An Interval Type-2 Fuzzy Prioritization Approach to Project Risk Assessment

被引:0
|
作者
Asan, Umut [1 ]
Soyer, Ayberk [1 ]
Bozdag, Erhan [1 ]
机构
[1] Istanbul Tech Univ, Dept Ind Engn, TR-34357 Istanbul, Turkey
关键词
Project risk assessment; interval type-2 fuzzy numbers; multi-criteria group decision making; analytic hierarchy process; new product development projects; ANALYTIC HIERARCHY PROCESS; CRITERIA DECISION-ANALYSIS; INFORMATION-TECHNOLOGY; CONSTRUCTION PROJECTS; MANAGEMENT; SELECTION; SYSTEMS; SETS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Assessment of project risks generally requires dealing with vague and imprecise information as well as highly subjective judgments of a group of experts. Therefore, it is often unrealistic and impractical to acquire exact judgments in project risk assessment. Several precision-and fuzzy-based methods, addressing this issue, have been suggested in the literature. However, these studies entirely or partly have ignored certain sources of uncertainties, especially subjectivity and variations among expert judgments. This paper proposes an interval type-2 fuzzy prioritization approach that effectively models the project risk assessment process. The approach captures at least two types of uncertainties associated with judgments elicited from a group of experts: intra-personal uncertainty and inter-personal uncertainty. In order to demonstrate the applicability and effectiveness of the proposed approach, an example is presented for the assessment of potential risks in new product development projects. Comparisons with current precision-and fuzzy-based methods demonstrate that the proposed approach offers additional flexibility to the experts in making judgments and provides a better representation of uncertainty.
引用
收藏
页码:541 / 577
页数:37
相关论文
共 50 条
  • [21] A new approach for ranking of interval type-2 trapezoidal fuzzy numbers
    Gong, Yanbing
    Yang, Shuxin
    Dai, Liangliang
    Hu, Na
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (03) : 1891 - 1902
  • [22] Parameter Adaptation in Harmony Search with Shadowed Type-2 Fuzzy Approach for Designing Optimized Interval Type-2 Fuzzy Controllers
    Peraza, Cinthia
    Ochoa, Patricia
    Castillo, Oscar
    [J]. INTELLIGENT AND FUZZY SYSTEMS: DIGITAL ACCELERATION AND THE NEW NORMAL, INFUS 2022, VOL 2, 2022, 505 : 730 - 738
  • [23] An Interval Type-2 Fuzzy Dynamic Approach To Replacement of Server Equipment
    Cakir, Esra
    Ulukan, Ziya
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2020,
  • [24] A narrow band interval type-2 fuzzy approach for image segmentation
    Shi, Jiao
    Lei, Yu
    Zhou, Ying
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2016, 64 : 86 - 99
  • [25] An Interval Type-2 Fuzzy Risk Analysis Model (IT2FRAM) for Determining Construction Project Contingency Reserve
    Fateminia, Seyed Hamed
    Sumati, Vuppuluri
    Fayek, Aminah Robinson
    [J]. ALGORITHMS, 2020, 13 (07)
  • [26] An interval type-2 fuzzy risk analysis model (IT2FRAM) for determining construction project contingency reserve
    Fateminia, Seyed Hamed
    Sumati, Vuppuluri
    Fayek, Aminah Robinson
    [J]. Algorithms, 2020, 13 (13)
  • [27] Knowledge reduction by combining interval Type-2 Fuzzy similarity measures and interval Type-2 Fuzzy formal lattice
    Sahar Cherif
    Nesrine Baklouti
    Adel M. Alimi
    [J]. International Journal of Information Technology, 2024, 16 (6) : 3723 - 3728
  • [28] A new interval type-2 fuzzy controller for stabilization of interval type-2 T-S fuzzy systems
    Zhao, Tao
    Xiao, Jian
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2015, 352 (04): : 1627 - 1648
  • [29] Uncertain fuzzy clustering:: Interval type-2 fuzzy approach to C-means
    Hwang, Cheul
    Rhee, Frank Chung-Hoon
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2007, 15 (01) : 107 - 120
  • [30] Novel interval type-2 fuzzy logic controller for improving risk assessment model of cyber security
    Jana, Dipak Kumar
    Ghosh, Ramkrishna
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 173 - 182