANP model for proper identification of public-private partnership project based risks. Ulubeyli and Kazaz [61] developed a fuzzy based sub-contractor selection model (CoSMo) for global based construction projects. Rajakallio et al. [62] analysed the solution delivery from a network perspective in integrated business model renewal. For assessing risk in deep foundation excavation, Valipour et al. [63] developed a step-wise weight assessment ratio analysis (SWARA) based complex proportional assessment (COPRAS) framework to analyse Iranian construction project uncertainty. Khanzadi et al. [64] solved the dispute resolution problem in the construction sector by considering a grey number based discrete zero-sum two-person matrix game model. Keshavarz Ghorabaee et al. [65] presented the hybrid fuzzy step-wise weight assessment ratio analysis (SWARA) based ‘evaluation based on distance from average solution’ (EDAS) model for assessment of the construction equipment by taking sustainability into account.

3. Preliminaries

3.1. Dempster–Shafer (D–S) Evidence Theory

To deal with real world information, which may be ambiguous, various imprecise decision-making models based on probability theory, fuzzy set theory, and D–S evidence theory have been developed [66]. D–S evidence theory directly expresses uncertain information by allocating the probability to the multiple object based subsets in lieu of individual items [67]. Due to its ability to compare pairs of evidence or belief functions when deriving new ones, and its superiority in an uncertain environment, evidence theory has been widely applied in various domains [22,34,39,68,69,70].
Certain basic definitions are now presented. Let U denote the frame of discernment representing a collective set of exhaustive and mutually exclusive events, and each element of 2 U (a power set in U ) represents a proposition [22]. Based on these, basic probability assignment (BPA) is defined as follows:
Definition 1.
Basic Probability Assignment (BPA)
A finite non-empty set of mutually exclusive and exhaustive hypotheses for any problem domain is called its frame of discernment. In lieu of a D–S evidence framework, the BPA is defined on a frame of discernment to express the imprecise judgements of experts [39]. Thus, if 2 U denotes the power set of a finite non-empty set U , then a BPA is defined as a mapping m satisfying (1) and (2):
m : 2 U [ 0 , 1 ] ,
m ( ϕ ) = 0   a n d   A 2 U m ( A ) = 1 ,
where ϕ is an empty set and A is any element of 2 U . If m ( A ) > 0 , A is called its focal element, and the union of all focal elements is the core of the mass function.
Example: Suppose there exists a task to assess a project. In the frame of D–S theory, the frame of discernment is the proposed project set B = { b 1 ,   b 2 ,   b 3 } .
As per the expert view, a BPA can be created to express their assessment result: m ( { b 1 } ) = 0.2 ;   m ( { b 2 } ) = 0.7 ;   m ( { b 2 ,   b 3 } ) = 0.1 , where b 1 = [ 0 ,   40 ] ,   b 2 = [ 41 ,   70 ] ,   b 3 = [ 71 ,   100 ] . In addition, the set B = { b 1 ,   b 2 ,   b 3 } is a frame of discernment in D–S theory with m ( { b 1 } )   +   m ( { b 2 } )   +   m ( { b 2 ,   b 3 } ) = 1 .

3.2. D Numbers Theory

Although D–S evidence theory is operative in the data fusion problem, it is restricted to handling semantic information where linguistic variables are not mutually exclusive [39,70]. Intuitively, if some hypotheses of D–S theory are removed reasonably, the ability to represent and handle uncertain information may greatly improve. Overall, in many practical scenarios, the experts fail to have complete information, and the assessment is done solely on the basis of partial information, resulting in an incomplete BPA. Based on this idea, Deng [36] proposed D numbers theory, a generalisation of evidence theory, in order to characterise ambiguous data, as defined in (3) and (4) below:
Definition 2.
D Numbers [36]
Let Ω be a finite nonempty set, D numbers is defined by a mapping:
D : Ω [ 0 , 1 ] ,
w i t h   B Ω D ( B ) 1   and   D ( ϕ ) = 0 ,
where ϕ is an empty set and B is a subset of Ω.
Compared with D–S evidence theory, the D numbers concept has the advantages that [34,39,42,71]:
  • Firstly, D numbers with nonexclusive hypothesis in each element of the frame of discernment is more applicable for linguistic assessment.
  • Secondly, in an evidence theory, a normal BPA must be complete, implying that the sum of all focal length elements in BPA is 1. D numbers allows the experts to input incomplete and uncertain information to the framework resulting in an incomplete BPA, thus releasing the completeness constraint. Thus, if B Ω D ( B ) = 1 , the information is said to be complete, and for B Ω D ( B ) <   1 , the information is said to be incomplete.
Example 1.
Let an expert give his assessment on the condition of a bridge, using D numbers, in a scale interval of [0,100]. The expert express his assessment in an incomplete BPA framework as follows:
D ( { a 1 } ) = 0.5 ;   D ( { a 2 } ) = 0.3 ;   D ( { a 1 ,   a 2 ,   a 3 } ) = 0.1 ,
where a 1 = [ 0 ,   60 ] ,   a 2 = [ 45 ,   75 ] ,   a n d   a 3 = [ 65 ,   100 ] .
Hence, the set of { a 1 ,   a 2 ,   a 3 } is not a frame of discernment, because the elements in the above set are not mutually exclusive. In addition, since D ( { a 1 } ) +   D ( { a 2 } ) +   D ( { a 1 ,   a 2 ,   a 3 } ) = 0.9 < 1 , the above information is incomplete. This example shows that the definition of D numbers is similar to the definition of the mass function.
Definition 3.
D numbers for a discrete set [36]
For a discrete set Ω = { b 1 , b 2 , , b i , , b n } , where b i R and b i b j ( i j ) , a special form of D numbers can be expressed as:
{ D ( { b i } ) = v i   ( i = 1 , 2 , , n )   or     denoted   as , D = { ( b 1 , v 1 ) ,   ( b 2 , v 2 ) , , ( b i , v i ) , , ( b n , v n ) } , where   v i > 0   a n d   i = 1 n v i 1 .
Definition 4.
Permutation invariability [22,71].
Two D numbers D 1 = { ( b 1 , v 1 ) ,   , , ( b i , v i ) , , ( b n , v n ) }   &   D 2 = { ( b n , v n ) ,   , , ( b i , v i ) , , ( b 1 , v 1 ) } are said to be invariable if:
D 1 D 2   .
Example 2.
If there are two D numbers:
D 1 = { ( 0.0 ,   0.7 ) ,   ( 1.0 ,   0.3 ) }   a n d   D 2 = { ( 1.0 ,   0.3 ) , ( 0.0 ,   0.7 ) } , then, D 1 D 2   .
Definition 5.
D numbers integration [6,36].
Let D = { ( b 1 , v 1 ) ,   ( b 2 , v 2 ) , , ( b i , v i ) , , ( b n , v n ) } be a D number; then, the integration representation I ( D ) of the D number is defined as:
I ( D ) = i = 1 n b i v i       .
Example 3.
Let D = { ( 1 ,   0.3 ) ,   ( 2 ,   0.4 ) , ( 3 ,   0.1 ) , ( 4 , 0.2 ) , ( 5 , 0.2 ) } , then I ( D ) = 1 × 0.3 + 2 × 0.4 + 3 × 0.1 + 4 × 0.2 + 5 × 0.2 = 3.2 .

4. Methodology

4.1. D-CFPR: D Numbers Extended CFPR

Based on the additive transitive property, Herrera-Viedma et al. [30] put forward the consistent fuzzy preference relation (CFPR) for structuring an n × n decision matrix, which requires only ( n 1 ) pair wise comparisons, in lieu of n ( n 1 ) / 2 comparisons needed for constructing a fuzzy preference relation. Preserving both the reciprocity and transitivity properties, CFPR is constructed only on complete and certain information but fails to deal with cases containing insufficient information [34,36]. Citing the same deficiency as in the case of fuzzy preference relations, Deng et al. [39] proposed the concept of a D numbers preference relation encompassing the fuzzy preference relations of the D numbers domain. In addition, considering the insufficiency in traditional CFPRs, Zuo et al. [42] proposed a D numbers consistent fuzzy preference relation matrix, abbreviated as D-CFPR matrix using D numbers to express linguistic preferences given by experts to construct the CFPR. In the following steps, we will discuss the algorithmic methodology of D-CFPR, where distribution assessments are assessed under incomplete or missing information.
Step 1: Construct a D-CFPR matrix ( R D ) . The D numbers extended CFPR is advocated to reinforce the capability of CFPR to express uncertain and incomplete information. A D numbers based preference relation on a set of criteria C = { C 1 , C 2 , , C n } is characterized by a n × n matrix R D = [ D i j ] n × n on the product set C × C , whose elements are formulated as per Equation (8), and represented in matrix form (9):
R D : C × C D ,
      C 1 C 2 C n R D = C 1 C 2 C n [ D 11 D 12 D 1 n D 21 D 22 D 2 n D n 1 D n 2 D n n ] ,
where D i j = { ( b i j 1 ,   v i j 1 ) , ( b i j 2 ,   v i j 2 ) , , ( b i j p ,   v i j p ) , } , D j i = ¬ D i j = { ( 1 b i j 1 ,   v i j 1 ) , ( 1 b i j 2 ,   v i j 2 ) , , ( 1 b i j p ,   v i j p ) , } , i , j { 1 , 2 , , n } ,   b i j p [ 0 , 1 ] ,   v i j p > 0 ,   p v i j p = 1 . Obviously, D i i = { ( 0.5 , 1.0 ) }     i { 1 , 2 , , n }   i n   R D .
In Equation (9), is R D called a D-CFPR as it is constructed based on ( n 1 ) pair wise comparisons, denoted as { D 12 , D 23 , , D ( n 1 ) n } representing a set of D numbers. Considering the set of preference values B = { D j i , 1 i < j n } , the elements of which are denoted D j i = { ( b j i 1 ,   v j i 1 ) , ( b j i 2 ,   v j i 2 ) , , ( b j i k ,   v j i k ) , } , which can also be represented as follows [42]:
D j i = j i + 1 2 D i ( i + 1 ) D ( i + 1 ) ( i + 2 ) D ( j 1 ) j ,
where each component ( b j i k ,   v j i k )   i n   D j i is obtained by:
b j i k = j i + 1 2 b i ( i + 1 ) x b ( i + 1 ) ( i + 2 ) y b ( j 1 ) j k ,   ( x , y , , z ) v j i k = ( x , y , . . . . . z ) Ω v i ( i + 1 ) x ×   v ( i + 1 ) ( i + 2 ) y   × × v ( j 1 ) j z , } ,
where Ω = { ( x , y , , z ) |   b j i k = j i + 1 2 b i ( i + 1 ) x b ( i + 1 ) ( i + 2 ) y b ( j 1 ) j k } , ( b i ( i + 1 ) x ,   v i ( i + 1 ) x ) is the x t h component of D i ( i + 1 ) , ( b ( i + 1 ) ( i + 2 ) y ,   v ( i + 1 ) ( i + 2 ) y ) is the y t h component of D ( i + 1 ) ( i + 2 ) , ( b ( j 1 ) j z ,   v ( j 1 ) j z ) is the z t h component of D ( j 1 ) j
Thus, based on the reciprocal property, the rest of the entries in D-CFPR (9) are calculated as per Equation (11) as follows:
D j i = ¬ D i j ,   i , j { 1 , 2 , , n } .
As per Equations (9)–(11), a D-CFPR can be constructed based on ( n 1 ) pair wise comparisons { D 12 , D 23 , , D ( n 1 ) n } . In the D-CFPR generated above, some values of the b i j ' s in D i j ,   i , j ( 1 , 2 , , n ) that fall in the interval [ a , 1 + a ] ,   a > 0 need to be transformed using Equation (12):
f : [ a , 1 + a ] [ 0 , 1 ] ,   f ( r ) = r + a 1 + 2 a .
The transformation function (12) works as a normalisation, which transforms the values of b i j ' s from [ a , 1 + a ] to the interval [0,1].
Step 2: Determine the crisp matrix R c . Convert the matrix R D = [ D i j ] n × n in (9) to a crisp matrix R C = [ c i j ] n × n (13) using the integration representation of D numbers (as per Equation (7)), where each element c i j = I ( D i j )   i , j = 1 , 2 , , n :
R c = [ c i j ] n × n = [ c 11 c 12 c 1 n c 21 c 22 c 2 n c n 1 c n 2 c n n ] .
Step 3: Construct a probability matrix R p . Based on the crisp matrix R C (13), construct a probability matrix R p = [ p i j ] n × n (14), representing the preference probability between a pair wise set of n criteria C = { C 1 , C 2 , , C n } :
R p = [ p i j ] n × n = [ p 11 p 12 p 1 n p 21 p 22 p 2 n p n 1 p n 2 p n n ] .
In R p , the element p i j = Pr ( C i C j ) , i , j { 1 , 2 , …… , n } , where represents “prefer to”. Based on (13), a set of rules is suggested to generate R p .
  • For the elements satisfying c i j + c j i = 1.0 ,
    If c i j > 0.5 , then Pr ( C i C j ) = 1   and   Pr ( C i C j ) = 0 ,
    If c i j 0.5 , then Pr ( C j > C i ) = 1   and   Pr ( C i > C j ) = 0   .
  • When c i j + c j i > 1.0 : c i j 0.5   a n d   c j i 0.5 ,
    If c i j 0.5 , then Pr ( C i C j ) = 1   and   Pr ( C j C i ) = 0 ,
    If c j i 0.5 , then Pr ( C j C i ) = 1   and   Pr ( C i C j ) = 0   .
  • when c i j + c j i < 1.0 : c i j < 0.5   a n d   c j i < 0.5 .
In this condition, the unallocated preference (up) is c u p = 1 ( c i j + c j i ) . The probability of one criteria outperforming another criteria is as follows:
If c i j < 0.5 ,   then Pr ( C i C j ) = 1 ( 0.5 c i j ) c u p ,
If c j i < 0.5 , then Pr ( C j C i ) = 1 ( 0.5 c j i ) c u p .
Step 4: Construct a triangular probability matrix R p T . Rank the criteria using the triangularisation procedure, viz. by maximising the sum of the values above, the main diagonal in the n × n square matrix in the final order is given as:
  • First, sum up each row of the n × n matrix and determine the row number with maximum value.
  • Then, assuming the obtained row number is k, delete the k-th row and k-th column in the matrix.
  • Replicate the two procedures above until the matrix is empty.
Thus, by applying this defined row deletion order operation on the matrix R p = [ p i j ] n × n (14), construct the triangular probability matrix R p T , shown in (15):
R p T = [ p i j T ] n × n = [ p 11 T p 12 T p 1 n T p 21 T p 22 T p 2 n T p n 1 T p n 2 T p n n T ] .
Step 5: Construct triangulated crisp matrix R c T . Firstly, the crisp matrix R c (13) is triangulated based on the triangular matrix R p T (15). From that step, the triangulated crisp matrix R c T (16) is derived:
R c T = [ c i j T ] n × n = [ c 11 T c 12 T c 1 n T c 21 T c 22 T c 2 n T c n 1 T c n 2 T c n n T ] .
Secondly, for elements satisfying R c T ( i ,   j ) + R c T ( j ,   i ) < 1 , a new “polishing operation” (17) is implemented to obtain a triangulated crisp matrix R k T (18):
R k T ( i ,   j ) = R c T ( i ,   j ) + 1 [ R c T ( i ,   j ) + R c T ( j ,   i ) ] 2 ,
R k T = [ k i j T ] n × n = [ k 11 T k 12 T k 1 n T k 21 T k 22 T k 2 n T k n 1 T k n 2 T k n n T ] .
Step 6: Calculate the relative priority weights of the criteria. Assume that the weight vector is W = ( w i ) T , where w i ( i = 1 , 2 , , n ) are the weights of criteria C i ( i = 1 , 2 , , n ) . The elements above and alongside the main diagonal of the matrix R k T = [ k i j T ] n × n (18) indicate the weight relationship of the criteria. Thus, by adding some necessary constraints, a set of Equation (19) is formed:
{ λ ( w 2 w 1 ) = k 22 T k 12 T λ ( w 3 w 2 ) = k 33 T k 23 T           λ ( w n w n 1 ) = k n n T k ( n 1 ) n T ,
where λ indicates the granular information about the pairwise comparison, which reveals the expert’s perceptive competency. The value of each weight w i ( i = 1 , 2 , , n ) , subjected to the parameter λ , relates to the expert’s cognitive aptitude. The values of λ highly depend on the influence of the experts’ judgment and belief function. Thus, a feasible outline (20) is obtained as follows:
λ = { λ _ ,   The   information   has   high   credibility n ,     The   information   has   medium   credibility n 2 2 ,     The   information   has   low   credibility ,
where λ _ signifies the lower bound of λ , λ _ = min { k | k λ _ } , and n is the number of alternatives [39]. The concrete priority weight value of each criteria is calculated here when λ = n .
Step 7: Inconsistency for the D-CFPR. The traditional CFPR is fully consistent when constructed under the transitivity property for n 1 preference values. The D numbers based CFPR is consistent, but, when reduced to classical CFPR, it shows inconsistency under uncertain or incomplete information. Thus, to express this inconsistency of D-CFPRs, an inconsistency degree (ID) (21) is defined, based on the triangular probability matrix R p T (18), as follows:
I . D . = i = 1 , j < i n R p T ( i , j ) n ( n 1 ) / 2 ,
where R p T ( i , j ) is an element of R p T , and n is the number of comparison objects. This emphasises that the inconsistency of the D matrix, and its acceptable level is decided by the DMs, whose subjective requirement regulates the tolerance level of the aforementioned inconsistency.

4.2. Evaluating the Risk Criteria Weight Using D-ANP

The evaluation of D-ANP methodology is composed of two phases.
The first phase emphasises the formation of pairwise judgments for every dependent relationship among given criteria C i ( i = 1 , 2 , , n ) , and determination of their priority weight. The priority weights thus obtained are input to the system-with-feedback supermatrix for computing the network influences amongst the different relationships.
The second phase, namely supermatrix evaluation, incorporates five steps: formation of the unweighted supermatrix, formation of the weighted supermatrix, normalisation of the weighted supermatrix (a column stochastic matrix), and finally convergence to a solution using the limited supermatrix.
The converged supermatrix will provide us with the relative priorities for each of the criteria (or sub-criteria) considered within clusters of the decision framework. Thus, the following algorithmic steps of D-ANP are as follows:
Step 1: Model construction and problem structuring. First, we properly outline the decision problem with detailed criteria and sub-criteria (if taken) and then delimit the cluster’s (dimension’s) network and elements (criteria set) within the given clusters. Next, we decide which inter- and inner-dependencies will prevail in the decision problem and clusters of the over-all feedback system.
Step 2: Pairwise comparison matrices and priority vectors. The expert inputs prerequisite for the ANP method are the pairwise judgments of the elements within each cluster, from which inter-and-inner-dependence matrices are formed. Primarily, three categories of pairwise comparisons are formed. First, the inner dependence comparison matrix, based on the criteria of different clusters (dimensions), is used to get the priority weight vector. Then, the pairwise comparison matrices obtained from criteria with respect to other factors (criteria) of the same cluster (dimension). Finally, the pairwise comparison matrix is developed by considering the factor (criteria) of a cluster (dimension) among factors (criteria) of the other cluster (dimension), which affect the criteria.
These pairwise comparison matrices, along with their valuation elicitation, constitute a modified version of D-AHP [22] and D-CFPR [34]. Based on Section 4.1, a brief summary for getting the priority weight of any pairwise comparison matrix is given below, the graphical description of which is shown in Figure 1.
  • In the first step, the D-CFPR matrix R D = [ D i j ] n × n , is constructed for n criteria, by considering the system as an input using Equations (9)–(12).
  • The D-CFPR matrix formed ( R D ) , is converted to a crisp matrix R C = [ c i j ] n × n , using the integration representation of D number, shown in Equation (13).
  • The probability matrix R p = [ p i j ] n × n is then constructed based on the derived crisp matrix ( R c ) using Equation (14), and it satisfies a set of rules in Step 3 of Section 4.1.
  • In the next step, using Equation (15), triangularisation R p T = [ p i j T ] n × n is applied to the probability matrix using local information that contains the preference relations of pairwise criteria.
  • Lastly, applying Equations (16)–(19), the crisp based triangular matrix R c T = [ c i j T ] n × n , is obtained, and relative priority weights w i ( i = 1 , 2 , , n ) of each criteria C i ( i = 1 , 2 , , n ) , based on clusters (dimensions) are calculated, thereby checking its inconsistency as per Equation (21).
Step 3: Formation of the unweighted supermatrix. The local priority weights resulting from the pairwise comparison are used as input in suitable columns of the unweighted constructed supermatrix, to obtain the global priorities in a system. As a result, a supermatrix takes the form of a partitioned matrix, each segment of which represents an association between two clusters in the given system. Thus, the supermatrix W Equation (22) formed is represented by sub-matrices W i j as W = [ W i j ] n × n ( i , j = 1 , 2 , , n ) . The size of the sub-matrix W i j Equation (23) depends on the compared factors (criteria). Interdependency between clusters is illustrated in Equation (22) by analysing both inter- and intra-relations among clusters.
Arrange all priority vectors, representing the impact of a given set of elements in a cluster on another element in the network, as sub-columns of the corresponding column of an unweighted supermatrix W as in Equations (22) and (23). This is composed of k clusters { D 1 , D 2 , , D k } , and linkages of these clusters { e k 1 , e k 2 , , e k n k } , are elements of the cluster D p ( p = 1 , 2 , , k ) . Each column of the sub-matrix W i j Equation (23) is the priority vector acquired from the identical pairwise judgment, indicating the significance of the elements in the i t h cluster with respect to an element in the j t h cluster:
D 1 D 2 D k e 11 e 12 e 1 ( n 1 ) e 21 e 22 e 2 ( n 2 ) e k 1 e k 2 e k ( n k ) W = D 1 D 2 D k e 11 e 12   e 1 ( n 1 ) e 21 e 22   e 2 ( n 2 ) e k 1 e k 2   e k ( n k ) [ W 11 W 12 . . . W 1 k W 21 W 22 . . . W 2 k . . . . . . . . . . . . W k 1 W k 2 . . . W k k ]   w h e r e   j = 1 k ( n j ) = n ,
W i j = [ W 11 i j W 1 j i j W 1 n j i j W i 1 i j W i j i j W i n j i j W n i 1 i j W n i j i j W n i n j i j ]   i , j = 1 , 2 , , k , .
Step 4: Determine the normalised weighted supermatrix. If there is no linkage between clusters D k and D l , then the sub-matrix W k l equals zero. We compute the weighted supermatrix W a = [ W ˜ i j ] n × n , by multiplying the unweighted matrix W = [ W i j ] n × n , Equation (23) by priority of dimensions V j ( j = 1 , 2 , , n ) , in this stage. As the weighted supermatrix ( W a ) needs to be stochastic, we normalise each column of it, and develop meaningful limiting priorities for determining overall cluster influences. This normalisation procedure ensures that the weighted supermatrix is column stochastic; it is finally represented by matrix W ^ = [ W ¯ i j ] n × n .
Step 5: Compute the limiting priorities for criteria weights. Finally, the column stochastic weighted supermatrix is raised to an appropriately large power until it converges. Thus, the weighted supermatrix W ^ is raised to limiting powers ( W ^ ) 2 m + 1 , m being an arbitrarily large number, to attain a steady-state limiting matrix W q . Details are shown in Equation (24):
W q = lim k ( W ^ ) 2 m + 1 .
The priority weight of criteria for the corresponding clusters (dimensions) can now be found in the rows of the limiting supermatrix W q . The limiting supermatrix provides the priority information for the elements of each individual cluster. The strategy outcome with the highest value should be selected from the cluster of criteria. Other priority rankings in different clusters are also provided.

4.3. D-MABAC for Ranking Alternatives

The MABAC methodology was developed by Pamucar and Cirovic [44] to handle problems in MCDM. D numbers is a new representation of uncertain information that can denote the more imprecise based conditions. Thus, the combination of MABAC and D numbers is a new experiment to make decisions in an uncertain environment. The basic setting of the MABAC technique is revealed in the definition of the distance of the criterion function of each of the observed alternatives from the approximate border area [72]. The algorithmic steps displays the execution process for the aforesaid D-MABAC methodology in six steps as follows:
Step 1: Constructing the initial decision matrix M . Initially, the assessment of m alternatives in respect of n criteria is carried out. The alternatives are represented in vector form A i = ( d i 1 , d i 2 , , d i n ) , where d i j ( j = 1 , 2 , , n ) denotes the value (in D numbers format) for the i alternative ( i = 1 , 2 , , m ) according to j criteria for matrix M = [ d i j ] m × n . Details shown in decision-matrix (25):
M = [ d 1 ( { 1 } ) = d 11 d 1 ( { 2 } ) = d 12 d 1 ( { n } ) = d 1 n d 2 ( { 1 } ) = d 11 d 2 ( { 2 } ) = d 22 d 2 ( { n } ) = d 2 n d m ( { 1 } ) = d m 1 d m ( { 2 } ) = d m 2 d m ( { n } ) = d m n ] .
Next, applying Equation (8), (i.e., integration representation of D numbers) on the elements d i j ( i = 1 , 2 , , m ; j = 1 , 2 , , n ) of decision matrix M = [ d i j ] m × n , crisp decision matrix X = [ I ( d i j ) ] m × n is formed as per Equation (26) as follows:
X = [ I ( d 11 ) I ( d 12 ) I ( d 1 n ) I ( d 21 ) I ( d 22 ) I ( d 2 n ) I ( d m 1 ) I ( d m 2 ) I ( d m n ) ] m × n = [ x 11 x 12 x 1 n x 21 x 22 x 2 n x m 1 x m 2 x m n ] m × n   where   each   x i j = I ( d i j ) .
Step 2. Normalisation of the elements of the initial matrix X . The elements of the normalized matrix N = [ t i j ] m × n are obtained using the following expressions:
N = [ t 11 t 12 t 1 n t 21 t 22 t 2 n t m 1 t m 2 t m n ] ,
where
t i j = { x i j x i x i + x i ,     for   benefit   type criteria   elements x i j x i + x i x i + ,     for   cos t   type criteria   elements ,
where x i j = I ( d i j ) and the components x i + = max ( x 1 , x 2 , , x m ) , x i = min ( x 1 , x 2 , , x m ) of the decision matrix ( X ) represent the maximum and minimum values of the criteria C j ( j = 1 , 2 , , n ) , by alternatives A i ( i = 1 , 2 , , m ) .
Step 3. Calculation of the elements of weighted matrix ( V ) . The elements of the weighted matrix V = [ v i j ] m × n , are calculated using the following equations:
V = [ v 11 v 12 v 1 n v 21 v 22 v 2 n v m 1 v m 2 v m n ] ,
v i j = w j . ( t i j + 1 ) ,
where t i j are the elements of the normalised matrix N = [ t i j ] m × n and w i ( j = 1 , 2 , , n ) the weight coefficients of criteria, respectively.
Step 4. Determine the border approximation area matrix (G). The elements of the border approximation area (BAA) for each criterion C j ( j = 1 , 2 , , n ) are determined as follows:
g j = ( i = 1 m v i j ) 1 / m ,
where v i j are the elements of the weighted matrix V = [ v i j ] m × n , and m is the total number of alternatives. After calculating the value g j ( j = 1 , 2 , , n ) , for each criterion, the BAA matrix ( G ) is formed with format n × 1 (n = the total number of criteria, according to which the selection is made from the alternatives).
G = [ g 1   g 2     g n ] 1 × n .
Step 5. Calculation of the distance of the alternative from the BAA for the matrix elements ( Q ) . The distance ( q i j ) of the alternatives A i ( i = 1 , 2 , , m ) from the BAA matrix G = [ g 1   g 2     g n ] is determined as the difference between the elements v i j ( i = 1 , 2 , , m ;   j = 1 , 2 , , n ) in the weighted matrix V = [ v i j ] m × n , and the value g j ( j = 1 , 2 , , n ) of the BAA ( G ) . The distance q i j ( i = 1 , 2 , , m ;   j = 1 , 2 , , n ) are elements of a matrix Q = [ q i j ] m × n and are shown in Equation (33):
Q = [ v 11 g 1 v 12 g 2 v 1 n g n v 21 g 1 v 22 g 2 v 2 n g n v m 1 g 1 v m 2 g 2 v m n g n ] = [ q 11 q 12 q 1 n q 21 q 22 q 2 n q m 1 q m 2 q m n ]   .
Alternative A i ( i = 1 , 2 , , m ) can belong to BAA ( G ) , upper approximation area ( G + ) , or lower approximation area ( G ) , i . e . , A i { G G + G } and are determined as per Equation (34):
A i { G +   i f   q i j > 0 G     i f   q i j = 0 G   i f   q i j < 0 ,   w h e r e   e a c h   q i j = v i j q j .
Step 6. Ranking of the alternatives. A calculation of the values of the criterion functions for the alternatives is obtained as the sum of the distance of the alternatives from the BAA ( q i j ) . Using Equation (35), we calculate the sum of the elements q i j of matrix ( Q ) by rows, and obtain the final values of the criterion functions S ^ i   ( i = 1 , 2 , , m ) , for the alternatives A i ( i = 1 , 2 , , m ) :
S ^ i = j = 1 n q i j ,   i = 1 , 2 , , m ;   j = 1 , 2 , , n .

5. Numerical Example: Risk Assessment in a Construction Project

5.1. Identification of Construction Projects Risk Indicators and Their Mitigation Strategies

For categorising and managing construction project risks effectually, several methodologies are recommended in the literature [43,73,74,75]. Keeping this in mind, we proposed the hybrid D-ANP-MABAC approach for the risk assessment of projects in the construction sector involving uncertain and incomplete information data. The authors employed a combination of questionnaire surveys involving literature reviews and subjective judgments of highly proficient experts to detect different risk response strategies that optimise the performance of construction projects. The proposed methodology incorporates the knowledge and experience of ten experts (five technical and five management based experts) for risk identification and structuring, along with proper risk mitigation strategies. The demographic profile of the respondents is given in Table 1.
Based on the literature review of papers discussed in Table 2, the DMs consider nine construction project risk criteria identified under three dimensions: political instability (C1), economic risk (C2), and social risk (C3). These are defined as environmental based external risks (D1). Technological risk (C4), work quality risk (C5), and time and cost risk (C6) are defined as construction process based project risks (D2). Resource risk (C7), documents and information risk (C8), and stakeholder’s risk (C9) are defined under intrinsic criteria based internal risks (D3). Details are given below in Table 3.
In past decades, construction businesses were constrained to use only a limited number of risk management procedures, even though they were not suitable for all situations. For example, Lyons and Skitmore [50] found that brainstorming is the most common risk identification technique used in the Queensland engineering construction industry. Forbes et al. [74] developed a matrix for selecting appropriate risk management techniques such as artificial intelligence, probabilistic analysis, sensitivity analysis, and decision trees in the built environment for each stage of risk management. In this paper, based on the brainstorming method, the experts sought five alternative construction project risk response mitigation strategies, as detailed in Table 4.

5.2. Calculating Risk Based Criteria Weight Using D-ANP Framework

In this section, the weights of the risk based criteria in construction projects are calculated by D-ANP. The ANP has substantial influence in MCDM problems involving a wide range of factors and sub-factors. In the ANP, a decision problem is transformed into a network structure that allows both inter-intra dependency and feedback among the decision clusters, and even amongst elements within the same clusters. In this phase, the decision group is asked to make pairwise comparison matrices for priority weights of three dimensions and nine criteria (as detailed in Table 3).
Using Steps 1–6 (of Section 4.1) of D-CFPR, the priority weights are calculated in the decision matrices. The algorithmic steps of D-ANP are shown below:
Step 1: Construction of the hierarchy of criteria and alternative risks strategies. The clearly defined risk based construction project model is decomposed into a logical system like a network. Based on the hierarchy of Figure 2, we have five risk mitigation strategies A i ( i = 1 , 2 , , 5 ) in Level 4 hierarchical position, three dimensions D j ( j = 1 , 2 , 3 ) (external, project, and internal risk) in Level 2, and corresponding to each dimension, a total of nine criteria C j ( j = 1 , 2 , , 9 ) in Level 3.
Step 2: Determination of the pairwise comparison matrices and priority vectors within clusters. The D numbers based preference matrix is first constructed before calculating the weight of the indicators using the ANP supermatrix. Here, we present the process of determining the priority weight of criteria (C1, C2, and C3) for risk dimension external risk with respect to the criterion C6 under dimension Project risk.
First, we calculate the relative significance of sub-criteria (C1, C2, and C3) relative to sub-criterion C6, to construct the inner dependence matrix built on the D numbers based preference relation R D = [ D i j ] 3 × 3 . In this case, the preference modelled by a set of D numbers (based on DM’s choice) involving both uncertain entry (i.e., D 12 = { ( 0.55 , 0.7 ) , ( 0.65 , 0.3 ) } and incomplete entry D 23 = { ( 0.75 , 0.8 ) } , respectively:
R D = [ D 11 D 12 D 13 D 21 D 22 D 23 D 31 D 32 D 33 ] = [ { ( 0.5 , 1.0 ) } { ( 0.55 , 0.7 ) , ( 0.65 , 0.3 ) } { ( 0.5 , 1.0 ) } { ( 0.75 , 0.8 ) } { ( 0.5 , 1.0 ) } ] .
The standard CFPR cannot handle this case, but D-CFPR (Equations (9)–(12) in Section 3.1) is effective to fill up the rest of the matrix elements in R D = [ D i j ] 3 × 3 as follows:
R D = [ { ( 0.5 , 1.0 ) } { ( 0.55 , 0.7 ) , ( 0.65 , 0.3 ) } { ( 0.80 , 0.56 ) , ( 0.9 , 0.24 ) } { ( 0.45 , 0.7 ) , ( 0.35 , 0.3 ) } { ( 0.5 , 1.0 ) } { ( 0.75 , 0.8 ) } { ( 0.2 , 0.56 ) , ( 0.1 , 0.24 ) } { ( 0.25 , 0.8 ) } { ( 0.5 , 1.0 ) } ] .
Then, the D numbers based CFPR matrix R D = [ D i j ] 3 × 3 is converted to a crisp mode, R C = [ c i j ] 3 × 3 , using Equation (13), and the integration representation of D numbers Equation (7), shown below:
R c = I ( R D ) = [ 0.5 0.58 0.66 0.42 0.5 0.60 0.13 0.20 0.5 ] .
Applying the preference rules proposed for D-CFPR (in Step 3 of Section 4.1) and using Equation (14), the probability matrix R p = [ p i j ] 3 × 3 is constructed:
R p = [ 0 1 1 0 0 1 0 0 0 ] .
Following the process (as mentioned in Step 4 of Section 4.1) of the D-CFPR methodology, we obtain the triangular matrix R p T = [ p i j T ] 3 × 3 . Using the triangularisation method, the ranking of the indicators is calculated and shown as: I 1 I 2 I 3 , where the symbol “ ” indicates preference,
R p T = [ 0 1 1 0 0 1 0 0 0 ] .
We next evaluate the relative weights of the risk criteria. First, based on the ranking of the risk criteria in the triangulated matrix R p T , the crisp matrix R c , is converted to a triangular crisp matrix R c T , as per Equation (16):
R c T = [ 0.5 0.58 0.66 0.42 0.5 0.60 0.13 0.20 0.5 ] .
Next, for elements satisfying R c T ( i ,   j ) + R c T ( j ,   i ) < 1 , a new polishing operation Equation (17) is executed and, by also applying Equation (18), a novel triangulated crisp matrix R k T = [ k i j T ] 3 × 3 is obtained:
R k T = [ 0.5 0.58 0.76 0.42 0.5 0.70 0.21 0.24 0.5 ] .
Finally, applying Equation (19), a group of equations is built to calculate the priority weight w i ( i = 1 , 2 , , n ) of each risk-based criterion. Applying the weight relation of the indicators in matrix mode, and incorporating necessary constraints, the weight equations are constructed and shown below:
{ λ ( w 1 w 2 ) = 0.58 0.5 λ ( w 2 w 3 ) = 0.76 0.5 w 1 + w 2 + w 3 = 1 λ > 0 w i 0 ,   i { 1 ,   2 ,   3 } ,
where w i denotes the weight of the i t h indicator and λ indicates the granular information about the pairwise evaluation, which is connected to the cognitive aptitude of the experts. Setting λ = 3 and using Equation (20), the weight of risk criteria C1, C2, and C3 for dimension D1 relative to C6 of dimension D2 are calculated as ( 0.373 ,   0.347 ,   0.280 ) T , respectively.
For quantifying the consistency of the D-CFPR based matrix R p T , an ID defined for the D numbers preference relation (as defined in Equation (21)) is used to express such inconsistency, and, for the case study taken, it is found to be consistent.
Similarly, using the same process, the priority weights of remaining criteria, shown in Figure 3 with respect to the same dimensions and criteria of other clusters (dimensions), are calculated.
Step 3: Formation of unweighted supermatrix. Arrange all priority vectors, indicating the influence of pre-set elements, in different cluster elements in the network, as sub-columns of the resultant column in an unweighted supermatrix W , which is composed of k clusters D k ( k = 1 ,   2 ,   3 ) , with corresponding linkages (criteria) { e k 1 , e k 2 , e k 3 }   f o r   k = 1 , 2 , 3 . Putting k = 1 , we get the first cluster (dimension) D 1 along with three elements { e 11 , e 12 ,   e 13 } representing three risk criteria { C 1 ,   C 2 ,   C 3 } , respectively. For k = 2 , we get a second cluster (dimension) D 2 along with three elements { e 21 , e 22 ,   e 23 } representing three risk criteria { C 4 ,   C 5 ,   C 6 } . Similarly, the remaining cluster (dimensions) D 3 , along with its risk criteria, can be found. Thus, we get three clusters (dimensions) D k = { D 1 ,   D 2 ,   D 3 } and nine corresponding risk criteria C j { j = 1 , 2 , , 9 } . Based on the above, the unweighted supermatrix W is formed by placing priority vector elements in the particular column of W , where each criterion influences the other risk criteria. Details shown in Table 5.
Step 4: Calculating the weighted supermatrix. The weighted supermatrix ( W a ) is calculated by multiplying unweighted supermatrix W (Table 5) by the inner dependence matrix of risk dimension D j ( j = 1 ,   2 ,   3 ) (Table 6). Details are shown in Table 7.
Step 5: Selecting the weight of criteria based on the limit matrix. To make the matrix column stochastic in Table 7, we normalise the weighted supermatrix ( W a ) column wise, and the result is shown in Table 8. The normalized weighted supermatrix W ^ (Table 8) is raised to its limiting power using Equation (22), to get the limiting supermatrix W q (Table 9). The final ranking of risk criteria weight for the construction project is shown in Table 10.
From Table 10, it is concluded that the third cluster (dimension) internal risk (D3) has a severe risk effect on the construction project sector. Document and information risk (C8) is the most risky, followed by resource risk (C7) and stakeholder’s risk (C9). First cluster External risk (D1) has less of a risk effect on construction business. Economic risk (C2) and social risk (C3) are in the 8th and 9th positions, respectively. However, political instability attains the 4th position in respect to the risk category. Managers and stakeholders should keep this in view when choosing projects in large construction sectors.

5.3. Determination of Final Alternative Ranking by D-MABAC

In this phase, the evaluation and ranking of risk response alternatives is performed by the application of a D numbers based MABAC (D-MABAC) methodology in construction project risk management. The step-by-step computational procedure is shown below.
Step 1: First, the five risk response alternative vectors, with respect to nine risk criteria C j ( j = 1 , 2 , , 9 ) , are represented as A i = ( d i 1 , d i 2 , , d i 9 )   ( i = 1 , 2 , , 5 ) using incomplete and uncertain numbers expressed in D numbers. Using Equations (23) and (24), we develop an initial decision matrix M = [ d i j ] 5 × 9 (Table 11) along with its crisp form X = [ I ( d i j ) ] 5 × 9 = [ x i j ] 5 × 9 .
Step 2: The elements of the crisp decision matrix X = [ x i j ] 5 × 9 are normalized using Equations (24) and (25) to form a normalized decision matrix N = [ t i j ] 5 × 9 , shown in Table 12.
Step 3: Using Equations (26) and (27), the elements of the weighted normalized decision matrix V = [ v i j ] 5 × 9 are calculated, and are shown in Table 13.
Step 4: Next, using Equations (28) and (29), we determine the BAA, G = [ g 1   g 2     g 9 ] for each criterion C j ( j = 1 , 2 , , 9 ) . This is followed by calculation of the distance ( q i j ) for matrix elements Q = [ q i j ] 5 × 9 for risk response alternatives A i ( i = 1 , 2 , , 5 ) from BAA G = [ g 1   g 2     g 9 ] using Equations (30) and (31).
Step 5: Finally, using Equation (32), we calculate the sum function S ^ i ( i = 1 , 2 , , 5 ) to obtain the ranking of alternatives A i ( i = 1 , 2 , , 5 ) . A graphical representation of the process is shown in Figure 4. Ranking of alternative risk response alternatives (Table 14) is finalised according to values calculated by D-MABAC in descending order. In this paper, the first alternative risk response was selected and implemented.

6. Results and Discussion

In this section, a detailed comparative analysis of all alternative initiatives (with respect to criteria and dimensions) is conducted.

6.1. Comparison of Alternative Ranking Using Different MCDM Methods

The hybrid MCDM methods in D numbers environment namely, D numbers based multi-attributive border approximation area comparison (D-MABAC), and D numbers based technique for order of preference by similarity to ideal solution (D-TOPSIS), D numbers based complex proportional assessment (D-COPRAS), and D numbers based additive ratio assessment (D-ARAS), were applied to the construction project based case study data to obtain the weighted normalised decision-making matrix V = [ v i j ] 5 × 9 (Table 13). The priority order of the risk response alternatives A i ( i = 1 , 2 , , 5 ) is compared and presented in Table 15.
Ranking of the risk response alternatives according to the presented MCDM methods concluded that the optimal alternative risk response is A1 (Proper scheduling for getting updated project information), followed by A3 (Information about local partner’s credibility), A4 (Transfer risks with other parties), and A2 (Adjust plans for scope of work). The worst performing risk response alternative is A5 (Merger and diversification of projects).
Spearman’s rank correlation coefficient ( r k ) between ranks is applied for determining correlation of ranks obtained by various approaches. Here, this coefficient is applied to demonstrate the statistical importance of difference among the ranking obtained through pairwise correlation analysis of different MCDM methods. Based on the recommendation of Keshavarz Ghorabaee et al. [65], all ( r k ) values higher than 0.80 show considerably high correlation. As per Table 16, a strong correlation (1.000) among the MCDM approaches is shown, confirming the credibility of the proposed approach.

6.2. Sensitivity Analysis

Ranking of results in MCDM problems are subject to the distribution of weight coefficients of the criteria. Sometimes, modifying these criteria weight coefficients may change the ranking order of alternatives, generally analysed by sensitivity analysis during the decision-making process. The above weight coefficients are usually based on expert subjective perception, and thus the outcome of probable deviation of these weight values need to be properly assessed.
A sensitivity analysis was executed to measure the level of crosstalk amongst the criteria, revealing the variation in alternative rankings with variation in criteria weight. Outcomes of the sensitivity analysis for prioritising specific project based criteria C j ( j = 1 , 2 , , 9 ) weights are shown in Table 17, and its corresponding effect on ranking of risk response alternatives A i ( i = 1 , 2 , , 5 ) in Table 18.
  • The results (Table 17 and Figure 5) shows that assigning various weights to project based criteria C j ( j = 1 , 2 , , 9 ) through different scenarios { S 1 S 8 } results in changes to ranking of individual alternatives, thus proving that the model is sensitive to variations in weight coefficients.
  • Analysis of the alternative ranking through eight scenarios (Table 18) showed that alternative A1 retained its rank in five scenarios { S 2 ,   S 3 ,   S 4 ,   S 5 ,   S 8 } (best-ranked alternative), while, in the remaining two scenarios { S 1 ,   S 7 } , it was ranked second, and third in scenario { S 6 } .
  • The worst-ranked alternative A5 retained its rank in six scenarios { S 2 ,   S 3 ,   S 4 ,   S 5 ,   S 7 ,   S 8 } , while in two scenarios { S 1 ,   S 6 } , it was ranked second worst. Therefore, changing the criteria weights through different scenarios resulted in changes to the ranks of the remaining alternatives.
  • In addition, from Table 17 and Table 18, it is clear that prioritising criteria C9 has less of an effect on ranking position of alternatives. However, prioritising criteria set {C4, C6, and C7} in scenario S7, {C2, C6, and C8} in scenario S1, along with {C4, C6, and C8} in scenario S6, all altered the positions of risk response alternatives A i ( i = 1 , 2 , , 5 ) .
  • The prioritising of criteria weight in scenarios { S 2 ,   S 3 ,   S 4 ,   S 5 ,   S 8 } has no effect on ranking of best or worst risk response alternative A1 and A5, respectively, but it does have an effect on the ranking of the second best risk response alternative A2.

7. Conclusions

Construction projects present a very complex field involving a large number of stakeholders. From the perspective of information sharing, uncertain information and data cause loss of faith among various stakeholders and increased risk in construction management, including project complexity and decision-making environment conditions. These risks affect project activities, which indirectly impact construction costs, resulting in delays and poor building quality. Thus, in this paper, we rank uncertain risk strategies in construction projects using a D-ANP-MABAC multi-criteria decision-making (MCDM) approach. In the new proposed method, the decision matrix determination from the MCDM problem is transformed to D numbers, which effectively represent the inevitable uncertainties such as incompleteness and imprecision, due to the subjective assessment of decision makers. As the basic element of many decision-making methods especially in analytic network process (ANP) model, the preference relation has attracted interests among researchers and practitioners. Fuzzy preference relation construct pairwise decision matrices based on linguistic values but is inconsistent due to inability of experts in dealing with overcomplicated objects. CFPR methodology [30] removes this inconsistency, but fails to deals with incomplete and uncertain information due to the lack of experts’ knowledge and the limitation of cognition. To overcome this weaknesses, D-CFPR methodology is applied to decision matrices allowing all stakeholders (members) of a construction business to address multiple criteria involving various types of uncertainties, such as imprecision and fuzziness in the decision process. The D-CFPR uses D numbers to express the linguistic preference values given by experts, and it can also be reduced to classical CFPR. Based on the D-CFPR based preference relation, the priority vectors of criteria are determined, to be used as inputs for any cluster of matrix formed by the D-ANP method, and obtain the corresponding risk criteria weights. The alternative risk response strategy ranking is achieved using the D-MABAC method.
In view of several categories of uncertainties, including incompleteness and impreciseness, the proposed technique can effectively represent and address uncertain information weighting risk criteria and alternatives in a logical way. An example of selecting risk strategies in construction risk projects is shown here to demonstrate the efficiency of the proposed approach. The assessment of a real world application of D-ANP-MABAC methodology, along with its output result of sensitivity, clearly identifies its potential to provide stable solutions to the problematic choice of laying-up positions. Based on that, the proposed risk strategy alternatives are successfully ranked. Thus, it can be concluded that the above procedure has provided an alternate approach for sustainable risk analysis and decision-making in the construction sector. In our proposed method, we consider both CFPR and ANP methodologies in D numbers domain. As in the present scenario, since the priority vectors for the criteria set are deduced from D-CFPR methodology, which are used as inputs in ANP matrix, it will thus also consume more computational time. Therefore, the computational complexity occurring in present D-CFPR-ANP methodology in future studies needs to be further optimized. In future research, the theoretical framework needs to be modified considering the hidden risks in construction sectors and further be applied to other real-life application areas such as supplier selection problems, project portfolio management, renewable energy selection, etc., to further validate its effectiveness.

Author Contributions

The individual contribution and responsibilities of the authors were as follows: Kajal Chatterjee designed the research, methodology, performed the development of the paper, Krishnendu Adhikary collected and analyzed the data and the obtained results, Edmundas Kazimieras Zavadskas provided extensive advice throughout the study, Jolanta Tamošaitienė assisted with the research design and revised the manuscript. Samarjit Kar assisted with methodology and findings. All of the authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akintoye, A.S.; MacLeod, M.J. Risk analysis and management in construction. Int. J. Proj. Manag. 1997, 15, 31–38. [Google Scholar] [CrossRef]
  2. Schatteman, D. Methodology for integrated risk management and proactive scheduling of construction projects. J. Constr. Eng. Manag. 2008, 134, 885–893. [Google Scholar] [CrossRef]
  3. Skorupka, D. Identification and initial risk assessment of construction projects in Poland. J. Manag. Eng. 2008, 24, 120–127. [Google Scholar] [CrossRef]
  4. Wang, S.; Dulaimi, M.; Aguria, M. Risk management framework for construction projects in developing countries. Constr. Manag. Econ. 2004, 22, 237–252. [Google Scholar] [CrossRef]
  5. Abdelgawad, M.; Fayek, A. Risk Management in the construction industry using combined fuzzy FMEA and fuzzy AHP. J. Constr. Eng. Manag. 2010, 10, 1028–1036. [Google Scholar] [CrossRef]
  6. Mhetre, K.; Konnur, B.A.; Landage, A.B. Risk Management in construction industry. Int. J. Eng. Res. 2016, 5, 153–155. [Google Scholar]
  7. Ribeiro, M.I.F.; Ferreira, F.A.F.; Jalali, M.S.; Meidutė-Kavaliauskienė, I. A fuzzy knowledge-based framework for risk assessment of residential real estate investments. Technol. Econ. Dev. Econ. 2017, 23, 140–156. [Google Scholar] [CrossRef]
  8. Ribeiro, C.; Ribeiro, A.R.; Maia, A.S.; Tiritan, M.E. Occurrence of Chiral Bioactive Compounds in the Aquatic Environment: A Review. Symmetry 2017, 9, 215. [Google Scholar] [CrossRef]
  9. Iqbal, S.; Choudhry, R.; Holschemacher, K.; Ali, A.; Tamošaitienė, J. Risk management in construction projects. Technol. Econ. Dev. Econ. 2015, 21, 65–78. [Google Scholar] [CrossRef]
  10. Hwang, B.-G.; Zhao, X.; Yu, G.S. Risk identification and allocation in underground rail construction joint ventures: Contractors’ perspective. J. Civ. Eng. Manag. 2016, 22, 758–767. [Google Scholar] [CrossRef]
  11. Butaci, C.; Dzitac, S.; Dzitac, I.; Bologa, G. Prudent decisions to estimate the risk of loss in insurance. Technol. Econ. Dev. Econ. 2017, 23, 428–440. [Google Scholar] [CrossRef]
  12. Pak, D.; Han, C.; Hong, W.-T. Iterative Speedup by Utilizing Symmetric Data in Pricing Options with Two Risky Assets. Symmetry 2017, 9, 12. [Google Scholar] [CrossRef]
  13. Ravanshadnia, M.; Rajaie, H. Semi-Ideal Bidding via a Fuzzy TOPSIS Project Evaluation Framework in Risky Environments. J. Civ. Eng. Manag. 2013, 19 (Suppl. 1), S106–S115. [Google Scholar] [CrossRef]
  14. Ebrat, M.; Ghodsi, R. Construction project risk assessment by using adaptive-network-based fuzzy inference system: An Empirical Study. KSCE J. Civ. Eng. 2014, 18, 1213–1227. [Google Scholar] [CrossRef]
  15. Taylan, O.; Bafail, A.; Abdulaal, R.; Kabli, M. Construction projects selection and risk assessment by fuzzy AHP and fuzzy TOPSIS methodologies. Appl. Soft Comput. 2014, 17, 105–116. [Google Scholar] [CrossRef]
  16. Dziadosz, A.; Rejment, M. Risk analysis in construction project-chosen Methods. Procedia Eng. 2015, 122, 258–265. [Google Scholar] [CrossRef]
  17. Schieg, M. Risk management in construction project management. J. Bus. Econ. Manag. 2006, 7, 77–83. [Google Scholar]
  18. Serpella, A.F.; Ferrada, X.; Howard, R.; Rubio, L. Risk management in construction projects: A knowledge-based approach. Procedia-Soc. Behav. Sci. 2014, 119, 653–662. [Google Scholar] [CrossRef]
  19. Santos, R.; Jungles, A. Risk level assessment in construction projects using the schedule performance index. J. Constr. Eng. 2016, 2016, 5238416. [Google Scholar] [CrossRef]
  20. Sadeghi, N.; Fayek, A.; Pedrycz, W. Fuzzy Monte Carlo simulation and risk assessment in construction. Comput.-Aided Civ. Infrastruct. Eng. 2010, 25, 238–252. [Google Scholar] [CrossRef]
  21. Nieto-Morote, A.; Ruz-Vila, F. A fuzzy approach to construction project risk assessment. Int. J. Proj. Manag. 2011, 29, 220–231. [Google Scholar] [CrossRef]
  22. Deng, X.; Hu, Y.; Deng, Y. Bridge condition assessment using D numbers. Sci. World J. 2014, 2014, 358057. [Google Scholar] [CrossRef] [PubMed]
  23. Zavadskas, E.K.; Turskis, Z.; Tamošaitienė, J. Risk assessment of construction projects. J. Civ. Eng. Manag. 2010, 16, 33–46. [Google Scholar] [CrossRef]
  24. Vafadarnikjoo, A.; Mobin, M.; Firouzabadi, S. An intuitionistic fuzzy-based DEMATEL to rank risks of construction projects. In Proceedings of the 2016 International Conference on Industrial Engineering and Operations Management, Detroit, MI, USA, 23–25 September 2016; pp. 1366–1377. [Google Scholar]
  25. Mohammadi, A.; Tavakolan, M. Construction project risk assessment using combined fuzzy and FMEA. In Proceedings of the 2013 Joint IFSA World Congress and NAFIPS Annual Meeting, Edmonton, AB, Canada, 24–28 June 2013; pp. 232–237. [Google Scholar]
  26. Hashemi, S.; Karimi, A.; Tavana, M. An integrated green supplier selection approach with analytic network process and improved grey relational analysis. Int. J. Prod. Econ. 2015, 159, 178–191. [Google Scholar] [CrossRef]
  27. Ahmadi, M.; Behzadian, K.; Ardeshir, A.; Kapelan, Z. Comprehensive risk management using fuzzy FMEA and MCDA technique in highway construction projects. J. Civ. Eng. Manag. 2016, 23, 300–310. [Google Scholar] [CrossRef]
  28. Shin, D.; Shin, Y.; Kim, G. Comparison of risk assessment for a nuclear power plant construction project based on analytic hierarchy process and fuzzy analytic hierarchy process. J. Build. Const. Plan. Res. 2016, 4, 157–171. [Google Scholar] [CrossRef]
  29. Dehdasht, G.; Zin, R.M.; Ferwati, M.S.; Abdullahi, M.M.; Keyvanfar, A.; McCaffer, R. DEMATEL-ANP risk assessment in oil and gas construction projects. Sustainability 2017, 9, 1420. [Google Scholar] [CrossRef]
  30. Herrera-Viedma, E.; Herrera, F.; Chiclana, F.; Luque, M. Some issues on consistency of fuzzy preference relations. Eur. J. Oper. Res. 2004, 154, 98–109. [Google Scholar] [CrossRef]
  31. Chen, Y.H.; Chao, R.J. Supplier selection using consistent fuzzy preference relations. Expert Syst. Appl. 2012, 39, 3233–3240. [Google Scholar] [CrossRef]
  32. Hosseini, L.; Tavakkoli-Moghaddam, R.; Vahdani, B.; Mousavi, S.; Kia, R. Using the analytical network process to select the best strategy for reducing risks in a supply chain. J. Eng. 2013, 2013, 355628. [Google Scholar] [CrossRef]
  33. Hesamamiri, R.; Mahdavi Mazdeh, M.; Bourouni, A. Knowledge-based strategy selection: A hybrid model and its implementation. VINE J. Inf. Knowl. Manag. Syst. 2016, 46, 21–44. [Google Scholar] [CrossRef]
  34. Deng, X.; Lu, X.; Chan, F.; Sadiq, R.; Mahadevan, S.; Deng, Y. D-CFPR: D numbers extended consistent fuzzy preference relations. Knowl.-Based Syst. 2015, 73, 61–68. [Google Scholar] [CrossRef]
  35. Zhang, X.; Deng, Y.; Chan, F.; Adamatzky, A.; Mahadevan, S. Supplier selection based on evidence theory and analytic network process. Proc. Inst. Mech. Eng. Part B J. Eng. Manuf. 2014, 230, 562–573. [Google Scholar] [CrossRef]
  36. Deng, Y.D. Numbers: Theory and applications. J. Inf. Comput. Sci. 2012, 9, 2421–2428. [Google Scholar]
  37. Han, X.; Chen, X. D-VIKOR method for medicine provider selection. In Proceedings of the IEEE Seventh International Joint Conference on Computational Sciences and Optimization (CSO), Beijing, China, 4–6 July 2014; pp. 419–423. [Google Scholar]
  38. Liu, H.; You, J.; Fan, X.; Lin, Q. Failure mode and effects analysis using D numbers and grey relational projection method. Expert Syst. Appl. 2014, 41, 4670–4679. [Google Scholar] [CrossRef]
  39. Deng, X.; Hu, Y.; Deng, Y.; Mahadevan, S. Supplier selection using AHP methodology extended by D numbers. Expert Syst. Appl. 2014, 41, 156–167. [Google Scholar] [CrossRef]
  40. Fan, G.; Zhong, D.; Yan, F.; Yue, P. A hybrid fuzzy evaluation method for curtain grouting efficiency assessment based on an AHP method extended by D numbers. Expert Syst. Appl. 2015, 44, 289–303. [Google Scholar] [CrossRef]
  41. Fei, L.; Hu, Y.; Xiao, F.; Chen, L.; Deng, Y. A modified TOPSIS method based on D numbers and its application in human resources selection. Math. Probl. Eng. 2016, 2016, 6145196. [Google Scholar] [CrossRef]
  42. Zuo, Q.; Qin, X.; Tian, Y.; Wei, D. A multi-attribute decision making for investment decision based on D numbers methods. Sci. Res. 2016, 6, 765–775. [Google Scholar] [CrossRef]
  43. Renault, B.; Agumba, J. Risk management in the construction industry: A new literature review. MATEC Web Conf. 2016, 66. [Google Scholar] [CrossRef]
  44. Pamucar, D.; Cirovic, G. The selection of transport and handling resources in logistics centers using Multi-Attribute Border Approximation area Comparison (MABAC). Expert Syst. Appl. 2015, 42, 3016–3028. [Google Scholar] [CrossRef]
  45. Peng, X.; Yang, Y. Pythagorean fuzzy Choquet integral based MABAC method for multiple attribute group decision making. Int. J. Intell. Syst. 2016, 31, 989–1020. [Google Scholar] [CrossRef]
  46. Yu, S.; Wang, J.; Wang, J. An interval type-2 fuzzy likelihood-based MABAC approach and its application in selecting hotels on a tourism website. Int. J. Fuzzy Syst. 2016, 9, 47–61. [Google Scholar] [CrossRef]
  47. Xue, Y.; You, J.; Lai, X.; Liu, H. An interval-valued intuitionistic fuzzy MABAC approach for material selection with incomplete weight information. Appl. Soft Comput. 2016, 38, 703–713. [Google Scholar] [CrossRef]
  48. Bozanic, D.; Pamucar, D.; Karovic, S. Use of the fuzzy AHP-MABAC hybrid model in ranking potential locations for preparing laying-up positions. Mil. Tech. Cour. 2016, 64, 705–729. [Google Scholar] [CrossRef]
  49. Salah, A.; Moselhi, O. Risk identification and assessment for engineering procurement construction management projects using fuzzy set theory. Can. J. Civ. Eng. 2016, 43, 429–442. [Google Scholar] [CrossRef]
  50. Lyons, T.; Skitmore, M. Project risk management in the Queensland engineering construction industry: A survey. Int. J. Proj. Manag. 2004, 22, 51–61. [Google Scholar] [CrossRef]
  51. Baloi, P.; Price, A. Modelling global risk factors affecting construction cost performance. Int. J. Proj. Manag. 2003, 21, 261–269. [Google Scholar] [CrossRef]
  52. Jafarnejad, A.; Ebrahimi, M.; Abbaszadeh, M.; Abtahi, S. Risk management in supply chain using consistent fuzzy preference relations. Int. J. Acad. Res. Bus. Soc. Sci. 2014, 4, 77–89. [Google Scholar]
  53. Tah, J.H.M.; Carr, V. A proposal for construction project risk assessment using fuzzy logic. Constr. Manag. Econ. 2000, 18, 491–500. [Google Scholar] [CrossRef]
  54. Wen, G. Construction project risk evaluation based on rough sets and artificial neural networks. In Proceedings of the 2010. IEEE Sixth International Conference on Natural Computation (ICNC), Yantai, China, 10–12 August 2010; pp. 1624–1628. [Google Scholar]
  55. Fouladgar, M.M.; Yazdani-Chamzini, A.; Zavadskas, E.K. Risk evaluation of tunneling projects. Arch. Civ. Mech. Eng. 2012, 12, 1–12. [Google Scholar] [CrossRef]
  56. Taroun, A.; Yang, J. A DST-based approach for construction project risk analysis. J. Opt. Res. Soc. 2013, 64, 1221–1230. [Google Scholar] [CrossRef]
  57. Kao, C.H.; Huang, C.H.; Hsu, M.S.C.; Tsai, I.H. Success factors for Taiwanese contractors collaborating with local Chinese contractors in construction projects. J. Bus. Econ. Manag. 2016, 17, 1007–1021. [Google Scholar] [CrossRef]
  58. Burcar Dunovic, I.; Radujkovic, M.; Vukomanovic, M. Internal and external risk based assessment and evaluation for the large infrastructure projects. J. Civ. Eng. Manag. 2016, 22, 673–682. [Google Scholar] [CrossRef]
  59. Yousefi, V.; Yakhchali, S.H.; Khanzadi, M.; Mehrabanfar, E.; Saparauskas, J. Proposing a neural network model to predict time and cost claims in construction projects. J. Civ. Eng. Manag. 2016, 22, 967–978. [Google Scholar] [CrossRef]
  60. Valipour, A.; Yahaya, N.; Noor, N.M.; Mardini, N.; Antucheviciene, J. A new hybrid fuzzy cybernetic analytic network process model to identify shared risks in PPP projects. Int. J. Strateg. Prop. Manag. 2016, 20, 409–426. [Google Scholar] [CrossRef]
  61. Ulubeyli, S.; Kazaz, A. Fuzzy multi-criteria decision making model for subcontractor selection in international construction projects. Technol. Econ. Dev. Econ. 2016, 22, 210–234. [Google Scholar] [CrossRef]
  62. Rajakallio, K.; Ristimaki, M.; Andelin, M.; Junnila, S. Business model renewal in context of integrated solutions delivery: A network perspective. Int. J. Strateg. Prop. Manag. 2017, 21, 72–86. [Google Scholar] [CrossRef]
  63. Valipour, A.; Yahaya, N.; Noor, N.M.; Antucheviciene, J.; Tamošaitienė, J. Hybrid SWARA-COPRAS method for risk assessment in deep foundation excavation project: An Iranian case study. J. Civ. Eng. Manag. 2017, 23, 524–532. [Google Scholar] [CrossRef]
  64. Khanzadi, M.; Turskis, Z.; Amiri, G.G.; Chalekaee, A. A model of discrete zero-sum two-person matrix games with grey numbers to solve dispute resolution problems in construction. J. Civ. Eng. Manag. 2017, 23, 824–835. [Google Scholar] [CrossRef]
  65. Keshavarz Ghorabaee, M.; Zavadskas, E.K.; Turskis, Z.; Antucheviciene, J. A new combinative distance-based assessment (CODAS) method for multi-criteria decision-making. Econ. Comput. Econ. Cybern. Stud. Res. 2016, 50, 25–44. [Google Scholar]
  66. Jiang, W.; Zhuang, M.; Qin, X.; Tang, Y. Conflicting evidence combination based on uncertainty measure and distance of evidence. Springer Plus 2016, 5, 12–17. [Google Scholar] [CrossRef] [PubMed]
  67. Li, M.; Hu, Y.; Zhang, Q.; Deng, Y. A novel distance function of D numbers and its application in product engineering. Eng. Appl. Artif. Intell. 2015, 47, 61–67. [Google Scholar] [CrossRef]
  68. Jiang, W.; Zhan, J.; Zhou, D.; Li, X. A method to determine generalized basic probability assignment in the open world. Math. Probl. Eng. 2016, 2016, 3878634. [Google Scholar] [CrossRef]
  69. Zhou, X.; Shi, Y.; Deng, X.; Deng, Y. D-DEMATEL: A new method to identify critical success factors in emergency management. Saf. Sci. 2017, 91, 93–104. [Google Scholar] [CrossRef]
  70. Zhou, D.; Tang, Y.; Jiang, W. An improved belief entropy and its application in decision-making. Complexity 2017, 2017, 4359195. [Google Scholar] [CrossRef]
  71. Deng, X.; Hu, Y.; Deng, Y.; Mahadevan, S. Environmental impact based on D numbers. Expert Syst. Appl. 2014, 41, 635–643. [Google Scholar] [CrossRef]
  72. Bozanic, D.; Pamucar, D.; Karovic, S. Application the MABAC method in support of decision-making on the use of force in defensive operation. Tehnika Menadžment 2016, 6, 129–135. [Google Scholar] [CrossRef]
  73. Lin, J.H.; Yang, C.J. Applying analytic network process to the selection of construction projects. Open J. Soc. Sci. 2016, 4, 41–47. [Google Scholar] [CrossRef]
  74. Forbes, D.; Smith, S.; Horner, M. Tools for selecting appropriate risk management techniques in the built environment. Constr. Manag. Econ. 2008, 26, 1241–1250. [Google Scholar] [CrossRef]
  75. Stević, Ž.; Pamučar, D.; Vasiljević, M.; Stojić, G.; Korica, S. Novel Integrated Multi-Criteria Model for Supplier Selection: Case Study Construction Company. Symmetry 2017, 9, 279. [Google Scholar] [CrossRef]
Figure 1. Procedure to obtain priority weights of criteria based on D numbers extended consistent fuzzy preference relation.
Figure 1. Procedure to obtain priority weights of criteria based on D numbers extended consistent fuzzy preference relation.
Symmetry 10 00046 g001
Figure 2. A hierarchical construction project risk breakdown structure.
Figure 2. A hierarchical construction project risk breakdown structure.
Symmetry 10 00046 g002
Figure 3. Network structure among construction risk dimensions and criteria.
Figure 3. Network structure among construction risk dimensions and criteria.
Symmetry 10 00046 g003
Figure 4. D numbers based Multi-Attributive Border Approximation area Comparison (D-MABAC) in risk mitigation strategy selection.
Figure 4. D numbers based Multi-Attributive Border Approximation area Comparison (D-MABAC) in risk mitigation strategy selection.
Symmetry 10 00046 g004
Figure 5. Sensivity analysis of the alternative ranking through different scenarios.
Figure 5. Sensivity analysis of the alternative ranking through different scenarios.
Symmetry 10 00046 g005
Table 1. Summary of demographic profile of respondents.
Table 1. Summary of demographic profile of respondents.
CharacteristicsFrequencyPercentage (%)
Age group21–31220
31–39440
39–45330
45–58110
GenderFemale440
Male660
Level of EducationBachelor’s degree440
Master’s degree550
Higher110
Role of respondentsChief personal officer110
Manager or general manager220
Staff or assistant manager110
Project risks analyst220
Purchasing manager110
Construction site engineer330
Years of experience in construction sectorAbove 15 years220
10 years~15 years440
5 years~10 years330
Less than 5 years110
Total available number10
Table 2. Risk factors involved in construction projects.
Table 2. Risk factors involved in construction projects.
Risk Indicators in Project Based Construction ManagementReferences
Environmental risk; political, social and economic risk; contractual agreement risk; financial risk; construction risk; project design risk; market risk.[1]
Safety risk, quality risk, environmental risk, political risk, project site risk, project complexity risk.[53]
Quality risks, personnel risks, cost risks, deadline risks, strategic decision risks, external risks.[17]
Operational risk, economic risk, political risk, financial risk, legal risk, currency and inflation risk, corruption risk, tendering procedures.[3]
Political risks, economic risk, social risk, weather risk, cost, quality risk, technical risk, construction risk, resources risk, project member risk, information risk, construction site risks.[23]
Resources risk, inexperience of project members, lack of motivational approach, design errors risk, efficiency risk, technical risk, quality risk.[21]
Inflation risk, Payment security risk, Programme overrun risk, subcontractor pricing risk.[56]
Political risk, economic risk, natural risk, legal risk, contractor risk, financial risk, management risk, equipment risk, designer risk.[25]
Management risk, project risk, design risk, financial risk, operational risk, external risk.[14]
Information risk, cost risks, lack of coordination, project schedule risk, lack of professional planning, legal dispute risk.[15]
Designing risk, time risk, budget risk, labour risk, political risk.[16]
Design risk, payment delay risk, funding risk, quality risk, labour dispute risks, natural disaster risk, exchange rate fluctuation risk, political instability, site condition risks, insurance inadequacy risk.[9]
Technical risks, organisational risks, socio-political risks, environmental risks, financial risks.[6]
Inflation (economic) risk, environmental and geological risk, design risk, construction delay risk, inadequate managerial skills risk, resource risk.[29]
Table 3. Dimensions and risk criteria involved in construction projects.
Table 3. Dimensions and risk criteria involved in construction projects.
Risk DimensionRisk Criteria *Brief Descriptions of Causes of the Mentioned Criteria Risks
External risks (D1)Political instability (C1)Frequent changes in government due to disputes among political parties, change in law due to local government’s unpredictable new regulations, needless influence by local government on court proceedings regarding project disputes.
Economic risk (C2)Fluctuation in currency exchange rate, unpredictable inflation due to immature banking systems, payment delays due to poor funding for project, inadequate forecasting about market demand.
Social risk (C3)Racial tension and differences in work culture and language between foreign and local partners.
Project risk (D2)Technological risk (C4)Risk of insufficient technology, improper design, unexpected design changes; inadequate site investigation; change in construction procedures and insufficient resource availability.
Work quality risk (C5)Corruption, including bribery, at sites; obsolete technology and practices by the local partner; low local workforce labor productivity due to poor skills or inadequate supervision; improper quality control; local partner tolerance of defects and inferior quality.
Time and cost risk (C6)Delays due to disputes with contractors, natural disasters, and lack of availability of utilities; risk of labor disputes and strikes; insufficient cash flow, improper measurements, ill planned schedules, and delays in payment; lack of proper benchmarking and monitoring of construction activities.
Internal risks (D3)Resource risk (C7)Difficulty in hiring suitable skilled employees; risk of defective material from suppliers; risk of labor, materials, and equipment availability; poor competence and productivity of labor *.
Documents and information risk (C8)Intellectual property protection risk from former local employees, partners, and third parties; corporate fraud including unexpected increases in turnover, unexpected resignations of financial advisers, intentional or unintentional negligence by auditors, bankers, or creditors.
Stakeholder’s risk (C9)Local partner’s creditworthiness: Information on local partner’s accounts lucidity, financial soundness, foreign exchange liquidity, staff reliability. Termination of joint ventures (JV): unfair dividends, e.g., assets, shares, and benefits, to foreign firms by local partner upon termination of JV contract.
* Sources: [4,6,9,23,27,52,75].
Table 4. Construction risks response strategies.
Table 4. Construction risks response strategies.
Alternative (s)Preventive Management TechniquesReferences
A1Proper scheduling for getting updated project information.[9]
A2Adjust plans for scope of work and estimates to counter risk implications.[2]
A3Get information about local partner’s credibility from present and past business partners.[4]
A4Transfer or share risks to/with other parties.[6]
A5Merger and diversification of projects.[23]
Table 5. Unweighted supermatrix formed from every risk factor.
Table 5. Unweighted supermatrix formed from every risk factor.
External Risk (D1)Project Risk (D2)Internal Risk (D3)
C1C2C3C4C5C6C7C8C9
External risk (D1)C10.0000.5760.5890.3150.3860.3730.3320.3530.395
C20.5250.0000.4110.3570.3510.3470.3360.3210.327
C30.4750.4240.0000.3270.2640.2800.3320.3260.278
Project risk (D2)C40.2880.3550.3540.0000.4610.5100.3480.3460.340
C50.4160.3200.3380.4810.0000.4900.3340.3610.363
C60.2960.3260.3080.5190.5390.0000.3180.2930.298
Internal risk (D3)C70.3320.3240.3570.3640.3130.3700.0001.0001.000
C80.3510.3690.3510.3430.3710.3511.0000.0001.000
C90.3160.3080.2920.2930.3150.2791.0001.0000.000
Table 6. Inner dependence matrix of construction project factors.
Table 6. Inner dependence matrix of construction project factors.
Dimensions
External RiskProject RiskInternal Risk
External risk10.5180.503
Project risk0.53710.496
Internal risk0.4620.4821
Table 7. Weighted supermatrix based on supply chain risk factors.
Table 7. Weighted supermatrix based on supply chain risk factors.
External RiskProject RiskInternal Risk
C1C2C3C4C5C6C7C8C9
External riskC10.0000.5760.5890.1630.2000.1930.1670.1780.199
C20.5250.0000.4110.1850.1820.1800.1690.1620.165
C30.4750.4240.0000.1700.1370.1450.1670.1640.140
Project riskC40.1550.1910.1910.0000.4610.5100.1730.1720.169
C50.2230.1720.1820.4810.0000.4900.1660.1790.180
C60.1590.1750.1650.5190.5390.0000.1580.1460.148
Internal riskC70.1540.1500.1650.1760.1510.1780.0001.0001.000
C80.1620.1710.1620.1650.1790.1691.0000.0001.000
C90.1460.1420.1350.1410.1520.1341.0001.0000.000
Table 8. Normalised weighted supermatrix based on supply chain risk factors.
Table 8. Normalised weighted supermatrix based on supply chain risk factors.
External RiskProject RiskInternal Risk
C1C2C3C4C5C6C7C8C9
External riskC10.0000.2880.2940.0820.1000.0970.0560.0590.066
C20.2630.0000.2060.0930.0910.0900.0560.0540.055
C30.2380.2120.0000.0850.0680.0730.0560.0550.047
Project riskC40.0780.0950.0950.0000.2310.2550.0580.0570.056
C50.1120.0860.0910.2410.0000.2450.0550.0600.060
C60.0790.0880.0830.2600.2700.0000.0530.0490.049
Internal riskC70.0770.0750.0830.0880.0750.0890.0000.3330.333
C80.0810.0850.0810.0830.0900.0850.3330.0000.333
C90.0730.0710.0680.0710.0760.0670.3330.3330.000
Table 9. Limited supermatrix based on supply chain risk factors.
Table 9. Limited supermatrix based on supply chain risk factors.
External RiskProject RiskDisruption Risk
C1C2C3C4C5C6C7C8C9
External riskC10.10620.10620.10620.10620.10620.10620.10620.10620.1062
C20.09580.09580.09580.09580.09580.09580.09580.09580.0958
C30.08940.08940.08940.08940.08940.08940.08940.08940.0894
Project riskC40.09720.09720.09720.09720.09720.09720.09720.09720.0972
C50.09960.09960.09960.09960.09960.09960.09960.09960.0996
C60.09710.09710.09710.09710.09710.09710.09710.09710.0971
Internal riskC70.13920.13920.13920.13920.13920.13920.13920.13920.1392
C80.14060.14060.14060.14060.14060.14060.14060.14060.1406
C90.13490.13490.13490.13490.13490.13490.13490.13490.1349
Table 10. Ranking of construction project risk criteria.
Table 10. Ranking of construction project risk criteria.
DimensionsRisk CriteriaRanking
External risk (D1)Political instability (C1)4
Economic risk (C2)8
Social risk (C3)9
Project risk (D2)Technological risk (C4)6
Work quality risk (C5)5
Time and cost risk (C6)7
Internal risk (D3)Resource risk (C7)2
Document and information risk (C8)1
Stakeholder’s risk (C9)3
Table 11. Comparison of alternatives w.r.t risk criteria using D numbers.
Table 11. Comparison of alternatives w.r.t risk criteria using D numbers.
C1C2C3C4C5C6C7C8C9
A1(0.62, 0.5)(0.72, 0.4), (0.48, 0.6)(0.53, 0.4)(0.58, 0.5)(0.72, 0.6)(0.48, 0.6), (0.64, 0.4)(0.66, 0.6)(0.38, 0.9)(0.84, 0.2)
A2(0.68, 0.4)(0.44, 0.8)(0.64, 0.6), (0.32, 0.3)(0.44,.9)(0.82, 0.9)(0.88, 0.6)(0.56, 0.8)(0.92, 0.8)(0.69, 0.4)
A3(0.54, 0.8), (0.68, 0.2)(0.68, 0.3)(0.47, 0.9)(0.78, 0.8)(0.38, 0.7), (0.59, 0.3)(0.68, 0.5)(0.29, 0.6), (0.39, 0.4)(0.28, 0.6)(0.34, 0.6)
A4(0.72, 0.9)(0.49, 0.7)(0.78, 0.4)(0.86, 0.4)(0.88, 0.4)(0.47, 0.7)(0.64, 0.2)(0.62, 1)(0.56, 0.7)
A5(0.48, 1)(0.56, 0.9)(0.82, 0.7)(0.36, 1)(0.78, 0.7)(0.59, 0.9)(0.78, 0.7)(0.68, 0.3), (0.49, 0.6)(0.44, 0.8)
Table 12. Normalised decision matrix of alternatives w.r.t criteria.
Table 12. Normalised decision matrix of alternatives w.r.t criteria.
C1C2C3C4C5C6C7C8C9
A10.89890110.792700.35890.58461
A210.60220.25970.682600.07440.234400.5179
A30.212810.417100.76420.94880.51670.84270.8393
A400.62630.72380.838311110
A50.44680.193500.79040.49740.060500.35310.1786
Table 13. Weighted normalised decision matrix of alternatives w.r.t criteria.
Table 13. Weighted normalised decision matrix of alternatives w.r.t criteria.
C1C2C3C4C5C6C7C8C9
A10.20170.19160.17880.19440.17860.09710.18920.23810.2698
A20.21240.13040.11260.16360.09960.10430.17180.14060.2048
A30.12880.16410.12670.09720.17570.18920.21110.28120.2481
A40.10620.13240.15410.17870.19920.19420.27840.16930.1349
A50.15370.09580.08940.17400.14910.10300.13920.19950.1590
Table 14. Ranking of alternatives using the D-MABAC method.
Table 14. Ranking of alternatives using the D-MABAC method.
Alternative Risk ResponsesQRank
Risk response (A1)Proper scheduling for getting updated project information.0.28301
Risk response (A2)Adjust plans for scope of work and estimates to counter risk implications.−0.11614
Risk response (A3)Get information about local partner’s credibility from its present and past business partners.0.16602
Risk response (A4)Transfer or share risks to/with other parties.0.09133
Risk response (A5)Merger and diversification of projects.−0.19355
Table 15. Comparison of MABAC with various existing multi-criteria decision making methods.
Table 15. Comparison of MABAC with various existing multi-criteria decision making methods.
Alternative Risk ResponsesD-MABACD-TOPSISD-COPRASD-ARAS
A11111
A24444
A32222
A43333
A55555
Table 16. Rank correlation of various MCDM methods.
Table 16. Rank correlation of various MCDM methods.
Spearman’s CoefficientD-MABACD-TOPSISD-COPRASD-ARAS
r k -1.0001.0001.000
Table 17. Scenarios for different criteria weights.
Table 17. Scenarios for different criteria weights.
Scenarios *
CriteriaS1S2S3S4S5S6S7S8
C10.01130.14820.02260.26740.19440.07950.00810.1602
C20.15780.11210.12040.11780.09140.06320.09620.0537
C30.05760.17890.29460.00010.18530.05770.03080.1054
C40.09040.11180.26550.15560.22190.05190.20320.0958
C50.11720.00330.04780.05980.06030.07030.08750.1805
C60.20160.02330.04960.06310.03220.33110.19580.0218
C70.08940.16630.03520.09370.0560.00550.14850.0223
C80.21030.09330.0030.02760.08710.3320.11910.0539
C90.06450.16280.16130.2150.07140.00890.11070.3063
* Priority criteria are indicated in bold text for different scenarios.
Table 18. Sensitivity in alternative rankings for different scenarios of criteria weighting.
Table 18. Sensitivity in alternative rankings for different scenarios of criteria weighting.
Alternative Risk ResponsesScenarios
S1S2S3S4S5S6S7S8
A121111321
A254423543
A312334132
A433242214
A545555455

Share and Cite

MDPI and ACS Style

Chatterjee, K.; Zavadskas, E.K.; Tamošaitienė, J.; Adhikary, K.; Kar, S. A Hybrid MCDM Technique for Risk Management in Construction Projects. Symmetry 2018, 10, 46. https://doi.org/10.3390/sym10020046

AMA Style

Chatterjee K, Zavadskas EK, Tamošaitienė J, Adhikary K, Kar S. A Hybrid MCDM Technique for Risk Management in Construction Projects. Symmetry. 2018; 10(2):46. https://doi.org/10.3390/sym10020046

Chicago/Turabian Style

Chatterjee, Kajal, Edmundas Kazimieras Zavadskas, Jolanta Tamošaitienė, Krishnendu Adhikary, and Samarjit Kar. 2018. "A Hybrid MCDM Technique for Risk Management in Construction Projects" Symmetry 10, no. 2: 46. https://doi.org/10.3390/sym10020046

APA Style

Chatterjee, K., Zavadskas, E. K., Tamošaitienė, J., Adhikary, K., & Kar, S. (2018). A Hybrid MCDM Technique for Risk Management in Construction Projects. Symmetry, 10(2), 46. https://doi.org/10.3390/sym10020046

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop