Anda di halaman 1dari 7

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/258513152

Application of Fuzzy Logic for Risk Assessment


using Risk Matrix

Article · January 2013

CITATIONS READS

2 110

1 author:

Ossama Abul-Haggag
Cairo University
23 PUBLICATIONS 16 CITATIONS

SEE PROFILE

All content following this page was uploaded by Ossama Abul-Haggag on 06 October 2017.

The user has requested enhancement of the downloaded file.


International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)

Application of Fuzzy Logic for Risk Assessment using


Risk Matrix
Ossama Y. Abul-Haggag1, Walied Barakat2
1,2
Cairo University, Faculty of Engineering – Electrical Power & Machines Department
Abstract— Since the World War II, industrial risk  Subjective assessment of how big or important risks
analysis has been applied with success to many power, are.
nuclear, petroleum, and chemical sites. Along our day-to-  Subjective assessment of acceptable risk levels and
day life, we are all exposed to situation when we
automatically counter act of risk reduction or risk control.
effective controls
Risk assessment is a process of identifying and
quantifying of risk resulting from a specific event or II. PURPOSE OF RISK ASSESSMENT
scenario. Risk assessment is concerned with determining Above approaches are missing the principle of
those factors which are especially dangerous and ensuring identification of all risk, allocation of
determining the likelihood of unacceptable risk. [1]
This process of risk assessment is about risk
appropriate resources, and selection of best controls. This
quantification and determining appropriate controls. [2] was the origin of “Risk Assessment” or “Risk
The issue under this study is the application of Fuzzy Management” which is inherently an objective
Logic to develop a Fuzzy Model to enhance the risk determination of the most cost effective way of ensuring
assessment process which is dealing with uncertainties that that risk levels are acceptable and therefore controls are
arise in each phase of the risk assessment process. appropriate.
This process of risk assessment is about risk
Keywords— Fuzzy Logic, Risk Assessment, Risk quantification and determining appropriate controls.
Management, International Electrotechnical Commission's
Quantification is the step by which we measure how
(IEC), Fuzzy Inference System (FIS), MATLAB ®.
large and important each risk is, relative to each other.
This allows us to prioritize risks for attention and
I. INTRODUCTION
appropriately allocate resources between the risks to
Along our day-to-day life, we are all exposed to manage them. Determining appropriate controls for each
situation when we automatically of risk reduction or risk risk involves a process which considers what would be an
control. acceptable level of risk and which controls would most
cost effectively reduce risk.
Risk assessment matrix is a tool to conduct subjective
risk assessment. The bases for risk matrix are the
definition of risk as a combination of severity of the
consequences occurring in a certain accident scenario and
its frequency.
Although the conventional Risk Matrix provides a
standard tool for treating the relationship between the
severity of consequences and the likelihood (probability)
in assessing process risks, it has a disadvantage of
uncertainties.

III. BETTER RISK QUANTIFICATION


FIGURE I CONTINUOUS PROCESS FOR RISK ASSESSMENT [3] Risk level = Consequence x Likelihood. So in order to
Managing risk -by nature- is about: estimate the risk level of a particular scenario we need to
estimate the consequences of that scenario and the
 Insurance coverage likelihood of that particular consequence occurring. Two
 Complying with constitutional requirements approaches are available for estimating risk. [2]
 Establishing an Emergency Response Plan
 Relying on personal experience by making sure you A. Single point on the curve estimations
don’t make the same mistake twice. The first approach is called “Single Point Estimation”.
 Relying on personal experience to determine In this approach, we only estimate one point on the risk
appropriate controls profile curve and use this as an estimation of the area
under the curve.

49
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
For example considering the Risk of burning down a Because we are using one point to approximate the
$1M building, following are the risk variables. area under the risk profile curve, the point with the
Consequences of burning the building = $1M, Likelihood highest risk value should be used – ie. the highest product
of $1M consequence (likelihood of fire per year) = 0.5% of consequence and likelihood value. For example,
/y. Therefore Risk = C x L = $1M x 0.005/y = $5,000/y. should we pick the point with a $1M consequence or the
As a matter of fact, most risks are not a point but are point with a $10K consequence to approximate the risk
actually a curve on a Consequences Vs Likelihood graph profile. It may take a bit of practice to develop an
or a risk profile. intuition as to which point will have the highest risk level
but if you are in doubt and the risk is important enough
B. Curve Estimations
(remember the value proposition) estimate other points
The second approach is called “Multiple point on the curve to determine which has the highest risk
estimations”. This is about estimating multiple points on value.
the curve to approximate the curve and then estimate the
area under the approximate curve. IV. FUNDAMENTAL QUANTIFICATION METHOD ERRORS
If we consider the same example estimating the Risk
of burning down a $1M building, then to quantify the risk A. Estimating the Likelihood of a Lesser Consequence
of fire to a $1M building, we would have to quantify the A common reason for over estimation of risk levels is
likelihood of a fire doing $1K damage to the building, estimating the likelihood of a scenario before estimating
$10K damage to the building, $1M damage to the the consequences of a scenario. This often causes over
building and every possible consequence in between. If estimation because you may not be estimating the
we developed this profile it might look something like likelihood of a lesser consequence.
below. For example the likelihood of a fire (a minor fire) in
the building maybe 20% per year, while the likelihood of
a fire which destroys the building maybe 1% per year. If
we used the likelihood of a fire (20%) in our calculations
rather than the likelihood of fire burning down the
building (1%) we would be over estimating the fire risk
level by a factor of 20. Only use the likelihood of
incurring the consequences you have previously
estimated.
B. Measuring Inherent Risk
Inherent risk is defined as the risk level without
controls in place. In the past trying to quantify Inherent
FIGURE II RISK ESTIMATION CURVE Risk was a popular method of conducting risk
The risk level is actually represented by the area under assessments but it is now much less popular as people
the curve. This leaves us with a bit of a problem because have come to understand the fault of this method.
not only is the curve a much more time consuming to The Inherent Risk method is faulty for a number of
estimate than a point but it is also much harder to reasons including:
estimate the area under the curve than the simple C x L  The purpose of a Risk Assessment is to help allocating
calculation for a point. resources based on the needs of the actual business
In practice, single point estimations are normally environment. If we artificially remove controls, we are
accurate enough for most risks except for some very not measuring the actual environment. We are
large risks or risks with expensive potential controls. In measuring an artificial one, which then doesn’t
any case, it is a good idea to start with a single point risk resemble the actual one.
quantification to filter the large risks from the smaller  The past proponents of this method argued that because
ones. You can then use more sophisticated methods on controls could fail, the inherent risk gave a better
the larger risks if warranted. picture of what would happen if controls failed. But
again this is not the real world. If you are quantifying
C. Increasing Quantification Accuracy the current (actual) risk level correctly the estimation of
The most accurate single point method is the use of a the likelihood of incurring a particular consequence
number and unit to estimate consequences ($) and a should take into account the probability of controls
number and unit to estimate likelihood (likelihood per failing.
year). The estimates are then placed in the equation C x L  In practice it was difficult to decide which controls to
= R. The unit for risk then becomes $/y. Refer to Single remove because each risk has a large number of
Point Risk Estimation Example above. tangible, less tangible, direct and indirect controls.
50
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
C. Not Including all Areas of Impact Risk Quantification has a number of inaccuracies and
 Make sure all the consequences of a possible event are uncertainties, like the estimation of the likelihood of an
included in the estimation of the consequences. If you event occurring.
leave any consequences out you will understate the
consequences and the risk level. VI. BASIC DEFINITIONS
All safety standards exist to reduce risk, which is
V. THE RISK QUANTIFICATION MATRIX inherent wherever manufacturing or processing occurs.
The risk quantification matrix is a very popular risk A. Value Proposition
quantification tool. The matrix can be reasonably
If we are to cost effectively manage risk, than we can’t
accurate or very inaccurate depending on how the matrix
spend large amounts of time quantifying every risk. On
is designed. Some potential matrix errors include:
the other hand we have to quantify risks accurately
A. Qualitative matrix: enough to appropriately allocate resources between them
These matrixes measure consequences and likelihood and help us make decisions on which controls cost
in terms of words only, without defining the words with effectively reduce the risks to acceptable levels. [2]
units. Measuring consequences and likelihood in terms of This brings up the term “Value Proposition” as that the
words is highly subjective. sophistication of any risk assessment must be
proportionate to the size of risk, cost of controls or the
B. Scaling errors value which could be gained from conducting the risk
These errors are introduced if the matrix has uneven or assessment.
inconsistent consequences and likelihood scales. The B. Tolerable Risk
errors are also introduced if the risks are positioned on
the boundaries of the consequence and likelihood scales. There is a point where risk becomes unacceptable or
“intolerably high”. Where there is –equally- a point
C. Scaling band width approximations where the risk is accepted as negligible. The area of the
These inaccuracies are due to the band width of the tolerable risk is bounded between these two points. [5]
consequence and likelihood categories. For example,
Moderate = $250k to $1M. This band width means that
risks, which maybe orders of magnitude different in size,
are given the same risk ranking. Accordingly, it is
possible that a $50K per year risk ($1M x 1/20y) and a
$50 per year risk ($250k x 1/5,000y) are both called a
level 3 risk.

FIGURE IV TOLERABLE RISK

C. Risk Reduction
Risk reduction is about taking action to minimize
either the likelihood of the risk developing, or its effects.
But a question is still there: How safe is safe? Or how
much does the risk need to be reduced?
There are two approaches to find an answer to these
questions. Quantitative Method: It involves quantifying
FIGURE III EXAMPLE MATRIX WITH SCALING AND BAND WIDTH
APPROXIMATION ERRORS
all the inherent risks which are associated with each
hazardous event and compare the sum to the level of risk
Because of these problems, using the matrix for large which has been identified as tolerable. Qualitative
or important risk should consider that the matrix should Method: This method is about using qualitative ranking
not be a Qualitative Matrix and it should be designed to considering consequence & likelihood. [5]
reduce scaling errors.

51
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
VII. FUZZY LOGIC For applying fuzzy, a category shall be selected for
Fuzzy logic is a set of mathematical principles for each variable in order to establish the fuzzy sets which
knowledge representation based on degrees of are characterized by a membership function with varying
membership. It deals with degrees of membership and values in the interval [0, 1].
degrees of truth. It reflects how people think and attempts The typical standard risk matrix shown in figure VIII
to model our sense of words, our decision making and is used in this work.
our common sense. [6]

FIGURE V BOOLEAN LOGIC VERSUS MULTI-VALUED LOGIC

FIGURE VIII TYPICAL STANDARD RISK GRAPH MODEL

The layout of this risk matrix layout is presented in


MIL-STD-882D and categories of the severity and levels
of probability are presented as follows:
TABLE I
SUGGESTED MISHAP SEVERITY CATEGORIES

FIGURE VI FUZZY AGE-CLASSIFICATION SCHEME

The basic structure of a fuzzy inference system


consists of three conceptual components: a rule base,
which contains a selection of fuzzy rules; a database
which defines the membership function used in the fuzzy
rules; and a reasoning mechanism which performs the
inference procedure upon the rules and given facts to
derive a reasonable output or conclusion.

TABLE II
SUGGESTED MISHAP PROBABILITY LEVELS

FIGURE VII BASIC STRUCTURE OF FUZZY SYSTEMS

VIII. FUZZY RISK MATRIX


In the light of the work presented in the Fuzzy Risk
Graph Model for Determining Safety Integrity Level
presented by R. Nait [4] for the application of fuzzy logic
to conventional risk graph, the scope of work under this
work is to apply fuzzy logic to conventional risk matrix
in order to get benefit of the fuzzy logic potential to
overcome uncertainties and imprecision to solve
problems where there are no sharp boundaries and
precise values for the risk matrix parameters (severity of
the consequences, and its frequency).

52
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
For the purpose of this work, equally distributed Mamdani method was selected against sugeno method
ranges have been assigned to each risk level as shown in due to the reason that Mamdani is widely accepted for
table III: capturing expert knowledge and it allows us to describe
TABLE III
the expertise in more intuitive, more human-like manner.
CASE STUDY RISK LEVELS On the other hand, Sugeno method is computationally
efficient and works well with optimization and adaptive
techniques, which makes it very attractive in control
problems, particularly for dynamic nonlinear systems.
All possible combinations of crisp input patterns have
been used for all of the risk graph parameters using the
five Defuzzification methods (Centroid, Bisector, MOM,
LOM, and SOM). Each crisp input was tested over three
In this research the Gaussian type of membership values within its range as simulated in figure X.
function was selected as the most natural and popular
choice for these systems.
figure IX presents the fuzzy sets and its membership
function for each variable used in the fuzzy risk
assessment matrix.

FIGURE X FUZZY RISK GRAPH MODEL TESTING

Results of the test combinations are summarized in


figure XI below.

FIGURE IX RISK MATRIX MEMBERSHIP FUNCTIONS

Because the likelihood values are logarithmically


spaced, the likelihood is presented over logarithmic scale
and a LOG function has been applied as shown in figure
IX.
Matlab was used to apply fuzzy logic to develop a
fuzzy risk matrix. FIGURE XI DEFUZZIFICATION METHODS’ TEST FOR SAFETY FUZZY
RISK GRAPH

53
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
Following figure XII, shows how aggregating MF’s The developed Risk Matrix has been applied to a
tells the risk level in a fuzzy manner rather than standard risk matrix scheme and risk values have been
following the complex defuzzification methods and verified against those determined through the
experiencing such deviations. conventional standard risk matrix.
This figure illustrates one of the test cases with the In addition, the developed model was examined using
parameters’ input pattern shown in Table IV below. different defuzzification methods to retrieve best
TABLE IV
matching risk values in comparison to those determined
TEST INPUT PATTERN FOR SAFETY FUZZY RISK GRAPH by the conventional model.
Conventional risk matrix is simple to be implemented,
Linguistic Value Calibrated Range but it leads to inconsistent possible results. One side of
Likelihood Probable (B) 0 : -1 applying risk matrix method is based on using qualitative
risk parameters is a subjective process. The other side is
Severity Negligible (IV) 2 : 10
using of numerical interpretation of risk parameters by
RISK (CONV) M
means of crisp intervals violates the real life gradual
transition between intervals.
Linguistic Value Range Test Value The work presented in this paper should be concluded
Likelihood Cc -0.75 as follows:
Severity Fa 4.2  Use of Fuzzy logic has a positive impact when
RISK (CRISP) 33 applied to conventional risk matrix for the risk
determination process.
 The developed fuzzy risk matrix has demonstrated
the wide acceptance of Mamdani FIS for capturing
expert knowledge and allowing description of the
expertise in more intuitive, more human-like
manner.
Fuzzy logic toolbox available under Matlab® does not
allow fuzzy inference computing with logarithmic scales.
In future this work has to be extended for soft
implementation to include the mathematical
interpretations of logarithmic scales.
A second work (in future) will explore the use of
Neuro-Fuzzy technique for automated optimization of
risk matrix parameter targeting to eliminate the test
deviations to NIL and solve the dilemma of selecting the
best defuzzification method among Mamdani different
supported defuzzification methods.
One more issues will be of great interest to be
FIGURE XII AGGREGATION OF FIRED MEMBERSHIP FUNCTIONS
explored in the future, for using fuzzy inputs to the fuzzy
Aside from defuzzifying the Fuzzy Inference System risk matrix model instead of using crisp inputs.
(FIS), to get a crisp risk value and to stay away from the REFERENCES
complexity of selecting the most suitable defuzzification
[1 ] John Duffus & Howard Worth 2001. “Risk Assessment & Risk
method among those five defuzzification methods, the Management” by IUPAC. The Science of Chemical Safety
aggregated MF’s can easily represent the value of the risk Essential Toxicology #6.
in a fuzzy way. [2 ] Tony Matthew, Riskcentral 114 536 033. “Advanced Risk
As it is demonstrated in figure XII -away from the Assessment”
dilemma of the defuzzification- the generated MF’s [3 ] BASF, Workshop Bieleschweig #4 14./15/9.2004. “Risk Matrix
pattern tells that this scenario tends to be a medium risk as a Tool for Risk Assesment”.
level. [4 ] R. Nait-Said, F.Zidani, and N.Ouzraoui. “Fuzzy Risk Graph
Model for Determining Safety Integrity Level” by Hindawi
Publishing Corporation. Volume 2008, Article ID 263895.
IX. CONCLUSION [5 ] “Understanding Safety Integrity Level” by Magnetrol
This work demonstrated that fuzzy logic theory can International in 2011. Bulletin 41-299.3.
serve as a decision support technique in SIL [6 ] F. Martin McNeill and Ellen Thro. 1994. “FUZZY LOGIC A
PRACTICAL APPROACH” by Academic Press Professional,
determination. Inc. San Diego, CA, USA.

54

View publication stats

Anda mungkin juga menyukai