Next Article in Journal
Existence and Asymptotic Behavior of Ground State Solutions to Kirchhoff-Type Equations of General Convolution Nonlinearity with a Steep Potential Well
Previous Article in Journal
Stability Analysis and Synthesis for 2-D Switched Systems with Random Disturbance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Risk Evaluation: Brief Review and Innovation Model Based on Fuzzy Logic and MCDM

1
Faculty of Mining and Geology, University of Belgrade, 11120 Belgrade, Serbia
2
Technical Faculty in Bor, University of Belgrade, 19210 Bor, Serbia
3
Faculty of Mechanical Engineering, University of Belgrade, 11120 Belgrade, Serbia
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(5), 811; https://doi.org/10.3390/math10050811
Submission received: 30 December 2021 / Revised: 8 February 2022 / Accepted: 25 February 2022 / Published: 3 March 2022

Abstract

:
The risk assessment of engineering systems represents an important part of the quality of service and dependability. The existing methods for risk evaluation use crisp sets for rating partial indicators’ proposition and their cumulative products as an overall indicator. In this paper, existing FMEA and FMECA methods have been improved using the fuzzy expert system for calculating the risk priority number. The application of fuzzy logic allows the use of linguistic descriptions for risk analysis. In this way, the state of the system in terms of risks and consequences is better described. The settings of the fuzzy systems are based on the application of two multi-criteria decision-making methods. The AHP method was used to define the mutual relationship of the impact of partial indicators (occurrence, severity, and detectability) on risk. In this way, subjectivity in risk assessment is reduced. In the composition of the fuzzy model, the TOPSIS method is introduced to reduce the dissipation of results, which contributes to the accuracy of the outcome. This contributes to the accuracy of the results. The results were verified through a case study of a complex engineering system—bucket-wheel excavators. The risk was observed from the aspect of the danger of damage and the danger of downtime. The initial information for weak points of ES is defined according to historical damage events and statistics of downtime. Expert knowledge was used for weak points grading in the model. Additional model verification was performed using similar methods, using the same input data. The innovative model, presented in the paper, shows that it is possible to correct different weights of risk indicators. The obtained results show less dispersion compared with other existing methods. Weak points with increased risk have been located, and an algorithm has been proposed for risk-based maintenance application and implementation.

1. Introduction

One of the fundamental tasks in the asset management of engineering systems (hereinafter ES) is to develop a risk calculation and prediction model. Assessment of risk level is a significant overall indicator of ES state, an indicator of remaining capabilities of ES, and guideline for risk-based maintenance methodology [1,2,3]. According to standard ISO 31000:2018 [4], risk is defined as the “effect of uncertainty on objectives”. An effect is a deviation from the expected [4]. It can be positive, negative, or both, and can address, create, or result in opportunities and threats. Objectives can have different aspects and categories and can be applied at different levels [4]. Additional important terms in risk are sources, events, consequences, and likelihood [4,5]. Risk management coordinates and controls risk activities with the organizations. Generally, it includes risk assessment, risk treatment, risk acceptance, and risk communications [4,5,6].
According to the same standard, risk assessment is the overall process of risk identification, risk analysis, and risk evaluation [4]. Risk identification has the purpose to find, recognize, and describe risks that might help or prevent an organization from achieving its objectives [4]. The basic questions that are asked when identifying risk are what, where, when why, and how something could happen. It involves the process of finding and categorizing risk elements. Elements can include source or danger, event, consequence, and probability [4]. Risk analysis is a systematic process to understand the risk nature and its characteristics. It involves a detailed consideration of uncertainties, risk sources, consequences, likelihood, events, scenarios, controls, and their effectiveness [4]. The multiple causes and consequences of an event can affect different objectives. Analysis techniques can be qualitative, quantitative, or a combination. It depends on the circumstances and intended use. Highly uncertain events and events with severe consequences can be difficult to quantify. Risk analysis provides input to risk evaluation, to decisions on whether risk needs to be treated and how, and on the most appropriate risk treatment strategy and methods [4]. The purpose of risk evaluation is to support decisions. Risk evaluation involves comparing the results of the risk analysis with the established risk criteria to determine where additional action is required [4,5]. This can lead to a decision to: do nothing further; consider risk treatment options; undertake further analysis to better understand the risk; maintain existing controls; reconsider objectives [4,5].
The most important activity in risk assessment is establishing the level of risk [7]. ES risk assessment is most often performed based on two methods: FMEA (Failure Mode and Effects Analysis) and FMECA (Failure Mode Effects and Criticality Analysis). The methods are defined by the international standard ISO/IEC 31010 [4]. They are based on the risk priority number (hereinafter RPN) concept. RPN is calculated according to the potential causes of failure. It is the evaluation of partial indicators Occurrence (O), Severity (S), and Detectability (D). The probability of occurrence is the possibility that failure will occur [8]. Criticality/severity is a serious measure of the possible consequences of a failure [8]. Detectability is the probability that control could eliminate or locate the defect on time [8]. The RPN number is obtained by multiplying the values of the risk indicators, which are obtained by expert grades on a scale from 1 to 10 (sometimes from 1 to 5). A higher RPN number represents a higher seriousness or risk [9]. For both methods, FMEA and FMECA, the calculation principle is the same. The FMEA method uses data recorded on maintenance analysis sheets and is directed towards reliability. With the FMECA method, there is a difference in the approach that is aimed at the preventive analysis of the problem.
This approach (with cumulative multiplying) to risk assessment was criticized by numerous authors [10,11,12,13,14,15,16,17]. All the mentioned authors record the disadvantages of using the RPN concept. The disadvantages can be reduced to:
  • The same RPN results can be observed from different input combinations of partial indicators’ values (S, O, and D). Consider two cases as an example. In the first case, one indicator was ranked as very high, and the other two are at a low level (9 × 2 × 1 = 18). In the second case, all indicators are at the low level (3 × 3 × 2 = 18). Both results are the same. In that case, the high value of the partial indicator (9) will not be recognized as a potential risk event and corrective actions might not be performed;
  • The RPN calculation model is sensitive. A small change in one partial indicator can greatly affect other factors and vice versa;
  • The same importance is given to all risk indicators. The different impact of partial indicators on risk level is not considered;
  • Estimates of partial indicators are subjective. An outcome can be predicted.
The risk assessment model needs a change in the way of partial indicators (hereinafter PI) evaluation and calculation. In that sense, in this article, a new approach in RPN calculation is proposed, which is based on the application of fuzzy logic and two MCDM (Multi-Criteria Decision Making) methods. Fuzzy logic is used in situations where uncertainty and ambiguity dominate and when it is necessary to reduce the impact of subjectivity. Using the fuzzy approach creates the possibility of applying specific linguistic descriptions in the PI evaluation process. Furthermore, the fuzzy proposition of PI loses the linear structure of RPN cumulative multiplication.
According to different authors [18,19,20], the main classification of MCDM is on discrete multi-attribute decision-making (MADM) methods and continuous multi-objective decision-making (MODM) methods. MADM methods are classified as utility methods (SAW/WSM, SMART, SPW/WPM, AHP, ANP, and MACBETH), outranking methods (ELEC-TREE, PROMETHEE, NAIADE, REGIME, ORESTE, COPRAS, and ARAS), compromise methods (TOPSIS, VIKOR, and CP), and other (DEMATEL, FLAG, and SMAA). MODM methods are DEA, LP, NP, MOP, GP, MOORA, and MULTIMOORA. The AHP method is often used to determine the weight of criteria. For the evaluation of potential alternatives, TOPSIS, EDAS, MABAC, COP-RAS, and MAIRCA are most often used.
The MCDM methods that are implemented in the fuzzy model are AHP (Analytical Hierarchy Process) and TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution). The application of the AHP method introduces the rank of PI significance to the comprehensive RPN. The TOPSIS method in the fuzzy composition reduces the subjectivity of the initial expert assessments. All this brings quality to the expert model.
The AHP method is in a group of discrete MADM methods for utilization and criteria ranking. The application is simple, at the level of expert assessments based on experience, it is suitable for the problem that is analysed in the paper. The mutual ranking of partial indicators is the initial part of the model, and in that way, their influence on the overall risk is determined. The method is based on a pair-wise comparison of all the parameters. The output values of the method are in the range from 0 to 1, where the sum is 1. This is suitable for the following steps in the model. An important advantage in selecting this method is the ability to check the consistency of the decision maker. Inconsistency is easily noticed and the growing problems in the following steps of the model are prevented.
The TOPSIS method enables the definition of preferences in the criteria. It is based on the mutual analysis of the data achieved by the alternatives according to the criteria, taking into account the orientation. The model relies on a presented data comparison with the best from the group. The best result is the one that is closest to the ideal, which is important in terms of such as risk.
In general, the consequences of risk in ES can be observed from several aspects:
  • Risk to structural stability—design errors, insufficient maintenance, or ES management errors can cause catastrophic damage with total damage [21,22,23,24,25];
  • Risk of interruption of the production process—downtime of ES causes losses in planned production [26,27];
  • Risk to the work environment—ES users may be exposed to various adverse health effects. First of all, influence means noise and vibration [28]; electromagnetic emission and radiation [29]; extreme temperatures and other climatic factors [30]; dust [31]; chemical and other hazardous substances [32]; open flame [33]; rotating and other parts with high inertia [22]; height works [34]; and others;
  • Environmental risks—there are distinguished direct and indirect impacts. Direct effects on soil degradation and pollution, contamination of surface and groundwater, air pollution, and other similar impacts. Indirect impacts are consumption of electricity and/or heat energy obtained from conventional sources, consumption of various resources and materials for the production of ES, etc.
The paper considers two risk segments. The first is the risk to the structural stability of the machine, i.e., the risk of damage. The second risk is the interruption of the production process, i.e., the risk of downtime. These two risks are dominant in ES. The remaining two are indirectly expressed and are not analysed in this paper.
A bucket-wheel excavator operating on an open-cast coal mine was chosen to present and verify the new risk assessment model. These are machines that carry great risk in their operation. The investment is large, and the operating costs are high. The price of machines correlates with weight. For machines around 3000 tons, it amounts to over EUR 25 million. The operation and maintenance are complex and induce high costs. In the continuous system of operation, they are 24 h/day, under the pressure of achieving performance, the indirect costs of unplanned downtime are high.
Verification of the results is performed by comparative analysis with other existing methods. The same input data is used. Checking the influence of the weights of the partial indicators is performed on models that do not have an integrated AHP method. The dispersion of the results is checked on models that have MAX–MIN or MIN–MAX composition instead of the innovative approach in this paper with the proposed TOPSIS method in composition. The level of result dispersion is an important segment in risk evaluation. The obtained results should indicate the priorities in maintaining the ES, which introduces the concept of risk-based maintenance.
This paper is structured in the following way: (i) literature overview with critical opinion according to current risk assessment models; (ii) risk theory and weak points analyses of ES; (iii) development of innovative risk assessment model, describing the algorithm; (iv) case study, verification of the model; (v) comparison with appropriate risk assessment models. Model (iii) is based on fuzzy expert concepts, with two-step expertise judgment and specific composition. In this way, greater objectivity of ex-pert judgment and accuracy of final risk mark were obtained.

2. Literature Review

Risk analysis using existing methods allows the assessment of ES at different stages of the lifetime (engineering and design, production, maintenance, etc.) in the event of the occurrence of various problems (downtime, failure, potential accidents, etc.) [35]. The following is a review of the literature focused on the FMEA and FMECA methods, implementing fuzzy sets and MCDM methods in risk management, etc.
FMEA method is a widely used quality improvement tool to identify potential failure modes and to rate the reliability of a product or a process [36]. The FMECA method is aimed at a preventive approach to problem analysis. It is based on the optimization of design, production processes, and maintenance through re-engineering to improve the situation and eliminate all known and potential problems [35]. Risk in the field of mining machinery has not been sufficiently analysed in the professional literature. There are several papers published in this field [27,35,37]. Kumar and Srivastava in the paper [37] define quality maintenance of technical systems through reliability. The authors note a more comprehensive approach to maintenance in the form of TPQM (Total Planned Quality Maintenance), which includes preventive, predictive, and planned maintenance activities. Functional analysis of the excavator, its assemblies, and sub-assemblies was performed. The methodology is based on FMECA, FMEA, and CBM (Condition Based Maintenance) that predict failure or deterioration of excavator components [37]. The same authors [35] present the possibility of applying the FMEA and FMECA methods for the analysis of the causes and consequences of excavator procedures. Both methods on 5 different excavators of the same category were used for the case study. For locations with located risk, RPN was calculated, and causes, consequences, preventive and corrective measures were defined. They then recalculated the performance of the RPN in case all the recommendations obtained from the previous analysis were followed. The new RPN value is significantly reduced compared with the initial one. Pantelic, Bosnjak, et al. [27] use the S-FMECA model as one of the basic analytical tools for the creation of maintenance concepts. The data were obtained based on monitoring the operation of the machine in the time interval. Equations for numerical calculation are set for O and S, while D is based on a linguistic description. Based on the analysis, they located the highest risk of downtime from the mechanical aspect on the crawler of the excavator and the return drum of the conveyor three. From the electrical aspect, the highest risk of downtime is due to the failure of the high-voltage power cable.
Existing risk assessment methods based on the RPN concept within the FMEA and FMECA methods have many shortcomings that have been previously presented. For these reasons, in the recent literature, clear efforts, which were conducted to overcome the shortcomings of this method, can be seen.

2.1. Implementing the Fuzzy Theory to RPN

The authors Wang et al. [38] applied the fuzzy sets for the safety analysis of complex ES. They propose the structural decomposition of complex ES into hierarchical levels. For failure description, they used fuzzy logic and evidential reasoning to determine the functionality of the system. Bowles and Pelaez [39] described and applied the model with the implementation of the fuzzy logic approach in the FMEA method. The linguistic terms were used to describe risk partial indicators: occurrence, severity, and detectability. Based on expert knowledge of the ES, they formed an if-then base of fuzzy rules for correlation between partial indicators. Since the base of if-then fuzzy rules can be quite extensive, a few papers that give measures to reduce the volume of fuzzy rule bases can be found in the literature. Pillay and Wang [10] have suggested indicators grading based on linguistic description instead of grading from 1 to 10. The model consists of two parts. The first process is failure screening with a formal risk assessment (relative ranking). The second process is hazard assessment that uses linguistic variables. By combining the existing 125 rules, their number was reduced to 35. Gargama and Chaturvedi [40] suggested a fuzzy FMEA model for analysing the risk of failure based on the degree of identity and fuzzy rule base that was reduced from the initial 125 to 14 rules. The proposed model includes the normalization of fuzzy numbers. Wang et al. [13] believe that it is not appropriate to apply a shortening of the fuzzy rules base. They propose the implementation of a fuzzy weighted geometric mean for the assessment of risk level. Braglia et al. [11] suggested using the normalized RPN values in the risk function, where normalized RPN values represent a value of RPN/1000. Łapczyńska and Burduk [41] apply the fuzzy FMEA (fFMEA) method in the automotive industry where quality control is conducted. Rafie and Namin [36] also use the combined FMEA method to assess land sinking due to the construction of subways in urban areas. Partial indicators O, S, and D are obtained through fuzzy and neuro systems. Petrović et al. [17] presented a model for the risk assessment of machine failure in mining. The proposed model is based on the application of fuzzy logic and implementing the MIN–MAX fuzzy composition. The partial indicators of RPN are given in the linguistic form. The mentioned authors also applied traditional risk calculation according to the RPN concept, after which they conclude all advantages of the proposed new model. For risk management purposes in the mechanization of underground mines, Balaraju, Raj and Murthy [42] used the fuzzy-FMEA method. In total, 16 potential risks of failure of subsystems (highest risk of the electrical subsystem) have been located. The authors also performed a comparative analysis with traditional RPN calculations. Das et al. [43] analyse the problem of scheduling and routing ships to reduce overall costs and transport interruptions. The analysis was conducted according to risks where imprecise cost parameters were treated as a triangular fuzzy set. The modified genetic algorithm (MGA) method was developed. The results show better quality than others heuristic algorithms. A modified fuzzy risk assessment model has also been used in the field of infrastructure analysis [44]. The same approach was suggested by Xu et al. [45] in the working analysis of engine systems and by Sadiq and Husain [46] in environmental risk analysis of drilling time loss during a drilling operation. Kushwaha et al. [47] suggest an integrated framework based on IF techniques to reduce the subjectivity and hesitation of experts from the FMEA team. In the first part of the model, the IF-FMEA approach was used. The expert knowledge according to a linguistic scale of risk indicators (O, S, and D) was applied. Critical causes were identified based on fuzzy RPN results. In the second part, IF-TOPSIS was implemented. Both parts are compared in the fuzzy approach. The case study was conducted on the example of the sugar industry in India. The adopted fuzzy logic model was used by Guimara and Lapa [48] to improve risk assessment in the inlet water system of a reserved steam boiler of a nuclear power plant.

2.2. Implementing the MCDM and Other Methods to RPN

Zammori and Gabbrielli [49] have introduced an approach called an analytic network process (ANP/RPN), which represents a modified version of FMECA, considering the possible interactions between the main causes of failure in the evaluation of the criticality of failure. Liu et al. [50] applied the VIKOR method to analyse the ranking of the failure mode according to the FMEA method. In this approach, linguistic variables were used to estimate the rating and weight for risk factors S, O, and D. The extended VIKOR method was used to determine the priority of the risks of the failures. The risk assessment model based on the combination of fuzzy-TOPSIS methods was used by the authors Khodadadi-Karimvand and Shirouyehzad [51]. The TOPSIS method was used to rank the indicators, while the fuzzy logic background was used for the calculation. The case study was performed on the example of drilling operations for gas and oil wells. MCDM methods for risk analysis have been applied in the field of finance and investment in mutual funds [52]. In the first step of the model, the DEA method is used to analyse the efficiency of assets, while the MABAC method is used to rank the risk and return parameters. In the second step, the entropy method is used, where weights are calculated. A case study was conducted in India.
Bevilacqua et al. [53] developed a risk assessment methodology based on a combination of FMECA and Monte Carlo simulations. In this paper, a new method of computing RPN is proposed, where the sum of weighted values of six indicators (safety, machine importance for the process, maintenance costs, frequency of failure, downtime, and machine operating conditions) was multiplied with the seventh indicator (difficult access to the machine) to obtain the RPN value. Rhee and Ishii [54] proposed a similar methodology. They presented an FMEA model that, with the help of Monte Carlo simulation, enables the estimation of the risk level from the aspect of costs over the lifetime of the system. An, Mikhaylov and Jung [55] analyse the problems in an airline, i.e., risk in network revenue management. A model based on the criterion of minimum regret is proposed. A heuristic-based approach on a genetic algorithm to define the booking limits has been developed to minimize regret. Chin et al. [56] developed a risk model using a grouped ER approach involving risk assessment. Factors using belief structures synthesize individual belief structures into group trust structures and rank expected risk results using the minimax regret approach (MRA). Risk analysis in energy is a popular topic and is of great importance, especially when it comes to the security of supply and safety through the use of nuclear, thermal, or renewable sources [57,58,59].
To reduce subjectivity, different authors have introduced linguistic variables for risk description in general and the fuzzy inference model for the composition of risk parameters. However, it has not been observed that motivation has been found for the development of the model that reduces the dissipation of results in phenomena such as risk.

3. Materials and Methods

The improved risk assessment model retains the traditional structure of partial indicators S, O, and D but with an innovative system of their evaluation and synthesis. The risk assessment model is based on the application of the fuzzy theory in combination with the MCDM. The goal of the innovative model is to reduce the subjectivity of the expert model by introducing PI ranking; to reduce the dispersion of outcomes, i.e., to increase the accuracy of the final risk assessment; to define a risk assessment algorithm. The model algorithm is presented in Figure 1.
The model consists of three parts (Figure 1):
  • Module 1, deep analyses of an engineering system (ES), with the aim of statistical processing of recorded data on behaviour primarily based on damages that have occurred, time state picture, reliability, and availability. Output from module 1 is a weak point list (hereinafter WP) on ES for which further risk evaluation is done;
  • Module 2, experts’ judgment of PI and their mutual ranking. Output from Module 2 is a PI assessment for each WP in fuzzy number form and rank of PI impact on risk;
  • Module 3 is a model of the fuzzy logical conclusion, which uses TOPSIS preferences in defining the outcome of fuzzy composition where fuzzy relationships are previously weighted based on AHP rank. Output from Module 3 is a risk assessment for each WP.
The theoretical explanation of certain specific parts of the model is provided below.

3.1. Fuzzy Proposition

To present estimates that contain linguistic values, the fuzzy proposition procedure is used. The fuzzy proposition is the process of perceiving reality in such a way that it can be presented in an analytical form, i.e., in numerical form. Fuzzy proposition belongs to the domain of artificial intelligence.
Five linguistic variables are introduced for each PI and risk as an overall indicator, which is defined in the coordinate system of the membership function (µ) and the class as the representative of the unit of indicator measure (j = 1 to 10) [60,61,62]. Linguistic variables are presented as fuzzy sets. Fuzzy sets are in a trapezoidal shape. This shape is applied for the linguistic variables for which there is no clear and precise difference between the fuzzy terms [17,63]. The linguistic variable (LV) is in the following form:
L V = { μ ( j = 1 ) ,   μ ( j = 1 ) ,   ,   μ ( j = 10 ) }
All the linguistic variables are defined in the following way, which is also presented in Figure 2.
A = { 0 ( 1 ) ,   ,   0 ( 8 ) ,   1 ( 9 ) ,   1 ( 10 ) } ; B = { 0 ( 1 ) ,   ,   0 ( 5 ) ,   0.33 ( 6 ) ,   1 ( 7 ) ,   1 ( 8 ) ,   0 ( 9 ) ,   0 ( 10 ) } ; C = { 0 ( 1 ) ,   ,   0.5 ( 4 ) ,   1 ( 5 ) ,   1 ( 6 ) ,   0.5 ( 7 ) ,   0 ( 8 ) ,   0 ( 9 ) ,   0 ( 10 ) } ; D = { 0 ( 1 ) ,   0 ( 2 ) ,   1 ( 3 ) ,   1 ( 4 ) ,   0.33 ( 5 ) ,   0 ( 6 ) ,   ,   0 ( 10 ) } ; E = { 1 ( 1 ) ,   1 ( 2 ) ,   0 ( 3 ) ,   ,   0 ( 10 ) } ;
The partial indicators are described according to the linguistic variable. The linguistic description helps experts in assigning grades. The descriptions are given in Table 1.

3.2. AHP Method—PI Ranking

Multi-criteria decision-making (hereinafter MCDM) methods are used for evaluation or selection among multiple alternatives. Analysis of the parameters that by their nature are not mutually comparable is possible with these methods in which basis is a simple mathematical tool [64]. Among the other MCDM methods, AHP is the most used method [65]. This method decomposes the problem into elementary components, which then can be compared in pairs. Input data in this model can be in the form of either quantitative or qualitative. Inconsistency checks of the decision maker in assigning values of the relative importance could be calculated, which is an additional advantage of this method [66].
The first step in this method is the mutual comparison of two alternatives in each interaction. For that purpose, the Saaty scale of relative importance is used (Table 2) [67,68].
The result of the pair-wise comparison of the elements is the priority vector (wi) [68]. The numerical value of the priority vector is used to form matrix M(m × n) (2) in which n is the number of considered criteria and aij is the relative comparison measure of wi/wj while i, j = 1, …, n. [69,70,71].
M = [ w 1 / w 1 w 1 / w 2 w 1 / w j w 2 / w 1 w 2 / w 2 w 2 / w j w i / w 1 w i / w 2 w i / w j ] = [ 1 a 12 a 1 j a 21 1 a 2 j a i 1 a i 2 1 ]
By calculating the matrix, the result of the AHP method was obtained for alternatives ranking according to given parameters and sub-parameters. The output value is defined as a weight coefficient of different PI (WO, WS, WD). The final step in the AHP method is the consistency check [72]. This is achieved by calculating the value consistency index (CI) and the random consistency index (CR). To fulfil a condition of consistency, the value (CR) must be less than 0.1. In other cases (CR > 0.1), it is necessary to determine the reasons for inconsistency (usually to repeat the pair-wise comparisons) [64,70]. For calculation values of (CI) and (CR), Equations (3) and (4) are used:
C I = ( λ max n ) ( n 1 ) ,
where λmax is the weighted mean of coefficient λi calculated by Equation (5); n is the number of compared elements [60].
λ max = 1 n i = 1 n λ i
λ i = j = 1 n ( a i j W i ) W i  
Follows,
C R = C I R I ,
where RI is the random index which depends on the number of compared elements (n) and it is shown in Table 3 [60].

3.3. Composition—TOPSIS Method

Fuzzy composition (product) is a procedure of synthesising two or more fuzzy relations into one overall. Fuzzy relations in this case represent PI provided in the form of fuzzy numbers. Fuzzy composition is in general a screening model. The product may or may not have a commutation property [63]. In that sense, the order of product members may but may not be defined. Depending on the desired function of the goal, the result (outcome) of the composition is defined. Basically, “IF-THEN” logical operators are used, i.e., derived application models MAX–MIN and MIN–MAX [38,60,73,74]. The MAX–MIN composition is called a pessimistic composition [60]. In this composition, the best possible solution is found from the set of the worst combinations of outcomes. The opposite is the MIN–MAX composition, called optimistic. From the best possible outcomes, the worst is found [60]. In the first, the goal function is oriented towards phenomena such as safety or dependability, while the second is used for risk-oriented phenomena [60]. The paper introduces an innovative composition model where the TOPSIS method is used. The goal is a concentration of screening model.
The basic principle of the method is to compare the considered alternatives with the best within the defined parameter. The TOPSIS method is based on the choice of the alternative that has the shortest “distance” from the ideal solution, i.e., the longest to the anti-ideal solution [75]. The ideal positive solution is formed of all the best values that can be obtained from the considered criteria. In contrast, the negative ideal solution is formed from all the lowest values [76].
The TOPSIS method starts with the forming of a matrix M (7) consisting of m alternatives and n criteria [69]:
M m × n = [ x 11 x 12 x 1 j x 1 n x 21 x 22 x 2 j x 2 n             x i 1 x i 2 x i j x i n             x m 1 x m 2 x m j x m n ]
where xij (for i = 1, 2… m; j = 1, 2… n) represents the value of i-th alternative toward j-th criterion.
In the next step, the matrix (8) is normalized (rij) and then (9) multiplied (pij) by the weight coefficients of the parameters obtained by the AHP method (Wi = WO, WS, WD).
r i j = x i j i = 1 m x i j 2 i = 1 , ,   m ; j = 1 , ,   n
p i j = W i r i j , i = 1 , ,   m ; j = 1 , ,   n ;  
Follows creation an ideal (A+) and anti-ideal (A) solution, Equations (10) and (11). Only different values from zero are taken into account in the composition [77]. The next step is calculating the distance of each alternative from the ideal solution (Si +, Si ) through Equations (12) and (13) [76,78]:
A + = ( M A X i 0 p i j | j J ) , ( M I N i 0 p i j | j J ) = { p 1 , p 2 , , p j , p n }
A = ( M I N i 0 p i j | j J ) , ( M A X i 0 p i j | j J ) = { p 1 , p 2 , , p j , p n }  
where J′ and J″ are associated with beneficial and non-beneficial attributes.
S i + = j = 1 n ( p i j p j + ) 2
S i = j = 1 n ( p i j p j ) 2  
The final step in composition is to calculate the relative closeness of the alternative to the ideal solution,
μ i = S i S i + S i + , 0 μ i 1
The rank value of µi arranged in descending order (from highest to lowest value) corresponds to the rank of alternatives Ai (from the best to the worst) [69,76,78]. The output shape of risk assessment after TOPSIS fuzzy composition:
R = μ ( j = 1 ) , μ ( j = 2 ) , , μ ( j = 10 )

3.4. Identification

The identification process aims to map form (15) into a form where the dependence is given according to the fuzzy sets ‘A’‘E’.
R P N = μ ( A ) , μ ( B ) , , μ ( E )
The identification method that is used in the paper is the best fit [60]. This approach maps the membership functions to classes (14) in the membership function of the fuzzy sets (1). The relative distance d between the membership functions of the result (14) and the fuzzy number defined by the linguistic variable ‘A’, …, ‘E’ [60] is calculated. The following form applies to each linguistic variables’ ‘A’, …, ‘E’:
d A ( R , A ) = j = 1 j = 10 ( μ R j μ A j ) 2 d E ( R , E ) = j = 1 j = 10 ( μ R j μ E j ) 2
where: μR(j) is output from (14) and μ‘A’(j)…‘E’(j) is according to (1).
In the next step, among the values d‘A’…‘E’, the minimum value is selected dmin. The nearer RPN is to the certain linguistic variable, the lower dmin is. Gap dmin is equal to zero if RPN is just the same as the certain expression in terms of the membership functions [63]. For that purpose, RPN should not at all be evaluated to other expressions due to the exclusiveness of these expressions.
Based on the ratio dmin/d‘A’,…‘E’ finally gets the membership function that appears in the Equation for RPN (16):
μ R P N ( A ) = d min d A ( d min d A + + d min d E ) μ R P N ( E ) = d min d E ( d min d A + + d min d E )
The values of µRPN in the model are calculated for all grades ‘A’ to ‘E’, which is the input value for the process of defuzzification and determination of the dissipation measure.
Each μRPN (‘A’, …, ‘E’) represents the extent to which RPN belongs to the defined risk fuzzy sets expressions (1). It can be noted that if RPN completely belongs to a certain expression, then μRPN(‘A’, …, ‘E’) is equal to 1 and the others are equal to 0 [63]. Thus, μRPN (‘A’, …, ‘E’) could be viewed as a degree of confidence that RPN belongs to the certain risk expressions defined to the procedure of proposition (Section 3.1).
Depending on the input parameters and the identification process, the risk value can be interpreted as ‘A’—very high risk, ‘B’—high risk, ‘C’—average risk, ‘D’—low risk, and ‘E’—very low risk.

3.5. Defuzzification

The fuzzy number is converted into a real number by the process of defuzzification. The output values of the identification procedure are arranged according to the grades (µi = ‘A’, ‘B’, ‘C’, ‘D’, and ‘E’). These values are combined into a final assessment that becomes comparative. The method of defuzzification that is used in this paper is the centre of mass (Zn) method [13,39,79]. The grade ‘A’ is assigned a value of Ci = 5. The remaining grades fall until grade ‘E’, which gets a value of Ci = 1 [80]. The value (Zn) is obtained according to the Equation (19):
Z n = i = 1 j μ i C i i = 1 j μ i
A standard deviation is used to determine the scatter around the value obtained [81]. The Equation for the standard deviation has the form (20):
S n = i = 1 i = N ( μ i μ s r ) 2 N 1
Considering the calculation from Equations (19) and (20), the risk assessment can be expressed in the form:
R P N = Z n ,   S n
where Zn = 1… 5 and Sn = 0… 1.

4. Results of the Case Study: Bucket-Wheel Excavator

The bucket-wheel excavator SRs2000, operating on the open-cast lignite mine, was used as the subject of analysis in the case study. The selection of this excavator was made based on the complexity of the ES, the availability of data, and a large number of the same excavators worldwide. The total number of excavators of this type in the world is 57. In general, a bucket-wheel excavator (BWE) is, together with a belt conveyor and spreader, part of continuous ES. From the aspect of reliability, these machines are in a connection in series. The downtime of one of the machines induces a downtime of the entire ES. BWEs are the initial and most responsible segment. It is designed to work in changing operating and climatic conditions. It is a complex ES composed of a large number of partial subsystems.

4.1. Module 1—Weak Point Analysis

An analysis of the background of serious failures (damages) and excavator downtimes was performed [23,24,25]. From the aspect of accident risk, four weak points are located that are characteristic for this type of excavator (Figure 3):
  • First point (P1.1)—rope wheel in the hoisting system. If the initial cracks in the rope wheel are not noticed in time, the rope may break, and the excavator may collapse. The causes are most often a bad technical solution (fabrication of segments by bending and welding) or excessive wear of the grooves;
  • Second point (P1.2)—bucket-wheel head. Problems that occurred were: fracture of the rotor wheel shaft, damage to the small diaphragm assembly, longitudinal cracks on the hollow shaft, fracture of 10 of the 12 screws on the diaphragm, damage to the support, etc. These problems can cause catastrophic damage to the excavator. Similar problems occurred at several excavators of the open-cast mines in Serbia;
  • Third point (P1.3)—support to A mast. The structural disadvantage of this excavator was due to water retention in the A-mast. The water caused corrosion and was frozen in the winter. There was a crack in the mast under the tension link;
  • Fourth point (P1.4)—slewing platform. Deformation (bulging of the plate) of the vertical mast/cylinder of the upper slewing platform was observed on several excavators of this type in Serbia and the surrounding area. A turntable is a central, carrying part of the excavator. It carries a bucket-wheel boom, a central pillar, and a counterweight boom. The cracking of a vertical mast can cause catastrophic damage or collapse of the excavator.
Weak points according to the risk of failure are defined based on statistical processing of data on machine failures. Downtimes induce high costs. Indirect costs are then often higher than direct ones. Analyses show that the indirect cost per hour of bucket-wheel excavator downtime can be up to EUR 15,000 [26,27].
Based on the insight into the data on the recorded sheets of malfunctions/failures, statistical processing was performed. All failures are qualified in categories. The analysis showed that 77.68% of interventions were caused at six weak points. Due to the complexity of the number of statistics data, only the percentage distribution is shown in Figure 4. The highest percentage of interventions are on bucket-wheel elements at 24.31%, followed by the conveyor drive system at 19.79%, crawler dive system at 14.51%, slewing drive system at 8.61%, digging drive system at 7.80%, and hoisting drive system at 2.66%. The number of interventions does not always have to correlate with the severity of the failure and the downtime. These six weak points are adopted as a starting point for further analysis of the risk of downtime.

4.2. Module 2 Expert System

The expert system contains a collection of initial information about O, S, and D using expertise judgments. The expert system is presented through the assessment phase and the ranking phase. Expert opinions were obtained from engineers and supervisory and technical staff dealing with the maintenance of the considered machines. Due to the complexity of the calculation, a detailed overview of the module is provided for the first located point of risk of damage P1.1 (rope wheel in the hoisting system) for which the risk performance is calculated. For the remaining weak points of the risk of damage and the risk of downtime in the analysis, only the input data and the result are presented.

4.2.1. Input Data—Questionnaire

For each of the defined subjects of analysis, it is necessary to perform an expert evaluation. Five experts assigned grades for each segment of the analysis. For each of the partial risk indicators (O, S, and D), values were assigned based on the ratings (‘A’, ‘B’, ‘C’, ‘D’, and ‘E’, where the rating with the highest risk is ‘A’, while the lowest risk is ‘E’). Grades were assigned based on the linguistic description provided in Section 3.1. The sum of assigned grades according to the partial indicator must be 100%. Table 4 shows the values of the assigned grades for P1.1. The last part of the table shows the mean values of the grades that represent the input to the next part of the model.
It can be seen from Table 4 that for the O indicator, the first expert assigned 90% for grade ‘D’ and 10% for grade ‘E’. For indicator S, he assigned 80% for grade ‘A’ and 20% for ‘B’, while according to indicator D, he assigned 60% and 40% to grades ‘C’ and ‘D’, respectively. Below, an example of calculating the average grade according to the O indicator is given. Grades ‘A’ and ‘B’ were not awarded by an expert. Two experts gave a grade of ‘C’, all five a grade of ‘D’, and three a grade of ‘E’. The average grades are:
C = ( 0 + 0.3 + 0 + 0.5 + 0 ) 5 = 0.16 D = ( 0.9 + 0.7 + 0.7 + 0.5 + 0.6 ) 5 = 0.68 E = ( 0.1 + 0 + 0.3 + 0 + 0.4 ) 5 = 0.16
The average grades for P1.1 for indicators O, S, and D have the following form:
O P 1.1 = ( 0 / A ,   0 / B ,   0.16 / C ,   0.68 / D ,   0.16 / E ) S P 1.1 = ( 0.42 / A ,   0.54 / B ,   0.04 / C ,   0 / D ,   0 / E ) D P 1.1 = ( 0 / A ,   0 / B ,   0.24 / C ,   0.58 / D ,   0.18 / E )
For the remaining P1.2–P2.6 analyses, only calculated mean grades are displayed. An overview of the input data to the partial models is provided in Table 5.

4.2.2. Fuzzification

The input data in Table 5 are multiplied by the intersection points of the fuzzy sets defined in Section 3.1. Each fuzzy set ‘A’, …, ‘E’ has its values on the j-scale (1). By multiplying, the assigned expert grades are mapped on the j-scale. Table 6 provides example P1.1 for the partial indicator O.
The fuzzification form of the expert assessment on the j-scale for P1.1 in relation to the indicator O has the form:
O P 1.1 = ( 0.16 / 1 ,   0.16 / 2 ,   0.68 / 3 ,   0.76 / 4 ,   0.66 / 5 ,   0.16 / 6 ,   0.08 / 7 ,   0 / 8 ,   0 / 9 ,   0 / 10 )
According to the same principle, grades for indicators S and D are obtained:
S P 1.1 = ( 0 / 1 ,   0 / 2 ,   0 / 3 ,   0.02 / 4 ,   0.04 / 5 ,   0.22 / 6 ,   0.56 / 7 ,   0.54 / 8 ,   0.42 / 9 ,   0.42 / 10 ) D P 1.1 = ( 0.18 / 1 ,   0.18 / 2 ,   0.58 / 3 ,   0.70 / 4 ,   0.43 / 5 ,   0.24 / 6 ,   0.12 / 7 ,   0 / 8 ,   0 / 9 ,   0 / 10 )
To analyse each weak point in the model, the same principle is applied to map the assigned expert grades on the scale.

4.2.3. AHP Ranking

In this section, experts’ judgment is used for priority vector evaluation among PI on risk. Experts have offered combinations of O:S:D ratios in the form of 3:2:1, 3:1:1, …, 1:1:1, …, 1:1:3, 1:2:3. The most common expert answer given for each analysed weak point is adopted in the further calculation. An example of calculating the PI weight for a weak point P1.1 is shown in Table 7. A matrix (2) with basic setting is shown in the table. By calculating the matrix, the solutions shown in the last column of the table are obtained (Wi). The consistency check of the decision maker using Equations (3)–(6) obtained a CR value that is less than 10%, which satisfies the condition.
An assessment of the impact of each of the PI on risk was obtained in the following form:
W O = 0.163 ;     W S = 0.540 ;     W D = 0.297
While WO + WS + WD = 1.
Based on the obtained values of weight coefficient, it is concluded that at P1.1, the influence of severity on risk, is dominant to the extent of 54%. This outcome of the ranking was expected because the failure in this position leads to the violation of the static stability of the machine.
According to the same principle, the weight coefficient of the mentioned indicators for other weak points was assessed. The values of weight coefficient (Wi) and consistency check (CR) are shown in Table 8.

4.3. Module 3—Fuzzy Inference Engine

4.3.1. Composition

Weighted grades of PI are synthesized by using fuzzy-TOPSIS composition. In the first step of the TOPSIS composition, the average values of PI defined in Table 4 are mapped to the membership functions of the fuzzy set. Fuzzy sets are in a trapezoidal shape. The obtained values represent the input parameters for the TOPSIS composition and are shown in Table 9.
In the next step, the values from the previous table are normalized using Equation (8). The normalized values of the matrix are shown in Table 10. In the third step, the values of the weight coefficient (Wi) obtained by the AHP method are introduced. According to Equation (9), the normalized values (rij) are multiplied by the weight coefficients from Table 8. The results (pij) of this step are also shown in Table 10.
By using Equations (10) and (11), the values of ideal (A+) and anti-ideal (A) solutions from the weighted normalized matrix (pij) are found. In the following account, only combinations other than zero are taken. The next step involves defining the distance (Si+, Si) of each parameter relative to the ideal (A+) and anti-ideal (A) using Equations (12) and (13). The output value of the TOPSIS method is the synthesis coefficient µi calculated according to Equation (14). The values of (A+, A), (Si+, Si) and (µi) are presented in Table 11 and Table 12, respectively.
Output value R (µi) from TOPSIS composition according to j-scale has the following form:
R ( µ P 1.1 ) = { 0.0623 ( 1 ) ,   0.0623 ( 2 ) ,   0.3373 ( 3 ) ,   0.3931 ( 4 ) ,   0.2497 ( 5 ) , 0.3213 ( 6 ) ,   0.6069 ( 7 ) ,   0.5584 ( 8 ) ,   0.4812 ( 9 ) ,   0.4812 ( 10 ) }
The results are also shown graphically in Figure 5.

4.3.2. Identification

Identification best-fit method is used to obtain the final grades (‘A’, ‘B’, ‘C’, ‘D’, and ‘E’). According to Equation (15) an example is provided for the grade ‘A’ and has the following form:
d 1 ( P 1.1 , A ) = ( 0 0.06229 ) 2 + ( 0 0.06229 ) 2 + + ( 0 0.55843 ) 2 + ( 1 0.48121 ) 2 + ( 1 0.48121 ) 2 = 1.28846
where: μA(P1.1) according to μi from Table 12 and μA according to (6).
For other fuzzy sets:
d 2 ( P 1.1 ,   B ) = 1.07298 , d 3 ( P 1.1 ,   C ) = 1.39387 , d 4 ( P 1.1 ,   D ) = 1.43827 , d 5 ( P 1.1 ,   E ) = 1.82641 .
For dmin = d2 according to Equation (16):
μ   A = 1.07298 ( 1.28846 ( 1.07298 1.28846 + 1.07298 1.07298 + 1.07298 1.39387 + 1.07298 1.43827 + 1.07298 1.82641 ) ) = 0.21157
Other values are: μ‘B’ = 0.25406, μ‘C’ = 0.19557, μ‘D’ = 0.18954, and μ‘E’ = 0.14926.
The grade for P1.1 of the machine is recorded in the form:
R P N ( P 1.1 ) = ( 0.21157 / A ,   0.25406 / B ,   0.19557 / C ,   0.18954 / D ,   0.14926 / E )
The grades are designated as: ‘A’—very high risk, ‘B’—high risk, ‘C’—average risk, ‘D’—low risk, and ‘E’—very low risk. For P1.1, very high risk is 21.16% and high risk is in the rating level of 25.41%. The low risk according to grades ‘A’ and ‘B’ are in ratings 18.95% and 14.93%. The distribution of grades (‘A’, …, ‘E’) of risk with the center of gravity after the identification process for P1.1 is presented in Figure 6. The calculated values for the remaining machine segments are shown in Table 13.

4.3.3. Defuzzification and Standard Deviation

The last part of the analysis involves the synthesis of the obtained results into one final grade. Defuzzification is performed using the centre of mass point method defined in Section 3.5. For P1.1 by applying Equation (19) the result is:
Z P 1.1 = i = 1 i = 5 μ i C i i = 1 i = 5 μ i = 0.21157 5 + 0.25406 4 + 0.19557 3 + 0.18954 2 + 0.14926 1 0.21157 + 0.25406 + 0.19557 + 0.18954 + 0.14926 = 3.189
Standard deviation is calculated according to the Equation (20):
S P 1.1 = i = 1 i = N ( μ i μ s r ) 2 N 1 = ( 0.21157 0.2 ) 2 + ( 0.25406 0.2 ) 2 + ( 0.19557 0.2 ) 2 + ( 0.18954 0.2 ) 2 + ( 0.14926 0.2 ) 2 5 1 = 0.03795
According to Equation (21), final value of calculated risk for P1.1 is presented in the form:
R P N P 1.1 = 3.189 ,   0.03795
Other RPN results are shown in Table 14.

5. Discussion

The analysis conducted in this paper was performed with two aspects of the risk of damage for items P1.1–P1.4 and the risk of interruption of production for items P2.1–P.2.6. Based on the applied innovative fuzzy–AHP–TOPSIS model, further considerations can be conducted in three directions: the concept of the created model, the results of the conducted case study, and guidelines in risk-based maintenance.

5.1. Discussion According to Innovation Model

Previous analysis in different areas of risk indicates that the MIN–MAX composition is used, which reduces the dissipation of results compared with MAX–MIN [82]. In this paper, the composition was developed by applying the TOPSIS method (M1). The goal was to find out if this method further reduces dissipation and shifts the centre of gravity. The same input data was used for the models: AHP-fuzzy with MIN–MAX composition (M2), fuzzy with MIN–MAX composition (M3), AHP-fuzzy with MAX–MIN composition (M4), and fuzzy with MAX–MIN composition (M5). The results are shown in Table 15.
The dissipation measure in the M1 method is the lowest in five cases. In four cases it is approximately equal to M3, while in one case dissipation is the lowest in method M3. The differences in the degree of dissipation are also shown graphically in Figure 7. The radius of the circle around the results indicates the measure of dissipation around the results.

5.2. Discussion According to the Case Study Results

The results of the case study are shown in Table 14 and graphically in Figure 8. On the abscissa of the diagram the weak points of both considered risks (P1.1, …, P2.6) are presented. The output values of identification according to µRPN from 0 to 1 for each of the grades (‘A’, …, ‘E’) are marked on the primary ordinate (left). The secondary ordinate (right) indicates the output value from defuzzification (Zi) in the range of 2.70–3.30. This rating is marked with dots as the centre of gravity. For easier tracking of the difference in results between weak points, they are linked with a red line.
The highest risk of damage is on the weak point P1.4—a slewing platform with a value of 3.204 on a scale from 1 to 5. This rating mostly belongs to the linguistic rating ‘D’, with a slight tendency towards the rating ‘C’. The second weak point with the highest risk of damage is P1.1—rope wheel in the hoisting system with a risk value of 3.189. It is followed by P1.2—bucket-wheel head with 3.044, while the lowest risk is with P1.3—support to A mast with a rating of 2.934. The distribution of affiliation to linguistic assessments is shown in Figure 7.
The highest risk of downtime is on P2.5—digging drive system with a value of 3.253. The second weak point with the highest risk is P2.4—slewing drive system where the grade is 3.164. The distribution of the remaining grades and affiliation to the linguistic descriptions is shown in Figure 7.
Statistics related to data to the risk of downtime are shown in Figure 4. The highest number of downtimes is at P2.1—bucket-wheel elements with 24.31%. The risk at this place is the lowest with a value of 2.888. There are several reasons for this result: downtimes that can be easily detected visually; replacement time planning is possible; the element is made up of several parts whose failure or damage will not, in any case, lead to machine downtime; etc. The second position where a larger number of interventions was statistically observed is the P2.2—conveyor drive system with a share of 19.79%. The risk at P2.2 is also low with a grade of 2.969. The reasons are similar. Detection is simple and the severity of the consequences does not jeopardize prolonged operation downtime of the machine.

5.3. Risk-Based Maintenance

The concept of ES maintenance may be different. “Work to failure” is the least favourable [83,84]. Such a concept is obsolete. Today, concepts strive for predictive and proactive maintenance. Additional progress can be made by implementing the risk-based maintenance concept. This reduces the possibility of damages and unplanned downtimes.
From the aspect of damage risk, attention should be paid to P1.4—slaving platform. Checking the condition of the steel structure of the slewing platform is performed from the aspect of deformations, cracks, or other defects. This includes modern diagnostic methods such as acoustic testing, tensometric testing, etc. The central vertical mast carries the bucket-wheel boom, its weight, and the counterweight. At the same time, it suffers from all dynamic loads during operation. From the aspect of the seriousness of the consequences, the risk is extremely high. The second weak point with the highest risk P1.1—rope wheel in the hoisting system requires testing of all ropes (magnetic testing), pulleys, drives (vibration and stress measurements), as well as safety brakes. Controls should be time defined to detect potential initial deformations in time.
The statistical number of interventions and the risk of downtime analysis conducted in the model are not in agreement. Most frequent failures are on P2.1—bucket-wheel elements. It can be said that the probability of occurrence is high, the severity of the consequences is small, and the possibility of detection is also good. For example, with P2.1, teeth often break out. The total number of teeth on the bucket wheel is large. The excavator is continues to work without any problems until a large number of teeth are damaged or broken. Then, the replacement is made, or the time is used when the excavator is at a standstill for some other reason. Other elements of P2.1 cause similar problems that are not of high risk.
Risk-based maintenance must be directed towards a weak point with high risk. The digging drive system (P2.5) is the initial drive in the digging process. It initiates the slewing movement of the working element and is exposed to different working and climatic conditions. Defects can be serious and require workshop repairs. The time that the machine is at a standstill is great and the costs are high. Improvements must focus on detecting dangers and reducing the severity of consequences. The application of modern diagnostic methods is required, such as monitoring the temperature of assemblies, mechanical damages, vibrations, the level of lubrication of rotating parts, etc. If conditions allow, monitoring should be online, i.e., monitoring of important elements from the aspect of risk should be carried out. For all elements and assemblies that would require workshop repair, it is necessary to prepare spare parts and aggregates on time. Maintenance would be carried out according to the system of aggregate/assembly replacement. A spare aggregate/assembly would always be available, the repair of the current one would be performed later, and it would then become a replacement. Similar problems occur with other drives with a higher risk of downtime (P2.4, P2.3). The risk-based maintenance setting should be used in these cases as well.

6. Conclusions

The paper presents an innovative model of EC risk assessment. So far, the two most used methods are FMEA and FMECA. The shortcomings of the model were noticed by several authors, and they are: increased subjectivity, the unambiguous influence of PI, obtaining the same RPN values by combining different PI, the sensitivity of the model, etc. This paper presents an innovative model that eliminates these shortcomings.
The existing RPN calculation method has been improved by introducing an innovative fuzzy expert model in combination with MCDM methods. The basis is a fuzzy model that allows the entry of linguistic estimates according to a defined algorithm.
The AHP method was used to define the relationship between influential partial risk indicators. In this way, the model gained flexibility and adaptability. Its objectivity through two-stage expert input has also been increased. The influence of O, S, and D on RPN may or may not always be the same. For some ESs, the severity or probability of occurrence is more important, while in other cases it is the possibility of risk detection. To create a comprehensive approach to risk performance, it is necessary to consider the PI weight coefficients.
The TOPSIS method was used in the fuzzy composition to define fuzzy rules and fuzzy outcomes to increase the accuracy of the output. For phenomena such as risks, the value of the results should be concentrated. Dissipation around the results should be kept to a minimum. With that goal, the TOPSIS method is applied in this paper. The TOPSIS method was used in the composition instead of IF-THEN, i.e., derived MAX–MIN and MIN–MAX compositions. The rate of dissipation in the innovative model is lower than in others.
According to the presented results, in relation to the other models, the innovative model has less dispersion on average at 29.9%. With detailed observation, M1 has less dispersion of M2 at 20.5%, M3 at 5.8%, M4 at 45.9%, and M5 at 47.3%.
The case study was conducted on a bucket-wheel excavator as a complex ES. The risk was analysed from two aspects: the risk of damage and the risk of downtime. From the aspect of risk of damage, the highest value is on the slewing platform, then on the rope wheel in the hoisting system, support to A mast, and on the bucket-wheel head. In terms of downtime risk, the highest value is on the digging drive system, then on the slewing drive system. The number of interventions does not agree with this distribution, which is understandable considering the seriousness and detectability of the considered weak points.
The model was developed in conceptual and mathematical terms and verification was conducted on an appropriate example. The model can be a useful tool for different ES-s in industry. Based on the located points, the concept of preventive maintenance can be applied or the concept of risk-based maintenance can be as well. Furthermore, further research should focus on the application of equipment maintenance management. Risk assessments need to be reconciled with the implications of quality of service and dependability of ES. Questions need to be answered regarding when and how to manage operations and maintenance depending on risk assessment.

Author Contributions

Conceptualization, M.T. and S.D.; methodology, M.T.; validation, S.D., U.B. and D.P.; formal analysis, P.J.; resources, D.I.; writing—original draft preparation, S.D. and M.T.; writing—review and editing, D.P. and U.B.; visualization, S.D.; supervision, P.J. and D.I. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
RPNRisk Priority Number
ESEngineering system
PIPartial indicators
OOccurrence
SSeverity
DDetectability
BWEBucket-wheel excavator
WPWeak point

References

  1. Jaderi, F.; Ibrahim, Z.Z.; Zahiri, M.R. Criticality analysis of petrochemical assets using risk based maintenance and the fuzzy inference system. Process Saf. Environ. Prot. 2019, 121, 312–325. [Google Scholar] [CrossRef]
  2. Leoni, L.; De Carlo, F.; Paltrinieri, N.; Sgarbossa, F.; BahooToroody, A. On risk-based maintenance: A comprehensive review of three approaches to track the impact of consequence modelling for predicting maintenance actions. J. Loss Prev. Process Ind. 2021, 72, 104555. [Google Scholar] [CrossRef]
  3. Yeter, B.; Garbatov, Y.; Soares, C.G. Risk-based maintenance planning of offshore wind turbine farms. Reliab. Eng. Syst. Saf. 2020, 202, 107062. [Google Scholar] [CrossRef]
  4. ISO 31000:2018; Risk Management—Guidelines. International Standards Organisation: Geneva, Switzerland, 2018.
  5. ISO Guide 73:2009; Risk Management—Vocabulary. International Standards Organisation: Geneva, Switzerland, 2009.
  6. ISO/IEC 31010:2019; Risk Management—Risk Assessment Techniques. The International Organization for Standardization and The International Electrotechnical Commission: Geneva, Switzerland, 2009.
  7. Grassi, A.; Gamberini, R.; Mora, C.; Rimini, B. A fuzzy multi-attribute model for risk evaluation in workplaces. Saf. Sci. 2009, 47, 707–716. [Google Scholar] [CrossRef]
  8. Pharmaceutical Guest Column; Durivage, M. Is It Time to Say Goodbye to FMEA Risk Priority Number (RPN) Scores? 2020. Available online: https://www.pharmaceuticalonline.com/doc/is-it-time-to-say-goodbye-to-fmea-risk-priority-number-rpn-scores-0001 (accessed on 15 November 2021).
  9. Stamatis, D.H. Failure Mode and Effect Analysis: FMEA from Theory to Execution; American Society for Quality (ASQ): Milwaukee, WI, USA, 1995. [Google Scholar]
  10. Pillay, A.; Wang, J. Modified failure mode and effects analysis using approximate reasoning. Reliab. Eng. Syst. Saf. 2003, 79, 69–85. [Google Scholar] [CrossRef]
  11. Braglia, M.; Frosolini, M.; Montanari, R. Fuzzy criticality assessment model for failure modes and effects analysis. Int. J. Qual. Reliab. Manag. 2003, 20, 503–524. [Google Scholar] [CrossRef]
  12. Braband, J. Definition and analysis of a new risk priority number concept. In Probabilistic Safety Assessment and Management; Springer: London, UK, 2004; pp. 2006–2011. [Google Scholar] [CrossRef]
  13. Wang, Y.-M.; Chin, K.-S.; Poon, G.K.K.; Yang, J.-B. Risk evaluation in failure mode and effects analysis using fuzzy weighted geometric mean. Expert Syst. Appl. 2009, 36, 1195–1207. [Google Scholar] [CrossRef]
  14. Chin, K.-S.; Wang, Y.-M.; Poon, G.K.K.; Yang, J.-B. Failure mode and effects analysis by data envelopment analysis. Decis. Support Syst. 2009, 48, 246–256. [Google Scholar] [CrossRef]
  15. Chang, K.-H.; Cheng, C.-H. Evaluating the risk of failure using the fuzzy OWA and DEMATEL method. J. Intell. Manuf. 2011, 22, 113–129. [Google Scholar] [CrossRef]
  16. Liu, H.-C.; Liu, L.; Liu, N. Risk evaluation approaches in failure mode and effects analysis: A literature review. Expert Syst. Appl. 2013, 40, 828–838. [Google Scholar] [CrossRef]
  17. Petrović, D.; Tanasijević, M.; Milić, V.; Lilić, N.; Stojadinovic, S.; Svrkota, I. Risk assessment model of mining equipment failure based on fuzzy logic. Expert Syst. Appl. 2014, 41, 8157–8164. [Google Scholar] [CrossRef]
  18. Hwang, C.L.; Yoon, K. Multiple Attribute Decision Making: A State of the Art Survey; Lecture Notes in Economics and Mathematical Systems 186; Springer: Berlin/Heidelberg, Germany, 1981. [Google Scholar] [CrossRef]
  19. Chai, J.; Liu, J.N.; Ngai, E.W. Application of decision-making techniques in supplier selection: A systematic review of literature. Expert Syst. Appl. 2013, 40, 3872–3885. [Google Scholar] [CrossRef]
  20. Zavadskas, E.K.; Turskis, Z.; Kildienė, S. State of art surveys of overviews on MCDM/MADM methods. Technol. Econ. Dev. Econ. 2014, 20, 165–179. [Google Scholar] [CrossRef] [Green Version]
  21. Amidu, M.A.; Olatubosun, S.A.; Ayodeji, A.; Addad, Y. Severe accident in high-power light water reactors: Mitigating strategies, assessment methods and research opportunities. Prog. Nucl. Energy 2021, 143, 104062. [Google Scholar] [CrossRef]
  22. Kim, J.-D.; Chung, W.-J.; Park, S.-B.; Jung, K.-H.; Lee, J.-M. Failure analysis for safety evaluation of capsizing accident of deep cement mixing vessel. Eng. Fail. Anal. 2020, 117, 104795. [Google Scholar] [CrossRef]
  23. Rusiński, E.; Harnatkiewicz, P.; Kowalczyk, M.; Moczko, P. Examination of the causes of a bucket wheel fracture in a bucket wheel excavator. Eng. Fail. Anal. 2010, 17, 1300–1312. [Google Scholar] [CrossRef]
  24. Rusiński, E.; Czmochowski, J.; Iluk, A.; Kowalczyk, M. An analysis of the causes of a BWE counterweight boom support fracture. Eng. Fail. Anal. 2010, 17, 179–191. [Google Scholar] [CrossRef]
  25. Bošnjak, S.M.; Savićević, S.D.; Gnjatović, N.; Milenovic, I.; Pantelić, M.P. Disaster of the bucket wheel excavator caused by extreme environmental impact: Consequences, rescue and reconstruction. Eng. Fail. Anal. 2015, 56, 360–374. [Google Scholar] [CrossRef]
  26. Bugaric, U.; Tanasijevic, M.; Polovina, D.; Ignjatovic, D.; Jovancic, P. Lost production costs of the overburden excavation system caused by rubber belt failure. Eksploat. Niezawodn.—Maint. Reliab. 2012, 14, 333–341. [Google Scholar]
  27. Pantelić, M.P.; Bošnjak, S.M.; Misita, M.Z.; Gnjatović, N.B.; Stefanović, A.Z. Service FMECA of a bucket wheel excavator. Eng. Fail. Anal. 2020, 108, 104289. [Google Scholar] [CrossRef]
  28. Chao, P.-C.; Juang, Y.-J.; Chen, C.-J.; Dai, Y.-T.; Yeh, C.-Y.; Hu, C.-Y. Combined effects of noise, vibration, and low temperature on the physiological parameters of labor employees. Kaohsiung J. Med. Sci. 2013, 29, 560–567. [Google Scholar] [CrossRef] [Green Version]
  29. Tang, Z.; Cai, J.; Li, Q.; Zhao, J.; Li, X.; Yang, Y. The regional scale atmospheric dispersion analysis and environmental radiation impacts assessment for the hypothetical accident in Haiyang nuclear power plant. Prog. Nucl. Energy 2020, 125, 103362. [Google Scholar] [CrossRef]
  30. Samaniego-Rascón, D.; da Silva, M.C.G.; Ferreira, A.D.; Lopez, R.E.C. Solar energy industry workers under climate change: A risk assessment of the level of heat stress experienced by a worker based on measured data. Saf. Sci. 2019, 118, 33–47. [Google Scholar] [CrossRef]
  31. Luo, Q.; Huang, L.; Xue, X.; Chen, Z.; Zhou, F.; Wei, L.; Hua, J. Occupational health risk assessment based on dust exposure during earthwork construction. J. Build. Eng. 2021, 44, 103186. [Google Scholar] [CrossRef]
  32. Schenk, L.; Antonsson, A.-B. Implementation of the chemicals regulation REACH—Exploring the impact on occupational health and safety management among Swedish downstream users. Saf. Sci. 2015, 80, 233–242. [Google Scholar] [CrossRef] [Green Version]
  33. Song, G.; Khan, F.; Yang, M. Probabilistic assessment of integrated safety and security related abnormal events: A case of chemical plants. Saf. Sci. 2019, 113, 115–125. [Google Scholar] [CrossRef]
  34. Xing, X.; Li, H.; Li, J.; Zhong, B.; Luo, H.; Skitmore, M. A multicomponent and neurophysiological intervention for the emotional and mental states of high-altitude construction workers. Autom. Constr. 2019, 105, 102836. [Google Scholar] [CrossRef]
  35. Kumar, P.; Kumar, A. Methods for risk management of mining excavator through FMEA and FMECA. Int. J. Eng. Sci. 2016, 5, 57–63. [Google Scholar]
  36. Rafie, M.; Namin, F.S. Prediction of subsidence risk by FMEA using artificial neural network and fuzzy inference system. Int. J. Min. Sci. Technol. 2015, 25, 655–663. [Google Scholar] [CrossRef]
  37. Kumar, P.; Srivastava, R. Development of a Condition Based Maintenance Architecture for Optimal Maintainability of Mine Excavators. IOSR J. Mech. Civ. Eng. 2014, 11, 18–22. [Google Scholar] [CrossRef]
  38. Wang, J.; Yang, J.; Sen, P. Safety analysis and synthesis using fuzzy sets and evidential reasoning. Reliab. Eng. Syst. Saf. 1995, 47, 103–118. [Google Scholar] [CrossRef]
  39. Bowles, J.B.; Pelaez, C. Fuzzy logic prioritization of failures in a system failure mode, effects and criticality analysis. Reliab. Eng. Syst. Saf. 1995, 50, 203–213. [Google Scholar] [CrossRef]
  40. Gargama, H.; Chaturvedi, S.K. Criticality Assessment Models for Failure Mode Effects and Criticality Analysis Using Fuzzy Logic. IEEE Trans. Reliab. 2011, 60, 102–110. [Google Scholar] [CrossRef]
  41. Łapczyńska, D.; Burduk, A. Fuzzy FMEA Application to Risk Assessment of Quality Control Process. In International Workshop on Soft Computing Models in Industrial and Environmental Applications; Springer: Cham, Switzerland, 2020; pp. 309–319. [Google Scholar] [CrossRef]
  42. Balaraju, J.; Raj, M.G.; Murthy, C.S. Fuzzy-FMEA risk evaluation approach for LHD machine-A case study. J. Sustain. Min. 2019, 18, 257–268. [Google Scholar] [CrossRef]
  43. Das, M.; Roy, A.; Maity, S.; Kar, S.; Sengupta, S. Solving fuzzy dynamic ship routing and scheduling problem through new genetic algorithm. Decis. Making Appl. Manag. Eng. 2021. [Google Scholar] [CrossRef]
  44. Lv, L.; Li, H.; Wang, L.; Xia, Q.; Ji, L. Failure Mode and Effect Analysis (FMEA) with Extended MULTIMOORA Method Based on Interval-Valued Intuitionistic Fuzzy Set: Application in Operational Risk Evaluation for Infrastructure. Information 2019, 10, 313. [Google Scholar] [CrossRef] [Green Version]
  45. Xu, K.; Tang, L.; Xie, M.; Ho, S.; Zhu, M. Fuzzy assessment of FMEA for engine systems. Reliab. Eng. Syst. Saf. 2002, 75, 17–29. [Google Scholar] [CrossRef]
  46. Sadiq, R.; Husain, T. A fuzzy-based methodology for an aggregative environmental risk assessment: A case study of drilling waste. Environ. Model. Softw. 2005, 20, 33–46. [Google Scholar] [CrossRef]
  47. Kushwaha, D.K.; Panchal, D.; Sachdeva, A. Risk analysis of cutting system under intuitionistic fuzzy environment. Rep. Mech. Eng. 2020, 1, 162–173. [Google Scholar] [CrossRef]
  48. Guimarães, A.C.; Lapa, C.M.F. Effects analysis fuzzy inference system in nuclear problems using approximate reasoning. Ann. Nucl. Energy 2004, 31, 107–115. [Google Scholar] [CrossRef]
  49. Zammori, F.; Gabbrielli, R. ANP/RPN: A multi criteria evaluation of the Risk Priority Number. Qual. Reliab. Eng. Int. 2012, 28, 85–104. [Google Scholar] [CrossRef]
  50. Liu, H.-C.; Liu, L.; Liu, N.; Mao, L.-X. Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment. Expert Syst. Appl. 2012, 39, 12926–12934. [Google Scholar] [CrossRef]
  51. Khodadadi-Karimvand, M.; Shirouyehzad, H. Well drilling fuzzy risk assessment using fuzzy FMEA and fuzzy TOPSIS. J. Fuzzy Ext. Appl. 2021, 2, 144–155. [Google Scholar] [CrossRef]
  52. Biswas, S.; Bandyopadhyay, G.; Guha, B.; Bhattacharjee, M. An ensemble approach for portfolio selection in a multi-criteria decision making framework. Decis. Making Appl. Manag. Eng. 2019, 2, 138–158. [Google Scholar] [CrossRef]
  53. Bevilacqua, M.; Braglia, M.; Gabbrielli, R. Monte Carlo simulation approach for a modified FMECA in a power plant. Qual. Reliab. Eng. Int. 2000, 16, 313–324. [Google Scholar] [CrossRef]
  54. Rhee, S.J.; Ishii, K. Using cost based FMEA to enhance reliability and serviceability. Adv. Eng. Inform. 2003, 17, 179–188. [Google Scholar] [CrossRef]
  55. An, J.; Mikhaylov, A.; Jung, S.-U. A Linear Programming approach for robust network revenue management in the airline industry. J. Air Transp. Manag. 2021, 91, 101979. [Google Scholar] [CrossRef]
  56. Chin, K.-S.; Wang, Y.-M.; Poon, G.K.K.; Yang, J.-B. Failure mode and effects analysis using a group-based evidential reasoning approach. Comput. Oper. Res. 2009, 36, 1768–1779. [Google Scholar] [CrossRef]
  57. An, J.; Mikhaylov, A. Russian energy projects in South Africa. J. Energy S. Afr. 2020, 31, 58–64. [Google Scholar] [CrossRef]
  58. Carless, T.S.; Redus, K.; Dryden, R. Estimating nuclear proliferation and security risks in emerging markets using Bayesian Belief Networks. Energy Policy 2021, 159, 112549. [Google Scholar] [CrossRef]
  59. Awodi, N.J.; Liu, Y.-K.; Ayodeji, A.; Adibeli, J.O. Expert judgement-based risk factor identification and analysis for an effective nuclear decommissioning risk assessment modeling. Prog. Nucl. Energy 2021, 136, 103733. [Google Scholar] [CrossRef]
  60. Djenadic, S.; Ignjatovic, D.; Tanasijevic, M.; Bugaric, U.; Jankovic, I.; Subaranovic, T. Development of the Availability Concept by Using Fuzzy Theory with AHP Correction, a Case Study: Bulldozers in the Open-Pit Lignite Mine. Energies 2019, 12, 4044. [Google Scholar] [CrossRef] [Green Version]
  61. Tanasijevic, M. A fuzzy-based decision support model for evaluation of mining machinery. In Proceedings of the 48th International October Conference on Mining and Metallurgy, Bor, Serbia, 28 September–1 October 2016; pp. 15–18. [Google Scholar]
  62. Ivezic, D.; Tanasijevic, M.; Jovancic, P.; Djuric, R. A Fuzzy Expert Model for Availability Evaluation. In Proceedings of the 20th International Carpathian Control Conference (ICCC), Krakow-Wieliczka, Poland, 26–29 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
  63. Ivezić, D.; Tanasijević, M.; Ignjatović, D. Fuzzy approach to dependability performance evaluation. Qual. Reliab. Eng. Int. 2008, 24, 779–792. [Google Scholar] [CrossRef]
  64. Djenadic, S.; Jovancic, P.; Ignjatovic, D.; Tanasijevic, M.; Miletic, F. Effectiveness analysis of different bucket-wheel excavators. In Proceedings of the 8th International Conference Mining and Environmental Protection, Sokobanja, Serbia, 22–25 September 2021; pp. 239–248. [Google Scholar]
  65. Sitorus, F.; Cilliers, J.J.; Brito-Parada, P.R. Multi-criteria decision making for the choice problem in mining and mineral processing: Applications and trends. Expert Syst. Appl. 2019, 121, 393–417. [Google Scholar] [CrossRef]
  66. De FSM Russo, R.; Camanho, R. Criteria in AHP: A Systematic Review of Literature. Procedia Comput. Sci. 2015, 55, 1123–1132. [Google Scholar] [CrossRef] [Green Version]
  67. Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: New York, NY, USA, 1980. [Google Scholar]
  68. Jankovic, I.; Djenadic, S.; Ignjatovic, D.; Jovancic, P.; Subaranovic, T.; Ristovic, I. Multi-Criteria Approach for Selecting Optimal Dozer Type in Open-Cast Coal Mining. Energies 2019, 12, 2245. [Google Scholar] [CrossRef] [Green Version]
  69. Konstantinos, I.; Georgios, T.; Garyfalos, A. A Decision Support System methodology for selecting wind farm installation locations using AHP and TOPSIS: Case study in Eastern Macedonia and Thrace region, Greece. Energy Policy 2019, 132, 232–246. [Google Scholar] [CrossRef]
  70. Saaty, T.; Ozdemir, M. Why the magic number seven plus or minus two. Math. Comput. Model. 2003, 38, 233–244. [Google Scholar] [CrossRef]
  71. Karahalios, H. The application of the AHP-TOPSIS for evaluating ballast water treatment systems by ship operators. Transp. Res. Part D Transp. Environ. 2017, 52, 172–184. [Google Scholar] [CrossRef]
  72. Milentijević, G.; Nedeljković, B.; Lekić, M.; Nikić, Z.; Ristović, I.; Djokić, J. Application of a Method for Intelligent Multi-Criteria Analysis of the Environmental Impact of Tailing Ponds in Northern Kosovo and Metohija. Energies 2016, 9, 935. [Google Scholar] [CrossRef] [Green Version]
  73. Tanasijevic, M.; Jovancic, P.; Ivezic, D.; Bugaric, U.; Djuric, R. A fuzzy-based decision support model for effectiveness evaluation—A case study of the examination of bulldozers. Int. J. Ind. Eng. 2019, 26, 878–897. [Google Scholar] [CrossRef]
  74. Miodragović, R.; Tanasijević, M.; Mileusnić, Z.; Jovančić, P. Effectiveness assessment of agricultural machinery based on fuzzy sets theory. Expert Syst. Appl. 2012, 39, 8940–8946. [Google Scholar] [CrossRef]
  75. Hwang, C.L.; Yoon, K. Methods for multiple attribute decision making. In Multiple Attribute Decision Making; Springer: Berlin/Heidelberg, Germany, 1981; pp. 58–191. [Google Scholar] [CrossRef]
  76. Krohling, R.A.; Pacheco, A.G. A-TOPSIS—An Approach Based on TOPSIS for Ranking Evolutionary Algorithms. Procedia Comput. Sci. 2015, 55, 308–317. [Google Scholar] [CrossRef] [Green Version]
  77. Tanasijević, M.; Ivezić, D.; Jovančić, P.; Ćatić, D.; Zlatanović, D. Study of Dependability Evaluation for Multi-hierarchical Systems Based on Max-Min Composition. Qual. Reliab. Eng. Int. 2013, 29, 317–326. [Google Scholar] [CrossRef]
  78. Đenadić, S.; Jovančić, P.; Ignjatović, D.; Miletić, F.; Janković, I. Analysis of the application of multi-criteria methods in optimizing the selection of hydraulic excavators on open-cast coal mining. Tehnika 2019, 74, 369–377. [Google Scholar] [CrossRef] [Green Version]
  79. Bowles, J.; Pelaez, C. Application of fuzzy logic to reliability engineering. Proc. IEEE 1995, 83, 435–449. [Google Scholar] [CrossRef]
  80. Djenadic, S.; Tanasijevic, M.; Milisavljevic, V.; Ignjatovic, D.; Jovancic, P. Application of the Fuzzy Model in the Evaluation and Selection of Hydraulic Excavators on Open-Pit Lignite Mine. SSRN Electron. J. 2021. [Google Scholar] [CrossRef]
  81. Crnogorac, M.; Tanasijević, M.; Danilović, D.; Maričić, V.K.; Leković, B. Selection of Artificial Lift Methods: A Brief Review and New Model Based on Fuzzy Logic. Energies 2020, 13, 1758. [Google Scholar] [CrossRef] [Green Version]
  82. Kundu, S. The min-max composition rule and its superiority over the usual max-min composition rule. Fuzzy Sets Syst. 1998, 93, 319–329. [Google Scholar] [CrossRef]
  83. Jovančić, P. Održavanje Rudarskih Mašina; Univerzitet u Beogradu, Rudarsko-Geološki Fakultet: Beograd, Srbija, 2014; pp. 122–124. [Google Scholar]
  84. Ivković, S. Otkazi Elemenata Rudarskih Mašina; Univerzitet u Beogradu, Rudarsko-Geološki Fakultet: Beograd, Srbija, 1997; pp. 49–55. [Google Scholar]
Figure 1. Structural algorithm of the model.
Figure 1. Structural algorithm of the model.
Mathematics 10 00811 g001
Figure 2. Dependence of linguistic variables and membership function, the general form.
Figure 2. Dependence of linguistic variables and membership function, the general form.
Mathematics 10 00811 g002
Figure 3. Weak points according to damage risk.
Figure 3. Weak points according to damage risk.
Mathematics 10 00811 g003
Figure 4. Distribution of failures.
Figure 4. Distribution of failures.
Mathematics 10 00811 g004
Figure 5. Output values from the model composition.
Figure 5. Output values from the model composition.
Mathematics 10 00811 g005
Figure 6. Output values of Identification with a marked centre of gravity.
Figure 6. Output values of Identification with a marked centre of gravity.
Mathematics 10 00811 g006
Figure 7. Difference in dissipation.
Figure 7. Difference in dissipation.
Mathematics 10 00811 g007
Figure 8. Partial evaluations of the analysed WP and final RPN values.
Figure 8. Partial evaluations of the analysed WP and final RPN values.
Mathematics 10 00811 g008
Table 1. The linguistic descriptions of partial indicators grade.
Table 1. The linguistic descriptions of partial indicators grade.
GradeKeywordRisk of DamageRisk of Downtime
Occurrence
AO1, AO2ExtremelyDamage is expectedThe same working and downtime
BO1, BO2ProbablyHigh probability of damageFailures are frequent and repeated
CO1, CO2ModerateDamage is possibleOccasionally there is a failure
DO1, DO2RarelyLow probability of damageFailures are not frequent
EO1, EO2SlightlyThere is no danger of damageFailures are very rare
Severity
AS1, AS2ExtremelyES stability endangeredLong delay, great repairs needed
BS1, BS2SeriousGreat ES disturbanceSerious defect, frequent downtime
CS1, CS2ModeratePotential uncertainty presentThe failure can be repaired
DS1, DS2LightSlight disturbanceMinor ES failure, short downtime
ES1, ES2Very lowThe ES is not endangeredWorking without downtime
Detectability
AD1, AD2ImpossibleDamage detection is not possibleFailure cannot be prevented
BD1, BD2SlightlyDamage detection is complexLow failure recognition capability
CD1, CD2ModerateThere is a chance to locate the problemThere is a chance to locate the failure
DD1, DD2PossibleThe risky damage is easily locatedA failure is visible
ED1, ED2ObviouslyDamages can be preventedThe downtime is predictable
Table 2. AHP scale.
Table 2. AHP scale.
The Level of ImportanceNumerical ValueReciprocal Value
Extreme importance91/9 (0.111)
Very strong to extreme importance81/8 (0.125)
Very strong importance71/7 (0.143)
Strong to very strong importance61/6 (0.167)
Strong importance51/5 (0.200)
Moderate to strong importance41/4 (0.250)
Moderate importance31/3 (0.333)
Equal to moderate importance21/2 (0.500)
Equal importance11 (1.000)
Table 3. The random index values depending on number of elements (n).
Table 3. The random index values depending on number of elements (n).
n123456789101112131415
RI0.00.00.580.891.121.241.321.411.451.491.511.481.561.571.59
Table 4. Results of a questionnaire for P1.1.
Table 4. Results of a questionnaire for P1.1.
Expert No.PI‘A’‘B’‘C’‘D’‘E’
1.O 0.90.1
S0.80.2
D 0.60.4
2.O 0.30.7
S0.50.5
D 0.30.7
3.O 0.70.3
S0.40.6
D 0.80.2
4.O 0.50.5
S 0.80.2
D 1.0
5.O 0.60.4
S0.40.6
D 0.60.4
AverageO000.160.680.16
S0.420.540.0400
D000.240.580.18
Table 5. Input data for all segments of the analysis.
Table 5. Input data for all segments of the analysis.
WPPI‘A’‘B’‘C’‘D’‘E’WPPI‘A’‘B’‘C’‘D’‘E’
P1.1O000.160.680.16P2.2O0.220.620.1600
S0.420.540.0400S00.260.340.400
D000.240.580.18D000.060.540.40
P1.2O00.360.6400P2.3O00.060.340.460.14
S0.180.780.0400S00.200.280.320.20
D000.280.660.06D0.540.46000
P1.3O000.020.580.40P2.4O0.640.36000
S0.180.620.2000S00.820.1800
D000.100.540.36D000.220.660.12
P1.4O000.120.700.18P2.5O0.620.38000
S0.680.300.0200S00.540.4600
D0.040.400.400.160D0.380.380.2400
P2.1O0.360.620.0200P2.6O000.280.720
S000.440.340.22S000.500.500
D0000.200.80D00.440.380.260
Table 6. Fuzzification P1.1 according to partial indicator O.
Table 6. Fuzzification P1.1 according to partial indicator O.
j = 1j = 2j = 3j = 4j = 5j = 6j = 7j = 8j = 9j = 10
‘A’0 × 00 × 00 × 00 × 00 × 00 × 00 × 00 × 00 × 10 × 1
‘B’0 × 00 × 00 × 00 × 00 × 00 × 0.50 × 10 × 10 × 00 × 0
‘C’0.16 × 00.16 × 00.16 × 00.16 × 0.50.16 × 10.16 × 10.16 × 0.50.16 × 00.16 × 00.16 × 0
‘D’0.68 × 00.68 × 00.68 × 10.68 × 10.5 × 10.68 × 00.68 × 00.68 × 00.68 × 00.68 × 0
‘E’0.16 × 10.16 × 10.16 × 00.16 × 00.16 × 00.16 × 00.16 × 00.16 × 00.16 × 00.16 × 0
Σ0.160.160.680.760.660.160.08000
Table 7. The ranking of partial indicator according to P1.1.
Table 7. The ranking of partial indicator according to P1.1.
ParametersOSDWi
O1.000.330.500.163
S3.001.002.000.540
D2.000.501.000.297
λmax3.00921
n3
RI0.58
CI0.0046
CR0.00794
Table 8. The ranking of partial indicator according to all segments.
Table 8. The ranking of partial indicator according to all segments.
AHPP1.1P1.2P1.3P1.4P2.1P2.2P2.3P2.4P2.5P2.6
WO0.1630.5000.1440.1440.1630.3330.2000.1630.5400.163
WS0.5400.2500.4280.4280.5400.3330.4000.5400.2970.540
WD0.2970.2500.4280.4280.2970.3330.4000.2970.1630.297
λmax3.00923.03.03.03.00923.03.03.00923.00923.0092
CI0.00460.00.00.00.00460.00.00.00460.00460.0046
CR0.00790.00.00.00.00790.00.00.00790.00790.0079
Table 9. Input data for model composition.
Table 9. Input data for model composition.
ParametersOSD
Weight Coefficient0.1630.5400.297
Grades (ji)10.160000.000000.18000
20.160000.000000.18000
30.680000.000000.58000
40.760000.020000.70000
50.386670.040000.43333
60.160000.220000.24000
70.080000.560000.12000
80.000000.540000.00000
90.000000.420000.00000
100.000000.420000.00000
Table 10. Normalized and weighted decision matrix of parameters.
Table 10. Normalized and weighted decision matrix of parameters.
rij (Equation (8))pij (Equation (9))
jOSDOSD
10.141830.000000.167780.023120.000000.04980
20.141830.000000.167780.023120.000000.04980
30.602760.000000.540620.098260.000000.16048
40.673670.019920.652480.109820.010760.19368
50.342750.039830.403910.055870.021520.11990
60.141830.219080.223710.023120.118340.06640
70.070910.557660.111850.011560.301220.03320
80.000000.537750.000000.000000.290460.00000
90.000000.418250.000000.000000.225910.00000
100.000000.418250.000000.000000.225910.00000
Table 11. Determined positive and negative ideal solutions.
Table 11. Determined positive and negative ideal solutions.
OSD
A+0.109820.301220.19368
A0.011560.010760.03320
Table 12. Sum of alternative distance from positive and negative ideal solution and results of risk (R).
Table 12. Sum of alternative distance from positive and negative ideal solution and results of risk (R).
jSi+Siµi
10.344890.022910.06229
20.344890.022910.06229
30.303260.154370.33733
40.290460.188170.39314
50.294260.097960.24975
60.239090.113180.32129
70.188170.290460.60686
80.222910.281900.55843
90.235040.218010.48121
100.235040.218010.48121
Table 13. Identification results for all segments of the analysis.
Table 13. Identification results for all segments of the analysis.
P1.1P1.2P1.3P1.4P2.1P2.2P2.3P2.4P2.5P2.6
‘A’0.211570.164240.153350.219170.174960.167060.198670.156860.247370.15495
‘B’0.254060.230070.224920.237490.182800.221040.227520.320150.247180.16274
‘C’0.195570.254040.209490.218640.217310.209190.214410.199960.180050.26790
‘D’0.189540.189050.226830.177280.204880.219600.197850.176480.162240.25946
‘E’0.149260.162600.185400.147420.220050.183120.161560.146550.163170.15495
Table 14. Results of risk performance and standard deviations for all segments of the analysis.
Table 14. Results of risk performance and standard deviations for all segments of the analysis.
RPNP1.1P1.2P1.3P1.4P2.1P2.2P2.3P2.4P2.5P2.6
Zi3.18923.04432.93403.20372.88772.96963.10393.16433.25332.9033
Si0.037950.040690.030900.036740.020300.023880.024750.070190.043730.05829
Table 15. Results of different method applications.
Table 15. Results of different method applications.
RPNP1.1P1.2P1.3P1.4P2.1P2.2P2.3P2.4P2.5P2.6
M1Zi3.1893.0442.9343.2042.8882.9693.1043.1643.2532.903
Si0.03790.04070.03090.03670.02030.02390.02470.07020.04370.0583
M2Zi3.1503.0152.8743.2882.7532.9393.1313.2363.2082.891
Si0.04000.04170.03150.06320.04560.04730.02510.10770.04600.0630
M3Zi3.0173.0082.8743.1422.8362.9393.1123.1533.1932.841
Si0.03010.04060.03150.03140.02820.04730.02480.07030.04380.0779
M4Zi3.0853.0622.9343.2192.8542.9543.0883.0943.2152.907
Si0.06970.11870.07480.09030.05890.06370.05390.06840.05720.0794
M5Zi2.9613.0302.8543.1132.9142.9543.0443.1533.2062.907
Si0.07410.13820.06320.06790.06490.06370.05660.07800.06450.0794
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Djenadic, S.; Tanasijevic, M.; Jovancic, P.; Ignjatovic, D.; Petrovic, D.; Bugaric, U. Risk Evaluation: Brief Review and Innovation Model Based on Fuzzy Logic and MCDM. Mathematics 2022, 10, 811. https://doi.org/10.3390/math10050811

AMA Style

Djenadic S, Tanasijevic M, Jovancic P, Ignjatovic D, Petrovic D, Bugaric U. Risk Evaluation: Brief Review and Innovation Model Based on Fuzzy Logic and MCDM. Mathematics. 2022; 10(5):811. https://doi.org/10.3390/math10050811

Chicago/Turabian Style

Djenadic, Stevan, Milos Tanasijevic, Predrag Jovancic, Dragan Ignjatovic, Dejan Petrovic, and Ugljesa Bugaric. 2022. "Risk Evaluation: Brief Review and Innovation Model Based on Fuzzy Logic and MCDM" Mathematics 10, no. 5: 811. https://doi.org/10.3390/math10050811

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop