1. Introduction
The evolution of swivel bridge construction (SBC) technology has achieved a significant level of maturity [
1]. There is a growing trend toward the incorporation of multi-thousand-ton, exceptionally long cantilevered swivel bridges encompassing highway and railway infrastructure. SBC technology is becoming widespread [
2,
3,
4], and the benefits of swivel technology in complex constructions are increasingly being recognized [
5]. SBC proves indispensable under such circumstances, showcasing its unparalleled efficacy [
6]. This construction method, unlike traditional railway bridge buildings, involves greater risks due to two main factors. First, the “skylight” window limits the available construction time. Second, the space for construction activities is restricted by the existing railway’s boundaries, complicating the task while ensuring ongoing traffic flow. Therefore, it is crucial to minimize disturbances to existing railway infrastructure and mitigate inherent safety hazards in the construction process [
7]. How to assess and control the risk factors affecting SBC spanning ERLs effectively is a difficult problem that needs to be solved.
Before initiating SBC spanning ERLs, conducting a systematic and comprehensive exploration is imperative to understanding the risk factors associated with rotary construction thoroughly [
8]. Existing research mainly targets bridge rotation technologies [
9,
10,
11,
12], with standards focusing on technical essentials [
1,
13]. Safety protocols are typically focused on mitigating the risks inherent in particular tasks or operations [
14,
15]. Some risks are interdependent and have multiple effects [
16,
17], and it becomes cumbersome for the project decision makers to trace the actual source of these risks [
18]. However, a critical aspect remains unaddressed: the certain interdependencies among the risks, which collectively increase safety hazards through their mutual influence. Surprisingly, this has received limited attention in prior research.
It is crucial to analyze the interrelationships among these risk factors and categorize them into hierarchical levels. The formulation of precise and targeted control measures becomes necessary. This methodical and rigorous approach plays a pivotal role in providing substantial support for the safe execution of SBC spanning ERLs.
This study seeks to address this research gap by employing fuzzy logic, interpretive structural modeling (ISM) and the cross-impact matrix multiplication applied to classification (MICMAC) approach (Fuzzy-ISM-MICMAC) to investigate the relationships and interdependencies among these risks of SBC spanning ERLs and the critical points of risk control. The integration of fuzzy logic with ISM not only mitigates the subjectivity associated with expert judgments but also amplifies the adaptability of the model [
19]. Combining the MICMAC method to hierarchically classify and determine the attributes of risk factors affecting SBC spanning ERLs significantly streamlines the analysis and assessment of pertinent risk factors [
20]. The process involves three key steps: (1) determining the risk factors, (2) delineating the interrelationships and hierarchical structure of risk factors and (3) proposing corresponding optimization strategies.
This paper is organized as follows:
Section 2 reviews the relevant literature on swivel bridge construction, the risk analysis of SBC and the inventory of risk factors aligned with the Fuzzy-ISM-MICMAC method.
Section 3 introduces the research flowchart, detailing how the Fuzzy-ISM-MICMAC research methodology is implemented.
Section 4 involves the identification of risk factors affecting SBC spanning ERLs and encompasses the establishment of an ISM model and MICMAC analysis. Finally,
Section 5 and
Section 6 provide a discussion of our findings and conclude the paper.
3. Materials and Methods
The safety of SBC spanning ERLs is significantly impacted by a myriad of risk factors that possess certain interdependencies. Thus, this study’s theoretical analytical framework, Fuzzy-ISM-MICMAC, aims to accurately illustrate the complex interrelationships among risk factors while addressing the inherent uncertainties in these relationships. It provides a mechanism for insightful attribute analysis and stratified classification, facilitating a comprehensive evaluation of the risk factors and offering a clear and coherent approach to delve deep into the intricacies of the topic. ISM uses expert insights to distill complex system factor relationships into a clear, multilevel hierarchy through matrix calculations [
44]. The MICMAC method analyzes the interaction among different system factors, primarily concentrating on assessing the strength of each factor’s driving and dependency forces [
50]. Integrating it with the ISM methodology enables a transition from qualitative to quantitative analysis in understanding the relationships among various influencing factors. The subsequent diagram outlines these steps, as depicted in
Figure 1.
The process of setting up the model is delineated in the following concrete steps:
Step 1. Expert Fuzzy Scoring.
Targeting the set of system constituent elements, denoted as
S (referenced in Equation (1)), experts are invited to carry out fuzzy scoring on the degree of association between pairs of influencing factors. The scoring scale ranges from 0 to 1. A more significant score represents a deeper association level, whereas a more miniature score indicates fewer associations. This procedure aids in determining the fuzzy adjacency matrix F. The standards for the fuzzy evaluation of influencing factors are illustrated in
Table 2.
signifies the i-th constituent element within the system.
This approach effectively leverages the expertise and intuition of experts, especially in situations where the associations between risk factors are challenging to quantify using traditional quantitative methods. By converting the qualitative assessments of experts into quantitative membership values, the complex interactions between risk factors can be better understood and quantified.
Step 2. Developing the Association Intensity Matrix.
represents the element in the i-th row and j-th column of matrix B. represents the element in the i-th row and j-th column of matrix F. and , respectively, represent the sum of the elements in the i-th row and the j-th column of matrix F.
Step 3. Establishing the Adjacency Matrix.
The adjacency matrix
is established between various influencing factors, determined according to the existence of a direct influence relationship between factors
Si and
Sj.
represents the element in the i-th row and j-th column of matrix A. represents the element in the i-th row and j-th column of matrix B. λ is the threshold value determined based on expert experience. A larger λ indicates more system levels, and vice versa.
Step 4. Building the Reachability Matrix M.
Initially, matrix
A is added to the unit matrix
I, resulting in a new matrix (
A +
I). Then, power operations are performed on the new matrix (
A +
I), as shown in Formula (4). Following Boolean operational rules, a condition is established where the matrix operations satisfy Formula (5).
I denotes the unit matrix, and
represents the Boolean power operation matrix, where
i is a positive integer.
M stands for the reachability matrix.
Step 5. Identifying the Reachable Set,
Based on the reachability matrix analysis, this step involves a hierarchical breakdown of the relationships between different factors.
denotes the set of all column elements in matrix M that have a value of 1 for each corresponding row element. indicates the element in the i-th row and j-th column in matrix M.
Step 6. Determining the Antecedent Set.
describes the set of all row elements in matrix M corresponding to each column , where the matrix elements are 1. represents the element in the j-th row and i-th column in matrix M.
Step 7. Hierarchical Structure Division.
Upon fulfilling the condition in Formula (8), establishes the first hierarchy level. Following this, elements are removed from matrix M. The factors for the second hierarchy level are determined anew based on Formulas (6)–(8), and so on until the final level factor set is identified. A risk factor progressive structure model can be illustrated using the resulting factor sets.
Step 8. Calculating the Driving Force of the Matrix.
represents the elements in the i-th row and j-th column of matrix M. refers to the sum of the elements in the i-th row of matrix M. The driving force indicates the degree to which this factor influences other factors; a higher driving force indicates a more significant influence on other factors.
Step 9. Calculating the Dependence of the Matrix.
represents the sum of elements in the j-th column of matrix M. The dependence indicates the degree to which this factor depends on other factors; a higher dependence indicates a greater reliance on other factors.
Step 10. Comprehensive Visual Analysis.
Based on the derived driving force and dependence results, a two-dimensional relationship diagram illustrating driving force and dependence can be created for analysis.
4. Case Analysis
Economic growth and increasing traffic are expected to continue driving the demand for large-scale bridge swivels of over ten thousand tons in the coming years [
2]. Because construction environments need to address key technical challenges in extensive bridge hinge structure optimization [
33], precise positioning installation [
28,
33], balanced weighing, and accurate rotational positioning [
26,
28], they are becoming increasingly complex and may pose unknown risks [
12]. This situation poses considerable safety management challenges, especially for construction companies inexperienced in building large-scale bridge swivels exceeding ten thousand tons. Therefore, this study selected a representative case, the Xiaojiazhuang Bridge. At that time in China, it was a high-speed railway turntable continuous beam bridge with the largest span and the highest beam, spanning the most existing lines. This study provides valuable insights and foundations for subsequent similar swivel bridge construction globally, not just in China, especially for the safety management of bridge swivels exceeding ten thousand tons, with relevant risk response measures.
4.1. Engineering Background
The Xiaojiazhuang Bridge stands as a pivotal project within the Lunan High-Speed Railway in China, including the largest span, the closest proximity to operational railway lines, the highest number of railway crossings and the most extended T-beam swivel construction within Shandong Province. This bridge spans four distinct railway lines, namely the Yanshi Up and Down Lines and the Wari Up and Down Lines, intersecting them at a precise angle of 35 degrees. The dual-track T-beam continuous beam configuration, measuring (78 + 144 + 78) meters in length, predicates the bridge’s structural design. The swivel bridge structure commands a considerable mass of 25,000 tons. To minimize operational disruptions from the SBC over existing railway lines and to maintain safety, the ball-joint method was employed for swivel construction at the 18th and 19th central piers. The asymmetrical cantilevering process was initially undertaken along the existing railway lines, forming two distinct T-structures. Swivel construction was executed upon reaching the designated position. A schematic diagram of the relationship between Xiaojiazhuang Bridge and the existing lines is shown in
Figure 2.
The construction of the Xiaojiazhuang Bridge demanded strict planning and execution due to its tight schedule and significant responsibilities. The massive scale of the individual segments required unprecedented precision during the construction phase, a factor further compounded by the substantial weight of the individual continuous beam segments. The complexity of installing the rotational system required high construction accuracy. An essential safety goal was to minimize construction risks on the operational line, particularly during the installation and removal of continuous girder templates. Optimizing methods and simplifying complex procedures were crucial to reducing the impact on the operational line and achieving a zero-accident goal.
To facilitate the successful realization of these safety management goals, implementing the Fuzzy-ISM-MICMAC method is instrumental in facilitating the risk control of continuous girder rotation construction, providing a robust theoretical foundation for achieving the safety control objectives.
4.2. Determination of the Risk Factors
The project team used two standard risk assessment methods to identify critical risks, minimize construction risks on the operational line and aim for zero accidents. Initially, the primary controlling factor method identified three significant risks for the bridge construction: the location over an active mainline railway, a turning span exceeding 100 m and novel structures and processes [
13,
41]. Further analysis with the index system method [
13,
41] highlighted three critical aspects: proximity to high-voltage lines, the inability to close the railway during construction and complex, frequent construction processes.
By combining the project team’s analysis,
Table 1’s inventory and Xiaojiazhuang Bridge’s specifics, this study identified 39 risk factors for SBC spanning ERLs. Subsequently, the Work Breakdown Structure–Risk Breakdown Structure (WBS–RBS) methodology [
7] was employed to cluster and analyze these 39 risk factors systematically, expounded in
Table 3.
Modifications and simplifications were undertaken through expert interviews to refine the rationality and semantics of the risk factor inventory further (
Table 3). This on-site face-to-face expert interview was conducted in Jinan, China, from 10 July to 11 July 2022. This study incorporated insights from five experts, whose profiles are detailed in
Table 4. The group included three individuals, who work as technical directors and safety supervisors with significant experience in SBC spanning ERLs, and two professors with expertise in bridge construction risk management research.
In the initial round of interviews, expert insights were utilized to eliminate relatively minor influences, incorporate previously unrecognized factors and consolidate risk factors with closely related connotations. This iterative process resulted in a streamlined set of 32 risk factors. Subsequently, in the second round of semi-structured interviews, conceptual descriptions were provided for these 32 risk factors. Following expert input, these descriptions were systematically clustered and refined. The revised risk factor list, along with their definitions, was once again subjected to expert scrutiny. After accommodating the expert-driven revisions, the ultimate risk factors specific to SBC spanning ERLs were distilled into 28, as detailed in
Table 5. These present a theoretical framework for understanding the risks and safety issues associated with bridge rotational construction across railway lines.
Two categories of risk factors have not yet been explicitly accounted for. (1) For the railway “skylight” time, the determination of construction window opening times involves communication and coordination between the project owner, construction entity and railway operator [
33,
36]. These timings are set prior to the development of the construction plan and typically cannot be adjusted to align with construction needs [
42]. Consequently, the construction plan is inherently constrained by these predetermined construction window opening times, making this aspect a constraining factor rather than a risk factor that can be controlled by human intervention. (2) Adverse weather conditions have been addressed in various risk assessments; however, the specific focus of this study, which involves “continuous beam rotation construction over existing railway lines”, introduces unique complexities. Unlike conventional bridge construction, this endeavor entails significantly greater construction complexity and difficulty, and it explicitly forbids construction activities during adverse weather conditions [
39]. Adverse weather conditions are characterized by their sudden and unpredictable nature [
42]. Due to the prohibitive costs and technical challenges associated with human intervention, adverse weather represents a construction context where avoidance is the only practical strategy rather than a risk factor that can be managed through human control.
4.3. Computation of the Reachability Matrix through Semi-Structured Expert Interviews
ISM analysis relies on expert insights, utilizing their knowledge and experience to create matrices that define the relationships and overall structure of complex element sets [
52,
53,
54]. Therefore, acquiring in-depth and intricate responses from high-quality interviewees is essential for constructing a hierarchical model. Nonetheless, semi-structured interviews are commonly favored as the method for data collection [
55]. This approach enables the researcher and the interviewee to engage thoroughly and clearly in the interview topics, exploring them in greater detail without confusion or ambiguity [
50,
54].
We undertook a comprehensive approach to meticulously analyze the interrelationships between risk factors impacting the safety of ongoing continuous beam rotation construction on existing lines, as detailed in
Table 3. Initially, we conducted semi-structured interviews with five experts to determine the nature of the contextual relationship between each pair of risks and whether one risk “leads to” or “influences” the other risk for each pair. To ensure the scoring process remained free from potential external disruptions, we conducted these interviews through two rounds of email communication from 1 September to 30 September 2022. Their profiles are detailed in
Table 4. Following the guidelines outlined in
Table 5, these experts were assigned to conduct a detailed fuzzy scoring of the interrelationships among the identified risk factors.
The consequent responses were aggregated, with the mean value of the data retrieved being utilized as the constituents of the fuzzy adjacency matrix (F). The correlation strength matrix (B) was formulated based on matrix F under the guidelines of Equation (3). This was followed by a rigorous comparative analysis of the individual elements to ascertain the optimal threshold value (λ).
It is imperative to note that a diminished λ value potentially culminates in fewer stratifications of factors, thereby obscuring the intricate, underlying relationships among them. Conversely, an escalated λ value might engender an augmentation in level divisions, thereby impeding the comprehensive understanding of the interrelationships among the factors. Given these considerations, this study was oriented toward ensuring the pinnacle of system performance. Consequently, based on the fuzzy evaluation criteria and the insightful perspectives rendered by the experts, a λ value of 0.5 was discerningly chosen. Following this, Equation (3) was utilized to manipulate correlation matrix B, thus facilitating the derivation of the adjacency matrix (A). Further, employing the functionalities of the software named MATLAB 2019b, the reachability matrix (M) was computed in strict adherence to Equations (4) and (5).
The Adjacency Matrix
A | F1 | F2 | F3 | F4 | F5 | F6 | F7 | F8 | F9 | F10 | F11 | F12 | F13 | F14 | F15 | F16 | F17 | F18 | F19 | F20 | F21 | F22 | F23 | F24 | F25 | F26 | F27 | F28 |
F1 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F3 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F5 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
F7 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
F9 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
F10 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 |
F11 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
F12 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 0 |
F13 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
F14 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
F15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 |
F16 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 1 |
F17 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 1 |
F18 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
F19 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
F20 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 |
F21 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
F22 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
F23 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
F24 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
F25 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F26 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F27 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
F28 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
The Reachability Matrix
M | F1 | F2 | F3 | F4 | F5 | F6 | F7 | F8 | F9 | F10 | F11 | F12 | F13 | F14 | F15 | F16 | F17 | F18 | F19 | F20 | F21 | F22 | F23 | F24 | F25 | F26 | F27 | F28 |
F1 | 1 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 |
F2 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | 1 |
F3 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 |
F4 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 1 |
F5 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
F6 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 |
F7 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 |
F8 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 |
F9 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
F10 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 |
F11 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
F12 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 0 |
F13 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 |
F14 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 |
F15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 1 |
F16 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | 0 | 1 |
F17 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 | 0 | 1 |
F18 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 |
F19 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
F20 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 |
F21 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
F22 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
F23 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 1 |
F24 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 |
F25 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
F26 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
F27 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
F28 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
4.4. Establishing the Hierarchical Structure of Risk Factors Based on ISM
We conducted hierarchical decomposition based on the reachability matrix
M. First, we calculated the reachability set and the antecedent set of influencing factors according to Equations (6) and (7), wherein the intersection of the reachability set and the antecedent set constitutes the common set
, as demonstrated in
Table 6.
Following this, utilizing the results obtained from the preliminary computations, the hierarchical relationships were ascertained by employing Equation (8) to scrutinize the intersections, thus facilitating the establishment of a rigorously delineated hierarchical structure. L1 = [16 F28]; L2 = [16 F20, F22, F23, F24]; L3 = [16 F12, F13, F14, F15, F16, F17, F18, F19, F21]; L4 = [16 F4, F5]. Utilizing the results derived from the stratification process, a schematic representation delineating the hierarchical interrelationships of risk factors impacting safety during the rotational construction of continuous girders across existing lines was constructed. This schematic systematically depicts all direct associations based on the adjacency matrix A, resulting in a nuanced multi-level progressive structure, as exemplified in
Figure 3.
As per the interpretive structural model, the delineation of risk factors is organized into three prominent hierarchical levels. These are classified as L1, serving as the superficial layer depicting initial, observable phenomena; L2 and L3, which function as the intermediary layers that encapsulate transitional and evolving factors; and finally, L4 and L5, which represent the root layer, housing the fundamental causes and underpinning forces driving the observed risks. This systematic categorization aids in a more structured and deep-rooted analysis of the potential risks.
L1 epitomizes the superficial layer of risk factors, prominently positioned at the zenith of the ISM framework. This layer encapsulates variables such as F25, F26, F27 and F28, highlighting the potential threats to the existing line’s traffic safety. These variables directly influence the safety dynamics of continuous girder rotation construction spanning existing lines, thereby delineating the quintessential focal points for safety management and control initiatives.
Addressing these pronounced risk factors necessitates a multifaceted strategy, intricately weaving interventions to mitigate foundational and intermediary risk elements. For instance, averting the perils associated with personnel falling from significant heights necessitates the enhancement of protective frameworks, thereby diminishing the inherent vulnerabilities present within the F12 protective system structure. Concurrently, ensuring a balanced configuration within lifting baskets stands crucial in neutralizing the perils represented by F16, relating to the counterweight’s rotational dynamics at the extremities of the baskets. Moreover, amplifying safety protocols during pivotal stages such as template hoisting, installation and dismantling mitigates the associated risk dimensions. The adept utilization of safety harnesses emerges as a vital strategy in circumventing the risks designated by F20, predominantly concerning the misuse of safety protective equipment. Furthermore, rectifying prevalent malfunctions within the traction equipment stands imperative in addressing the complications of F9. On a foundational stratum, it demands the bolstering of safety measures and managerial oversight onsite, orchestrating efforts toward negating potential risks denoted by F2, thus fostering a work environment grounded in stringent safety paradigms.
L2 and L3 constitute the intermediate echelons of risk factors, serving a critical function in mediating the foundational and superficial layers within the confines of ISM. These factors are invariably restrained by the intrinsic risk elements residing at the base stratum and concurrently exert a discernible influence on the manifest risk factors at the superficial layer. This segment embodies a total of 19 risk variables, namely F6, F7, F8, F12, F13, F14, F15, F16, F17, F18, F19, F21, F9, F10, F1, F20, F22, F23 and F24. These entities represent indirect influential variables, demonstrating a cascading and stratified interrelationship.
Within this intricate matrix, two salient conduits of risk transmission are discernible. First, those elements find themselves subordinate to the foundational risk constituents entrenched in the basal layer. Although these elements do not have a direct nexus with safety incidents during construction, they facilitate the percolation of influences to the superficial layer through a sophisticated interplay with foundational components. For example, variable F7, indicative of axial deviation, is confined by the repercussions of F1, a misjudged selection of rotational construction techniques; F3, inadequate surveillance strategies; and F5, alack of comprehensive pre-construction simulation drills. This variable notably impacts F10, denoting equipment and facility encroachment, thereby indirectly precipitating a ripple effect on the superficial risk entity F28, which encapsulates threats to existing line vehicular safety.
Second, we recognize a subset of relatively autonomous risk factors, encompassing variables such as F6, which signifies deficient quality in spherical hinge construction; F8, representing structural component degradation; F14, highlighting severe foundational subsidence and slippage; and F21, pinpointing a deficiency in skill levels amongst construction personnel. These variables remain primarily unencumbered by the foundational layer’s risk determinants, directly influencing other intermediate-layer risk entities. This influence eventually proliferates, indirectly impacting the risk factors situated at the superficial layer. The intricate nexus amongst these variables posits a complex scenario, epitomizing the focal points and intricate challenges intrinsic to mitigating and managing construction risks.
L4 epitomizes the nucleus of risk factors in continuous girder rotation construction over existing lines. It serves as a reservoir of fundamental issues that profoundly affect the safety protocols associated with such construction projects. This tier encompasses critical factors, including F1, F2, F3, F4 and F5. These elements hold substantial sway over the safety aspects of continuous girder rotation construction, pointing to crucial issues that necessitate urgent and meticulous attention in managing and mitigating risks in these engineering ventures.
At the apex of foundational risk analysis, these factors clearly outline the significant impact that initial steps such as the careful selection of technological applications, strategic conceptual design development, preparatory construction rehearsals and the establishment of robust safety infrastructure can have on the emergence of risk elements during critical phases of the rotation construction process. By adeptly addressing these entrenched risk factors, one can significantly curtail the propensity for risk occurrences at the intermediate and superficial layers, potentially obviating them in entirety.
However, it is essential to recognize that neglecting to adequately emphasize or thoroughly evaluate these deep-rooted risk factors could significantly weaken the effectiveness of risk management strategies. This scenario accentuates the absolute necessity for an incisive and methodical approach to risk mitigation right from the inception of these projects. Therefore, this standpoint necessitates a heightened level of analytical engagement, fostering a paradigm where the comprehensive containment of intrinsic risks is achieved at their genesis, thereby engendering an operational environment characterized by augmented safety and control.
4.5. Analysis with MICMAC
Upon acquiring the hierarchical structure of risk factors affecting the safety of continuous girder rotation construction over existing lines, and in conjunction with the categorization determined through MICMAC method analysis, a profound segmentation of the positions and roles of the risk factors was conducted. This delineation ascertained the corresponding dependencies and driving forces , thereby formulating more targeted countermeasures for different risk factors.
Upon the foundation of the established reachability matrix M, a rigorous MICMAC analysis was undertaken. Dependency is characterized as the number of elements designated as ‘1’ within the respective columns correlating to each factor in the matrix M, whereas driving power signifies the number of elements denoted as ‘1’ within the respective rows corresponding to each factor therein.
Using the analytical frameworks outlined in Equation (9) through (10), a detailed calculation of the driving forces and dependencies of the influencing factors was carried out. Here,
λ was instituted as a metric to encapsulate the relative scale of relationships between driving power and dependency, mathematically represented as
λ = driving power/dependency. The computations culminated in results, which are comprehensively delineated in
Table 7.
Following the findings delineated in
Table 7, a quadrant analysis was conducted, utilizing the median values of dependency and driving forces as bifurcation parameters to segment the coordinate axis into four distinct sectors: I (Autonomous Cluster), II (Independent Cluster), III (Linkage Cluster) and IV (Dependency Cluster). As manifested in
Figure 4, this analytical framework explicates the intricate affiliations and categorical interdependencies subsisting among the various influential factors, providing a robust platform for nuanced analysis and stratification in risk management processes.
The ensuing analysis is presented herein, incorporating the findings delineated in
Figure 3 and
Figure 4.
(1) The risk elements within the dependency cluster demonstrate a high degree of reliance but possess diminished propulsive forces, generally necessitating resolutions from the autonomous and independent clusters of risk factors for effective mitigation. This group encompasses factors such as F23, F24, F25, F26, F27 and F28, predominantly localized within the L1 and L2 strata of the hierarchical structural diagram, thereby being principally subjected to influences from subordinate components. For instance, T-beam overturning risk aversion (F23) critically hinges upon the efficacious management of a suite of other risk constituents, including F8, which pertains to component damage; F6, addressing the issues of subpar spherical hinge construction quality; F13, denoting inaccuracies in monitoring during the pivotal rotation phase; F14, highlighting serious foundational settlement; and F16, focusing on the perils associated with beam-end basket counterweight rotation risks. The in-depth management of these ancillary risk variables serves as a cornerstone in negating the potential repercussions associated with F23, thereby underscoring the vital interdependency and nuanced complexity embodied within this risk matrix.
(2) Within the ambit of the autonomous cluster, risk factors demonstrate a notable parity in their levels of dependency and driving force, embodying a complex and balanced dynamism in the context of risk management. This category encapsulates factors such as F6, F7, F8, F12, F13, F14, F15, F16, F17, F18, F19, F9, F10, F11, F20, F22 and F24. These constituents are prominently positioned within the L2 and L3 echelons of the multilevel hierarchical structure diagram, indicating a sophisticated role where they not only assimilate influences from the underlying strata but also impart considerable influences onto the higher tiers. Consequently, these elements function as critical nodal points in the risk network, facilitating a cascade of effects that both stem from and influence a wide array of other risk factors, thereby assuming a central role in the transmission and modulation of risk attributes across different layers of the analytical framework. This elucidation underscores their integral function in mediating and transmitting influences, thereby serving as essential conduits in the intricate web of risk interdependencies and interactions.
(3) Linkage Cluster Risk Factors. This category of risk factors is absent in the current analysis, indicating that the selected risk factors are relatively stable without demonstrating prominent characteristics of linkage or chain reactions.
(4) Risk Factors About the Independent Cluster. The risk factors classified within this cluster are characterized by a pronounced predominance of driving forces as opposed to dependency levels, delineating a high degree of autonomy in influencing the project’s outcome. This category encompasses elements F1, F2, F3, F4, F5 and F21, strategically positioned at the L4 layer within the hierarchical structure delineated in the multi-level progressive structural diagram. These fundamental factors exert a pervasive influence over all superior tiers, facilitating a nuanced analysis of root causality should discrepancies manifest within the upper echelons, thereby enabling targeted adjustments and interventions.
Per the project-specific constraints encapsulated by environmental, organizational and procedural parameters, selecting rotational construction methodologies and conjunction segment construction techniques becomes incumbent. This strategy mitigates many construction safety risks emanating from procedural complexities. Furthermore, deploying sufficient onsite safety provisions and formulating rigorous monitoring schemas substantiate establishing a fortified safety infrastructure. Incorporating cutting-edge technologies for the in-depth simulation and rehearsal of construction sequences buttresses existing preventative measures, engendering a robust protective framework. A pivotal role is carved in precluding the emergence of risks intrinsic to both autonomous and dependent clusters through comprehensive and precise safety technical briefings. These elements unequivocally constitute the linchpin in orchestrating safety risk management and control during continuous girder rotation construction across existing lines.
This research focuses on the critical risk factors identified at the root layer and within the independent cluster to effectively manage and control the risks affecting the safety of continuous girder rotational construction over existing lines. The effective prevention of safety accidents during the rotation construction of continuous beams across existing lines can be initiated from fundamental layers and critical risk factors of independent clusters, adopting proactive preventative measures to concurrently regulate upper-level factors and mitigate the impact of lower-level elements.
This study is limited to certain interdependencies among the risks, and some safety measures could be implemented to reduce hazards. Various safety protection measures are adopted both technically and managerially, which collectively help regulate the factors in the upper layers and reduce the influence of the factors in the lower layers. These measures include the following:
Making a judicious selection of rotational system structural technology.
Enhancing safety protective measures during basket construction.
Optimizing the construction technique during the mid-span closure segment.
Implementing an automatic real-time monitoring system for precise surveillance during the rotational process.
Fully utilizing BIM technology for construction simulation, actively predicting and guiding the prevention and control of construction risks.
Ensuring that all workers involved in these activities receive appropriate safety training.