discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/258513152
CITATIONS READS
2 110
1 author:
Ossama Abul-Haggag
Cairo University
23 PUBLICATIONS 16 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ossama Abul-Haggag on 06 October 2017.
49
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
For example considering the Risk of burning down a Because we are using one point to approximate the
$1M building, following are the risk variables. area under the risk profile curve, the point with the
Consequences of burning the building = $1M, Likelihood highest risk value should be used – ie. the highest product
of $1M consequence (likelihood of fire per year) = 0.5% of consequence and likelihood value. For example,
/y. Therefore Risk = C x L = $1M x 0.005/y = $5,000/y. should we pick the point with a $1M consequence or the
As a matter of fact, most risks are not a point but are point with a $10K consequence to approximate the risk
actually a curve on a Consequences Vs Likelihood graph profile. It may take a bit of practice to develop an
or a risk profile. intuition as to which point will have the highest risk level
but if you are in doubt and the risk is important enough
B. Curve Estimations
(remember the value proposition) estimate other points
The second approach is called “Multiple point on the curve to determine which has the highest risk
estimations”. This is about estimating multiple points on value.
the curve to approximate the curve and then estimate the
area under the approximate curve. IV. FUNDAMENTAL QUANTIFICATION METHOD ERRORS
If we consider the same example estimating the Risk
of burning down a $1M building, then to quantify the risk A. Estimating the Likelihood of a Lesser Consequence
of fire to a $1M building, we would have to quantify the A common reason for over estimation of risk levels is
likelihood of a fire doing $1K damage to the building, estimating the likelihood of a scenario before estimating
$10K damage to the building, $1M damage to the the consequences of a scenario. This often causes over
building and every possible consequence in between. If estimation because you may not be estimating the
we developed this profile it might look something like likelihood of a lesser consequence.
below. For example the likelihood of a fire (a minor fire) in
the building maybe 20% per year, while the likelihood of
a fire which destroys the building maybe 1% per year. If
we used the likelihood of a fire (20%) in our calculations
rather than the likelihood of fire burning down the
building (1%) we would be over estimating the fire risk
level by a factor of 20. Only use the likelihood of
incurring the consequences you have previously
estimated.
B. Measuring Inherent Risk
Inherent risk is defined as the risk level without
controls in place. In the past trying to quantify Inherent
FIGURE II RISK ESTIMATION CURVE Risk was a popular method of conducting risk
The risk level is actually represented by the area under assessments but it is now much less popular as people
the curve. This leaves us with a bit of a problem because have come to understand the fault of this method.
not only is the curve a much more time consuming to The Inherent Risk method is faulty for a number of
estimate than a point but it is also much harder to reasons including:
estimate the area under the curve than the simple C x L The purpose of a Risk Assessment is to help allocating
calculation for a point. resources based on the needs of the actual business
In practice, single point estimations are normally environment. If we artificially remove controls, we are
accurate enough for most risks except for some very not measuring the actual environment. We are
large risks or risks with expensive potential controls. In measuring an artificial one, which then doesn’t
any case, it is a good idea to start with a single point risk resemble the actual one.
quantification to filter the large risks from the smaller The past proponents of this method argued that because
ones. You can then use more sophisticated methods on controls could fail, the inherent risk gave a better
the larger risks if warranted. picture of what would happen if controls failed. But
again this is not the real world. If you are quantifying
C. Increasing Quantification Accuracy the current (actual) risk level correctly the estimation of
The most accurate single point method is the use of a the likelihood of incurring a particular consequence
number and unit to estimate consequences ($) and a should take into account the probability of controls
number and unit to estimate likelihood (likelihood per failing.
year). The estimates are then placed in the equation C x L In practice it was difficult to decide which controls to
= R. The unit for risk then becomes $/y. Refer to Single remove because each risk has a large number of
Point Risk Estimation Example above. tangible, less tangible, direct and indirect controls.
50
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
C. Not Including all Areas of Impact Risk Quantification has a number of inaccuracies and
Make sure all the consequences of a possible event are uncertainties, like the estimation of the likelihood of an
included in the estimation of the consequences. If you event occurring.
leave any consequences out you will understate the
consequences and the risk level. VI. BASIC DEFINITIONS
All safety standards exist to reduce risk, which is
V. THE RISK QUANTIFICATION MATRIX inherent wherever manufacturing or processing occurs.
The risk quantification matrix is a very popular risk A. Value Proposition
quantification tool. The matrix can be reasonably
If we are to cost effectively manage risk, than we can’t
accurate or very inaccurate depending on how the matrix
spend large amounts of time quantifying every risk. On
is designed. Some potential matrix errors include:
the other hand we have to quantify risks accurately
A. Qualitative matrix: enough to appropriately allocate resources between them
These matrixes measure consequences and likelihood and help us make decisions on which controls cost
in terms of words only, without defining the words with effectively reduce the risks to acceptable levels. [2]
units. Measuring consequences and likelihood in terms of This brings up the term “Value Proposition” as that the
words is highly subjective. sophistication of any risk assessment must be
proportionate to the size of risk, cost of controls or the
B. Scaling errors value which could be gained from conducting the risk
These errors are introduced if the matrix has uneven or assessment.
inconsistent consequences and likelihood scales. The B. Tolerable Risk
errors are also introduced if the risks are positioned on
the boundaries of the consequence and likelihood scales. There is a point where risk becomes unacceptable or
“intolerably high”. Where there is –equally- a point
C. Scaling band width approximations where the risk is accepted as negligible. The area of the
These inaccuracies are due to the band width of the tolerable risk is bounded between these two points. [5]
consequence and likelihood categories. For example,
Moderate = $250k to $1M. This band width means that
risks, which maybe orders of magnitude different in size,
are given the same risk ranking. Accordingly, it is
possible that a $50K per year risk ($1M x 1/20y) and a
$50 per year risk ($250k x 1/5,000y) are both called a
level 3 risk.
C. Risk Reduction
Risk reduction is about taking action to minimize
either the likelihood of the risk developing, or its effects.
But a question is still there: How safe is safe? Or how
much does the risk need to be reduced?
There are two approaches to find an answer to these
questions. Quantitative Method: It involves quantifying
FIGURE III EXAMPLE MATRIX WITH SCALING AND BAND WIDTH
APPROXIMATION ERRORS
all the inherent risks which are associated with each
hazardous event and compare the sum to the level of risk
Because of these problems, using the matrix for large which has been identified as tolerable. Qualitative
or important risk should consider that the matrix should Method: This method is about using qualitative ranking
not be a Qualitative Matrix and it should be designed to considering consequence & likelihood. [5]
reduce scaling errors.
51
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
VII. FUZZY LOGIC For applying fuzzy, a category shall be selected for
Fuzzy logic is a set of mathematical principles for each variable in order to establish the fuzzy sets which
knowledge representation based on degrees of are characterized by a membership function with varying
membership. It deals with degrees of membership and values in the interval [0, 1].
degrees of truth. It reflects how people think and attempts The typical standard risk matrix shown in figure VIII
to model our sense of words, our decision making and is used in this work.
our common sense. [6]
TABLE II
SUGGESTED MISHAP PROBABILITY LEVELS
52
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
For the purpose of this work, equally distributed Mamdani method was selected against sugeno method
ranges have been assigned to each risk level as shown in due to the reason that Mamdani is widely accepted for
table III: capturing expert knowledge and it allows us to describe
TABLE III
the expertise in more intuitive, more human-like manner.
CASE STUDY RISK LEVELS On the other hand, Sugeno method is computationally
efficient and works well with optimization and adaptive
techniques, which makes it very attractive in control
problems, particularly for dynamic nonlinear systems.
All possible combinations of crisp input patterns have
been used for all of the risk graph parameters using the
five Defuzzification methods (Centroid, Bisector, MOM,
LOM, and SOM). Each crisp input was tested over three
In this research the Gaussian type of membership values within its range as simulated in figure X.
function was selected as the most natural and popular
choice for these systems.
figure IX presents the fuzzy sets and its membership
function for each variable used in the fuzzy risk
assessment matrix.
53
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 1, January 2013)
Following figure XII, shows how aggregating MF’s The developed Risk Matrix has been applied to a
tells the risk level in a fuzzy manner rather than standard risk matrix scheme and risk values have been
following the complex defuzzification methods and verified against those determined through the
experiencing such deviations. conventional standard risk matrix.
This figure illustrates one of the test cases with the In addition, the developed model was examined using
parameters’ input pattern shown in Table IV below. different defuzzification methods to retrieve best
TABLE IV
matching risk values in comparison to those determined
TEST INPUT PATTERN FOR SAFETY FUZZY RISK GRAPH by the conventional model.
Conventional risk matrix is simple to be implemented,
Linguistic Value Calibrated Range but it leads to inconsistent possible results. One side of
Likelihood Probable (B) 0 : -1 applying risk matrix method is based on using qualitative
risk parameters is a subjective process. The other side is
Severity Negligible (IV) 2 : 10
using of numerical interpretation of risk parameters by
RISK (CONV) M
means of crisp intervals violates the real life gradual
transition between intervals.
Linguistic Value Range Test Value The work presented in this paper should be concluded
Likelihood Cc -0.75 as follows:
Severity Fa 4.2 Use of Fuzzy logic has a positive impact when
RISK (CRISP) 33 applied to conventional risk matrix for the risk
determination process.
The developed fuzzy risk matrix has demonstrated
the wide acceptance of Mamdani FIS for capturing
expert knowledge and allowing description of the
expertise in more intuitive, more human-like
manner.
Fuzzy logic toolbox available under Matlab® does not
allow fuzzy inference computing with logarithmic scales.
In future this work has to be extended for soft
implementation to include the mathematical
interpretations of logarithmic scales.
A second work (in future) will explore the use of
Neuro-Fuzzy technique for automated optimization of
risk matrix parameter targeting to eliminate the test
deviations to NIL and solve the dilemma of selecting the
best defuzzification method among Mamdani different
supported defuzzification methods.
One more issues will be of great interest to be
FIGURE XII AGGREGATION OF FIRED MEMBERSHIP FUNCTIONS
explored in the future, for using fuzzy inputs to the fuzzy
Aside from defuzzifying the Fuzzy Inference System risk matrix model instead of using crisp inputs.
(FIS), to get a crisp risk value and to stay away from the REFERENCES
complexity of selecting the most suitable defuzzification
[1 ] John Duffus & Howard Worth 2001. “Risk Assessment & Risk
method among those five defuzzification methods, the Management” by IUPAC. The Science of Chemical Safety
aggregated MF’s can easily represent the value of the risk Essential Toxicology #6.
in a fuzzy way. [2 ] Tony Matthew, Riskcentral 114 536 033. “Advanced Risk
As it is demonstrated in figure XII -away from the Assessment”
dilemma of the defuzzification- the generated MF’s [3 ] BASF, Workshop Bieleschweig #4 14./15/9.2004. “Risk Matrix
pattern tells that this scenario tends to be a medium risk as a Tool for Risk Assesment”.
level. [4 ] R. Nait-Said, F.Zidani, and N.Ouzraoui. “Fuzzy Risk Graph
Model for Determining Safety Integrity Level” by Hindawi
Publishing Corporation. Volume 2008, Article ID 263895.
IX. CONCLUSION [5 ] “Understanding Safety Integrity Level” by Magnetrol
This work demonstrated that fuzzy logic theory can International in 2011. Bulletin 41-299.3.
serve as a decision support technique in SIL [6 ] F. Martin McNeill and Ellen Thro. 1994. “FUZZY LOGIC A
PRACTICAL APPROACH” by Academic Press Professional,
determination. Inc. San Diego, CA, USA.
54