Professional Documents
Culture Documents
a r t i c l e i n f o
abstract
Decision-making problems in emergency response are usually risky and uncertain due to the limited
decision data and possible evolvement of emergency scenarios. This paper focuses on a risk decisionmaking problem in emergency response with several distinct characteristics including dynamic
evolvement process of emergency, multiple scenarios, and impact of response actions on the
emergency scenarios. A method based on Fault Tree Analysis (FTA) is proposed to solve the problem.
By analyzing the evolvement process of emergency, the Fault Tree (FT) is constructed to describe the
logical relations among conditions and factors resulting in the evolvement of emergency. Given
different feasible response actions, the probabilities of emergency scenarios are estimated by FTA.
Furthermore, the overall ranking value of each action is calculated, and a ranking of feasible response
actions is determined. Finally, a case study on H1N1 infectious diseases is given to illustrate the
feasibility and validity of the proposed method.
& 2012 Elsevier Ltd. All rights reserved.
Keywords:
Emergency response
Fault tree analysis (FTA)
Scenario probability estimation
Ranking
1. Introduction
Emergencies, i.e., natural disasters, industrial incidents, infectious diseases and terrorist attacks etc., often cause losses of life
or injury, property damages, social and economic disruptions or
environmental degradations. For example, the Severe Acute
Respiratory Syndrome (SARS) broken out in east Asia early 2003
resulted in the death of hundreds of people, the global panic and
the inestimable economic loss. When an emergency occurs, the
relevant management personnel or decision-makers (DMs) need
to decide what actions to take instantly so as to mitigate or
minimize the negative effects. Usually, the decision-making
problems in emergency response are complicated due to the
limited decision data and possible evolvement of emergency
scenarios [1,2]. Therefore, how to select an effective response
action in the earlier stage of emergency is an important research
topic of emergency management.
Some studies have been conducted to deal with the decisionmaking problem in emergency response [111]. For example,
al
ainen
Ham
et al. [1] proposed a multi-attribute risk analysis
method to select a strategy for protecting the population in a
simulated nuclear accident. Shim et al. [2] developed a decision
0305-0548/$ - see front matter & 2012 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.cor.2012.08.015
50
A fA1 ,A2 ,:::, Am g: the set of m feasible response actions (alternatives), where Ai denotes the ith response action, i 1,2,. . ., m.
51
failure, as well as depicting the logical relations among components, manufacturing processes, and sub-systems [1217]. It was
originally developed by Bell Laboratories for the US Air Force in
1962 and was later adopted and extensively applied by the Boeing
Company. Now, FTA is wildly used in many elds, such as
chemical industries [16], liqueed natural gas terminal emergency shutdown system [17] and so on. In this paper, the
principle of FTA is employed to estimate the probabilities of
emergency scenarios. Thus, constructing a FT beforehand is
necessary in order to depict the logical relations among the
conditions and factors driving the evolvement of emergency
scenarios. In the following, we rst introduce the basic components of FT, and then give the steps for constructing the FT for an
emergency.
3.1. Basic components of FT
Usually, a FT is composed of a series of events and logic gates.
The main events include:
Top event: is the most undesirable system failure event and the
object of the analysis, denoted as &.
Basic event: is the primary failure event and the cause of the
top event or middle events, denoted as
J.
Logic gate AND: indicates that output event occurs only if all
Fig. 1. The risk decision-making problem in emergency response.
52
X2
F S2 S1 M 1 X 1 X 2 X 3 X 4 ,
S2
S1
r11
6
A2 6 r21
A1
6
^ 6
4 ^
Am rm1
r12
r22
A1
P pij mn
X4
X3
r1l
7
r2l 7
S4
7
^ 7
5
rm2 rml
i 1,2,. . .,m,
j 1,2,. . .,n
Sn
2
p11
6
A2 6 p21
6
^ 6
4 ^
Am pm1
p12
p22
^
pm2
p1n
S2
S1
M5
M1
M2
M3
M4
M6
7
p2n 7
7
^ 7
5
pmn
S3
X2
X1
S1
M1
Xl
Y rih ml
X1 X 2 X 3 X 4
X5 X6 X7
X8
X 9 X 10 X 11
0:2
0:4
max
djk
max
min
dk dk
dk
where
i 1,2,. . ., m
j 0,1,2,. . ., n,
k 1,2,. . ., q
and
max
dk
10
n1
X
i 1,2,. . .,m
12
S1
S2
A1 0:92 0:0736
P pij 22
A2 0:91 0:1092
djk
wk aik ,
omax oi
,
omax omin
q
X
k1
oi
53
i 1,2,. . ., m,
6. Case study
In this section, to illustrate the feasibility and validity of the
FTA-based method, we investigate a case on H1N1 infectious
disease in University B, one of the most famous universities in
China. First, the introduction of the case is given. Then, the FTAbased method is used to choose a desirable response action for
controlling the spreading of H1N1 in the university. In addition, a
sensitivity analysis is conducted to show the impact of parameters on the ranking of feasible response actions.
6.1. Introduction of the case
H1N1 virus is a subtype of inuenza A virus and was the most
common cause of human inuenza in 2009. In September, an
infected person of H1N1 was diagnosed in University B, which has
30,000 students and staff living on campus. After persuading the
infected person to take quarantine measures, the university needs
to take further action to control the spreading of H1N1 by
selecting one from six feasible emergency response actions. The
six feasible response actions are given as below.
k 1,2,. . ., q
j1
11
54
D1
D2
D3
S0
S1
S2
S3
S4
0
10
40
100
200
0
20
50
80
100
0
10
40
70
100
Table 2
The meanings of symbols in Fig. 3.
Symbols
Meanings of symbols
S1
S2
S3
S4
M1
M2
M3
M4
M5
M6
X1
X2
X3
X4
X5
X6
X7
X8
X9
X 10
X 11
New infected persons are detected in the infected persons close contacts
New infected persons are detected in the same institute or dormitories of the infected person and his/her close contacts
Multiple new infected persons are detected in other institutes and dormitories
The pandemic of H1N1 in University B
The infection routes are unclear
Healthy persons are infected by intermediary, such as tableware, classroom, etc
Healthy persons are infected by undetected infected ones
The ineffective monitoring measures on infection routes
Healthy persons are infected by the close contacts
New infected ones infect healthy persons in the same institute
The close contacts are not taken quarantine measures
The close contacts have been infected
Several persons in the same dormitory have been infected
The classrooms in the institute of the infected ones have not been disinfected timely
The infected ones in the institute are not detected timely
The infected ones contact with others in group activities of the institute
New infected persons have contacted with persons in other institutes and dormitories
The classrooms in other institutes have not been disinfected timely
The infected ones enter the classroom in other institutes
The infected ones in other institutes are not detected timely
The infected ones contact with others in group activities of the university
13
F S2 F S1 X 4 X 5 X 6 X 1 X 2 X 3 X 4 X 5 X 6 ,
14
F S3 F S2 X 7 X 1 X 2 X 3 X 4 X 5 X 6 X 7 ,
15
F S4 F S3 X 8 X 9 X 10 X 11
X 1 X 2 X 3 X 4 X 5 X 6
X 7 X 8 X 9 X 10 X 11 :
16
17
18
pi3 pi2 ri7 ri1 ri2 ri3 ri1 ri2 ri3 ri4 ri5 ri6 ri4 ri5 ri6 ri7 ,
55
Table 6
The expected criterion values of different actions.
aik
D1
D2
D3
A1
A2
A3
A4
A5
A6
0.3612
0.5834
0.7633
0.9113
0.9166
0.9200
0.2610
0.5181
0.6787
0.7872
0.7893
0.7907
0.2970
0.5415
0.7199
0.8451
0.8483
0.8504
19
6.3. Sensitivity analysis
pi4 pi3 ri8 ri9 ri10 ri11 ri8 ri9 ri10 ri11
ri1 ri2 ri3 ri1 ri2 ri3 ri4 ri5 ri6
ri4 ri5 ri6 ri7 ri8 ri9 ri10 ri11 ri8 ri9 ri10 ri11
20
A1
A2
A3
A4
A5
A6
X1
X2
X3
X4
X5
X6
X7
X8
X9
X 10
X 11
1
0
0
0
0
0
0.8
0.8
0.8
0.8
0.8
0.8
0.6
0.6
0.6
0.6
0.6
0.6
0.8
0.8
0.4
0.4
0.4
0.4
0.9
0.9
0.4
0.4
0.4
0.4
0.8
0.8
0.7
0.2
0.2
0.2
0.7
0.7
0.6
0.1
0.1
0.1
0.8
0.8
0.8
0.8
0.4
0.4
0.9
0.9
0.9
0.2
0.2
0.2
0.9
0.9
0.9
0.9
0.4
0.4
0.8
0.8
0.8
0.8
0.8
0.1
wk a 1 if w
a w . Let
k1
W 0 w01 ,w02 ,. . .,w0q be the vector
of criterion weights correspond0
ing to wcost . Then, we have
0
w0k
wk 1wcost
,
1wcost
cost0
Table 4
The probabilities of scenarios given different response actions.
pij
S1
S2
S3
S4
A1
A2
A3
A4
A5
A6
0.92
0.6
0.6
0.6
0.6
0.6
0.8685
0.5664
0.3408
0.2688
0.2688
0.2688
0.6079
0.3965
0.2045
0.0269
0.0269
0.0269
0.5603
0. 3654
0.1884
0.0206
0.0101
0.0031
Table 5
The normalized criterion values.
djk
D1
D2
D3
S0
S1
S2
S3
S4
1
0.95
0.8
0.5
0
1
0.8
0.5
0.2
0
1
0.9
0.6
0.3
0
k 1,2,. . ., q
q
P
21
wk 1.
obviously, w
In the abovek 1case study, we have wcost 0:1 and
0
W 0:6, 0:2, 0:1. If wcost 0:1 is changed into wcost 0:01,
0
then according to Eq. (21), we have W 0:66,0:22,0:11. Furthermore, according to Eq. (12), the overall ranking value of each
response action can be determined, i.e., a1 0:3385, a2 0:5681,
a3 0:7413, a4 0:8751, a5 0:8779, a6 0:8747. Thus, a new
ranking result of feasible response actions can be obtained, i.e.,
A5 gA4 gA6 g A3 gA2 gA1 .
The overall ranking values of the six feasible response actions
0
with regard to different wcost are plotted in Fig. 4. It can be seen
0
from Fig. 4 that action A1 , A2 or A3 should be selected if wcost is
cost0
greater. Conversely, action A4 , A5 or A6 should be selected if w
is smaller.
6.3.2. The impact of probabilities of basic events on ranking of
actions
There are two types of basic events in the FT for an emergency
case. The rst type includes the events used to describe the current
scenario of emergency, whose probabilities will not change with
different response actions, such as X 2 and X 3 in Fig. 3. The second
56
ai
ai
1.0
1.0
0.8
0.8
0.6
0.6
0.4
0.4
0.2
0.2
0.1
0.2
a1
0.3
0.4
0.5
a2
a3
0.6
0.7
0.8
a4
0.9
a5
1.0
a6
cost
Fig. 4. Curves of overall ranking values of the six feasible response actions with
0
regard to different wcost .
ai
1.0
1.0
0.8
0.8
0.6
0.6
0.4
0.4
0.2
0.2
0.1
a1
0.2
0.3
a2
0.4
a3
0.5
0.6
a4
0.7
a5
0.8
0.9
a6
1.0
i2
a1
0.3
a2
0.4
a3
0.5
0.6
a4
0.7
a5
0.8
a6
0.9
1.0
i4
Fig. 6. Curves of overall ranking values of the six feasible response actions with
regard to different r0i4 .
ai
0.2
0.1
0.1
0.2
a1
0.3
a2
0.4
a3
0.5
0.6
a4
0.7
a5
0.8
a6
0.9
1.0
i7
Fig. 5. Curves of overall ranking values of the six feasible response actions with
regard to different r0i2 .
Fig. 7. Curves of overall ranking values of the six feasible response actions with
regard to different r0i7 .
7. Conclusions
This paper presents a novel FTA-based method for risk
decision-making in emergency response. By constructing the FT,
the logical relations among the conditions and factors driving the
evolvement of emergency are described. Then, based on the
constructed FT, the probabilities of emergency scenarios are
estimated given each feasible action. Furthermore, according to
the obtained probabilities, the ranking of actions is determined by
calculating the overall ranking values of feasible actions. The
major contributions of this paper are discussed as follows.
First, this paper discovers and formulates a new risk decisionmaking problem in emergency response with distinct characteristics including the dynamic evolvement of emergency, multiple
scenarios and their probabilities, and inuence of response
actions on probabilities of the scenarios. It is a new idea for
describing the decision-making problem in emergency response
and lays a good foundation for further conducting studies on risk
decision analysis in emergency response.
Second, the key of the proposed method is to estimate the
probabilities of scenarios given each feasible response action. For
this, the principle of FTA is introduced, and the steps for constructing the FT for an emergency are given. The attempt to introduce FTA
into decision analysis makes it possible to capture the dynamic
evolvement process of emergency and estimate the probabilities of
emergency scenarios before the response actions are implemented.
It is valuable and important for developing and enriching theories
and methods of decision analysis in emergency response.
Third, using the proposed method, not only the ranking of feasible
response actions can be derived, but also the sensitivity analysis can
Acknowledgment
This work was partly supported by the National Science Fund
for Excellent Innovation Research Group of China (Project no.
71021061), the National Science Foundation of China (Project nos.
90924016, 71001020, 71071029, 71101020 and 71101021), the
Fundamental Research Funds for the Central Universities, NEU,
China (Project nos. N100406012 and N110706001) and Doctoral
Scientic Research Foundation of Liaoning Science and Technology Committee (Project no. 201120013).
References
al
ainen
[1] Ham
RP, Lindstedt MRK, Sinkko K. Multiattribute risk analysis in
nuclear emergency management. Risk Analysis 2000;20(4):45567.
[2] Shim KC, Fontane DG, Labadie JW. Spatial decision support system for
integrated river basin ood control. Journal of Water Resources Planning
and Management 2002;128(3):190201.
[3] Korte
J. Risk-based emergency decision support. Reliability Engineering and
System Safety 2003;82(3):23546.
[4] Levy JK. Multiple criteria decision making and decision support systems for
ood risk management. Stochastic Environmental Research and Risk Assessment 2005;19(6):43847.
[5] Levy JK, Taji K. Group decision support for hazards planning and emergency
management: a group analytic network process (GANP) approach. Mathematical and Computer Modeling 2007;46(78):90617.
[6] Fu GT. A fuzzy optimization method for multicriteria decision making: an
application to reservoir ood control operation. Expert Systems with Applications 2008;34(1):1459.
al
ainen
57
[8] Lim KS, Lee DR. The spatial MCDA approach for evaluating ood damage
reduction alternatives. KSCE Journal of Civil Engineering 2009;13(5):35969.
[9] Yu L, Lai KK. A distance-based group decision-making methodology for multiperson multi-criteria emergency decision support. Decision Support Systems
2011;51(2):30715.
[10] Peng Y, Zhang Y, Tang Y, Li SM. An incident information management
framework based on data integration, data mining, and multi-criteria
decision making. Decision Support Systems 2011;51(2):31627.
[11] Ergu D, Kou G, Shi Y, Shi Y. Analytic network process in risk assessment and
decision analysis. Computers and Operations Research, in press. /http://dx.
doi.org/10.1016/j.cor.2011.03.005S.
[12] Lee WS, Grosh DL, Tillman FA, Lie CH. Fault tree analysis, methods, and
applications: a review. IEEE Transactions on Reliability 1985;34(3):194203.
[13] Kim CE, Ju YJ, Gens M. Multilevel fault tree analysis using fuzzy numbers.
Computers & Operations Research 1996;23(7):695703.
[14] Bertsche B. Reliability in automotive and mechanical engineering. Berlin
Heidelberg: Springer-Verlag; 2008.
[15] Liu DX, Amari SV. Fault tree analysis. In: Misra KB, editor. Handbook of
Performability Engineering. London limited: Springer-Verlag; 2008.
[16] Lin MS, Chang MS, Chen DJ, Ku KL. The distributed program reliability analysis
on ring-type topologies. Computers & Operations Research 2001;28(7):
62535.
[17] Cheng SR, Lin BS, Hsu BM, Shu MH. Fault-tree analysis for liqueed natural
gas terminal emergency shutdown system. Expert Systems with Application
2009;36(9):1191824.
[18] Gao X, Shan GL, Liu HL, Xie XQ, Lu HY, Zeng G. Analysis on characteristics of
transmission and diagnosis of SARS in Beijing in 2004. Chinese Journal of
Public Health (in Chinese) 2005;21(5):5223.
[19] Saaty TL. The analytical hierarchy process. Toronto: McGraw-Hill; 1980.
[20] Peng Y, Kou G, Wang GX, Wu WS. Ensemble of software defect predictors: an
AHP-based evaluation method. International Journal of Information Technology & Decision Making 2011;10(1):187206.
[21] Lapp SA, Powers GJ. Computer-aided synthesis of fault-trees. IEEE Transactions on Reliability 1977;24(1):213.
[22] Bossche A. Computer-aided fault tree synthesis I: system modeling and
causal trees. Reliability Engineering & System Safety 1991;32(3):21741.
[23] Bossche A. Computer-aided fault tree synthesis II: fault tree construction.
Reliability Engineering & System Safety 1991;33(1):121.
[24] Khan FI, Abbasi SA. Analytical simulation and PROFAT II: a new methodology
and a computer automated tool for fault tree analysis in chemical process
industries. Journal of Hazardous Materials 2000;75:127.
[25] Wang Y, Teague T, West H, Mannan S. A new algorithm for computer-aided
fault tree synthesis. Journal of Loss Prevention in the Process Industries
2002;15(4):26577.
[26] Figueira J, Mousseau V, Roy B. ELECTRE methods. In: Figueira J, Greco S,
Ehrgott M, editors. Multiple Criteria Decision Analysis: State of the Art
Surveys. Springer; 2005 chapter 4.
[27] Nowak M. Aspiration level approach in stochastic MCDM problems. European
Journal of Operational Research 2007;177:162640.
[28] Linstone H, Turloff M. The Delphi method: techniques and applications.
London, UK: Addison-Wesley; 1975.
[29] Clemen RT, Winkler RL. Combing probability distribution from experts in risk
analysis. Risk Analysis 1999;19(2):187203.
[30] Peng Y, Kou G, Wang GX, Shi Y. FAMCDM: A fusion approach of MCDM
methods to rank multiclass classication algorithms. Omega 2011;39:
67789.
[31] Kou G, Lu YQ, Peng Y, Shi Y. Evaluation of classication algorithms using
MCDM and rank correlation. International Journal of Information Technology
& Decision Making 2012;11(1):197225.