Next Article in Journal
Silicon Nitride Photonic Integration Platforms for Visible, Near-Infrared and Mid-Infrared Applications
Next Article in Special Issue
Modeling of BN Lifetime Prediction of a System Based on Integrated Multi-Level Information
Previous Article in Journal
Millimeter Scale Track Irregularity Surveying Based on ZUPT-Aided INS with Sub-Decimeter Scale Landmarks
Previous Article in Special Issue
A Time-Space Domain Information Fusion Method for Specific Emitter Identification Based on Dempster–Shafer Evidence Theory
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fuzzy Risk Evaluation in Failure Mode and Effects Analysis Using a D Numbers Based Multi-Sensor Information Fusion Method

School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
*
Authors to whom correspondence should be addressed.
Sensors 2017, 17(9), 2086; https://doi.org/10.3390/s17092086
Submission received: 30 August 2017 / Revised: 8 September 2017 / Accepted: 11 September 2017 / Published: 12 September 2017

Abstract

:
Failure mode and effect analysis (FMEA) is a useful tool to define, identify, and eliminate potential failures or errors so as to improve the reliability of systems, designs, and products. Risk evaluation is an important issue in FMEA to determine the risk priorities of failure modes. There are some shortcomings in the traditional risk priority number (RPN) approach for risk evaluation in FMEA, and fuzzy risk evaluation has become an important research direction that attracts increasing attention. In this paper, the fuzzy risk evaluation in FMEA is studied from a perspective of multi-sensor information fusion. By considering the non-exclusiveness between the evaluations of fuzzy linguistic variables to failure modes, a novel model called D numbers is used to model the non-exclusive fuzzy evaluations. A D numbers based multi-sensor information fusion method is proposed to establish a new model for fuzzy risk evaluation in FMEA. An illustrative example is provided and examined using the proposed model and other existing method to show the effectiveness of the proposed model.

1. Introduction

Failure mode and effects analysis (FMEA) is a widely used technology in many fields to identify potential failures or errors and further improve the reliability of systems by avoiding the occurrence of these failures or errors [1,2,3]. Risk evaluation is a crucial step in FMEA, which aims to identify failure modes with high risk so as to perfect system design to eliminating the risk [4,5]. In FMEA, risk priority number (RPN) approach is a classical method for the risk evaluation [6,7]. Since having clear physical meaning and easy to implement, the RPN approach has been received extensively concern and application. However, there still are some shortcomings in the RPN approach [8,9], for example the possible missing of risk factors, without considering the relative importance of risk factors, and so on. Among these drawbacks, failing to address the uncertainty in risk evaluation is one of the most concerned, and has attracted increasing attention [10,11,12,13].
In the risk evaluation of FMEA, domain experts’ knowledge and evaluations play a very importance role. Because there are human being’s judgments, it inevitably involves various types of uncertainties such as ignorance and fuzziness. Fuzzy set theory [14] provides a useful framework to describe the uncertain information. Therefore, risk evaluation under fuzzy environment, also known as fuzzy risk evaluation, has become an important research direction in FMEA. Many technologies have been developed to solve the problem of fuzzy risk evaluation in FMEA. Chin et al. [15] presented a data envelopment analysis (DEA) based FMEA to determine the risk priorities of failure modes. Jee et al. [16] proposed a fuzzy inference system (FIS)-based RPN model for the prioritization of failures. In [17], the authors have given applied a model of evolving tree to allow the failure modes in FMEA to be clustered and visualized. Reference [18] gives a detained literature review to the risk evaluation approaches in FMEA. By summarizing the existing approaches [10,18], one of the main branches is to regard the fuzzy risk evaluation in FMEA as a multiple criteria decision making (MCDM) problem under fuzzy environment. Many MCDM or multi-sensor information fusion technologies [19,20,21,22,23,24,25,26] have been used in FMEA, such as TOPSIS [27], VIKOR [28], evidential reasoning [29], and so on.
In this paper, we address the fuzzy risk evaluation in FMEA from a perspective of multi-sensor information fusion. Each risk factor in FMEA is regarded as a sensor or information source that yields an evaluation regarding the risk of each failure mode. Then, the risk evaluation of every failure mode therefore becomes the process of fusing these evaluations generated from the information sources that correspond to risk factors. Different from existing multi-sensor information fusion method used in FMEA, in this paper the non-exclusiveness between the evaluations of fuzzy linguistic variables to failure modes is taken into consideration. A novel model called D numbers [30,31,32,33] which is an extension of Dempster-Shafer evidence theory [34,35] is used to model the non-exclusive fuzzy evaluations. At first, a new D numbers based multi-sensor information fusion method is proposed. Then, the proposed multi-sensor information fusion method is applied to FMEA, which results in a novel model for fuzzy risk evaluation. At last, an illustrative example is given to demonstrate the effectiveness of the proposed model.
The rest of the paper is organized as follows. Section 2 gives a brief introduction about fuzzy set theory, RPN approach, as well as Dempster-Shafer evidence theory and D numbers. In Section 3, a novel multi-sensor information fusion method is proposed based on D numbers. Then, the new model for fuzzy risk evaluation in FMEA is presented in Section 4. Section 5 gives an illustrative example of the proposed model to show its effectiveness. Lastly, Section 6 concludes this paper. In addition, the notations of this paper are briefly introduced here: A ˜ represents a fuzzy set or fuzzy number, and μ A ˜ is its corresponding membership function, and A r e a A ˜ represents the area of A ˜ in the graph; Ω and Θ stand for the frame of discernment in Dempster-Shafer theory and D numbers respectively, m represents a mass function and D is a D number; u ¬ E ( A ˜ , B ˜ ) is the non-exclusive degree between A ˜ and B ˜ ; B e t P represents a distribution of pignistic probabilities; C F ˜ is the defuzzified value of fuzzy number F ˜ .

2. Preliminaries

2.1. Fuzzy Set Theory

Fuzzy set theory was first introduced by Zadeh [14] in 1965 to deal with the uncertainty information. In some real application environments, the states are subjective concepts which are too complex or too ill-defined to be reasonably described in conventional quantitative expressions. In those situation, fuzzy set theory provides an efficiently simple way to express the vagueness or imprecise information [36,37].
Definition 1.
Let X be the universe of discourse, a fuzzy set A ˜ is characterized by a membership function μ A ˜ satisfying
μ A ˜ : X [ 0 , 1 ]
where μ A ˜ ( x ) is called the membership degree of x X belonging to fuzzy set A ˜ .
For a finite set A = { x 1 , , x i , , x n } , , the fuzzy set ( A ˜ , μ A ˜ ) is often denoted by { μ A ˜ ( x 1 ) x 1 , , μ A ˜ ( x i ) x i , , μ A ˜ ( x n ) x n } . It is easily found that a fuzzy set is described entirely by its membership function. When μ A ˜ takes value from { 0 , 1 } , fuzzy set A ˜ degenerates into a classical set. A fuzzy number A ˜ is a fuzzy subset of the real number R , and its membership function is
μ A ˜ ( x ) : R [ 0 , 1 ]
where x is a real number and there definitely exists an element x 0 such that μ A ˜ ( x 0 ) = 1 . Triangular and trapezoidal fuzzy numbers are the most widely used fuzzy numbers, and the former can be regarded as the special case of the latter. A trapezoidal fuzzy number is usually denoted as A ˜ = ( a 1 , a 2 , a 3 , a 4 ) , as graphically shown in Figure 1, which has the following membership function
μ A ˜ ( x ) = 0 , x a 1 ; x a 1 a 2 a 1 a 1 , x a 2 ; 1 , a 2 x a 3 ; a 4 x a 4 a 3 , a 3 x a 4 ; 0 , a 4 x .
In theory and practice, fuzzy numbers are usually associated with linguistic variables to express the fuzzy evaluation to objects. A linguistic variable is a variable whose values are represented by words or sentences in a natural or artificial language, for example “Very Low”, “Low”, “Medium”, “High”, “Very High”, where there values are usually expressed by fuzzy numbers.

2.2. Risk Priority Number Approach in FEMA

Risk priority number (RPN) approach is a traditional risk evaluation method in FEMA. In this approach, the risk priority of each failure mode is expressed by a RPN which is defined by the following formula
R P N = O × S × D
where O is the probability of occurrence of a failure mode, S is the severity of the failure effect, and D is the probability of a failure mode not being detected before it occurs. In the RPN approach, each factor among O, S, and D is evaluated by 10 rankings, as shown in Table 1, Table 2 and Table 3. The larger the RPN value, the higher the risk priority of a failure mode.
Although the RPN approach is easy to use, but it still has some shortcomings that are criticized in many studies [8,9]. For example, three risk factors O, S, D are considered with equal importance; Traditional RPN approach only considers three factors but ignores other possible influential factors to different application environment; Various sets of O, S and D may produce an identical RPN value, but their hidden risk implications may be different. Please refer to [8,9] for more details on the drawbacks of RPN approach.

2.3. Dempster-Shafer Evidence Theory and D Numbers

Dempster-Shafer evidence theory [34,35], also called Dempster-Shafer (D-S) theory or evidence theory, is a popular theory to deal with uncertain information [40,41,42,43,44,45]. Compared with traditional probability theory, this theory has an advantage of directly expressing the “uncertainty” by assigning the probability to the set composed of multiple objects, it therefore has attracted increasing interest in uncertainty reasoning and modelling [46,47,48,49,50,51,52] and been further extended such as generalized evidence theory (GET) in open world [53,54,55].
Let Ω be a set of mutually exclusive and collectively exhaustive events, indicated by Ω = { E 1 , E 2 , , E i , , E N } , where set Ω is called a frame of discernment (FOD). The power set of Ω is indicated by 2 Ω , namely 2 Ω = { , { E 1 } , , { E N } , { E 1 , E 2 } , , { E 1 , E 2 , , E i } , , Ω } . In D-S theory, the uncertain information is modelled by mass functions.
Definition 2.
Given a FOD Ω, a mass function is a mapping m : 2 Ω [ 0 , 1 ] , such that
m ( ) = 0 a n d A 2 Ω m ( A ) = 1
where set A with m ( A ) > 0 is called a focal element, and the assigned m ( A ) measures the belief exactly assigned to A and represents how strongly the evidence supports A. A mass function is also called a basic probability assignment (BPA).
Considering two pieces of evidence indicated by m 1 and m 2 , Dempster’s rule of combination can be used to combine them. This rule assumes that these mass functions are mutually independent. The Dempster’s rule of combination, denoted by m = m 1 m 2 , is defined as follows:
m ( A ) = 1 1 K B C = A m 1 ( B ) m 2 ( C ) , A 0 , A =
with
K = B C = m 1 ( B ) m 2 ( C ) .
In order to make decision in terms of a mass function [56], an approach, called pignistic probability transformation (PPT), is proposed by Smets and Kennes [57] to derive a probability distribution from a mass function. Let m be a mass function or BPA on FOD Ω , a PPT function B e t P m : Ω [ 0 , 1 ] associated to m is defined by
B e t P m ( x ) = x A , A Ω 1 | A | m ( A ) 1 m ( ) ,
where m ( ) 1 and | A | is the cardinality of proposition A.
Although D-S theory provides a good framework for uncertainty reasoning, this theory is also constrained by many strong hypotheses and hard constraints which limit its development and application to a large extend. For one hand, the elements in the FOD are required to be mutually exclusive. It is called exclusiveness hypothesis. For another, the sum of basic probabilities of a mass function must be equal to 1, which is called completeness constraint. To overcome these existing shortcomings in D-S theory and enhance its capability in expressing uncertain information, a novel model, named as D numbers, has been proposed recently [30,31,32,33,58]. D numbers relax mass function’s exclusiveness hypothesis and BPA’s completeness constraint.
Definition 3.
Let Θ = { F 1 , F 2 , , F N } be a nonempty set satisfying F i F j if i j , i , j = { 1 , , N } , a D number is a mapping formulated by
D : 2 Θ [ 0 , 1 ]
with
B Θ D ( B ) 1 a n d D ( ) = 0
whereis the empty set and B is a subset of Θ.
If B Θ D ( B ) = 1 , the information is said to be complete; if B Θ D ( B ) < 1 , the information is said to be incomplete. If a D number is of complete information, it means that the D number is generated from an environment with the close-world assumption. By contrast, a D number with incomplete information is corresponding to the open-world assumption. With respect to the open-orld assumption, Smets [57] proposed a transferable belief model (TBM) which allows m ( ) > 0 . Compared with the TBM, in D numbers the open-world environment is implemented by letting B Θ D ( B ) < 1 . What’s more important, in the TBM each mass function is defined on a FOD which requires the internal elements are mutually exclusive. However, in D numbers the exclusiveness hypothesis is removed, i.e., the elements in Θ do not require mutual exclusiveness for D numbers.

3. Proposed Multi-Sensor Information Fusion Method Based on D Numbers

Let us consider a multiple criteria decision making (MCDM) problem, where each criterion can be regarded as an independent sensor or information source. Therefore, the process of resolving the MCDM problem can be treated as a process of multi-sensor information fusion. Assume there are p alternatives, indicated by A i , i = 1 , , p , and q criteria, denoted as C j , j = 1 , , q , and the weight of each criterion is w j , j = 1 , , q . Due to the uncertainty of decision-making environment, the evaluation to alternative A i on criterion C j is expressed as a D number indicated by D i j , thus the decision matrix is represented as
M = C 1 C q A 1 A p D 11 D 1 q D p 1 D p q .
In this paper, we assume that each evaluation D i j in the decision matrix M is information-complete, i.e., k D i j ( B k ) = 1 for any i = 1 , , p and j = 1 , , q . Now the overall objective is to find the best alternative according to the decision matrix M and criteria’s weights mentioned above. In this study, we develop a new multi-sensor information fusion method based on D numbers to solve that problem. The key points of the proposed approach are presented as follows.

3.1. Non-Exclusiveness in D Numbers

Since the evaluations are in the form of D numbers and the theory of D numbers is found on the basis of non-exclusiveness assumption, the first step is to calculate the non-exclusive degrees in D numbers. The non-exclusiveness is the opposite of exclusiveness, representing a potential connection between elements in D numbers framework. By contrast, the exclusiveness refers to the characteristic that one object excludes the others, which is an either-or related thing but not the similarity.
Definition 4.
Let B i and B j be two non-empty elements belonging to 2 Θ , the non-exclusive degree between B i and B j is characterized by a fuzzy membership function u ¬ E :
u ¬ E : 2 Θ × 2 Θ [ 0 , 1 ]
with
u ¬ E ( B i , B j ) = 1 , B i B j p , p [ 0 , 1 ] , B i B j =
and
u ¬ E ( B i , B j ) = u ¬ E ( B j , B i ) .
If letting the exclusive degree between B i and B j be denoted as u E , then u E = 1 u ¬ E .
In our previous study [59], a simple approach was proposed to determine the non-exclusive degrees in D numbers. In that approach it assumes that all non-exclusive degrees among elements in FOD Θ have already been determined, then each exclusive degree in the power set space 2 Θ can be calculated by the following formula:
u ¬ E ( B i , B j ) = max x B i , y B j { u ¬ E ( x , y ) } , B i , B j 2 Θ .
An illustrative example regarding the calculation of non-exclusive degrees is given as follows.
Example 1.
Supposing each evaluation in decision matrix M shown in Equation (11) is defined on a set of linguistic variables Θ = { V L , L , M L , M , M H , H , V H } in which every linguistic variable is represented by a trapezoidal fuzzy number given in Table 4 and graphically presented as Figure 2.
The set Θ is seen as the FOD. At first, let us calculate the non-exclusive degrees between elements in FOD Θ. In this paper, an approach based on fuzzy numbers’ areas is utilized. Assume the areas of fuzzy numbers A ˜ and B ˜ are respectively denoted as A r e a A ˜ and A r e a B ˜ , and the area of the overlap of A ˜ and B ˜ is A r e a A ˜ B ˜ , then the non-exclusive degree between A ˜ and B ˜ is defined as
u ¬ E ( A ˜ , B ˜ ) = A r e a A ˜ B ˜ A r e a A ˜ + A r e a B ˜ A r e a A ˜ B ˜ .
According to Equation (16), each non-exclusive degree between elements in FOD Θ therefore can be obtained as shown in the following matrix
V L L M L M M H H V H V L L M L M M H H V H 1 0.1111 0 0 0 0 0 0.1111 1 0.0909 0 0 0 0 0 0.0909 1 0.0909 0 0 0 0 0 0.0909 1 0.0909 0 0 0 0 0 0.0909 1 0.0909 0 0 0 0 0 0.0909 1 0.1111 0 0 0 0 0 0.1111 1
Having the above non-exclusive degree matrix of between elements in Θ, according to Equation (15), we can easily calculate the non-exclusive degree of any pair of elements in 2 Θ . For example, as for { L } and { M L , M } , we have
u ¬ E ( { L } , { M L , M } ) = max u ¬ E ( { L } , { M L } ) , u ¬ E ( { L } , { M } ) = max 0.0909 , 0 = 0.0909 .

3.2. Fusing the Evaluations to the Same Alternative on Different Criteria

In order to implement the overall assessment to each alternative, all evaluations belonging to the same alternative on different criteria should be combined according to the perspective of multi-sensor information fusion. In this paper since the evaluations are given in the form of D numbers, it becomes the fusion of D numbers. In our recent study [59], a D numbers combination rule (DNCR) has been proposed from a perspective of conflict redistribution. The proposed DNCR is shown as follows.
Definition 5.
Let D 1 and D 2 be two D numbers defined on Θ with B Θ D 1 ( B ) = 1 and C Θ D 2 ( C ) = 1 , the combination of D 1 and D 2 , indicated by D = D 1 D 2 , is defined by
D ( A ) = 0 , A = 1 1 K D B C = A u ¬ E ( B , C ) D 1 ( B ) D 2 ( C ) + B C = A B C = u ¬ E ( B , C ) D 1 ( B ) D 2 ( C ) , A
with
K D = B C = 1 u ¬ E ( B , C ) D 1 ( B ) D 2 ( C ) .
The above rule for D numbers is a generalization of Dempster’s rule for the model of D numbers, because it can totally reduce to the classical Dempster’s rule when u ¬ E ( B , C ) = 0 for any B C = . Different from the D-S theory, in this rule the impact of of non-exclusiveness in D numbers is taken into consideration.
Although the rule defined in Definition 5 provides a solution for the combination of D numbers, it must point out that such rule does not preserve the associative property, i.e., ( D 1 D 2 ) D 3 D 1 ( D 2 D 3 ) ( D 1 D 3 ) D 2 , and it is only suitable for the combination of two D numbers. In order to implement the effective combination of multiple D numbers, a novel combination rule for multiple D numbers is developed in this paper by utilizing the idea of induced ordered weighted averaging (IOWA) operator [60] which imports an order variable compared with other aggregation operators [61,62].
Definition 6.
Let D 1 , D 2 , ⋯, D n be n D numbers, and v j be an order variable for each D j , j = 1 , , n , therefore each piece of information is indicated by tuple < v j , D v j > . The combination operation of these information represented by D numbers is defined as a mapping A g g D , such that
A g g D ( D 1 , D 2 , , D n ) = [ [ D λ 1 D λ 2 ] D λ n ]
where D λ i is the corresponding D v j in tuple < v j , D v j > having the i-th largest order variable v j .
In this paper, for the MCDM problem the weight of each criterion is regarded as the order variable of corresponding D numbers so as to fuse the evaluations to each alternative on multiple criteria. For each alternative A i , i = 1 , , p , the obtained aggregated evaluation is denoted as D i which is defined over the FOD Θ consisting of fuzzy linguistic variables.

3.3. Decision-Making Based on the Aggregated Evaluations under Fuzzy Environment

In this paper, each aggregated evaluation is also a D number, indicated by D i , i = 1 , , p , which is defined on FOD Θ composed by fuzzy linguistic variables. Assume Θ = { θ t , t = 1 , , l } , and each element θ t is represented by a trapezoidal fuzzy number θ t = ( a t 1 , a t 2 , a t 3 , a t 4 ) . Each D i is firstly transformed to a distribution of pignistic probabilities, denoted as B e t P i , by means of the PPT as follows
B e t P i ( θ t ) = θ t B , B Θ D i ( B ) | B | , t = 1 , , l .
Once the B e t P i is obtained, it then be transformed to a fuzzy aggregated evaluation F i ˜ to express the overall assessment to alternative i, represented as
F i ˜ = ( f i 1 , f i 2 , f i 3 , f i 4 ) , i = 1 , , q
in which
f i k = t = 1 l B e t P i ( θ t ) × a t k , k = 1 , 2 , 3 , 4 .
At last, these fuzzy aggregated evaluation F i ˜ , i = 1 , , p , are converted to crisp values through a defuzzification process in order to rank all alternatives. Among existing defuzzification techniques, the centroid defuzzification approach is a common used one. Given a fuzzy number F ˜ with membership function μ F ˜ ( x ) , in terms of the centroid defuzzification approach we can have
C F ˜ = x μ F ˜ ( x ) d x μ F ˜ ( x ) d x ,
where C F ˜ is the defuzzified value of F ˜ . In terms of the study in [63], while F ˜ is a trapezoidal fuzzy number indicated by ( f 1 , f 2 , f 3 , f 4 ) the centroid-based defuzzified value turns out to be
C F ˜ = 1 3 f 1 + f 2 + f 3 + f 4 f 3 f 4 f 1 f 2 ( f 3 + f 4 ) ( f 1 + f 2 ) .
Via the defuzzification process, for each fuzzy aggregated evaluation F i ˜ , a defuzzified value C F ˜ i can be derived. The best alternative is finally determined by finding the one with the largest defuzzified value.

4. The Proposed Model for Fuzzy Risk Evaluation in FMEA

In terms of the multi-sensor information fusion method based on D numbers as presented above, a novel model for fuzzy risk evaluation in FMEA is proposed in this section. The flowchart of the proposed model is shown in Figure 3, which briefly contains four phases, namely identification, evaluation, preprocessing and ranking. The final output is the risk ranking of potential failure modes.
  • Step 1: Identify all potential failure modes according to the practical FMEA environment.
  • Step 2: Identify all possible risk factors for the risk evaluation task. In the RPN approach, the risk factors are probability of occurrence (O), severity of failure effect (S), and probability of a failure mode not being detected (D).
  • Step 3: Determine fuzzy linguistic variables for the evaluation including evaluating failure modes and evaluating the weights of risk factors.
  • Step 4: Evaluate failure modes and the weights of risk factors using fuzzy linguistic variables determined in the above step. These are usually given by domain experts of FMEA risk evaluation.
  • Step 5: Calculate the weight of each risk factor and transform the fuzzy evaluations of failure modes on different risk factors to D numbers. This is a process of data preprocessing.
  • Step 6: Rank the failure modes using the proposed multi-sensor information fusion method in above section so as to generate the risk ranking of all failure modes.

5. Illustrative Example

In the section, an illustrative example is given to show the effectiveness of the proposed model for fuzzy risk evaluation in FMEA. This example is original from literature [28]. In [28], the authors developed an extended VIKOR method for risk evaluation in FMEA under fuzzy environment. In this paper, we will solve the problem by using our proposed model and compare the obtained result with that of literature [28].
Step 1: Identify all potential failure modes. By following literature [28], a hospital wants to rank the most serious failure modes during general anesthesia process, and six potential failure modes are identified which are denoted as FM 1, FM 2, FM 3, FM 4, FM 5, FM 6.
Step 2: Identify all possible risk factors. In this application, the risk factors are consistent with the RPN approach, therefore there are three risk factors, namely O, S, D.
Step 3: Determine fuzzy linguistic variables for the evaluation. As for the evaluation of failure modes, a set of linguistic variables including Very Low (VL), Low (L), Medium Low (ML), Medium (M), Medium High (MH), Very High (VH) is used as shown in Table 4. In addition, for the evaluation of risk factors’ weights, the fuzzy linguistic variables are given in Table 5.
Step 4: Evaluate failure modes and the weights of risk factors using fuzzy linguistic variables. As given in literature [28], a FMEA team of five decision makers, DM 1, DM 2, DM 3, DM 4, DM 5, is employed to evaluate failure modes and the weights of risk factors. With respect to risk factors’ weights, all five decision makers’ evaluations are given in Table 6. For the six failure modes, the evaluations from the FMEA team are given in Table 7.
Step 5: At this step, the weight of each risk factor is calculated at first. Since the calculation of risk factors’ weights is not the core concern of this paper, we simply continue to use the weights obtained in literature [28]. The importance of O is 0.768, and S 0.878, and D 0.650, therefore the weights of these risk factors are w O = 0.768 / ( 0.768 + 0.878 + 0.650 ) = 0.3345 , w S = 0.878 / ( 0.768 + 0.878 + 0.650 ) = 0.3824 , w D = 0.650 / ( 0.768 + 0.878 + 0.650 ) = 0.2831 . Secondly, let us transform the fuzzy evaluations of failure modes on risk factors to D numbers. In this example since multiple decision makers are included so as to form a group decision making environment, we use the proportion of each evaluation to construct the D numbers. For example, for FM 1 on risk factor O, five decision makers respectively give evaluations M, M, M, MH, M, hence we can construct a D number D ( M ) = 0.8 , D ( M H ) = 0.2 . In terms of this means, the evaluations to failure modes are transformed to the form of D numbers, as shown in Table 8.
Step 6: Rank the failure modes using the proposed multi-sensor information fusion method. At first, the fuzzy linguistic variables in Table 4 form a FOD Θ = { V L , L , M L , M , M H , H , V H } . Each exclusive degree between elements in Θ has been obtained in Example 1. According to Equation (15), the non-exclusive degree of any pair of elements in 2 Θ can be easily obtained. Secondly, for every failure mode the evaluations on O, S, and D can be fused based on the proposed combination operation in Definition 6. For FM 1, the aggregated evaluation is
D 1 ( { M } ) = 0.558 , D 1 ( { M L } ) = 0.263 , D 1 ( { M L , M } ) = 0.175 , D 1 ( { M L , M , M H } ) = 0.004 .
For FM 2,
D 2 ( { M , M H } ) = 0.702 , D 2 ( { M , M H , H } ) = 0.298 .
For FM 3,
D 3 ( { M H } ) = 0.943 , D 3 ( { M , M H } ) = 0.057 .
For FM 4,
D 4 ( { M L } ) = 0.236 , D 4 ( { M L , M } ) = 0.756 , D 4 ( { V L , L , M L } ) = 0.008 .
For FM 5,
D 5 ( { M L } ) = 0.178 , D 5 ( { M L , M } ) = 0.714 , D 5 ( { M L , M , M H } ) = 0.043 , D 5 ( { L , M L , M } ) = 0.065 .
For FM 6,
D 6 ( { M , M H , H } ) = 1.000 .
Thirdly, by using the PPT, we have: B e t P 1 ( { M L } ) = 0.3516 , B e t P 1 ( { M } ) = 0.6471 , B e t P 1 ( { M H } ) = 0.0013 for FM 1; B e t P 2 ( { M } ) = 0.4504 , B e t P 2 ( { M H } ) = 0.4504 , B e t P 2 ( { H } ) = 0.0993 for FM 2; B e t P 3 ( { M } ) = 0.0286 , B e t P 3 ( { M H } ) = 0.9714 for FM 3; B e t P 4 ( { V L } ) = 0.0026 , B e t P 4 ( { L } ) = 0.0026 , B e t P 4 ( { M L } ) = 0.6168 , B e t P 4 ( { M } ) = 0.3780 for FM 4; B e t P 5 ( { L } ) = 0.0216 , B e t P 5 ( { M L } ) = 0.5712 , B e t P 5 ( { M } ) = 0.3928 , B e t P 5 ( { M H } ) = 0.0144 for FM 5; and B e t P 6 ( { M } ) = 0.3333 , B e t P 6 ( { M H } ) = 0.3333 , B e t P 6 ( { H } ) = 0.3333 for FM 6. Fourthly, these pignistic probabilities are then transformed to fuzzy aggregated evaluations according to Equations (21) and (22) which are
F 1 ˜ = ( 3.2982 , 4.2982 , 4.6511 , 5.6511 ) ,
F 2 ˜ = ( 4.7482 , 5.7482 , 6.1986 , 7.1986 ) ,
F 3 ˜ = ( 4.9714 , 5.9714 , 6.9429 , 7.9429 ) ,
F 4 ˜ = ( 2.7480 , 3.7454 , 4.3648 , 5.3648 ) ,
F 5 ˜ = ( 2.8072 , 3.8072 , 4.3928 , 5.3928 ) ,
F 6 ˜ = ( 5.3333 , 6.3333 , 6.6667 , 7.6667 ) .
These fuzzy aggregated evaluations are graphically shown in Figure 4. At last, in terms of the centroid defuzzification approach we can have C F ˜ 1 = 4.4746 , C F ˜ 2 = 5.9734 , C F ˜ 3 = 6.4571 , C F ˜ 4 = 4.0559 , C F ˜ 5 = 4.1000 , C F ˜ 6 = 6.5000 . Therefore, the risk ranking of all failure modes from high to low is F M 6 F M 3 F M 2 F M 1 F M 5 F M 4 . From the result, it is found that the failure mode with the highest risk is FM 6 and that having the lowest risk is FM 4.
The above steps have clearly shown the process of using the proposed model to do the risk evaluation in FMEA under fuzzy environment. Now we compare the result obtained by the proposed model with that from other method. In literature [28], Liu et al. dealt with the risk evaluation in FMEA with an extended VIKOR method. The results of the risk ranking are given in Table 9. In [28], the failure modes are ranked in terms of three indicators S, R, Q. By S, the failure modes with the highest and lowest risk are FM 3 and FM 4; By R, the failure modes having the highest and lowest risk are respectively FM 6 and FM 4; By Q, the failure modes with the highest and lowest risk are FM 3 and FM 4, respectively. Comparing the proposed model and the extended VIKOR method in [28], the ranking obtained by the proposed model is basically same with that of R. In addition, both the two methods have identified FM 4 is the failure mode of lowest risk. In addition, as a whole the failure modes can be classified into two groups by S, R, Q, and the first group which has higher risk is composed by FM 3, FM 6, FM 2, the second group having lower risk includes FM 1, FM 5, FM 4. By using the proposed model, we also obtain the same classification that FM 6, FM 3, FM 2 are in the group with higher risk and FM 1, FM 5, FM 4 constitute the group with lower risk. Through the above analysis and comparison, therefore it shows that the proposed model is effective for risk evaluation in FMEA.

6. Conclusions

In this paper, the risk evaluation of failure modes in FMEA has been studied in an environment involving fuzzy uncertainty. A novel model is proposed for the fuzzy risk evaluation in FMEA. Within the proposed model, a D numbers based multi-sensor information fusion method has been presented to evaluate potential failure modes and rank the risk levels of failure modes. Since the use of D numbers which is a new model of extending classical D-S theory, the non-exclusiveness between the evaluations of fuzzy linguistic variables has been taken into consideration in the proposed method. Compared with some existing risk evaluation methods in FMEA, the proposed method overcomes the shortcomings of traditional RPN approach to some degrees and obtains comparable performances relative to other MCDM technologies used in FMEA. This study provides a new solution for the risk evaluation in FMEA under fuzzy environment and it is especially suitable for the case that contains non-exclusive fuzzy evaluations. In the future research, on one hand we hope to seek more practical applications with read data to analyze the proposed D numbers based multi-sensor information fusion method, on the other hand we will explore other technologies such as Physarum-inspired model [64] to improve the risk evaluation in FMEA.

Acknowledgments

The authors are grateful to anonymous reviewers for their useful comments and suggestions. The work is partially supported by National Natural Science Foundation of China (Grant No. 61703338, 61671384), Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016JM6018), Aviation Science Foundation (Program No. 20165553036), Fundamental Research Funds for the Central Universities (Program No. 3102017OQD020).

Author Contributions

X.D. and W.J. conceived, designed, performed the experiments and analyzed the data; X.D. wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Stamatis, D.H. Failure Mode and Effect Analysis: FMEA from Theory to Execution; ASQ Quality Press: Milwaukee, WI, USA, 2003. [Google Scholar]
  2. Liu, H.C.; Liu, L.; Lin, Q.L. Fuzzy failure mode and effects analysis using fuzzy evidential reasoning and belief rule-based methodology. IEEE Trans. Reliab. 2013, 62, 23–36. [Google Scholar] [CrossRef]
  3. Arabian-Hoseynabadi, H.; Oraee, H.; Tavner, P. Failure modes and effects analysis (FMEA) for wind turbines. Int. J. Electr. Power Energy Syst. 2010, 32, 817–824. [Google Scholar] [CrossRef] [Green Version]
  4. Wang, Y.M.; Chin, K.S.; Poon, G.K.K.; Yang, J.B. Risk evaluation in failure mode and effects analysis using fuzzy weighted geometric mean. Expert Syst. Appl. 2009, 36, 1195–1207. [Google Scholar] [CrossRef]
  5. Franceschini, F.; Galetto, M. A new approach for evaluation of risk priorities of failure modes in FMEA. Int. J. Prod. Res. 2001, 39, 2991–3002. [Google Scholar] [CrossRef]
  6. Zammori, F.; Gabbrielli, R. ANP/RPN: A multi criteria evaluation of the risk priority number. Qual. Reliab. Eng. Int. 2012, 28, 85–104. [Google Scholar] [CrossRef]
  7. Xiao, N.; Huang, H.Z.; Li, Y.; He, L.; Jin, T. Multiple failure modes analysis and weighted risk priority number evaluation in FMEA. Eng. Fail. Anal. 2011, 18, 1162–1170. [Google Scholar] [CrossRef]
  8. Braglia, M.; Frosolini, M.; Montanari, R. Fuzzy criticality assessment model for failure modes and effects analysis. Int. J. Qual. Reliab. Manag. 2003, 20, 503–524. [Google Scholar] [CrossRef]
  9. Liu, H.C.; You, J.X.; Li, P.; Su, Q. Failure mode and effect analysis under uncertainty: An integrated multiple criteria decision making approach. IEEE Trans. Reliab. 2016, 65, 1380–1392. [Google Scholar] [CrossRef]
  10. Liu, H.C. FMEA Using Uncertainty Theories and MCDM Methods; Springer: Singapore, 2016. [Google Scholar]
  11. Chin, K.S.; Chan, A.; Yang, J.B. Development of a fuzzy FMEA based product design system. Int. J. Adv. Manuf. Technol. 2008, 36, 633–649. [Google Scholar] [CrossRef]
  12. Yang, Z.; Bonsall, S.; Wang, J. Fuzzy rule-based Bayesian reasoning approach for prioritization of failures in FMEA. IEEE Trans. Reliab. 2008, 57, 517–528. [Google Scholar] [CrossRef]
  13. Yeh, T.M.; Chen, L.Y. Fuzzy-based risk priority number in FMEA for semiconductor wafer processes. Int. J. Prod. Res. 2014, 52, 539–549. [Google Scholar] [CrossRef]
  14. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  15. Chin, K.S.; Wang, Y.M.; Poon, G.K.K.; Yang, J.B. Failure mode and effects analysis by data envelopment analysis. Decis. Support Syst. 2009, 48, 246–256. [Google Scholar] [CrossRef]
  16. Jee, T.L.; Tay, K.M.; Lim, C.P. A new two-stage fuzzy inference system-based approach to prioritize failures in failure mode and effect analysis. IEEE Trans. Reliab. 2015, 64, 869–877. [Google Scholar] [CrossRef]
  17. Chang, W.L.; Tay, K.M.; Lim, C.P. A new application of an evolving tree to failure mode and effect analysis methodology. In Proceedings of the International Conference on Neural Information Processing, Kuching, Malaysia, 3–6 November 2014; Springer: Cham, Switzerland, 2014; pp. 415–422. [Google Scholar]
  18. Liu, H.C.; Liu, L.; Liu, N. Risk evaluation approaches in failure mode and effects analysis: A literature review. Expert Syst. Appl. 2013, 40, 828–838. [Google Scholar] [CrossRef]
  19. Waltz, E.; Llinas, J. Multisensor Data Fusion; Artech House: Boston, MA, USA, 1990. [Google Scholar]
  20. Mitchell, H.B. Multi-Sensor Data Fusion: An Introduction; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  21. Ji, L.; Yang, F.; Wang, X.; Chen, L. An uncertain information fusion method based on possibility theory in multisource detection systems. Opt. Int. J. Light Electron Opt. 2014, 125, 4583–4587. [Google Scholar] [CrossRef]
  22. Jiang, W.; Xie, C.; Zhuang, M.; Shou, Y.; Tang, Y. Sensor data fusion with Z-numbers and its application in fault diagnosis. Sensors 2016, 16, 1509. [Google Scholar] [CrossRef] [PubMed]
  23. Sun, S.; Lin, H.; Ma, J.; Li, X. Multi-sensor distributed fusion estimation with applications in networked systems: A review paper. Inf. Fusion 2017, 38, 122–134. [Google Scholar] [CrossRef]
  24. Tian, T.; Sun, S.; Li, N. Multi-sensor information fusion estimators for stochastic uncertain systems with correlated noises. Inf. Fusion 2016, 27, 126–137. [Google Scholar] [CrossRef]
  25. Palmieri, F.; Ciuonzo, D. Objective priors from maximum entropy in data classification. Inf. Fusion 2013, 14, 186–198. [Google Scholar] [CrossRef]
  26. Palmieri, F.; Ciuonzo, D. Data fusion with entropic priors. In Proceedings of the 20th Italian Workshop on Neural Nets, WIRN, Frontiers in Artificial Intelligence and Applications, Vietri sul Mare, Italy, 27–29 May 2010; Volume 226, pp. 107–114. [Google Scholar]
  27. Song, W.; Ming, X.; Wu, Z.; Zhu, B. A rough TOPSIS approach for failure mode and effects analysis in uncertain environments. Qual. Reliab. Eng. Int. 2014, 30, 473–486. [Google Scholar] [CrossRef]
  28. Liu, H.C.; Liu, L.; Liu, N.; Mao, L.X. Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment. Expert Syst. Appl. 2012, 39, 12926–12934. [Google Scholar] [CrossRef]
  29. Jiang, W.; Xie, C.; Zhuang, M.; Tang, Y. Failure mode and effects analysis based on a novel fuzzy evidential method. Appl. Soft Comput. 2017, 57, 672–683. [Google Scholar] [CrossRef]
  30. Deng, Y. D numbers: Theory and applications. J. Inf. Comput. Sci. 2012, 9, 2421–2428. [Google Scholar]
  31. Deng, X.; Hu, Y.; Deng, Y.; Mahadevan, S. Supplier selection using AHP methodology extended by D numbers. Expert Syst. Appl. 2014, 41, 156–167. [Google Scholar] [CrossRef]
  32. Deng, X.; Hu, Y.; Deng, Y.; Mahadevan, S. Environmental impact assessment based on D numbers. Expert Syst. Appl. 2014, 41, 635–643. [Google Scholar] [CrossRef]
  33. Zhou, X.; Deng, X.; Deng, Y.; Mahadevan, S. Dependence assessment in human reliability analysis based on D numbers and AHP. Nucl. Eng. Des. 2017, 313, 243–252. [Google Scholar] [CrossRef]
  34. Dempster, A.P. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 1967, 38, 325–339. [Google Scholar] [CrossRef]
  35. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976. [Google Scholar]
  36. Yang, F.; Wei, H. Fusion of infrared polarization and intensity images using support value transform and fuzzy combination rules. Infrared Phys. Technol. 2013, 60, 235–243. [Google Scholar] [CrossRef]
  37. Wang, X.; Yang, F.; Wei, H.; Ji, L. A risk assessment model of uncertainty system based on set-valued mapping. J. Intell. Fuzzy Syst. 2016, 31, 3155–3162. [Google Scholar] [CrossRef]
  38. Ford Motor Company. Potential Failure Mode and Effect Analysis (FMEA) Reference Manual; Ford Motor Company: Dearborn, MI, USA, 1988. [Google Scholar]
  39. Sankar, N.R.; Prabhu, B.S. Modified approach for prioritization of failures in a system failure mode and effects analysis. Int. J. Qual. Reliab. Manag. 2001, 18, 324–336. [Google Scholar] [CrossRef]
  40. Deng, X.; Jiang, W. An evidential axiomatic design approach for decision making using the evaluation of belief structure satisfaction to uncertain target values. Int. J. Intell. Syst. 2017, in press. [Google Scholar] [CrossRef]
  41. Yang, Y.; Han, D. A new distance-based total uncertainty measure in the theory of belief functions. Knowl.-Based Syst. 2016, 94, 114–123. [Google Scholar] [CrossRef]
  42. Yager, R.R.; Alajlan, N. Maxitive Belief Structures and Imprecise Possibility Distributions. IEEE Trans. Fuzzy Syst. 2017, 25, 768–774. [Google Scholar] [CrossRef]
  43. Elmore, P.A.; Petry, F.E.; Yager, R.R. Geospatial Modeling Using Dempster-Shafer Theory. IEEE Trans. Cybern. 2017, 47, 1551–1561. [Google Scholar] [CrossRef] [PubMed]
  44. Deng, X.; Xiao, F.; Deng, Y. An improved distance-based total uncertainty measure in belief function theory. Appl. Intell. 2017, 46, 898–915. [Google Scholar] [CrossRef]
  45. Jiang, W.; Wang, S. An uncertainty measure for interval-valued evidences. Int. J. Comput. Commun. Control 2017, 12, 631–644. [Google Scholar] [CrossRef]
  46. Wu, H.; Siegel, M.; Stiefelhagen, R.; Yang, J. Sensor fusion using Dempster-Shafer theory [for context-aware HCI]. In Proceedings of the 19th IEEE Instrumentation and Measurement Technology Conference (IMTC/2002), Anchorage, AK, USA, 21–23 May 2002; IEEE: Piscataway, NJ, USA, 2002; Volume 1, pp. 7–12. [Google Scholar]
  47. Hégarat-Mascle, S.L.; Richard, D.; Ottlé, C. Multi-scale data fusion using Dempster-Shafer evidence theory. Integr. Comput.-Aided Eng. 2003, 10, 9–22. [Google Scholar]
  48. Deng, X.; Jiang, W.; Zhang, J. Zero-sum matrix game with payoffs of Dempster-Shafer belief structures and its applications on sensors. Sensors 2017, 17, 922. [Google Scholar] [CrossRef] [PubMed]
  49. Xu, X.; Li, Z.; Li, G.; Zhou, Z. State Estimation Using Dependent Evidence Fusion: Application to Acoustic Resonance-Based Liquid Level Measurement. Sensors 2017, 17, 924. [Google Scholar] [CrossRef] [PubMed]
  50. Su, X.; Mahadevan, S.; Han, W.; Deng, Y. Combining dependent bodies of evidence. Appl. Intell. 2016, 44, 634–644. [Google Scholar] [CrossRef]
  51. Deng, X.; Han, D.; Dezert, J.; Deng, Y.; Shyr, Y. Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 2016, 46, 2070–2082. [Google Scholar] [CrossRef] [PubMed]
  52. Song, Y.; Wang, X.; Lei, L.; Yue, S. Uncertainty measure for interval-valued belief structures. Measurement 2016, 80, 241–250. [Google Scholar] [CrossRef]
  53. Deng, Y. Generalized evidence theory. Appl. Intell. 2015, 43, 530–543. [Google Scholar] [CrossRef]
  54. Jiang, W.; Zhan, J. A modified combination rule in generalized evidence theory. Appl. Intell. 2017, 46, 630–640. [Google Scholar] [CrossRef]
  55. Jiang, W.; Wang, S.; Liu, X.; Zheng, H.; Wei, B. Evidence conflict measure based on OWA operator in open world. PLoS ONE 2017, 12, e0177828. [Google Scholar] [CrossRef] [PubMed]
  56. Han, D.; Dezert, J.; Duan, Z. Evaluation of probability transformations of belief functions for decision making. IEEE Trans. Syst. Man. Cybern. Syst. 2016, 46, 93–108. [Google Scholar] [CrossRef]
  57. Smets, P.; Kennes, R. The transferable belief model. Artif. Intell. 1994, 66, 191–234. [Google Scholar] [CrossRef]
  58. Wang, N.; Liu, X.; Wei, D. A modified D numbers’ integration for multiple attributes decision making. Int. J. Fuzzy Syst. 2017, 1–12. [Google Scholar] [CrossRef]
  59. Deng, X.; Jiang, W. Exploring the combination rules of D numbers from a perspective of conflict redistribution. In Proceedings of the 20th International Conference on Information Fusion (Fusion), Xi’an, China, 10–13 July 2017; pp. 1–6. [Google Scholar] [CrossRef]
  60. Yager, R.R.; Filev, D.P. Induced ordered weighted averaging operators. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 1999, 29, 141–150. [Google Scholar] [CrossRef] [PubMed]
  61. Yager, R.R. The power average operator. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2001, 31, 724–731. [Google Scholar] [CrossRef]
  62. Jiang, W.; Wei, B.; Zhan, J.; Xie, C.; Zhou, D. A visibility graph power averaging aggregation operator: A methodology based on network analysis. Comput. Ind. Eng. 2016, 101, 260–268. [Google Scholar] [CrossRef]
  63. Ebrahimnejad, S.; Mousavi, S.; Tavakkoli-Moghaddam, R.; Hashemi, H.; Vahdani, B. A novel two-phase group decision making approach for construction project selection in a fuzzy environment. Appl. Math. Model. 2012, 36, 4197–4217. [Google Scholar] [CrossRef]
  64. Xu, S.; Jiang, W.; Deng, X.; Shou, Y. A modified Physarum-inspired model for the user equilibrium traffic assignment problem. Appl. Math. Model. 2017, in press. [Google Scholar] [CrossRef]
Figure 1. Graphically presentation of the trapezoidal fuzzy number.
Figure 1. Graphically presentation of the trapezoidal fuzzy number.
Sensors 17 02086 g001
Figure 2. Graphically presentation of fuzzy linguistic variables in Table 4.
Figure 2. Graphically presentation of fuzzy linguistic variables in Table 4.
Sensors 17 02086 g002
Figure 3. Flowchart of the proposed model for fuzzy risk evaluation in FMEA.
Figure 3. Flowchart of the proposed model for fuzzy risk evaluation in FMEA.
Sensors 17 02086 g003
Figure 4. Graphically presentation of fuzzy aggregated evaluations.
Figure 4. Graphically presentation of fuzzy aggregated evaluations.
Sensors 17 02086 g004
Table 1. Assessment rankings for occurrence in FMEA [38,39].
Table 1. Assessment rankings for occurrence in FMEA [38,39].
RankingProbability of OccurrencePossible Failure Rate
10Extremely high: failure almost inevitable≥1/2
9Very high1/3
8Repeated failures1/8
7High1/20
6Moderately high1/80
5Moderate1/400
4Relatively low1/2000
3Low1/15,000
2Remote1/150,000
1Nearly impossible≤1/1,500,000
Table 2. Assessment rankings for severity in FMEA [38,39].
Table 2. Assessment rankings for severity in FMEA [38,39].
RankingEffectSeverity of Effect
10Hazardous without warningVery high severity ranking when a potential failure mode affects safe vehicle operation and/or involves noncompliance with government regulations without warning
9Hazardous with warningVery high severity ranking when a potential failure mode affects safe vehicle operation and/or involves noncompliance with government regulations with warning
8Very highVehicle/item inoperable, with loss of primary function
7HighVehicle/item operable, but at reduced level of performance. Customer dissatisfied
6ModerateVehicle/item operable, but comfort/convenience item(s) inoperable. Customer experiences discomfort
5LowVehicle/item operable, but comfort/convenience item(s) operable at reduced level of performance. Customer experiences some dissatisfaction.
4Very lowCosmetic defect in finish, fit and finish/squeak or rattle item that does not conform to specifications. Defect noticed by most customers
3MinorCosmetic defect in finish, fit and finish/squeak or rattle item that does not conform to specifications. Defect noticed by average customer
2Very minorCosmetic defect in finish, fit and finish/squeak or rattle item that does not conform to specifications. Defect noticed by discriminating customers
1NoneNo effect
Table 3. Assessment rankings for detection in FMEA [38,39].
Table 3. Assessment rankings for detection in FMEA [38,39].
RankingDetectionCriteria
10Absolutely impossibleDesign control will not and/or cannot detect a potential cause/mechanism and subsequent failure mode; or there is no design control
9Very remoteVery remote chance the design control will detect a potential cause/mechanism and subsequent failure mode
8RemoteRemote chance the design control will detect a potential cause/mechanism and subsequent failure mode
7Very lowVery low chance the design control will detect a potential cause/mechanism and subsequent failure mode
6LowLow chance the design control will detect a potential cause/mechanism and subsequent failure mode
5ModerateModerate chance the design control will detect a potential cause/mechanism and subsequent failure mode
4Moderately highModerately high chance the design control will detect a potential cause/mechanism and subsequent failure mode
3HighHigh chance the design control will detect a potential cause/mechanism and subsequent failure mode
2Very highVery high chance the design control will detect a potential cause/mechanism and subsequent failure mode
1Almost certainDesign control will almost certainly detect a potential cause/mechanism and subsequent failure mode
Table 4. Linguistic variables for evaluating the weights of risk factors.
Table 4. Linguistic variables for evaluating the weights of risk factors.
Linguistic VariablesFuzzy Numbers
Very Low (VL)(0, 0, 1, 2)
Low (L)(1, 2, 2, 3)
Medium Low (ML)(2, 3, 4, 5)
Medium (M)(4, 5, 5, 6)
Medium High (MH)(5, 6, 7, 8)
High (H)(7, 8, 8, 9)
Very High (VH)(8, 9,10,10)
Table 5. Linguistic variables for the evaluation.
Table 5. Linguistic variables for the evaluation.
Linguistic VariablesFuzzy Numbers
Very Low (VL)(0, 0, 0.1, 0.2)
Low (L)(0.1, 0.2, 0.2, 0.3)
Medium Low (ML)(0.2, 0.3, 0.4, 0.5)
Medium (M)(0.4, 0.5, 0.5, 0.6)
Medium High (MH)(0.5, 0.6, 0.7, 0.8)
High (H)(0.7, 0.8, 0.8, 0.9)
Very High (VH)(0.8, 0.9, 1, 1)
Table 6. The evaluations to the weights of risk factors from the FMEA team.
Table 6. The evaluations to the weights of risk factors from the FMEA team.
Risk FactorFMEA Team Member
DM 1DM 2DM 3DM 4DM 5
OHHVHHMH
SVHVHHVHVH
DMHMHMHMH
Table 7. The evaluations to failure modes from the FMEA team.
Table 7. The evaluations to failure modes from the FMEA team.
FM 1FM 2FM 3FM 4FM 5FM 6
O
DM 1MHVHMMMH
DM 2MMHMHMMLH
DM 3MHVHLMM
DM 4MHMHVHMMMH
DM 5MMHVHMMM
S
DM 1MLHMHMMH
DM 2MLMHMHMMHH
DM 3MLHMHMLMHH
DM 4MHMHMMH
DM 5MHMHMMH
D
DM 1MMMHVLLL
DM 2MLMMMLMLM
DM 3MLMLMHVLLL
DM 4MLMMHMLLL
DM 5MLMMVLLVL
Table 8. The evaluations to failure modes in the form of D numbers.
Table 8. The evaluations to failure modes in the form of D numbers.
Failure ModeOSD
FM 1 D ( { M } ) = 0.8 , D ( { M H } ) = 0.2 D ( { M L } ) = 0.6 , D ( { M } ) = 0.4 D ( { M } ) = 0.2 , D ( { M L } ) = 0.8
FM 2 D ( { H } ) = 0.4 , D ( { M H } ) = 0.6 D ( { H } ) = 0.8 , D ( { M H } ) = 0.2 D ( { M } ) = 0.8 , D ( { M L } ) = 0.2
FM 3 D ( { V H } ) = 0.8 , D ( { M H } ) = 0.2 D ( { M H } ) = 1 D ( { M H } ) = 0.6 , D ( { M } ) = 0.4
FM 4 D ( { M } ) = 0.8 , D ( { L } ) = 0.2 D ( { M } ) = 0.8 , D ( { M L } ) = 0.2 D ( { V L } ) = 0.6 , D ( { M L } ) = 0.4
FM 5 D ( { M } ) = 0.8 , D ( { M L } ) = 0.2 D ( { M } ) = 0.6 , D ( { M H } ) = 0.4 D ( { L } ) = 0.8 , D ( { M L } ) = 0.2
FM 6 D ( { M } ) = 0.4 , D ( { M H } ) = 0.4 , D ( { H } ) = 0.2 , D ( { H } ) = 1 D ( { L } ) = 0.6 , D ( { M } ) = 0.2 , D ( { V L } ) = 0.2
Table 9. Risk ranking of failure modes by using the extended VIKOR method in [28].
Table 9. Risk ranking of failure modes by using the extended VIKOR method in [28].
Failure Mode
FM 1FM 2FM 3FM 4FM 5FM 6
By S421653
By R532641
By Q531642

Share and Cite

MDPI and ACS Style

Deng, X.; Jiang, W. Fuzzy Risk Evaluation in Failure Mode and Effects Analysis Using a D Numbers Based Multi-Sensor Information Fusion Method. Sensors 2017, 17, 2086. https://doi.org/10.3390/s17092086

AMA Style

Deng X, Jiang W. Fuzzy Risk Evaluation in Failure Mode and Effects Analysis Using a D Numbers Based Multi-Sensor Information Fusion Method. Sensors. 2017; 17(9):2086. https://doi.org/10.3390/s17092086

Chicago/Turabian Style

Deng, Xinyang, and Wen Jiang. 2017. "Fuzzy Risk Evaluation in Failure Mode and Effects Analysis Using a D Numbers Based Multi-Sensor Information Fusion Method" Sensors 17, no. 9: 2086. https://doi.org/10.3390/s17092086

APA Style

Deng, X., & Jiang, W. (2017). Fuzzy Risk Evaluation in Failure Mode and Effects Analysis Using a D Numbers Based Multi-Sensor Information Fusion Method. Sensors, 17(9), 2086. https://doi.org/10.3390/s17092086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop