Open access peer-reviewed chapter

Risk Analysis, a Fuzzy Analytic Approach

Written By

Mahmoud Shahrokhi, Majid Vaziri Sarashk and Alain Bernard

Submitted: 21 August 2022 Reviewed: 10 October 2022 Published: 11 November 2022

DOI: 10.5772/intechopen.108535

From the Edited Volume

Risk Management, Sustainability and Leadership

Edited by Larisa Ivascu, Ben-Oni Ardelean and Muddassar Sarfraz

Chapter metrics overview

94 Chapter Downloads

View Full Metrics

Abstract

One of the challenges in designing industrial systems is integrating accident risk analysis with the other technical analysis tools. In the face of this challenge, this paper introduces an analytic approach to defining the occupational risk entities in computer-aided design software by visualizing the risk entities as geometric shapes. It uses energy/barrier analysis and the fuzzy set theory to model the protective role of barriers and infer the effects of harmful agents on humans and assets (targets). It defines dangers and targets presence zones by fuzzy sets, the so-called “fuzzy spaces” demonstrated as geometric profiles. The barriers affect these geometric profiles, and fuzzy union and intersection aggregate the effects of several dangers and protective measures. The model calculates the quantitative risk indexes for the various workplace points. The proposed model is adapted to evaluate the risk in the computer-aided design platform during the workplace simulation. An example illustrates the model application in a one-dimensional space.

Keywords

  • fuzzy theory
  • risk analysis
  • computer-aided design

1. Introduction

Järvinen et al. emphasized the potential of three-dimensional (3D) simulation models for implementing risk analysis without presenting any specific model [1]. Wang et al. developed an enhanced automated 3D visualization ergonomic analysis integrated with a proposed fuzzy logic-based joint-level ergonomic risk assessment methodology for work modification and workplace design [2]. Ojstersek et al. used the modeling and simulation method and ergonomic analyses in workplaces and presented potential opportunities for improving productivity and cost [3].

Despite many efforts, researchers have failed to develop practical risk management approaches in 3D platforms; implementing the new concurrent engineering approaches requires integrating safety-engineering techniques into the 3D design applications [4]. One of the significant challenges in this domain is the complexity of risk analysis due to the need to consider many system parameters that are very difficult to quantify. These parameters explain the characteristics of the harmful factors, their effect on vulnerable targets (humans, assets, and the environment), and the role of the safety barriers [5]. In the face of these challenges, this paper proposes an integrated risk analysis approach to develop the appropriate 3D risk analysis modeling tools for use through the design process by introducing geometric methods for modeling risk in computer-synthesized three-dimensional and virtual reality platforms.

Shahrokhi and Bernard use the “fuzzy space” concept to model danger zones, target presence zones, and physical and perceptual barriers by geometrical profiles [6]. This model visualizes and identifies the risk concentration points in the simulated workplace. The present paper uses fuzzy spaces to illustrate the risk distribution in the workplace and applies fuzzy operations to calculate a quantitative risk index.

Advertisement

2. Background

Risk is a function of the probability and the consequence of an unwanted top event in terms of possible damage to a target (i.e., property, environment, and people) [7]. Many researchers attempt to integrate risk analysis into computer-aided design applications. Määttä studied the applications of the virtual environment to analyze the safety of new designs in a steel factory [8]. Abshire and Barron review real-world applications of virtual maintenance and present the provided facilities using the virtual environment and digital prototypes for Failure Mode Effect Analysis (FMEA) during the design process [9]. Gallego et al. implemented an interesting geometric risk assessment method using the linguistic variables for occupancy degree and occupancy time to model the number of people exposed to a harmful agent (HA) [10]. Hendershot uses contour maps to calculate the risk by superposing the impact zones and population distribution for 11 regions [11].

Many efforts are taken to model barriers as an essential concept that, due to their variety, is very difficult to be modeled in geometric forms. The barrier concept was initially based on the successive works of domino theory back in the 1930s, Haddon in 1966 and Gibson in 1961, which developed the idea of an accident as an abnormal or unexpected release of energy [12]. It identifies and evaluates the associated hazards of the harmful agents [13]. Barrier analysis contributes to the energy analysis and represents the barrier as the protector of the target from dangers [14]. When avoiding or eliminating the dangerous agent and hazards is impossible, the designer adds a series of safety barriers to reduce the risk of the undesired outcomes to an acceptable level [15]. Polet and Zhang et al. state that the barriers prevent events or accidents, resurrect the target, and mitigate the severity of adverse consequences [16, 17]. Hollnagel distinguishes the protector and the preventive barriers. It defines a barrier as the “equipment, constructions, or rules that can stop the development of an accident” [18]. The same idea is the origin of the bow-tie diagram when categorizing the barrier effects by prevention and mitigation effects [19].

Tinmannsvik et al. modeled an accident that occurs by failing control barriers, controlling the hazards, and defense barriers that protect the target due to the transformation of the latent failures to the realized losses [20]. Fithri et al. conducted occupational safety and health risk analysis in manufacturing companies using FMEA and FTA methods [21]. The proposed model by Choe and Leite describes accident causation and improves accident investigation methods [22]. With construction domain knowledge, they offered a safety risk generation and control model representing the dynamic safety risk.

Despite many efforts, modeling the material and immaterial barriers reminds the fundamental challenges of modeling the risk in 3D computer applications.

Guimaraes and Lapa (a) and Guimarães and Lapa (b) used fuzzy inference systems to estimate risk priority numbers by aggregating the expert opinions in the failure mode and effects analysis (FMEA) method [23, 24]. Huang et al. developed a fuzzy set approach to integrating human error evaluation results in the event tree analysis [25]. Sadeghi et al. review the applications of design theories and methodologies and design tools and techniques to analyze and identify work situations to improve human safety in manufacturing system design [26]. Echeverri et al. (a) developed a design process’s risk analysis models by considering technological and human factors and using essential functions and the production system’s internal energy flow [27]. The proposed model integrated elements from the different design approach, considering cost, time, and performance, incorporating safety factors through energy functions and organizational rearrangements. Echeverri et al. (b) developed a multi-criteria design framework considering energy flow through components to characterize its behavior via Energetic Technical Functions [28]. Fargnoli reviewed the research addressing design for safety in the industrial context, focusing on those research approaches to integrate human factors within design activities [29]. He concluded that there is a research gap between theory and practice. He proposed a unified design for the safety process to support integrating human factors in design activities more practically.

The present paper introduces an analytic risk analysis approach by defining the danger, the target zones, and the effects of the barriers by geometric shapes.

Advertisement

3. Methodology

The presented method defines danger and target zones by fuzzy membership and probability density functions, illustrating them by geometric profiles in the 3D model.

3.1 Defining danger zones

A danger zone (DZ) is a portion of space where a harmful event may occur [10]. Shahrokhi and Bernard define fuzzy space to calculate every point x’s membership in the danger zone [6]. According to the fuzzy sets notification, the following formula uses the integral and division symbols to explain that DZ is a continuous fuzzy set and assigns membership μDZ˜xto each x in the workplace.

DZ˜=xμDZ˜xx0μDZ˜x1xX

As Figure 1 presents, in contrast to the classic definition, a member (e.g., a point) is not just inside or outside of a fuzzy danger zone (DZ˜); it may also have a degree of membership. Function μDZ˜x indicates the membership of point x in danger zone DZ˜.

Figure 1.

Demonstration of the dangerous zone around a moving car using (a) the traditional and (b) the fuzzy space definitions [6].

Figure 2 illustrates a mono-dimensional danger zone and shows how a HA decreases by increasing the distance from the danger source.

Figure 2.

Schematic demonstrations of a one-dimensional DZ˜.

A dangerous source can be an explosion, radiation, or a toxic gas leak. In all cases, a DZ˜ assigns a membership value μDZ˜x to each point, x. The DZ˜ form is a function of the physical characteristics of the danger and the environmental conditions. For example, for a punctual radioactive material, the radiation in a uniform environment decreases proportionally to the distance squared from the danger source.

3.2 Aggregating several danger zones

Fuzzy union apples on several dangers to form a total danger zone, as follows:

DZ˜=i=1nDZ˜i

The selection of an appropriate union method among standard union (max(a,b)), bounded sum (min(1,a + b)), and other fuzzy union operations are essential to simulate the actual effect of accumulated dangers on the target.

3.3 Defining the target zone

A fuzzy target zone (TZ˜) is also a fuzzy space, indicating the geographical distribution of the presence of the target:

TZ˜=xμTZ˜xx

The μTZ˜x is the normalized target population density (P(x)) or the target presence probability f(X) in point x. The following normalization formula converts the population density to a membership value by ensuring that the maximum membership value is 1:

μTZ˜x=PxSupxPx

It divides the population density of every point to their maximum (supremum) value for every x. For a target with random movement or stochastic existence, the model normalizes the probability function of the target presence, f(X), by using the following formula:

μTZ˜x=fxSupxfx

The membership function of TZ (i.e., μTZ˜x) indicates the distribution of the targets in the workplace. A fixed target creates a singleton fuzzy set target zone.

3.4 Modeling the barriers

The barriers limit danger and target zone(s) in several ways:

  • Danger barriers (DB˜s) impede or diminish the hazard’s harmfulness and affected area by modifying DZ˜.

  • Target barriers (TB˜s) modify TZ˜s by impeding or decreasing the target membership in the danger zone or separating the target and HA by time.

The proposed approach models the above barriers by using geometric shapes. Fuzzy barriers (i.e., TB˜s and DB˜s) illustrate the geographical distribution of barriers’ capability to impede the danger and target presence.

3.5 Modeling danger barriers

Figure 3ac exemplify danger barriers for the following cases, respectively:

  1. A gas mask reduces 60% of danger harmfulness

  2. A firewall that prevents 80% of the heat from passing through

  3. A hazard neutralization system with a Gaussian local efficiency

Figure 3.

Some schematic demonstration of danger barriers.

This approach uses fuzzy complement operation to transfer the danger barriers protection to danger barrier inefficiency (DBI˜) as follows

DBI˜=¬DB˜μDBI˜x=1μDB˜xxX

The risk exists when there is a danger and no barriers to neutralize the threat. Therefore, the practical (residual) danger zone equals the intersection of the original danger zone and the danger barrier inefficiency.

EDZ˜=DZ˜¬DB˜

The following equation is applied when barrier effectiveness is proportional (e.g., using percentages). It means that the barrier reduces a specified portion of the danger.

μEDZ˜x=μDZ˜x1μDB˜xxX

The following equation is valid when the barrier effectiveness is in absolute values (e.g., the barrier absorbs or filters a specified amount of the hazardous effects).

μEDZ˜x=Max0μDZ˜x1μDB˜xxX

3.6 Modeling target barriers

The exemplified TBs affect the TZ˜, For example, they may describe the following cases:

a detector, organizational measure or warning signs (Figure 4a), or a wall that prevents the presence of the target in a limited zone with specified reliability (Figure 4b), and a thermal protective cloth which controls 30% of the outside temperature from colliding with the wearer body (Figure 4c).

Figure 4.

Some schematic demonstration of target barriers.

Some protective measures may affect both the DZ˜ and TZ˜ simultaneously; for example, Figures 3b and 4b model effects of the same protection wall on the DZ˜ and TZ˜, respectively.

3.7 Cumulative effects of several barriers

There are cumulative effects where two or several barriers are practical at the same place and time. The fuzzy union operator aggregates a set of J danger barriers and a set of K target barriers as effective danger barriers and practical target barriers, using the following formulas:

EDB˜x=j=1JDB˜jx
ETB˜=k=1KTB˜k

Fuzzy spaces EDB˜ and ETB˜ are the effective danger zone barrier and effective target barrier, respectively.

The definition of the fuzzy union in the above equations varies according to the cumulative barrier effects. The proposed approach defines serial and parallel barriers. In a serial barrier configuration, the danger must pass from all obstacles to impact the target (e.g., the consecutive antifire doors); in this case, the bounded sum (min(1, a + b)) is one of the appropriate s-norms if the danger reduced after passing from each barrier.

The standard union (i.e., max(a,b)) is a helpful s-norm when the most effective barrier is essential in limiting the danger zone or target presence zones.

In a parallel structure, it is sufficient for the threat to pass through one of the guards to impact the target. The analyst may consider the most unreliable barrier as the weakest link in the protection chain. A fuzzy intersection operator such as the standard intersection (e.g., min(a,b)) aggregates the parallel safety measures as effective danger follows:

EDB˜=j=1JDBj˜
ETB˜=k=1KTB˜k

3.8 Barriers inefficiency

Appling fuzzy compliment operator on “effective danger barriers” and “effective target barriers” results in “danger barriers inefficiency” and “target barriers inefficiency,” respectively, as follows:

IDB˜=¬DB˜
ITB˜=¬TB˜

Operator ⌐ means fuzzy complement (fuzzy NOT) operation. The standard complement (⌐a = 1-a) is one of the most suitable fuzzy complementation methods. However, also there are other alternatives for this operator.

μIDB˜x=1μDB˜xxX
μITB˜x=1μTB˜xxX

3.9 Apply barrier effects to the danger zone

Danger remains in dangerous places, but there is not enough protection; this means that the residual (effective) hazard at each point equals the intersection of the threat and the barriers inefficiency at that point. Therefore effective danger for every danger zone is:

EDZ˜=DZ˜IDB˜

In the same way, a practical target presence zone is:

ETZ˜=TZ˜ITB˜

Using the EDZ˜ and ETZ˜, the fuzzy risk zone is:

RZ˜=EDZ˜ETZ˜

In this case, multiplication is one of the alternatives for fuzzy intersection operation.

3.10 Determining the fuzzy risk zone

The proposed risk analysis approach uses the fundamentals of energy analysis and considers an accident resulting from the impact of a harmful agent (energy) on a target. Therefore, the fuzzy risk zone (RZ˜)is an intersection area of a DZ˜and a TZ˜. The risk analyst should select the most appropriate fuzzy intersection operator (i.e., triangular norms (t-norm)) to reflect the accident consequence best. Triangular norms are indispensable for interpreting the conjunction in the intersection of fuzzy sets. One of the simplest choices is the product intersection, defined as:

RZ˜=DZ˜TZ˜
μRZ˜x=μDZ˜xμTZ˜xxX

This formula uses the concept that the accident importance equals the multiplication of the hazard amplitude and the target presence probability or density. Other t-norms may be more appropriate for specific cases.

Figure 5 illustrates the distribution of targets in the neighborhood of a supposed hazard source.

Figure 5.

Schematic demonstrations of a one-dimensional TZ˜.

Figure 6a shows both DZ˜ and TZ˜, and Figure 6b illustrates the resulting risk zone using the algebraic product t-norm as the fuzzy intersection operator. The horizontal axis corresponds to the distance from the hazard source. The vertical axis illustrates the risk index function; thus, risk zone (RZ˜) presents the geographic distribution of the risk amplitude.

Figure 6.

Schematic demonstrations of one-dimensional DZ˜, TZ˜, and RZ˜.

If the hazardous effects of several dangers are not similar, RZ˜ should be calculated separately for different hazards.

Advertisement

4. Examples

This section presents a numerical example using fuzzy discrete sets.

4.1 Numerical example

Suppose three similar dangers produce danger zones DZ1 to DZ3, limited by three serial danger barriers DB1 to DB3 with the following parameters (Tables 1 and 2):

ParameterParameter descriptionValues
xOne-dimensional coordinates (x)012345
μDZ˜1xMembership of x in DZ110.80.60.40.20.1
μDZ˜2xMembership of x in DZ20.80.910.50.40.1
μDZ˜3xMembership of x in DZ30.20.60.80.80.50.4
μDB˜1xMembership of x in DB10.10.20.30.20.10.1
μDB˜2xMembership of x in DB20.10.10.10.10.10.1
μDB˜3xMembership of x in DB30.00.00.20.00.00.0

Table 1.

The risk entities parameters.

xOne-dimensional coordinates (x)012345
μEDB˜xMembership in Effective Danger Barrier0.20.30.60.30.20.2

Table 2.

Membership of different coordinates in effective danger barriers fuzzy set.

Because the danger barriers are supposed on serial, the model accumulates their effects. For this example, using bounded sum fuzzy union (μDB˜1DB˜2x=min1μDB˜1x+μDB˜2x), the effective danger barrier is:

Therefore, the danger barriers inefficiency zones are (Table 3).

xOne-dimensional coordinate (x)012345
μIDB˜xMembership in Danger Barriers Inefficiency0.80.70.40.70.80.8

Table 3.

Membership of different coordinates in effective danger barrier inefficiency fuzzy set.

Suppose the barriers reduce some specific proportion of the danger, so the residual danger zones after applying the above barriers, by using EDZ˜=DZ˜IDB˜ and the Algebraic product (μEDZ˜x=μDZ˜xμIDB˜x) intersection are (Table 4).

xOne-dimensional coordinates (x)012345
μEDZ˜1xMembership in Residual DZ10.80.560.240.280.160.08
μEDZ˜2xMembership in Residual DZ20.640.630.40.350.320.08
μEDZ˜3xMembership in Residual DZ30.160.420.320.560.40.32

Table 4.

Membership of different coordinates in residual fuzzy danger zones.

Consider 4 targets, using the following protective barriers for targets T1 to T4 (Table 5).

xOne-dimensional coordinate (x)012345
μTB˜1xTarget Barrier effect, used by T10.20.20.20.20.20.2
μTB˜2xTarget Barrier effect, used by T20.30.30.30.20.10.1
μTB˜3xTarget Barrier effect, used by T30.40.40.40.40.40.4
μTB˜4xTarget Barrier effect, used by T40.10.10.10.10.10.1

Table 5.

Membership of different coordinates in fuzzy target barriers.

The above values indicate the protectives proportion of targets barriers used by different targets in different places. Using the fuzzy complement, the Inefficiency of the above protective measures is (Table 6).

xOne-dimensional coordinates (x)012345
μ¬TB˜1xInefficiency of target barrier 10.80.80.80.80.80.8
μ¬TB˜2xInefficiency of target barrier 20.70.70.70.80.90.9
μ¬TB˜3xInefficiency of target barrier 30.60.60.60.60.60.6
μ¬TB˜4xInefficiency of target barrier 40.90.90.90.90.90.9

Table 6.

Membership of different coordinates in residual fuzzy target barriers Inefficiency.

The impacted dangers 1 to 3 to target 1, to target 1, after applying target barrier 1 is (Table 7).

xOne-dimensional coordinates (x)012345
μEDZ˜11xT1 membership in Residual FDZ10.640.4480.1920.2240.1280.064
μEDZ˜12xT1 membership in Residual FDZ 20.5120.5040.320.280.2560.064
μEDZ˜13xT1 membership in Residual FDZ 30.1280.3360.2560.2560.320.256
Membership in Total Danger Zone for T1110.7680.760.7040.384

Table 7.

Membership of different coordinates in residual fuzzy danger zones.

In the above table, the model uses the bounded sum union to calculate the accumulated danger in each position.

In the same way, the total impacted danger for all the targets is (Table 8).

xOne-dimensional coordinates (x)012345
T1 Membership in Total Danger Zone110.7680.760.7040.384
T2 Membership in Total Danger Zone110.6720.760.7920.432
T3 Membership in Total Danger Zone0.960.9660.5760.570.5280.288
T4 Membership in Total Danger Zone110.8640.8550.7920.432

Table 8.

Membership of different coordinates in total fuzzy danger zones.

Suppose the position of the targets is a random variable with the following 132probabilities (Table 9).

xOne-dimensional coordinates (x)012345
P1xPresence probability of T100.10.20.30.20.3
P2xPresence probability of T20.10.20.20.20.30
P3xPresence probability of T3000.40.50.10
P4xPresence probability of T4001000

Table 9.

Presence probability of targets in different coordinates.

Therefore the total risk for every target at each position is (Table 10).

xOne-dimensional coordinates (x)012345
RZ˜1xTotal risk for T100.10.1540.2280.1410.115
RZ˜2xTotal risk for T20.10.20.1340.1520.2380
RZ˜3xTotal risk for T3000.2300.2850.0530
RZ˜4xTotal risk for T4000.864000
RZ˜xTotal risk0.10.31.3820.6650.4310.115

Table 10.

Total risk for targets in different coordinates.

The following figure shows the distribution of the danger (Figure 7).

Figure 7.

The distribution of the risk for the targets.

The above chart shows that the most dangerous place is point 2, with a total risk index of 1.382, and particularly the risk for target 4 is very high at this point.

In the continue consider a target presence barrier with the following reliabilities (Table 11).

xOne-dimensional coordinate (x)012345
P1xThe presence barrier reliability for T100.10.30.10.10
P2xThe presence barrier reliability for T2000.20.20.20
P3xThe presence barrier reliability for T3000.40.10.10
P4xThe presence barrier reliability for T4000.8000

Table 11.

The effects of presence barriers for targets in different coordinates.

It impedes particularly the targets presented in point 2. The Inefficiency of this barrier is (Table 12).

xOne-dimensional coordinates (x)012345
P1xThe presence barrier inefficiency for T110.90.70.90.91
P2xThe presence barrier inefficiency for T2110.80.80.81
P3xThe presence barrier inefficiency for T3110.60.90.91
P4xThe presence barrier inefficiency for T4110.2111

Table 12.

The effects of presence barriers Inefficiency for targets in different coordinates.

Using algebraic product fuzzy intersection, the presence probability of the targets is (Table 13).

xOne-dimensional coordinates (x)012345
P1xModified presence probability of T100.090.140.270.180.3
P2xModified presence probability of T20.10.20.160.160.240
P3xModified presence probability of T3000.240.450.090
P4xModified presence probability of T4000.2000

Table 13.

The modified presence probability of targets in different coordinates.

By applying algebraic product fuzzy intersection on target presence probability and targets membership in danger zones, the total risk for the targets is (Table 14).

xOne-dimensional coordinates (x)012345
RZ˜1xTotal risk for T100.090.1080.2050.1270.115
RZ˜2xTotal risk for T20.10.20.1080.1220.1900
RZ˜3xTotal risk for T3000.1380.2570.0480
RZ˜4xTotal risk for T4000.173000
RZ˜xTotal risk0.10.290.5260.5830.3640.115

Table 14.

The total risk for targets in different coordinates.

The following chart illustrates the risk after applying this barrier (Figure 8).

Figure 8.

The distribution of the risk for the targets, after applying the presence target.

The results indicate a reduction in the risk significantly.

Advertisement

5. Discussion

The proposed fuzzy analytical approach attempts to simplify the complexity of the traditional risk analysis by demonstrating the geometric profiles of risk analysis entities. This method models dangers, target presence, material, and immaterial barriers and provides a communication/analysis tool in graphical design platforms.

By using this approach in simulation applications, danger, target, and value attributes may vary during the simulated period. For instance, the magnitude of the HA and target position may vary according to the target and HA position. A software may calculate these parameters for each of the simulation sequences separately. The duration of simulation sequences is essential for calculating a total risk index for a simulated operation.

Shahrokhi and Bernard (2006) presented more discussion about the target vulnerability and worth. An event tree analysis may calculate the probability of occurrence of the simulated conditions. Defining the danger zone and target presence zone provided an index for quantitative risk analysis. The quantitative approaches require carefully scaling factors. For a fixed target, the presence zone will have infinite amplitude. The adaptability of fuzzy operations provides excellent flexibility to tailor the model according to typical situations. The method improves by considering several risks for a group of targets by applying fuzzy operations. Though the impact mode, including the impact duration and direction, is fundamental to estimating the accident severities, authors believe that in many risk analysis methods, including energy/barrier analysis, the assumptions related to the impact mode are not robust and sufficient.

Most of the barriers have not only protection effects; they relocate or reform DZ or TZ. For example, a protection wall increases the concentration of the DZ and TZ in a limited space.

Other fuzzy union operators can model the modification of the DZ/TZ by the barriers.

This model assumes a linear relationship between the damage and impact time because the presence zone demonstrates the duration of the target presence at each point. However, by defining the presence zone as the population density, the model ignores each target impact time. Like many other risk analysis methods, there is no assumption about other impact mode attributes. Therefore, the model’s validity depends on the system’s specifications. The model considers the danger zone as a stable and fixed region. In this case, the fundamentals theories are valid only for separated sequence times. A moving and dynamic danger zone is more appropriate if the danger source’s harmfulness or position is unstable. Shahrokhi and Bernard (2006) discussed this case.

This model is applicable for calculating the cumulative risk indexes for a group of targets and hazards.

Advertisement

6. Conclusion

This paper presents a graphical approach to explain the geographical distribution of the danger and target presence to show the results of scientific calculations, experts’ opinions, and observations. Using geographical risk attributes instead of their simple values provides a spatial risk analysis approach to present the workplace’s danger concentration points and neighborhoods. The model introduces a geometric definition for the probability and severity of the professional risk and material/immaterial barriers using the fuzzy space concept. This definition lets to separate the barriers’ severity and probability effects and use the fuzzy set operations to determine the risk and barrier effects. It assigns a risk membership to each workplace location and aggregates all points to provide a total risk index. The model is appropriate for calculating the cumulative risk indexes for a group of targets and hazards.

References

  1. 1. Järvinen J, Kuivanen R, Viitaniemi J. Safety design by using three-dimensional simulation models. International Journal of Industrial Ergonomics. 1996;17(4):343-350
  2. 2. Wang J, Li X, Han S, Al-Hussein M. Construction workers’ behavior assessment using 3D visualization and fuzzy logic method. In: Intelligent Construction and Sustainable Buildings 2020 Oct 14. Reston, VA: American Society of Civil Engineers; 2020. pp. 47-54
  3. 3. Ojstersek R, Buchmeister B, Vujica HN. Use of data-driven simulation Modeling and visual computing methods for workplace evaluation. Applied Sciences. 2020;10(20):7037
  4. 4. Shahrokhi M, Bernard A. A fuzzy accident risk analysis approach for a concurrent engineering platform. In: IFIP International Conference on Advances in Production Management Systems. Cham: Springer; 2021. pp. 351-360
  5. 5. De Ru WG, Eloff JH. Risk analysis modelling with the use of fuzzy logic. Computers & Security. 1996;15(3):239-248
  6. 6. Shahrokhi M, Bernard A. A fuzzy approach for definition of dangerous zone in industrial systems. In: 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No. 04CH37583). The Hague, Netherlands: IEEE; 10 October 2004;7:6318-6324. DOI: 10.1109/ICSMC.2004.1401392
  7. 7. Jo YD, Park KS. Dynamic management of human error to reduce total risk. Journal of Loss Prevention in the Process Industries. 2003;16(4):313-321
  8. 8. Määttä T. Virtual Environments in Machinery Safety Analysis. VTT Technical Research Centre of Finland; VTT Publications. 2003. Vol. 516. p. 170. Available from: https://publications.vtt.fi/pdf/publications/2003/P516.pdf
  9. 9. Abshire KJ, Barron MK. Virtual maintenance real-world applications within virtual environments. In: Annual Reliability and Maintainability Symposium. 1998 Proceedings. International Symposium on Product Quality and Integrity. Anaheim, CA, USA: IEEE; 1998. pp. 132-137. DOI: 10.1109/RAMS.1998.653690
  10. 10. Gallego LE, Duarte O, Torres H, Vargas M, Montana J, Pérez E, et al. Lightning risk assessment using fuzzy logic. Journal of Electrostatics. 2004;60(2–4):233-239
  11. 11. Hendershot DC. A simple problem to explain and clarify the principles of risk calculation. In: International Conference and Workshop on Risk Analysis in Process Safety. Bristol, UK: Rohm and Haas Company; 1997; Available online: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.7084
  12. 12. Livingston AD, Jackson G, Priestley K. Root causes analysis: Literature review. HSE Contract Research. 2001. p. 53
  13. 13. Harms-Ringdahl L. Assessing safety functions—Results from a case study at an industrial workplace. Safety Science. 2003;41(8):701-720
  14. 14. Guldenmund F, Hale A, Goossens L, Betten J, Duijm NJ. The development of an audit technique to assess the quality of safety barrier management. Journal of Hazardous Materials. 2006;130(3):234-241
  15. 15. Trost WA, Nertney RJ. Barrier Analysis. US Department of Energy; Ref. DOE 76-45/29, SSDC-29; 1995. p. 34
  16. 16. Polet P. Modélisation des franchissements de barrières pour l'analyse des risques des systèmes homme-machine (Doctoral dissertation, Valenciennes)
  17. 17. Zhang Z, Chaali A, Vanderhaegen F. A Comparative Study on Prediction of Human Operator Violation Using Neural Networks. In: 2004 IEEE International Conference on Systems, Man and Cybernetics. The Hague, Netherlands: IEEE; 10 October 2004;3:2599-2604. DOI: 10.1109/ICSMC.2004.1400722
  18. 18. Hollnagel E. Accident Analysis and Barrier Functions. Project TRAIN; Feb. 1999. Available from: https://www.researchgate.net/publication/251559941
  19. 19. De Dianous V, Fiévez C. ARAMIS project: A more explicit demonstration of risk control through the use of bow–tie diagrams and the evaluation of safety barrier performance. Journal of Hazardous Materials. 2006;130(3):220-233
  20. 20. Tinmannsvik R, Sklet S, Jersin E. Investigation methodology: Man, technology, organisation (in Norwegian only). SINTEF. October 2005. Report no.: STF38 A04422. Available from: http://www.ptil.no/NR/rdonlyres/63D64078–11AA–4AC7–931FA6A6CB790573/0/UlykkesgranskingSTF38A04422.pdf
  21. 21. Fithri P, Hasan A, Kurnia I. Risk analysis for occupational safety and health in manufacturing company using FMEA and FTA methods: A case study. In: IOP Conference Series: Materials Science and Engineering. 2020. IOP Publishing; 1 December 2020;1003(1):012073. DOI: 10.1088/1757-899x/1003/1/012073
  22. 22. Choe S, Leite F. Transforming inherent safety risk in the construction industry: A safety risk generation and control model. Safety science. 2020;124:104594
  23. 23. Guimaraes AC, Lapa CM. Effects analysis fuzzy inference system in nuclear problems using approximate reasoning. Annals of Nuclear Energy. 2004;31(1):107-115
  24. 24. Guimarães AC, Lapa CM. Fuzzy FMEA applied to PWR chemical and volume control system. Progress in Nuclear Energy. 2004;44(3):191-213
  25. 25. Huang D, Chen T, Wang MJ. A fuzzy set approach for event tree analysis. Fuzzy Sets and Systems. 2001;118(1):153-165
  26. 26. Sadeghi L, Dantan JY, Siadat A, Marsot J. Design for human safety in manufacturing systems: Applications of design theories, methodologies, tools and techniques. Journal of Engineering Design. 2016;27(12):844-877
  27. 27. Echeverri JC, Dantan JY, Godot X. Integrated design–multi-view approach for production systems design. Procedia CIRP. 2021;100:217-222
  28. 28. Echeverri JC, Dantan JY, Godot X. Design framework for production systems based on BES model–application in design for safety. Procedia CIRP. 2021;99:484-489
  29. 29. Fargnoli M. Design for safety and human factors in industrial engineering: A review towards a unified framework. In: Proceedings of the 11th Annual International Conference on Industrial Engineering and Operations Management. Singapore; 2021. pp. 7-11

Written By

Mahmoud Shahrokhi, Majid Vaziri Sarashk and Alain Bernard

Submitted: 21 August 2022 Reviewed: 10 October 2022 Published: 11 November 2022