Next Article in Journal
Healthcare Supply Chain Resilience Investment Strategy Analysis Based on Evolutionary Game
Previous Article in Journal
A New Methodology, Based on a CAD System, for Evaluating Partial and Global Asymmetries in Deer Antlers from Hunting Quality Assessment Data
Previous Article in Special Issue
On Neutrosophic Fuzzy Metric Space and Its Topological Properties
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Fuzzy Bayesian Inference Approach for Risk Assessments

1
School of Nuclear Science and Technology, University of South China, Hengyang 421001, China
2
Hunan Engineering & Technology Research Center for Virtual Nuclear Reactor, University of South China, Hengyang 421001, China
3
Sino-French Institute of Nuclear Engineering and Technology, Sun Yat-sen University, Zhuhai 519082, China
*
Authors to whom correspondence should be addressed.
Symmetry 2024, 16(7), 786; https://doi.org/10.3390/sym16070786
Submission received: 7 April 2024 / Revised: 13 June 2024 / Accepted: 17 June 2024 / Published: 22 June 2024
(This article belongs to the Special Issue Research on Fuzzy Logic and Mathematics with Applications II)

Abstract

:
Bayesian network (BN) inference is an important statistical tool with additive symmetry. However, BN inference cannot deal with the uncertain, fuzzy, random, and conflicting information from experts’ knowledge in the process of conducting a risk assessment. To tackle this issue, a new fuzzy BN inference approach for risk assessments was proposed based on cloud model (CM), interval type-2 fuzzy set (IT2 FS), interval type-2 fuzzy logic system (IT2 FLS), modified Dempster–Shafer (D-S) evidence theory (ET), and Latin hypercube sampling (LHS) methods along the following lines. Firstly, CM was integrated into IT2 FS, and CM-based IT2 FS (CM-IT2 FS) was defined in the IT2 FLS. Secondly, modified D-S ET was utilized to determine the CM-IT2 FS-based a priori probabilities, and the CM-IT2 FS-based BN model was established. Thirdly, the CM-IT2 FS-based a priori probabilities were reduced to the CM-IT1 FS-based ones using a type reducer in the IT2 FLS, LHS was applied to propose a new fuzzy BN inference algorithm, and then, the new algorithm was used in a typical case to perform the fuzzy BN positive inference for risk prediction and the fuzzy BN reverse inference for risk sensitivity analysis. Finally, the BN inference results were analyzed using the proposed algorithm and the two common BN inference algorithms, and the effectiveness of the proposed approach was validated. It can be concluded that the proposed approach was both accurate and promising.

1. Introduction

Risk assessment is most beneficial for a complex system [1]. The aim of a risk assessment is to quantify the uncertain risks and to determine the probabilities of risk occurrence events and their impact on project objectives [2]. Therefore, assessing the risk of a complex system using a scientific tool is crucial.
The Bayesian network (BN) method is an advanced artificial intelligence tool [3]. BN inference is the procedure of combining the a priori probability and conditional probability, which can be obtained either using experts’ knowledge or by data analysis [4], to calculate the updated probability of nodes [5,6]. It has characteristics with additive symmetry. The advantage of BN inference is that it can comprehensively utilize a priori and posteriori probabilities, and thus, it exhibits higher estimation accuracy and robustness [7]. BN inference includes BN positive inference and BN reverse inference. BN positive inference can be used to predict the occurrence probability for leaf nodes, which is a type of system failure, and BN reverse inference can be used to analyze the system sensitivity in the BN model [8]. BN inference has been explored as a potential valuable technique to conduct the risk assessment [9]. Recently, BN inference has been extensively employed for risk assessments in many complex systems that include nuclear power plants (NPPs) [10,11,12], petrochemical plants [13,14,15,16], construction projects [17,18,19,20], hazardous material transportation [21,22,23,24], etc. However, BN inference uses crisp probabilities; thus, it is challenging to deal with the uncertain information from experts’ knowledge [25,26].
The type-2 fuzzy set (FS) (T2 FS) method, an extension of the type-1 FS (T1 FS) method, was first proposed by Zadeh in 1975 [27]. Based on the T2 FS, the type-2 fuzzy logic system (T2 FLS) was proposed by Karnik et al. in 1999 [28]. T2 FLS can be useful in dealing with highly uncertain information [29]. The reason for this is that the membership degree of T2 FS is a fuzzy value in the interval [0, 1] compared to that of T1 FS, which has a crisp value [30]; however, the computational complexity of T2 FLS is quite high [31]. As a restricted class of T2 FLS, interval T2 FLS (IT2 FLS) was proposed to avert the significant computational requirement that was mainly created by its type reducer [32]. Many researchers have recently been applying IT2 FLS to deal with the uncertain information from experts’ knowledge for risk assessments [33,34,35]. Nonetheless, it is challenging to use IT2 FLS to deal with the fuzzy and random information from experts’ knowledge [36].
The cloud model (CM) method based on the probability statistics theory and the traditional fuzzy set [37] provides a scientific way to solve the aforementioned challenging task. CM can be utilized to achieve the bidirectional conversion between qualitative linguistics and quantitative value and to characterize the fuzziness and randomness for a research object using digital characteristics [38]. CM is often used to deal with fuzzy and random information in risk assessments [39,40,41]. Consequently, to deal with the uncertain, fuzzy, and random information from experts’ knowledge, CM should be integrated into interval T2 FS (IT2 FS) to define the CM-based IT2 FS (CM-IT2 FS) in the IT2 FLS. Unfortunately, this is still a gap in the current research.
Since experts provide risk assessment judgements based on their own professional knowledge, conflicting information is generated [42]. Thus, the CM-IT2 FS-based conflicting information should be fused. Currently, the Dempster–Shafer (D-S) evidence theory (ET) [43], which uses the information fusion rule to fuse conflicting information [44], can only be applied to fuse the T1 FS-based conflicting information, and this T1 FS-based conflicting information includes triangular fuzzy numbers [45], trapezoidal fuzzy numbers [46], interval-valued fuzzy sets [47], intuitionistic fuzzy sets [48], etc. Therefore, the D-S ET has to be modified to fuse the CM-IT2 FS-based conflicting information.
Considering that BN inference for risk assessments was to be improved by CM, IT2 FS, IT2 FLS, and modified D-S ET, the conventional BN inference algorithm is no longer suitable. Thus, an applicable BN inference algorithm should be defined. Presently, the Monte Carlo sampling (MCS) method and the variational inference (VI) method are the two main methods used to define the fuzzy BN inference algorithms in the T1FSs environment [49], in which MCS is used to randomly generate the samples through distribution functions of input random variables and VI is used to transform complicated inference issues into high-dimensional optimized ones. However, they are inefficient for large samples [50,51].
The Latin hypercube sampling (LHS) method, a stratified random sampling technique [52], has attracted interest from academics. LHS can divide the range of cumulative distribution function (CDF) of each variable into equal probability intervals and randomly generate a sampling value for each interval [53,54]. The above process ensures that all the sampling values can cover the sampling intervals [55]. Evidently, LHS can produce a higher number of stable and precise results than MCS with the same sampling number [56]. However, it is difficult to apply LHS to propose a fuzzy BN inference algorithm in the CM-IT2 FS environment. One reason for this may be that there is no one-to-one mapping relationship between each variable and its CDF for the CM-IT2 FS. To obtain this one-to-one mapping relationship, the fused CM-IT2 FS-based conflicting information should be reduced to the CM-IT2 FS-based information. Fortunately, IT2 FLS can reduce the IT2 FS-based information to the IT1 FS-based information using a type reducer [57], and this provides a potential solution to overcome the above difficulty.
The above literature shows that there is still a research gap pertaining to the fuzzy BN inference for risk assessments with respect to the uncertain, fuzzy, random, and conflicting information from experts’ knowledge. Therefore, the innovative purpose of this study is to propose a new fuzzy BN inference approach for risk assessment by studying the following problems: (1) how to integrate CM into IT2 FS in order to define the CM-IT2 FS in the IT2 FLS; (2) how to utilize modified D-S ET to determine the CM-IT2 FS-based a priori probabilities in order to establish the CM-IT2 FS-based BN model; (3) how to apply LHS to propose a new fuzzy BN inference algorithm on the basis of the CM-IT1 FS-based a priori probabilities obtained by reducing the CM-IT2 FS-based ones using a type reducer in the IT2 FLS; and (4) how to conduct the fuzzy BN positive and reverse inferences for risk assessments using the proposed algorithm.
Three original contributions of this study can be summarized as follows:
(1)
The CM-IT2 FS was defined in the IT2 FLS through Definitions 1 to 6, and the uncertain, fuzzy, and random information from experts’ knowledge was dealt with accordingly.
(2)
The CM-IT2 FS-based conflicting information from experts’ knowledge was dealt with and fused using modified D-S ET, as shown in Equations (8)–(10), and then, the CM-IT2 FS-based BN model was established.
(3)
A new fuzzy BN inference algorithm was proposed using LHS, as shown in Definition 13, and the risk prediction and risk sensitivity analysis were conducted by the proposed algorithm for a typical case.
This paper is outlined as follows. Section 2 introduces the preliminaries. Section 3 presents the proposed approach. Section 4 describes the case study. Section 5 validates and discusses the availability of the proposed approach. Section 6 concludes our study.

2. Preliminaries

2.1. CM-IT2 FS in the IT2 FLS

Definition 1 [58]. 
IT2 FLS is composed of a fuzzifier, a rule, an inference engine, a type reducer, and a defuzzifier. The fuzzifier is responsible for converting the expert judgement information, which is qualitative linguistics, into a form of IT1 FS. The rule is used to perform the fuzzy operation. The inference engine provides a mapping from the IT1 FS to the IT2 FS. The type reducer converts the IT2 FS into the IT1 FS. The defuzzifier produces the crisp output. The general architecture of IT2 FLS is shown in Figure 1.
Definition 2 [59]. 
B is a qualitative linguistic set in the domain; x is assumed to be a random number that obeys a normal distribution with  x B . The membership degree μ ( x )  of x is a random number with a stable inclination and  μ ( x ) [ 0 , 1 ] .
Definition 3. 
In the CM-IT2 FS,  r ˜ ˜ i j  represents the CM-IT2 FS-based membership degree of the i-th assessment index subordinating to the j-th risk level, and it can be defined as follows.
r ˜ ˜ = ( r ˜ L , r ˜ U ) = ( r 1 L , r 2 L , r 3 L , r 4 L ; H 1 ( r L ) , H 2 ( r L ) ) , ( r 1 U , r 2 U , r 3 U , r 4 U ; H 1 ( r U ) , H 2 ( r U ) )
where  r ˜ L  and  r ˜ U  are T1FSs, and they represent the lower and the upper membership degree functions of CM-IT2 FS, respectively;  r 1 L r 2 L r 3 L r 4 L r 1 U r 2 U r 3 U , and  r 4 U  represent the reference points for  r ˜ ˜ ;  H 1 ( r L )  and  H 2 ( r L ) , the upper and lower limits for the lower membership degree function, respectively; and  H 1 ( r U )  and   H 2 ( r U )  represent the upper and lower bounds for the upper membership degree function, respectively.
Definition 4. 
In the CM-IT2 FS,  R ˜ ˜ i  represents the CM-IT2 FS-based membership degree set of the i-th assessment index subordinating to all risk levels, and it is defined as follows:
R ˜ ˜ i = r ˜ ˜ i I , , r ˜ ˜ i j , , r ˜ ˜ i J = ( r ˜ L i I , r ˜ U i I ) , , ( r ˜ L i j , r ˜ U i j ) , , ( r ˜ L i J , r ˜ U i J )
where  j = 1 , 2 , , 5 .

2.2. CM-IT2 FS-Based BN Model

Definition 5 [60,61]. 
BN is a directed acyclic graph, which is composed of nodes and arrows. The nodes represent the random variables. The arrows, which connect parent nodes and their child nodes, represent the conditional dependencies between different variables. The occurrence probability of root node is called the a priori probability. The probability of non-root node is called the conditional probability. Each node codifies a conditional probability distribution. The probability distribution of random variables is called the joint probability distribution, and can be defined as follows:
P ( X 1 , , X i , , X n ) = i = 1 n P ( X i p a ( X i ) )
where  X 1 , , X i , , X n  are the random variable set;  p a ( X i )  is the parent node; and  P ( X i p a ( X i ) )  is the conditional probability.
Definition 6 [62]. 
If a set  Θ = u 1 , , u i , , u n  is a non-empty finite one with n mutually exclusive elements included,  Θ  is the framework of discernment. The power set of  Θ  is denoted by  P S ( Θ ) . A set function m:  P S ( Θ ) 0 , 1  is regarded as an evidence source if it satisfies the following conditions:
u i P S ( Θ ) m ( u i ) = 1 m ( Ø ) = 0
where  m ( u i )  represents the occurrence probability of u i .
Definition 7. 
The CM-IT2 FS-based membership degree set in Definition 6 is defined as a basic belief assignment in the D-S ET using Equation (5).
m ˜ ˜ ( x i ) = R ˜ ˜ i
Definition 8 [63]. 
The traditional information fusion rule is defined to fuse the conflicting information from experts’ knowledge using Equations (6) and (7).
K = i = 1 n e = 1 z m e ( x i )
m * ( x i ) = 0 , x i = Ø i = 1 n e = 1 z m e ( x i ) 1 K ,   x i Ø
where K denotes a measure of conflict as the coefficient;  m e ( x i )  represents the basic belief assignment of the i-th assessment index by e-th expert; and  m * ( x i )  is the fused evidence.
Definition 9 [64]. 
The modified information fusion rule is utilized to fuse the conflicting information from experts’ knowledge using Equations (8)–(10), and the D-S ET is modified. In Equations (8)–(10), there is a high degree of conflict in the obtained evidence when  K 0.95 , and no conflict in the evidence is observed when  0 K < 0.95 .
m ˜ L x i = 1 1 K L e = 1 z m e L ( x i ) ,     K L < 0.95 K L 1 z e = 1 z m e L ( x i ) + e = 1 z m e L ( x i ) , K L 0.95
m ˜ U x i = 1 1 K U e = 1 z m e U ( x i ) ,     K U < 0.95 K U 1 z e = 1 z m e U ( x i ) + e = 1 z m e U ( x i ) , K U 0.95
m ˜ ˜ * ( x i ) = ( m ˜ L x i , m ˜ U x i )
where  K L  and  K U  are coefficients of lower and upper bounds for  m ( x i ) , respectively;  m ˜ L x i  and  m ˜ U x i  are lower and upper membership degree functions for  m ( x i ) , respectively; and  m ˜ ˜ * ( x i )  is the fused information.
Definition 10. 
The fused conflicting information is defined as the CM-IT2 FS-based a priori probability using Equation (11). Based on this, the CM-IT2 FS-based BN model is established.
P ˜ ˜ ( X i ) = m ˜ ˜ * ( x i )

2.3. New Fuzzy BN Inference Algorithm

Definition 11 [65]. 
The CM-IT2 FS-based a priori probability is reduced to the CM-IT1 FS-based one using Equations (12)–(14) in the type reducer of the IT2 FLS.
r i L = ( r i 4 L r i 1 L ) + ( H 1 ( r i L ) × r i 2 L r i 1 L ) + ( H 2 ( r i L ) × r i 3 L r i 1 L ) 4 + r i 1 L
r i U = ( r i 4 U r i 1 U ) + ( H 1 ( r i U ) × r i 2 U r i 1 U ) + ( H 2 ( r i U ) × r i 3 U r i 1 U ) 4 + r i 1 U
P ˜ ( X i ) = ( r i L , r i U )
Definition 12. 
The fuzzy probability of occurrence for leaf node T is defined using Equation (15) after determining the CM-IT1 FS-based a priori probabilities and conditional probabilities. The updated fuzzy a priori probability, called fuzzy posteriori probability, is defined using Equation (16). The fuzzy sensitivity performance measure (SPM), which denotes the sensitivity degree of root nodes, is defined using Equation (17).
P ˜ ( T ) i = 1 n P ˜ ( X i ) P ( T X i )
P ˜ ( X i T ) P ˜ ( X i ) P ( T X i ) P ˜ ( T )
S P ˜ M ( X i , T ) j = I V ( P ˜ ( T X i j = 1 ) P ˜ ( T ) ) P ˜ ( T )
where  P ˜ ( T )  is the fuzzy occurrence probability;  P ˜ ( X i )  is the fuzzy a priori probability;  P ( T X i )  is the conditional probability;  P ˜ ( X i T )  is the fuzzy posteriori probability;  S P ˜ M ( X i , T )  is the fuzzy SPM; and  P ˜ ( T X i j = 1 )  is the updated fuzzy occurrence probability.
Definition 13. 
A new fuzzy BN inference algorithm is proposed using LHS. The proposed algorithm is as follows Algorithm 1:
Algorithm 1: A new fuzzy BN inference algorithm
1: Set batch number: s samples for a variable generated in a loop.
2: for each one of all variables
3: Initialize the samples number as zero.
4: Define an interval [0, 1] in the samples space, then partition the interval into s equally sized segments,
5: Randomly sample s samples from the interval [0, 1], and record each as  ξ k i .
6: Generate a random value  γ k i  by using  γ k i = k 1 + ξ k i s , then shuffle s random values (sampling values).
7: Employ  F ( γ i ) = P { X i γ i } to compute the CDF for s random values.
8: Generate s a priori probability samples by using  P k ( X i ) = F 1 ( γ k i ) .
9: If s a priori probability samples have been generated, save into the matrix, or return to 3
10: Define a row in the matrix as a set of a priori probability samples.
11: Initiate the parameters and structure in the CM-IT2 FS-based BN model.
12: Assign a priori probability samples to the root node, and calculate the fuzzy occurrence probability using Equation (15).
13: Calculate fuzzy posteriori probability using Equation (16).
14: Calculate fuzzy SPM using Equation (17).
15: If all batches of samples have been calculated, output the results, or return to 12.
16: End

3. Proposal of a New Fuzzy BN Inference Approach

In this study, CM, IT2 FS, IT2 FLS, modified D-S ET, and LHS were applied to introduce a new fuzzy BN inference approach for risk assessments. Figure 2 illustrates its theoretical framework, comprising three stages and twelve relevant steps.

3.1. Stage 1: Define the CM-IT2 FS in the IT2 FLS

At stage 1, the CM-IT2 FS was defined in the IT2 FLS, which included five steps.

3.1.1. Create the Index System

The index system is the basis to assess the studied risk.

3.1.2. Obtain the Qualitative Linguistics for Each Assessment Index

It is assumed that the qualitative risk assessment standard is composed of five risk levels, including level 1 (very low risk), level 2 (low risk), level 3 (medium risk), level 4 (high risk), and level 5 (very high risk). The senior experts on risk assessments were invited to provide their qualitative linguistics for each assessment index according to the risk assessment procedure.

3.1.3. Transform the Qualitative Linguistics into the Quantitative Cloud Characteristics

The golden section method [66], as shown in Table 1, was applied to transform the qualitative linguistics into the quantitative cloud characteristics for each assessment index. Then, the CM-based membership degree set of each assessment index subordinating to five risk levels μ i = μ i 1 , μ i 2 , μ i 3 , μ i 4 , μ i 5 was obtained, where μ i j = ( E x i j , E n i j , H e i j ) and j = 1 , 2 , 3 , 4 , 5 .
Table 1. Golden section method.
Table 1. Golden section method.
Qualitative LinguisticsQuantitative Cloud Characteristics
ExEnHe
Level 1XmaxEn0He0/0.382
Level 2Ex0 + (Xmax + Xmin)/20.382 × (Xmax + Xmin)/6He0/0.618
Level 3(Xmax + Xmin)/20.618En0He0
Level 4Ex0 − (Xmax + Xmin)/20.382 × (XmaxXmin)/6He0/0.618
Level 5XminEn0/0.618He0/0.382
Notes: Ex (expectation value), En (entropy value), and He (hyper-entropy value) are three digital characteristics of CM; Xmax and Xmin represent the upper and lower bounds for the given qualitative linguistics, respectively; Xmax is taken from Table 2, and Xmin takes a value of 0; and Ex0, En0, and He0 are the quantitative cloud characteristics for the middle cloud, taking values of 0.5, 0.103, and 0.005, respectively.
Table 2. Value of Xmax in Table 1.
Table 2. Value of Xmax in Table 1.
Qualitative LinguisticsXmaxQualitative LinguisticsXmaxQualitative LinguisticsXmax
Level 10.9Level 20.7Level 30.5
Level 40.3Level 50.1

3.1.4. Transform the CM-Based Membership Degree Set of Each Assessment Index into the Fuzzy Input Set in the IT2 FLS

The fuzzifier in the IT2 FLS and Equations (18)–(20) [67] was used to transform the CM-based membership degree set of each assessment index for the CM-IT1 FS-based membership degree set μ ˜ i , and μ ˜ i = μ ˜ i 1 , μ ˜ i 2 , μ ˜ i 3 , μ ˜ i 4 , μ ˜ i 5 . The μ ˜ i was inputted into the IT2 FLS as the fuzzy input set.
μ i j L = E x i j 3 E n i j
μ i j U = 1 E x i j 3 E n i j
μ ˜ i j = ( μ i j L , μ i j U )

3.1.5. Define the CM-Based Rule in the IT2 FLS and Create the CM-IT2 Fuzzy Judgement Matrix

The CM-based rule in the IT2 FLS was defined using Equations (21) and (22). The μ ˜ i was iterated twice by the defined rule and inference engine in the IT2 FLS. Afterwards, the μ ˜ i was transformed as the CM-IT2 FS-based membership degree set R ˜ ˜ i , and R ˜ ˜ i = r ˜ ˜ i 1 , r ˜ ˜ i 2 , r ˜ ˜ i 3 , r ˜ ˜ i 4 , r ˜ ˜ i 5 . Then, the CM-IT2 fuzzy judgement matrix W ˜ ˜ for n assessment indexes from one expert’s knowledge was created using Equation (23), as follows:
r ˜ i j U = ( μ ˜ i j ) α
r ˜ i j L = ( μ ˜ i j ) 1 α
where α is the cut set, and it takes a value of 2.
W ˜ ˜ = r ˜ ˜ 11 r ˜ ˜ 12 r ˜ ˜ 13 r ˜ ˜ 14 r ˜ ˜ 15 r ˜ ˜ i 1 r ˜ ˜ i 2 r ˜ ˜ i 3 r ˜ ˜ i 4 r ˜ ˜ i 5 r ˜ ˜ n 1 r ˜ ˜ n 2 r ˜ ˜ n 3 r ˜ ˜ n 4 r ˜ ˜ n 5
Through steps in Section 3.1.2, Section 3.1.3, Section 3.1.4 and Section 3.1.5 in stage 1, the CM-IT2 FS was defined in the IT2 FLS.

3.2. Stage 2: Establish the CM-IT2 FS-Based BN Model

At stage 2, the CM-IT2 FS-based BN model was established, and it included three steps.

3.2.1. Define the Nodes

The studied risk was defined as leaf nodes, and its causes were defined as middle nodes and root nodes, according to the analysis results.

3.2.2. Fuse the CM-IT2 FS-Based Conflicting Information and Determine the CM-IT2 FS-Based a Priori Probabilities

The CM-IT2 FS-based membership degree set in W ˜ ˜ was defined as a basic belief assignment using Equation (5). Afterwards, the evidence matrix M ˜ ˜ was created, as shown in Equation (24). Then, the CM-IT2 FS-based conflicting information was fused using Equations (8)–(10), and the CM-IT2 FS-based a priori probabilities of root nodes were determined using Equation (11).
M ˜ ˜ = m ˜ ˜ 1 ( x 1 ) m ˜ ˜ e ( x 1 ) m ˜ ˜ z ( x 1 ) m ˜ ˜ 1 ( x i ) m ˜ ˜ e ( x i ) m ˜ ˜ z ( x i ) m ˜ ˜ 1 ( x n ) m ˜ ˜ e ( x n ) m ˜ ˜ z ( x n )

3.2.3. Determine the Conditional Probabilities

Conditional probabilities of non-root nodes were determined based on the data analysis of the risk accident to be studied and the engineering experiences and knowledge from experts.
Through Section 3.2.1, Section 3.2.2 and Section 3.2.3 in stage 2, the CM-IT2 FS-based BN model was established.

3.3. Stage 3: Conduct the Fuzzy BN Inference

At stage 3, the new fuzzy BN inference was conducted, and it included four steps.

3.3.1. Reduce the CM-IT2 FS-Based a Priori Probabilities to the CM-IT1 FS-Based Ones

The CM-IT2 FS-based a priori probabilities were reduced to the CM-IT1 FS-based ones using a type reducer in the IT2 FLS and Equations (12)–(14).

3.3.2. Propose a New Fuzzy BN Inference Algorithm

A new fuzzy BN inference algorithm was proposed using LHS, as shown in Definition 13.

3.3.3. Conduct the Fuzzy BN Positive Inference

The fuzzy BN positive inference was conducted using the proposed fuzzy BN inference algorithm (Algorithm 1) to calculate the fuzzy occurrence probability of the risk to be studied so as to take scientific decisions to prevent the risk of accidents.

3.3.4. Conduct the Fuzzy BN Reverse Inference

The fuzzy BN reverse inference was conducted using the proposed fuzzy BN inference algorithm (Algorithm 1) to analyze the risk sensitivity in order to recognize the key risk factors. In reality, the risk management process should be enhanced according to the fuzzy SPM.

4. Case Study

A complex system, which was the NPP in Xudabo Nuclear Power Co., Ltd. (XNPCL), was selected as the case study. It adopts the VVER-1200 technology and is being constructed, at present, in Northeast China.
The deep foundation excavation engineering (DFEE) was selected as the research object in XNPCL. The DFEE has the characteristics of large investments, long engineering cycles, complicated techniques, and unpredictable risk factors [68]. Therefore, it is necessary to conduct the DFEE risk assessment for the NPP construction project.
The DFEE risk assessment was conducted by using the three stages presented in Section 3. Firstly, 10 experts with more than 10 years of experience in risk assessments for NPP construction projects were invited as the senior experts. Then, they conducted the on-site inspection and accessed the relevant information and data. Furthermore, they provided their qualitative linguistics according to the DFEE risk assessment procedure. Finally, the qualitative linguistics was converted into the quantitative value for the DFEE risk prediction and the DFEE risk sensitivity analysis.

4.1. Stage 1: Define the CM-IT2 FS in the IT2 FLS

4.1.1. Create the Index System

The index system of the assessed DFEE risk was created on the basis of the DFEE risk assessment procedure in XNPCL, and it is shown in Table 3.

4.1.2. Obtain the Qualitative Linguistics for Each Assessment Index

The qualitative linguistics for each assessment index was provided by senior experts based on the DFEE risk assessment procedure.

4.1.3. Transform the Qualitative Linguistics into the Quantitative Cloud Characteristics

The qualitative linguistics was transformed into quantitative cloud characteristics for each assessment index, and then, the CM-based membership degree set of each assessment index subordinating to five risk levels was obtained through Section 3.1.3. Taking the qualitative linguistics for the assessment index R11 from the first expert as an example, its CM-based membership degree set was as follows: μ 1 = {(0.7, 0.103, 0.013), (0.85, 0.045, 0.008), (0.35, 0.309, 0.005), (0.15, 0.045, 0.008), (0, 0.809, 0.013)}.

4.1.4. Transform the CM-Based Membership Degree Set of Each Assessment Index into the Fuzzy Input Set in the IT2 FLS

The CM-based membership degree set of each assessment index was transformed into the CM-IT1 FS-based set μ ˜ i , and the μ ˜ i was inputted into the IT2 FLS as the fuzzy input set through Section 3.1.4. Taking the CM-based membership degree set in Example 1 as an example, its corresponding fuzzy input set was as follows: μ ˜ 1 = {(0.156, 0.500), (0.010, 0.591), (0.156, 0.500), (0.259, 0.359), (0.156, 0.500)}.

4.1.5. Define the CM-Based Rule in the IT2 FLS and Create the CM-IT2 Fuzzy Judgement Matrix

The CM-based rule in the IT2 FLS was defined, and then, the CM-IT2 fuzzy judgement matrix R ˜ ˜ for eight assessment indexes from one expert was created through Section 3.1.5. Taking the CM-IT2 fuzzy judgement matrix W ˜ ˜ for eight assessment indexes from the first expert as an example, the following matrix was established:
W ˜ ˜ = ( 0.0000 , 0.0100 , 0.0100 , 0.3162 ; 0.9 , 0.9 ) , ( 0.1220 , 0.5910 , 0.5910 , 0.8768 ; 1.0 , 1.0 ) ( 0.0625 , 0.0500 , 0.0500 , 0.8409 ; 0.9 , 0.9 ) , ( 0.0000 , 0.0010 , 0.0010 , 0.3162 ; 1.0 , 1.0 ) ( 0.0006 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 0.9 , 0.9 ) , ( 0.0005 , 0.1562 , 0.1562 , 0.6287 ; 1.0 , 1.0 )

4.2. Stage 2: Establish the CM-IT2 FS-Based BN Model

4.2.1. Determine the Nodes

The DFEE risk for the construction project in XNPCL was defined as leaf nodes, and indexes and sub-indexes in Table 3 were defined as middle nodes and root nodes, respectively.

4.2.2. Fuse the CM-IT2 FS-Based Conflicting Information and Determine the CM-IT2 FS-Based a Priori Probabilities

The evidence matrix M ˜ ˜ was created, the CM-IT2 FS-based conflicting information was fused, and the CM-IT2 FS-based a priori probabilities of root nodes were determined through the Section 3.2.2, and the results are shown as follows:
M ˜ ˜ = ( 0.0000 , 0.0100 , 0.0100 , 0.3162 ; 0.9 , 0.9 ) , ( 0.1220 , 0.5910 , 0.5910 , 0.8768 ; 1.0 , 1.0 ) ( 0.0006 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0167 , 0.3590 , 0.3590 , 0.7741 ; 0.9 , 0.9 ) , ( 0.0045 , 0.2590 , 0.2590 , 0.7134 ; 1.0 , 1.0 ) ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 0.9 , 0.9 ) , ( 0.1562 , 0.1562 , 0.1562 , 0.6287 ; 1.0 , 1.0 ) ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 0.9 , 0.9 ) , ( 0.0000 , 0.0100 , 0.0100 , 0.3262 ; 1.0 , 1.0 ) ( 0.0167 , 0.3590 , 0.3590 , 0.7741 ; 0.9 , 0.9 ) , ( 0.0045 , 0.2590 , 0.2590 , 0.7134 ; 1.0 , 1.0 ) ( 0.0060 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0000 , 0.0100 , 0.0100 , 0.3162 ; 0.9 , 0.9 ) , ( 0.1220 , 0.5910 , 0.5910 , 0.8768 ; 1.0 , 1.0 ) ( 0.0006 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0166 , 0.3590 , 0.3590 , 0.7741 ; 0.9 , 0.9 ) , ( 0.0045 , 0.2590 , 0.2590 , 0.7164 ; 1.0 , 1.0 ) ( 0.0006 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0000 , 0.0100 , 0.0100 , 0.3162 ; 0.9 , 0.9 ) , ( 0.1220 , 0.5910 , 0.5910 , 0.8768 ; 1.0 , 1.0 ) ( 0.0006 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0167 , 0.3590 , 0.3590 , 0.7741 ; 0.9 , 0.9 ) , ( 0.0045 , 0.2590 , 0.2590 , 0.7134 ; 1.0 , 1.0 ) ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 0.9 , 0.9 ) , ( 0.0006 , 0.1562 , 0.1562 , 0.6287 ; 1.0 , 1.0 ) ( 0.0167 , 0.3590 , 0.3590 , 0.7741 ; 0.9 , 0.9 ) , ( 0.0045 , 0.2590 , 0.2590 , 0.7134 ; 1.0 , 1.0 ) ( 0.0060 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0000 , 0.0100 , 0.0100 , 0.3162 ; 0.9 , 0.9 ) , ( 0.1220 , 0.5910 , 0.5910 , 0.8768 ; 1.0 , 1.0 ) ( 0.0006 , 0.1562 , 0.1562 , 0.6287 ; 0.9 , 0.9 ) , ( 0.0625 , 0.5000 , 0.5000 , 0.8409 ; 1.0 , 1.0 ) ( 0.0166 , 0.3590 , 0.3590 , 0.7741 ; 0.9 , 0.9 ) , ( 0.0045 , 0.2590 , 0.2590 , 0.7164 ; 1.0 , 1.0 )
Taking the assessment index R11 as an example, its CM-IT2 FS-based a priori probability is shown in Table 4.

4.2.3. Determine the Conditional Probabilities

The conditional probabilities of non-root nodes were determined through Section 3.2.3. Some conditional probabilities are shown in Table 5.
Through the above Section 4.2.1, Section 4.2.2 and Section 4.2.3, the CM-IT2 FS-based BN model, as shown in Figure 3, was created.

4.3. Stage 3: Conduct the fuzzy BN Inference

4.3.1. Reduce the CM-IT2 FS-Based a Priori Probabilities to the CM-IT1-FS-Based Ones

The CM-IT2 FS-based a priori probabilities were reduced to the CM-IT1 FS-based ones through Section 3.3.1. Taking the assessment index R11 as an example, its CM-IT1 FS-based a priori probability is shown in Table 6.

4.3.2. Propose a New Fuzzy BN Inference Algorithm

The proposed new fuzzy BN inference algorithm from LHS is shown in Definition 13. The sampling number was set as 1000.

4.3.3. Conduct the Fuzzy BN Positive Inference

The fuzzy occurrence probability of the DFEE risk was calculated using the proposed fuzzy BN inference algorithm (Algorithm 1), and Figure 4 shows the risk prediction result. The prediction result indicates that the DFEE risk was assessed as low risk (level 2).

4.3.4. Conduct the Fuzzy BN Reverse Inference

The fuzzy SPM was calculated using the proposed fuzzy BN inference algorithm (Algorithm 1), and Figure 5 shows the boxplot of the fuzzy SPM of the assessment index R11.
As shown in Figure 5, the scatter plots of the fuzzy SPM for the assessment index R11 followed a normal distribution. The sampling numbers near the upper margin (0.2380) and the lower margin (0.1562) were quite small. The sampling numbers from the upper quartile (0.2089) to the lower quartile (0.1868) were large. The length from the upper quartile to the lower quartile was short. The above analysis indicated that the fuzzy SPM for the assessment index R11 was ideal.

5. Validation and Discussion

For the sake of validating the availability of the proposed fuzzy BN inference approach for risk assessments, we conducted the following two tasks.

5.1. The BN Positive Inference Results Were Analyzed

The CM-IT2 FS-based, CM-IT1 FS-based, and traditional CM-crisp value-based a priori probabilities were compared and analyzed. Taking the assessment index R11 as an example, its coefficient K was 0.9986, and this indicates that the information from experts’ knowledge was highly conflicting. Modified D-S ET was utilized to fuse the above three kinds of a priori probabilities, and the fusion results are shown in Table 7.
Then, the BN positive inference was conducted, and the DFEE risk prediction results are shown in Figure 6. For high risks, the ranking of the obtained occurrence probabilities was as follows: proposed fuzzy BN inference algorithm (14.67%) > CM-IT1 FS-based fuzzy BN inference algorithm (10.39%) > traditional CM-crisp value-based BN inference algorithm (6.82%).
The reasons for the above ranking were as follows. Most a priori probabilities obtained using the CM-IT1 FS-based fuzzy BN inference algorithm and the traditional BN inference algorithm were assigned to low and medium risks (levels 1, 2, and 3), but high risks (levels 4 and 5) were underestimated. When the realistic DFEE risk is high, the risk prediction result obtained using the proposed fuzzy BN inference algorithm can truly reflect the actual situation. This is of great help for decisionmakers to take timely corrective actions to avoid the risk of accidents.

5.2. The BN Reverse Inference Results Were Analyzed

The BN reverse inference was conducted. The SPMs for each root node were calculated; the results are shown in Table 8, and the rankings of SPMs for each root node are shown in Table 9. In Table 8 and Table 9, SPM1 and SPM2 represent the obtained mean values of fuzzy SPMs using the proposed fuzzy BN inference algorithm and the CM-IT1 FS-based fuzzy BN inference algorithm, respectively, and SPM3 represents the obtained SPM using the traditional CM-crisp value-based BN inference algorithm.
As shown in Table 8, the order of SPM was SPM3 > SPM2 > SPM1. As shown in Table 9, four risk factors containing R12, R21, R32, and R11 had a great impact on the occurrence of the DFEE accidents.
The reasons for the above results were as follows: When compared with the CM-IT1 FS-based a priori probability and the CM-crisp value-based a priori probability, the CM-IT2 FS-based a priori probability had a wider range of values because it expressed more uncertain, fuzzy, random, and conflicting information. The comparative result is shown in Table 7. When calculating the fuzzy SPM of root node Xi using the proposed fuzzy BN inference algorithm, we assumed that the a priori probability of Xi subordinating to the j-th level was 1, and the a priori probabilities subordinating to the other four risk levels were 0, and this would change its fuzzy a priori probability. Meanwhile, in the process of random sampling for fuzzy a priori probabilities of other root nodes, it would produce some difference among sampling values and CM-crisp value-based a priori probabilities. This process compensated for the changing value of fuzzy a priori probability of root node Xi to some extent, which caused little change in the fuzzy occurrence probability of leaf nodes, making SPM1 smaller than SPM1 and SPM3.

6. Conclusions

In our study, a new fuzzy BN inference approach for risk assessments was proposed on the basis of CM, IT2 FS, IT2 FLS, D-S ET, and LHS methods. The DFEE risk prediction and DFEE risk sensitivity analysis were conducted using the proposed fuzzy BN inference algorithm. The DFEE risk prediction result indicated that the DFEE risk was assessed as low risk, however, attention should be paid to the potential high risks. The DFEE risk sensitivity analysis result indicated that four risk factors had a great impact on the occurrence of DFEE accidents, and this provided the clear direction for XNPCL to continuously improve the DFEE risk management process.
However, our study has the following two limitations: One is that we only analyzed the DFEE risk for the NPP construction project. The other is that we only used the proposed approach for a typical case. Therefore, in a future study, we will expand the studied risk to other risks, which include work at height, temporary electricity, occupational health, etc., to propose a universal fuzzy BN inference approach for safety-related risk assessments, and then we will use the proposed approach in other projects.

Author Contributions

Conceptualization, J.X.; methodology, R.D.; software, T.D.; validation, M.Z.; formal analysis, R.D. and M.Z.; resources, T.Y.; data curation, Y.S.; writing—original draft preparation, J.X.; writing—review and editing, Y.S.; visualization, T.D.; supervision, T.Y.; project administration, Y.S.; funding acquisition, Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 52174189 and 11805094, and the Natural Science Foundation of Hunan Province, grant number 2023JJ10035.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Peet, W.; Ryan, R. Risk Management in a Network Operation—Understanding Complex Systems. In Owning the Future: Integrated Risk Management in Practice; Centre for Advanced Engineering: Christchurch, New Zealand, 1998; pp. 255–274. [Google Scholar]
  2. Yang, Y.; Wang, J.; Wang, G.; Chen, Y.W. Research and Development Project Risk Assessment Using a Belief Rule-Based System with Random Subspaces. Knowl.-Based Syst. 2019, 178, 51–60. [Google Scholar] [CrossRef]
  3. Sun, B.; Zhou, Y.; Wang, J.; Zhang, W. A New PC-PSO algorithm for Bayesian Network Structure Learning with Structure Priors. Expert Syst. Appl. 2021, 184, 115237. [Google Scholar] [CrossRef]
  4. Akhavan, M.; Sebt, M.V.; Ameli, M. Risk Assessment Modeling for Knowledge Based and Startup Projects Based on Feasibility Studies: A Bayesian Network Approach. Knowl.-Based Syst. 2021, 222, 106992. [Google Scholar] [CrossRef]
  5. Zarei, E.; Azadeh, A.; Khakzad, N.; Aliabadi, M.M.; Mohammadfam, I. Dynamic Safety Assessment of Natural Gas Stations Using Bayesian Network. J. Hazard. Mater. 2017, 321, 830–840. [Google Scholar] [CrossRef]
  6. Zhang, G.H.; Chen, W.; Jiao, Y.Y.; Wang, H.; Wang, C.T. A Failure Probability Evaluation Method for Collapse of Drill-and-Blast Tunnels Based on Multistate Fuzzy Bayesian Network. Eng. Geol. 2020, 276, 105752. [Google Scholar] [CrossRef]
  7. Li, K.; Fang, L.; Lu, T. Bayesian Panel Smooth Transition Model with Spatial Correlation. PLoS ONE 2019, 14, e0211467. [Google Scholar] [CrossRef] [PubMed]
  8. Yu, J.; Wu, S.; Yu, Y.; Chen, H.; Fan, H.; Liu, J.; Ge, S. Process System Failure Evaluation Method Based on a Noisy-OR Gate Intuitionistic Fuzzy Bayesian Network in an Uncertain Environment. Process Saf. Environ. Prot. 2021, 150, 281–297. [Google Scholar]
  9. Dong, Y.; Wang, T. Risk Evaluation of Registered Specifications and Internal Release Limits Using a Bayesian Approach. In Proceedings of the Pharmaceutical Statistics: MBSW 39, Muncie, IN, USA, 16–18 May 2016; Liu, R., Tsong, Y., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 89–99. [Google Scholar]
  10. Kim, J.; Shah, A.U.A.; Kang, H.G. Dynamic Risk Assessment with Bayesian Network and Clustering Analysis. Reliab. Eng. Syst. Saf. 2020, 201, 106959. [Google Scholar] [CrossRef]
  11. Lee, C.J.; Lee, K.J. Application of Bayesian Network to the Probabilistic Risk Assessment of Nuclear Waste Disposal. Reliab. Eng. Syst. Saf. 2006, 91, 515–532. [Google Scholar] [CrossRef]
  12. Tolo, S.; Patelli, E.; Beer, M. Bayesian Network Approach for Risk Assessment of a Spent Nuclear Fuel Pond. In Vulnerability, Uncertainty, and Risk; American Society of Civil Engineers (ASCE): Reston, VA, USA, 2014; pp. 598–607. [Google Scholar]
  13. Barua, S.; Gao, X.; Pasman, H.; Mannan, M.S. Bayesian Network Based Dynamic Operational Risk Assessment. J. Loss Prev. Process Ind. 2016, 41, 399–410. [Google Scholar] [CrossRef]
  14. Khakzad, N. Application of Dynamic Bayesian Network to Risk Analysis of Domino Effects in Chemical Infrastructures. Reliab. Eng. Syst. Saf. 2015, 138, 263–272. [Google Scholar] [CrossRef]
  15. Zhang, J.; Cai, B.; Mulenga, K.; Liu, Y.; Xie, M. Bayesian Network-Based Risk Analysis Methodology: A Case of Atmospheric and Vacuum Distillation Unit. Process Saf. Environ. Prot. 2018, 117, 660–674. [Google Scholar] [CrossRef]
  16. Lu, Y.; Wang, T.; Liu, T. Bayesian Network-Based Risk Analysis of Chemical Plant Explosion Accidents. Int. J. Environ. Res. Public Health 2020, 17, 5364. [Google Scholar] [CrossRef]
  17. Chen, T.T.; Leu, S. Sen Fall Risk Assessment of Cantilever Bridge Projects Using Bayesian Network. Saf. Sci. 2014, 70, 161–171. [Google Scholar] [CrossRef]
  18. Namazian, A.; Haji Yakhchali, S. Modified Bayesian Network–Based Risk Analysis of Construction Projects: Case Study of South Pars Gas Field Development Projects. ASCE-ASME J. Risk Uncertain. Eng. Syst. Part A Civ. Eng. 2018, 4, 05018003. [Google Scholar] [CrossRef]
  19. Wang, Z.Z.; Chen, C. Fuzzy Comprehensive Bayesian Network-Based Safety Risk Assessment for Metro Construction Projects. Tunn. Undergr. Space Technol. 2017, 70, 330–342. [Google Scholar] [CrossRef]
  20. Zhang, L.; Wu, X.; Skibniewski, M.J.; Zhong, J.; Lu, Y. Bayesian-Network-Based Safety Risk Analysis in Construction Projects. Reliab. Eng. Syst. Saf. 2014, 131, 29–39. [Google Scholar] [CrossRef]
  21. Huang, W.; Zhang, Y.; Kou, X.; Yin, D.; Mi, R.; Li, L. Railway Dangerous Goods Transportation System Risk Analysis: An Interpretive Structural Modeling and Bayesian Network Combining Approach. Reliab. Eng. Syst. Saf. 2020, 204, 107220. [Google Scholar] [CrossRef]
  22. Khan, R.U.; Yin, J.; Mustafa, F.S.; Anning, N. Risk Assessment for Berthing of Hazardous Cargo Vessels Using Bayesian Networks. Ocean Coast. Manag. 2021, 210, 105673. [Google Scholar] [CrossRef]
  23. Zarei, E.; Gholamizadeh, K.; Khan, F.; Khakzad, N. A Dynamic Domino Effect Risk Analysis Model for Rail Transport of Hazardous Material. J. Loss Prev. Process Ind. 2022, 74, 104666. [Google Scholar] [CrossRef]
  24. Zhao, L.; Wang, X.; Qian, Y. Analysis of Factors That Influence Hazardous Material Transportation Accidents Based on Bayesian Networks: A Case Study in China. Saf. Sci. 2012, 50, 1049–1055. [Google Scholar] [CrossRef]
  25. Ferdous, R.; Khan, F.; Sadiq, R.; Amyotte, P.; Veitch, B. Handling and Updating Uncertain Information in Bow-Tie Analysis. J. Loss Prev. Process Ind. 2012, 25, 8–19. [Google Scholar] [CrossRef]
  26. Tolo, S.; Patelli, E.; Beer, M. Robust Vulnerability Analysis of Nuclear Facilities Subject to External Hazards. Stoch. Environ. Res. Risk Assess. 2017, 31, 2733–2756. [Google Scholar] [CrossRef]
  27. Hidalgo, D.; Melin, P.; Castillo, O. An Optimization Method for Designing Type-2 Fuzzy Inference Systems Based on the Footprint of Uncertainty Using Genetic Algorithms. Expert Syst. Appl. 2012, 39, 4590–4598. [Google Scholar] [CrossRef]
  28. Wang, L.X. A New Look at Type-2 Fuzzy Sets and Type-2 Fuzzy Logic Systems. IEEE Trans. Fuzzy Syst. 2017, 25, 693–706. [Google Scholar] [CrossRef]
  29. Melin, P.; Castillo, O. A Review on the Applications of Type-2 Fuzzy Logic in Classification and Pattern Recognition. Expert Syst. Appl. 2013, 40, 5413–5423. [Google Scholar] [CrossRef]
  30. Leal-Ramírez, C.; Castillo, O.; Melin, P.; Rodríguez-Díaz, A. Simulation of the Bird Age-Structured Population Growth Based on an Interval Type-2 Fuzzy Cellular Structure. Inf. Sci. 2011, 181, 519–535. [Google Scholar] [CrossRef]
  31. Li, Y.; Sun, Y.; Hua, J.; Li, L. Indirect Adaptive Type-2 Fuzzy Impulsive Control of Nonlinear Systems. IEEE Trans. Fuzzy Syst. 2015, 23, 1084–1099. [Google Scholar] [CrossRef]
  32. Khosravi, A.; Nahavandi, S.; Creighton, D. Short Term Load Forecasting Using Interval Type-2 Fuzzy Logic Systems. In Proceedings of the 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, China, 27–30 June 2011; pp. 502–508. [Google Scholar]
  33. Bahrebar, S.; Blaabjerg, F.; Wang, H.; Vafamand, N.; Khooban, M.H.; Rastayesh, S.; Zhou, D. A Novel Type-2 Fuzzy Logic for Improved Risk Analysis of Proton Exchange Membrane Fuel Cells in Marine Power Systems Application. Energies 2018, 11, 721. [Google Scholar] [CrossRef]
  34. Jana, D.K.; Pramanik, S.; Sahoo, P.; Mukherjee, A. Interval Type-2 Fuzzy Logic and Its Application to Occupational Safety Risk Performance in Industries. Soft Comput. 2019, 23, 557–567. [Google Scholar] [CrossRef]
  35. Macura, D.; Laketić, M.; Pamučar, D.; Marinković, D. Risk Analysis Model with Interval Type-2 Fuzzy FMEA—Case Study of Railway Infrastructure Projects in the Republic of Serbia. Acta Polytech. Hung. 2022, 19, 103–118. [Google Scholar] [CrossRef]
  36. Li, X.; Ran, Y.; Zhang, G.; He, Y. A Failure Mode and Risk Assessment Method Based on Cloud Model. J. Intell. Manuf. 2020, 31, 1339–1352. [Google Scholar] [CrossRef]
  37. Gong, X.; Yu, C.; Min, L. A Cloud Theory-Based Multi-Objective Portfolio Selection Model with Variable Risk Appetite. Expert Syst. Appl. 2021, 176, 114911. [Google Scholar] [CrossRef]
  38. Yang, X.; Xu, Z.; Xu, J. Large-Scale Group Delphi Method with Heterogeneous Decision Information and Dynamic Weights. Expert Syst. Appl. 2023, 213, 118782. [Google Scholar] [CrossRef]
  39. Guo, Y.; Meng, X.; Meng, T.; Wang, D.; Liu, S. A Novel Method of Risk Assessment Based on Cloud Inference for Natural Gas Pipelines. J. Nat. Gas Sci. Eng. 2016, 30, 421–429. [Google Scholar] [CrossRef]
  40. Wu, Y.; Hu, M.; Liao, M.; Liu, F.; Xu, C. Risk Assessment of Renewable Energy-Based Island Microgrid Using the HFLTS-Cloud Model Method. J. Clean. Prod. 2021, 284, 125362. [Google Scholar] [CrossRef]
  41. Yu, J.; Chen, H.; Wu, S.; Fan, H. A Novel Risk Matrix Approach Based on Cloud Model for Risk Assessment under Uncertainty. IEEE Access 2021, 9, 27884–27896. [Google Scholar]
  42. Liu, J.; Gong, B. Analysis of Uncertainty Multi-attribute Group Decision Making Process Based on D-S Evidence Theory. J. Comput. 2011, 6, 711–717. [Google Scholar] [CrossRef]
  43. Zhang, W.; Ji, X.; Yang, Y.; Chen, J.; Gao, Z.; Qiu, X. Data Fusion Method Based on Improved D-S Evidence Theory. In Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), Shanghai, China, 15–17 January 2018; pp. 760–766. [Google Scholar]
  44. Dou, Z.; Xu, X.; Lin, Y.; Zhou, R. Application of D-S Evidence Fusion Method in the Fault Detection of Temperature Sensor. Math. Probl. Eng. 2014, 2014, 395057. [Google Scholar] [CrossRef]
  45. Gong, Y.; Su, X.; Qian, H.; Yang, N. Research on Fault Diagnosis Methods for the Reactor Coolant System of Nuclear Power Plant Based on D-S Evidence Theory. Ann. Nucl. Energy 2018, 112, 395–399. [Google Scholar] [CrossRef]
  46. Liu, H.; Ma, Z.; Deng, X.; Jiang, W. A New Method to Air Target Threat Evaluation Based on Dempster-Shafer Evidence Theory. In Proceedings of the 2018 Chinese Control And Decision Conference (CCDC), Shenyang, China, 9–11 June 2018; pp. 2504–2508. [Google Scholar]
  47. Pan, Y.; Zhang, L.; Li, Z.W.; Ding, L. Improved Fuzzy Bayesian Network-Based Risk Analysis with Interval-Valued Fuzzy Sets and D-S Evidence Theory. IEEE Trans. Fuzzy Syst. 2020, 28, 2063–2077. [Google Scholar] [CrossRef]
  48. Guo, J. A Risk Assessment Approach for Failure Mode and Effects Analysis Based on Intuitionistic Fuzzy Sets and Evidence Theory. J. Intell. Fuzzy Syst. 2016, 30, 869–881. [Google Scholar] [CrossRef]
  49. Zhang, J.; Liu, M.; Dong, M. Variational Bayesian Inference for Interval Regression with An Asymmetric Laplace Distribution. Neurocomputing 2019, 323, 214–230. [Google Scholar] [CrossRef]
  50. Hajian, M.; Rosehart, W.D.; Zareipour, H. Probabilistic Power Flow by Monte Carlo Simulation with Latin Supercube Sampling. IEEE Trans. Power Syst. 2013, 28, 1550–1559. [Google Scholar] [CrossRef]
  51. Hoffman, M.D.; Blei, D.M.; Wang, C.; Paisley, J. StochasticVariational Inference. J. Mach. Learn. Res. 2013, 14, 1303–1347. [Google Scholar]
  52. Shields, M.D.; Zhang, J. The Generalization of Latin Hypercube Sampling. Reliab. Eng. Syst. Saf. 2016, 148, 96–108. [Google Scholar] [CrossRef]
  53. Banyay, G.A.; Shields, M.D.; Brigham, J.C. Efficient Global Sensitivity Analysis of Structural Vibration for a Nuclear Reactor System Subject to Nonstationary Loading. Nucl. Eng. Des. 2020, 361, 110544. [Google Scholar] [CrossRef]
  54. Su, L.; Li, X.L.; Jiang, Y.P. Comparison of Methodologies for Seismic Fragility Analysis of Unreinforced Masonry Buildings Considering Epistemic Uncertainty. Eng. Struct. 2020, 205, 110059. [Google Scholar] [CrossRef]
  55. Banyay, G.A.; Shields, M.D.; Brigham, J.C. Efficient Global Sensitivity Analysis for Flow-Induced Vibration of a Nuclear Reactor Assembly Using Kriging Surrogates. Nucl. Eng. Des. 2019, 341, 1–15. [Google Scholar] [CrossRef]
  56. Shu, Z.; Jirutitijaroen, P. Latin Hypercube Sampling Techniques for Power Systems Reliability Analysis with Renewable Energy Sources. IEEE Trans. Power Syst. 2011, 26, 2066–2073. [Google Scholar]
  57. Zhang, Z.; Wang, T.; Chen, Y.; Lan, J. Design of Type-2 Fuzzy Logic Systems Based on Improved Ant Colony Optimization. Int. J. Control Autom. Syst. 2019, 17, 536–544. [Google Scholar] [CrossRef]
  58. Sanchez, M.A.; Castillo, O.; Castro, J.R. Generalized Type-2 Fuzzy Systems for Controlling a Mobile Robot and a Performance Comparison with Interval Type-2 and Type-1 Fuzzy Systems. Expert Syst. Appl. 2015, 42, 5904–5914. [Google Scholar] [CrossRef]
  59. Liao, L.; Guo, W.W. Incorporating Utility and Cloud Theories for Owner Evaluation in Tendering. Expert Syst. Appl. 2012, 39, 5894–5899. [Google Scholar] [CrossRef]
  60. Tolo, S.; Patelli, E.; Beer, M. An Open Toolbox for the Reduction, Inference Computation and Sensitivity Analysis of Credal Networks. Adv. Eng. Softw. 2018, 115, 126–148. [Google Scholar] [CrossRef]
  61. Khakzad, N. System Safety Assessment under Epistemic Uncertainty: Using Imprecise Probabilities in Bayesian Network. Saf. Sci. 2019, 116, 149–160. [Google Scholar] [CrossRef]
  62. Bisht, K.; Kumar, A. A Portfolio Construction Model Based on Sector Analysis Using Dempster-Shafer Evidence Theory and Granger Causal Network: An Application to National Stock Exchange of India. Expert Syst. Appl. 2023, 215, 119434. [Google Scholar] [CrossRef]
  63. Luo, H.; Yang, S.L.; Hu, X.J.; Hu, X.X. Agent Oriented Intelligent Fault Diagnosis System Using Evidence Theory. Expert Syst. Appl. 2012, 39, 2524–2531. [Google Scholar] [CrossRef]
  64. Xu, J.; Ding, R.; Li, M.; Dai, T.; Zheng, M.; Yu, T.; Sui, Y. A New Bayesian Network Model for Risk Assessment Based on Cloud Model, Interval Type-2 Fuzzy Sets and Improved D-S Evidence Theory. Inf. Sci. 2022, 618, 336–355. [Google Scholar] [CrossRef]
  65. Wu, Z.; Yang, C.; Zheng, R. Developing a Holistic Fuzzy Hierarchy-Cloud Assessment Model for the Connection Risk of Renewable Energy Microgrid. Energy 2022, 245, 123235. [Google Scholar] [CrossRef]
  66. Xu, J.; Zhai, J. Research on the Evaluation of Green Innovation Capability of Manufacturing Enterprises in Innovation Network. Sustainability 2020, 12, 807. [Google Scholar] [CrossRef]
  67. Huang, G.; Xiao, L. Failure Mode and Effect Analysis: An Interval-Valued Intuitionistic Fuzzy Cloud Theory-Based Method. Appl. Soft Comput. 2021, 98, 106834. [Google Scholar] [CrossRef]
  68. Zhou, H.; Zhang, H. Risk Assessment Methodology for A Deep Doundation Pit Construction Project in Shanghai, China. J. Constr. Eng. Manag. 2011, 137, 1185–1194. [Google Scholar] [CrossRef]
Figure 1. General architecture of IT2 FLS.
Figure 1. General architecture of IT2 FLS.
Symmetry 16 00786 g001
Figure 2. Theoretical framework of the proposed approach.
Figure 2. Theoretical framework of the proposed approach.
Symmetry 16 00786 g002
Figure 3. CM-IT2 FS-based BN model.
Figure 3. CM-IT2 FS-based BN model.
Symmetry 16 00786 g003
Figure 4. Fuzzy occurrence probability of the DFEE risk.
Figure 4. Fuzzy occurrence probability of the DFEE risk.
Symmetry 16 00786 g004
Figure 5. Boxplot of fuzzy SPM.
Figure 5. Boxplot of fuzzy SPM.
Symmetry 16 00786 g005
Figure 6. DFEE risk prediction results. Note: Occurrence probabilities were obtained using the proposed fuzzy BN inference algorithm and the CM-IT1 FS based fuzzy BN inference algorithm, and they are the mean values of the sampling values.
Figure 6. DFEE risk prediction results. Note: Occurrence probabilities were obtained using the proposed fuzzy BN inference algorithm and the CM-IT1 FS based fuzzy BN inference algorithm, and they are the mean values of the sampling values.
Symmetry 16 00786 g006
Table 3. Index system.
Table 3. Index system.
IndexSub-Index
Bracing system instability (U1)Bracing overall system instability (R11)
Bracing system break (R12)
Kick damage (R13)
Soil deformation (U2)Soil landslide (R21)
Soil permeation (R22)
Foundation surge (R23)
Mechanical injury (U3)Mechanical collapse (R31)
Unsafety behavior (R32)
Table 4. CM-IT2 FS-based a priori probability.
Table 4. CM-IT2 FS-based a priori probability.
IndexRisk LevelA Priori Probability
R11Level 1((0.0000, 0.1439, 0.1439, 0.5148; 0.9, 0.9),
(0.0006, 0.4732, 0.4732, 0.8214; 1.0, 1.0))
Level 2((0.0000, 0.1269, 0.1269, 0.5649; 0.9, 0.9),
(0.2214, 0.5184, 0.5184, 0.8501; 1.0, 1.0))
Level 3((0.0000, 0.2137, 0.2137, 0.6063; 0.9, 0.9),
(0.0000, 0.4068, 0.4068, 0.7878; 1.0, 1.0))
Level 4((0.0000, 0.1229, 0.1229, 0.2548; 0.9, 0.9),
(0.0000, 0.0933, 0.0933, 0.2360; 1.0, 1.0))
Level 5((0.0325, 0.1526, 0.1526, 0.2747; 0.9, 0.9),
(0.0000, 0.0380, 0.0380, 0.1655; 1.0, 1.0))
Table 5. Some conditional probabilities.
Table 5. Some conditional probabilities.
R11R12R13P (U1| R11, R12, R13)R11R12R13P (U1| R11, R12, R13)
Level 1Level 1Level 1(1, 0, 0, 0, 0)Level 1Level 2Level 1(0.6, 0.4, 0, 0, 0)
Level 2(0.6, 0.4, 0, 0, 0) Level 2(0.4, 0.6, 0, 0, 0)
Level 3(0.4, 0.3, 0.3, 0, 0) Level 3(0.3, 0.4, 0.3, 0, 0)
Level 4(0.4, 0.2, 0.2, 0.2, 0) Level 4(0.3, 0.2, 0.3, 0.2, 0)
Level 5(0.4, 0.15, 0.15, 0.15, 0.15) Level 5(0.2, 0.3, 0.15, 0.15, 0.2)
Table 6. CM-IT1 FS-based a priori probability.
Table 6. CM-IT1 FS-based a priori probability.
IndexRisk LevelA Priori Probability
R11Level 1(0.1935, 0.4186)
Level 2(0.1983, 0.5565)
Level 3(0.2477, 0.3800)
Level 4(0.1010, 0.1190)
Level 5(0.0585, 0.1455)
Table 7. Comparison of fusion results.
Table 7. Comparison of fusion results.
Risk LevelCM-IT2 FS-Based a Priori ProbabilityCM-IT1 FS-Based a Priori ProbabilityCM-crisp Value-Based a Priori Probability
Level 1((0.0000, 0.1439, 0.1439, 0.5148; 0.9, 0.9),
(0.0006, 0.4732, 0.4732, 0.8214; 1.0, 1.0))
(0.2935, 0.4186)0.2954
Level 2((0.0000, 0.1269, 0.1269, 0.5649; 0.9, 0.9),
(0.2214, 0.5184, 0.5184, 0.8501; 1.0, 1.0))
(0.2983, 0.5565)0.3581
Level 3((0.0000, 0.2137, 0.2137, 0.6063; 0.9, 0.9),
(0.0000, 0.4068, 0.4068, 0.7878; 1.0, 1.0))
(0.1477, 0.3800)0.2595
Level 4((0.0000, 0.1229, 0.1229, 0.2548; 0.9, 0.9),
(0.0000, 0.0933, 0.0933, 0.2360; 1.0, 1.0))
(0.0010, 0.1190)0.045
Level 5((0.0325, 0.1526, 0.1526, 0.2747; 0.9, 0.9),
(0.0000, 0.0380, 0.0380, 0.1655; 1.0, 1.0))
(0.0585, 0.1455)0.042
Table 8. SPM calculation results.
Table 8. SPM calculation results.
Root NodeSPM1SPM2SPM3Root NodeSPM1SPM2SPM3
R110.19750.26560.5843R220.19370.26230.3567
R120.25600.32280.5945R230.13230.17740.3398
R130.13210.17720.4817R310.00920.01880.4571
R210.25570.32231.2607R320.22800.31950.5364
Table 9. SPM rankings.
Table 9. SPM rankings.
Root NodeSPM1SPM2SPM3Root NodeSPM1SPM2SPM3
R11443R22557
R12112R23668
R13775R31886
R21221R32334
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, J.; Sui, Y.; Yu, T.; Ding, R.; Dai, T.; Zheng, M. A New Fuzzy Bayesian Inference Approach for Risk Assessments. Symmetry 2024, 16, 786. https://doi.org/10.3390/sym16070786

AMA Style

Xu J, Sui Y, Yu T, Ding R, Dai T, Zheng M. A New Fuzzy Bayesian Inference Approach for Risk Assessments. Symmetry. 2024; 16(7):786. https://doi.org/10.3390/sym16070786

Chicago/Turabian Style

Xu, Jintao, Yang Sui, Tao Yu, Rui Ding, Tao Dai, and Mengyan Zheng. 2024. "A New Fuzzy Bayesian Inference Approach for Risk Assessments" Symmetry 16, no. 7: 786. https://doi.org/10.3390/sym16070786

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop