Next Article in Journal
Grouping Bilinear Pooling for Fine-Grained Image Classification
Previous Article in Journal
Influence of Carbon Dioxide Curing on the Corrosion Resistance of Reinforced Cement Mortar under the External Erosion of NaCl Freeze–Thaw Cycle
Previous Article in Special Issue
Remaining Useful Life Prediction of Cutting Tools Using an Inverse Gaussian Process Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Dynamic Approach for Risk Analysis and Simulation Using Multi-Agents Model

1
College of Engineering and Technology, American University of the Middle East, Egaila 54200, Kuwait
2
Data Scientist, Renault Group, 92100 Boulogne-Billancourt, France
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(10), 5062; https://doi.org/10.3390/app12105062
Submission received: 4 April 2022 / Revised: 27 April 2022 / Accepted: 6 May 2022 / Published: 17 May 2022
(This article belongs to the Special Issue Modelling Dependent Failure Processes)

Abstract

:
Static risk analysis techniques (SRATs) use event graphs and risk analysis assessment models. Those techniques are not time-based techniques and hence are inadequate to model dynamic stochastic systems. This paper proposes a novel dynamic approach to model such stochastic systems using Dynamic Fault Trees (DFT). The proposed model is called Generic Dynamic Agent-Based Model (GDABM) for risk analysis. GDABM is built on top of the well-known Agent-Based Modeling and Simulation (ABMS) technique. GDABM can model the dynamic system agents in both nominal (failure-free) and degraded (failure) modes. GDABM shows the propagation of failure between system elements and provides complete information about the system’s configurations. In this paper, a complete detailed case study is provided to show the GDABM capabilities to model and study the risk analysis for such dynamic systems. In the case study, the GDABM models the risk analysis for a chemical reactor/operator and performs a complete risk analysis for the entire system. The GDABM managed to simulate the dynamic behavior of the system’s components successfully using Repast Simphony 2.0. Detailed agent behavioral modes and failure modes are provided with various scenarios, including different time stamps. The proposed GDABM is compared to a reference model. The reference model is referred to as the ABM model. GDABM has given very promising results. A comparison study was performed on three performance measures. The performance measures used are (1) Accuracy, (2) response time, and (3) execution time. GDABM has outperformed the reference model by 15% in terms of accuracy and by 27% in terms of response time. GDABM incurs a slightly higher execution time (13%) when compared to the ABM reference model. It can be concluded that GDABM can deliver accepted performance in terms of accuracy and response time without incurring much processing overhead.

1. Introduction

The field of system engineering conducts risk analysis and assessment for various real-world industrial systems. Those systems have a high complexity level which depends on the huge size of the system, implying an important number of interactions between the system’s components and its dynamic operational environment.
Analyzing risks related to such systems considers mainly two factors: the probability of having a failure and the severity of the resulting outcomes. This severity could vary from minor consequences to disastrous ones. Thus, modeling and simulation of such dynamic systems are crucial. Due to the complexity and the dynamic aspect of the studied systems, a dynamic representation of the system’s behavior is needed to rank its performance and analyze its reliability.
In literature, modeling techniques are classified into static and dynamic. Static modeling techniques were used to assess system reliability, such as a bow-tie diagram, which consists of an event tree and a fault tree, and block diagrams. Those techniques are not adequate for studying the dynamic effects of time-dependent systems; since there are many interesting behaviors that static modeling techniques will not be able to model. An example of such interesting behavior is time-dependent behavior that changes over time. On the other hand, and after many developments over the past decades, scientists developed many dynamic modeling techniques that provide means of modeling and simulation of the time-dependent behavior of various complex systems, including a wide range of real-world industrial systems operating in a dynamic environment. Those techniques overcome the limitations of the conventional static risk analysis techniques. Examples of such methods are Petrinets [1], graphical Markov models [2], state-transition graphs, Business Process Model [3], Stochastic Hybrid Automaton (SHA), Monte Carlo simulations [4], and Agent-Based Modelling and Simulation (ABMS) [5].
Yagi et al. [6] have proven that ABMS is one of the most adequate tools to model dynamic systems with autonomous agents. ABMS was proven to be suitable for risk assessment since the agents frequently cooperate and interact with each other [7]. To the best of our knowledge, ABMS is not widely used in the field of risk analysis and its application is limited by performing a general risk analysis without providing any details about the failure (causes and consequences), the failure propagation between the various system’s components and the mutual relation between agents behavioral and failure modes.
This paper aims to (1) propose an extension to the classical ABM that overcomes the above limitations, (2) provide full details about risk analysis, (3) represent the failure propagation and risk analysis in the agent-based model, and (4) study the failure of a system’ component to show its effects on the agent’s behavioral mode in addition to its transition to the other system’ components. This extension is represented by a risk model, which allows us to model and simulate the system behavior in nominal (failure-free) and degraded (failure) modes [8]. The proposed model is called Generic Dynamic Agent Based Model for risk analysis (GDABM).
The remainder of the paper is organized as follows. Section 2 highlights the main dynamic models and Section 3 presents a literature review of the most used methods in risk analysis. Section 4 identifies the selected methods for risk analysis. Section 5 gives a complete description of the classical ABM. Section 6 discusses the proposed model (GDABM). Section 7 has the case study of using the chemical reactor/operator to verify and validate the proposed model. Section 8 has the simulation testbed. Section 9 has the conclusion and the future work of the paper.

2. Dynamic Modeling

Dynamic modeling, known as simulation modeling, is described mainly using mathematical models. Delany et al. [9] assume that dynamic models (DM) are defined using a set of rules. These rules take the current states as inputs and study how the modeled systems change over time. In this subsection, a taxonomy of the main dynamic approaches applied to complex systems will be shown. Borshchev et al. [10] describe DM as a relationship providing the next state of the studied system based on its present state. Min and Zhou [11] categorized the model variables as follows:
  • Non-probabilistic/Deterministic models that use static crisp parameters. They are decomposed into two categories: (1) Single objective models and (2) multi-objective models;
  • Probabilistic/Stochastic models that include unknown or random parameters [12,13] where Markov models can be used to model such stochastic events. Those approaches can be further classified as (1) the optimal control theory and (2) the dynamic programming;
  • Hybrid models have mixed elements from both the deterministic and the stochastic models. Hybrid models include both the simulation aspects and the inventories theory to cover crisp and uncertain parameters;
Beamon [14] and Labarthe [15] have classified the models based on the used tools (such as economic, analytical, simulation, and organizational approaches). One of the important strengths of dynamical modeling is the ability to illustrate the temporal aspect throughout the simulation. Three modeling approaches of the temporal aspect could be observed in Figure 1: Random Number Models, Continuous Time Models, and Discrete Event Models. Hybrid modeling illustrates the combination of those approaches.

2.1. Random Number Models

In the field of risk analysis, most of the work did not focus on studying the events and hence the probability of detecting events in a simulation is very rare.
A possible solution is to conduct the experiment with a random generation of inputs. A computer is defined as a deterministic machine capable of carrying out instructions fed beforehand, represented as a program. Deterministic algorithms are used for the generation of random numbers (GRN); those numbers should resemble random even on large scales [16]. The best algorithms for GRN have been developed by mathematicians [17]. For reliability analysis, Monte Carlo Models, Markov models, and Agent-based models are on the top of random number models.

2.2. Continuous-Time Models

In continuous-time model (CTM) and as the name indicates, a continuous description of the variable’s changes is provided using some differential equations. CTM covers:
  • System Dynamics (SD): SD is defined as a mathematical model that represents complex systems. The applications of this model are very wide, and it is mainly discrete.
  • Markov model: Markov model is a set of consecutive random variables that represent the system evolution dynamically in continuous or discrete-time models. Although Markov chains [18] have been implemented with success in the context of risk analysis [13], they are inadequate for large systems [16], and they are inadequate for short time interval [19].

2.3. Discrete Event Models

In contrast to continuous models, for a discrete event system (DES), ref. [20] the state variable changes at discrete/numerous times, with a chronological representation of each operation as a sequence of events. Each event is described by an occurrence time that may change the system’s state. For DES, changes may happen only at the moment of event occurrence. DES can be done using activity-based, event-based, three-phase approaches, and process-based [21]. In literature, the most used DES tools are
  • Discrete event simulation (DES) describes entity flow and resource sharing using entities, resources, and block charts with the related changes at the prescribed occurrence time [22]. DES is used in different applications and mainly for safety analysis and performance evaluation [23]. Arena, ProModel, Witness, and Anylogic are the most used software for DES.
  • Petri Nets (PN) is described as a mathematical modeling language that can represent distributed and discrete systems using some places, arcs, transitions, and tokens. PN was applied successfully in different fields such as reliability analysis, planning of complex production systems, modeling of automated production systems, and management of supply chains [24,25,26,27,28,29].
  • Business Processes Model (BPM): Known as BPMN (Business Process Modeling Notation). It is a standard method representing processes using simple diagrams easily managed by IT and business managers [30,31].

2.4. Hybrid Models

  • Agent-based modeling (ABM): ABM is a new approach used to model distributed and intelligent systems. It is a decentralized model, highly preferred for complex systems and characterized by the diversity of its abstraction level. ABM was tested and used in different application as supply chain [32], air transport [33,34], health and spread of pandemics [35], and evacuation plan in a fire situation with obstacles [36], but its application for risk engineering science is very limited. ABM is considered a simple modeling tool for complex system representation by modeling only the individual units named agents and simulating their interaction to get the behavior of the whole system [16].
  • Logical-combinatorial approach (LCA): It is mainly used for supervised and unsupervised dynamic pattern recognition problems. It aims to classify a set of classes as normal or deviated [37]. The majority of the papers developed using LCA focused on three problems: feature selection, supervised classification, and unsupervised classification [38]. This approach can be used to perform dynamic risk analysis as it can show two different categories of behavioral modes: Normal and Abnormal.

2.5. Why Agent-Based Model?

ABM is characterized by the definition of behavior at the individual level. In this work, it is used because of the below:
  • It is made up of several intelligent agents that communicate and cooperate with each other within a distributed and dynamic environment [7];
  • Its intelligence is represented by the ability to make decisions under incomplete/partial perception of its environment [39]
  • Its capability to analyze complex models with a high level of inter-dependencies;
  • Its ability to deal with decentralized/distributed components;
  • Its flexibility: represented by the dynamic number of agents in the simulation;
  • Its ability to detect the unexpected behavior of a complex system;
  • Its very high Computational power allows users to modulate complex systems with micro details.

3. Risk Analysis

Risk Analysis (RA) is the first step in the risk management process that aims to identify risk origin, impacted areas, and probable interventions [40,41]. It is defined as a measure of losses on economic, population, and environmental levels. It is characterized by two aspects that provide an evaluation of the related risk level: likelihood or the expected probability ψ of an event occurrence and the severity or the effect η of its undesirable consequences. Four risk levels can be distinguished: high (H), significant (S), moderate (M), and low (L) risk regions, as shown in Table 1. Risk assessment process could be used in any system type, such as insurance systems [42], nuclear industry [43], transportation of ice-covered waters [44], building fire evacuation [45], online shopping transaction [46], and food security system [47].

3.1. Classification of Reliability-Based Methods for Risk Analysis (RMRA)

RMRA are classified into three categories: Qualitative, Semi-Quantitative, and Quantitative, which depend on the type of available data [48,49]. Those categories with the covered methods are visualized in the form of a Venn diagram, presented in Figure 2.

3.2. Qualitative Risk Assessment (QRA)

Insufficient data leads to a qualitative risk assessment that uses some information about hazards, causes, and outcomes of failure, in addition to the probability of failure events, to produce reliability. The most used methods for QRA are Hazard and Operability Study (HAZOP) [50], What-if/Checklist, Logic diagrams, and Failure Modes and Effects Analysis (FMEA) [51].

3.3. Semi-Quantitative Risk Assessment (SQRA)

SQRA is to be applied whenever the studied system requires further details than the qualitative approach [49]. It covers some quantity of probability, outcomes, and risk value. It may be conducted using fault tree analysis (FTA), Dynamic fault tree (DFT), event tree analysis (ETA), bow-tie analysis (BT), or risk ranking matrix [52].

3.3.1. Dynamic Fault Tree

FTA is used for different applications to study system dependability [53]. It consists of many logic gates that represent the relationship between failures and their origin. In an FTA, basic events are independent, and no consideration of events sequencing/order is possible [54]. This model is called Static Fault Tree (SFT). In literature, many attempts have been reported to overcome these constraints, with consideration of the temporal aspect and statistical dependencies in the FT model. In 1976, Fussell et al. [55] have introduced the concept of Priority-AND (PAND) gate. Later, many other extensions to the SFTs have been proposed (e.g., DFT [56], temporal fault trees [57], and State/event fault trees [58]). The most popular one is the DFT. It retains the PAND gate and adds many others like priority OR (POR), Functional Dependency (FDEP), Warm Spare (WSP), and Sequence enforcing (SEQ). Unlike the static fault tree, DFT uses both Boolean and dynamic gates to specify logical relationships among events.

3.3.2. Event Tree Analysis

An event tree analysis (ETA) is performed following the bottom-up approach. It identifies all potential event sequences which may result from the initial event. Event trees were applied in many cases to analyze risks for chemical processes [59]. This analysis consists of two parts: analyzing the causes of an event (failure mode) using DFTA and identifying the sequence of events using ETA. The combination of DFTA and ETA forms a Bow-Tie Analysis (BTA).

3.4. Quantitative Risk Assessment (QRA)

QRA is to be applied whenever the analyzed risks need further detailed analysis. QRA assesses risks to identify and prioritize technology needs and evaluate regulatory alternatives [60]. Quantitative methods used in the literature can be analytical (such as the probability of failure POF, second-order reliability method SORM), probabilistic (Monte-Carlo simulation MCS, stochastic response surface methods SRSM), or sophisticated (fuzzy set theory FST, multi-criteria decision analysis MCDA) [61]. Those reliability-based methods are then categorized into FM analyses (FMEA), tree and diagrammatic analyses [62,63,64,65] (FTA, DFT, ETA, and BT), and hazard analyses (HAZOP). Ref. [66] contains further details of risk assessment methods. Complex mathematical and statistical problems can be easily represented and solved using Monte Carlo simulation. It was applied in many fields such as Energy, finance, project management [67], engineering [68], insurance, transportation [69], human health risk assessment [70], and manufacturing. Kolios et al. [71] declare that MCs come with high computational effort, which is considered the main disadvantage.

4. Selected Methods for Risk Analysis

After providing an overview of the main methods used for risk assessment, Table 2 highlights some capabilities and limitations of those methods.
As shown in Table 2, Dynamic Fault Tree (DFT) and Monte Carlo simulation (MCs) are the most suitable method for dynamic systems. MCs is considered the ideal solution to model random events with rare probability, which is the case of failure events [78], but this method requires a high computational effort [71]. DFT is the best method to be used for fully dynamic systems with consideration of probability of failure and repair rate [79]. In this work, the authors used DFT to consider the dependencies, sequences, and redundancies of FMs using special dynamic logic gates [73]. Furthermore, it allows the representation of the combination of events and the effects of the order of the failure [79]. In contrast to the static fault tree, DFT covers dynamic and logical gates that represent the relationship between the studied events.
As in this work, the authors aim to represent the dynamic agent’s behavioral and failure modes, so DFT was used to represent the failure propagation between the system’s components and perform risk analysis.

5. Classical Agent-Based Model (ABM)

This section discusses the classical ABM modeling technique [5]. ABM models the agents of a specific system and simulates the interactions of these agents with the environment to get the overall system behavior, as shown in Figure 3. ABM is used to model and simulate systems in different sectors [80] such as traffic [81], Epidemic transmission (COVID-19) [82], and construction [83]. The following subsections discuss the agents and the environment modules in addition to the use of ABM to assess risk analysis.

5.1. Agent

In literature, the term agent has many definitions. In this paper, an agent is defined as an autonomous entity with an informative state and could be either software or hardware [84]. The informative state S is defined as in the tuple S = <X, Y, B M s > represented in Figure 3 where:
X. It is a finite set x 1 , , x θ of variables that define the dynamic characteristics of an agent, where θ is the total number of variables for an agent.
Y. It is a finite set y 1 , , y ρ of attributes that define the static characteristics of the agent, where ρ is the total number of attributes for an agent.
B M s . It is a finite set of behavioral modes (BM)= B M 1 , , B M ρ that specifies the rules under which the agent acts, where ϱ is the total number of behavioral mode for an agent covering the nominal and failure modes.

5.2. Environment

An environment is the place where an agent is located [84]. For each agent A i , there is an environment Ω i defined as the set of all objects/agents outside A i . A mutual relationship exists between agent-environment: agents use any information sensed from the environment to make possible decisions whenever needed and they are capable of producing output actions that affect the environment, as shown in Figure 3. Sometimes, the collected information is incomplete. Due to their intelligence, agents will make their decisions in such conditions of uncertainty [39].

5.3. Risk Analysis Using Classical ABM

ABM was used for risk analysis in various fields such as reinforcement learning [85], financial risk [86], social risk [87], oil sector [7], gas sector [88], natural disaster and emergency systems [89,90,91,92], disease propagation stochastic modeling systems [93], supply chains [94], intrusion detection and prevention systems for Android mobile devices [95], green edge computing systems [96], and cloud computing [97].
Meanwhile, we have investigated state of the art in multi-agent work that took stochastic systems into consideration and we have listed the following references: smart electricity grids and markets, biology epidemics distribution systems, and ecological systems [98,99,100,101,102,103]. However, they didn’t show the details of the methodology used in the problem-solving process. A limited number of authors are explicitly using ABM as a novel modeling approach [104,105,106] and their proposed approach does not represent the failure propagation between system agents. To do so, a risk model should be considered for ABM. This model is presented in Section 5.

6. Generic Dynamic ABMS (GDABM) for Risk Analysis

This section presents a proposed extension of ABM allowing the representation of the overall system behavior in normal and degraded modes in addition to the analysis of existing risks. This extension forms the new risk model called Generic Dynamic Agent Based Model (GDABM) for risk analysis. Figure 4 shows the 4 components of GDABM:
  • Behavioral Modes (BMs);
  • Failures Modes (FMs);
  • External Failure Agent Communication (EFAC);
  • Internal Failure Agent Communication (IFAC).
Those components provide a standard pattern (or metamodel) for the system’ agents. The first component is used to illustrate the system in its different operating modes. The second component allows risk situations to be identified with full details and components 3 and 4 are used to assess and represent the spread of risk from one element to another. GDABM represents the contribution of this work because these four components are the elements necessary and sufficient to model any agent behavior and also analyze and assess the risk according to the evolution of the system. The following sections discuss the components.

6.1. Behavioral Modes (BMs)

In the field of risk analysis, the concept of agent mode defines the agent’s operational behavior in the presence of failure conditions. In the same way, the nominal agent mode defines the agent’s operational behavior without the presence of any failure. Behavioral modes (BM) define the agent’s behavior in both its nominal and degraded modes. BM describes the dynamic behavior of a multi-agent system by continuously measuring the behavior of each agent in that system. As cited in Section 4, an agent is defined by a set of variables, attributes, and behavioral modes. Its dynamic movement in a behavioral mode M i is defined using a set of sequential modules/blocks represented as activity blocks. Those modules can be of 4 types, as shown in Figure 5.
  • Start Module (SM): It is the starting point at which the agent is created and ready to process.
  • Activity Process Module (APM): It represents the various activities to be processed by an agent a. It describes the interaction between a and other system agents. Such activities may include creating new agents or deleting existing ones. APM has the following characteristics, as shown in Figure 6.
    (a)
    A mathematical relation: It can be of two types:
    • Discrete relations f i :
      x ( k + 1 ) = f i ( x ( k ) , y ( k ) , u ( k ) , v ( k ) ) , M ( f i ) ;
    • Continuous relations g i :
      x * ( k ) = g i ( x * ( k ) , y ( k ) , u ( k ) , v ( k ) ) , M ( g i ) ;
      where: x ( k ) : finite set of agent a variables;
    y ( k ) : finite set of agent a attributes;
    u ( k ) : variables of agents in relations with a;
    v ( k ) : attributes of agents in relations with a;
    M ( f i ) : set of behavioral modes M ( f i ) B M , when f i is valid;
    M ( g i ): set of behavioral modes M ( g i ) B M , when g i is valid;
    x * : subset x * x of the agents variables;
    (b)
    A duration: It is the time required to execute the activity process;
    (c)
    Consumable Input Agents: They are consumable agents that help to generate the output agents.
    (d)
    Non-consumable Input Agents: They are non-consumable agents that should be allocated to the agent activity to perform a certain task then get released on task completion.
    (e)
    Output Agents: They are the agents produced at the end of the activity.
    (f)
    Activity Agent: It is the agent executing the activity.
    (g)
    Activity engine: It is the core of the activity process that identifies the inputs/outputs agents and controls the actions among different activity components. It describes how to generate output agents using input agents.
    (h)
    Inputs Actions: They are pre-actions that should be performed just before the execution of the APM (e.g., allocating non-consumable agents for a certain amount of time)
    (i)
    Outputs Actions: They are post-actions that should be performed once the APM is performed (e.g., deallocating non-consumable agents after the task is completed).
    (j)
    Filtering Conditions: Which precise the criteria required for consumable/non-consumable agents of the activity.
  • Decision Making Module (DMM): It is the module responsible for checking some conditions on the agent’s variables. The result decides how the agent proceeds.
  • End Module (EM): It is the point where the agent is terminated and deleted from the system.
Making a coffee represents an example of the Activity Process Module. In the coffee preparation process, the following assumptions are used:
  • Duration is the amount of time to make a cup of coffee which is assumed to be 45 s.
  • Consumable input agents are coffee powder, water, electricity, and an empty cup.
  • Non-consumable input agents are coffee room and the coffee table.
  • Output agent is the prepared cup of coffee.
  • Input action is the process of reserving the coffee machine/making the water temperature 65.
  • Output action is the process of releasing the coffee machine.
  • Filtering Conditions is the process of selecting one coffee powder brand among a set of alternatives in the kitchen.

6.2. Failure Modes (FMs)

Failure modes (FMs) are events that describe the agents’ failures in detail. For each agent in the system, FMs identify (1) what triggers the agents to fail and (2) what caused the agent’s inability to comply with the expected level of performance. FMs assume the following:
  • Facts are represented by events;
  • Agents can have one or more events.
  • An event can be either active or inactive;
Failure modes have different attributes as described in Equation (3). They are classified into three categories, Boolean Failure Modes B F M s , Stochastic Failure Modes S F M s , and Complex Failure Modes C F M s .
F M = < N , A , F , S >
where N, A, F, and S are:
  • N is the failure mode’s name;
  • A is the agent that experiences the failure;
  • F is the current value of the failure whether it is active or inactive failure.
  • S is the set of successor events in case of active failure, represented in an event tree.
  • Boolean Failure Modes (BFMs): A Boolean Failure Mode is an event representing a certain condition/expression (e.g., a > b, a + b < c, ⋯) and has the value of that expression. Once this expression is true or valid, the failure mode is said to be active. In general, the expression is directly related to the agent’s variables. B F M is expressed in terms of the Boolean expression B as in Equation (4):
    B F M = < N , A , F , S , V >
    where V is the Boolean expression associated with the agent variable(s).
  • Stochastic Failure Modes (SFMs): S F M is a failure mode defined as a probability of failure. S F M is represented in Equation (5)
    S F M = < N , A , F , S , P >
    where P is the probability that represents the likelihood of the system’s failure;
  • Complex Failure Modes (CFMs) A C F M is defined as in Equation (6):
    C F M = < N , A , F , S , D >
    where D represents the set of predecessor events of the C F M represented in a dynamic fault tree. Predecessor events could be either of type B F M or C F M . A C F M is enabled when the result of the output of the combinational circuit is enabled.
Figure 7 has the bow-tie diagram. It consists of the combinational circuit, PAND, POR, SEQ, SPARE and FDEP gates, representing the dynamic fault tree. The diagram also has the event tree representing the set of consecutive events that occur on failure. The bow-tie diagram is a typical example of the CFM.

6.3. External Failure Agent Communication (EFAC)

An External Failure Agent Communication (EFAC) governs the communication among different agents (connection d). A failure of an agent i could be propagated to other surrounding agents. When a failure mode i F M of an agent i becomes active, this agent broadcasts a message to all surrounding agents. The propagated message contains complete information about the failure. This failure will be added to the set of external failure elements of the surrounding agent’s failure modes.
For example, if we consider a multi-agent environment where the agents are trucks moving in a highway. If a truck t 1 travels from a point A to a point B, a collision between two other trucks t 2 , and t 3 in the same path of the truck t 1 , might cause a significant delay to truck t 1 . This collision information will be shared with t 1 and it is considered as an external agent failure for t 1 .

6.4. Internal Failure Agent Communication (IFAC)

In the proposed GDABM model, there is a bidirectional influence between the FMs and the BMs for any agent. This influence describes how the change in the value of the agent’s variables in a behavioral mode might trigger an agent’s failure mode.
For example, in a car, many failure modes could occur. Failure modes could be mechanical, electrical, fuel-based, car body, etc. Initially, all of these failures are assumed to be inactive. The car, in this case, is assumed to be functioning properly (in its nominal mode). In case of any failure activation to any of the aforementioned components, that would lead to a degraded functionality of the car (degraded mode) and might lead to a more severe total dysfunctional of the car.
There are two sets associated with any agent i, BMs set ( i B M ) and FMs set ( i F M ). If the number of elements in the FM set is μ , then the number of elements in the BM set can take up to 2 μ values, one of which is considered nominal.
The following subsections have the influence of the BMs on the FMs and vice versa.

6.4.1. BMs → FMs

This section has the influence of the BMs on the FMs (connection a). The BMs are assumed to have a set of variables denoted by X. These variables have constraints. The constraints on the agent’s variables define a set of CBFM for that agent.
Equation (7) computes the FM as a function of the BM’s variables.
i F M = φ i ( X )
where: i F M : is a CBFM of the agent i, φ i ( X ) : is a boolean expression of X for an agent i. If φ i ( X ) is true, i F M becomes active and will be added to the set of active failure modes of the agent i.

6.4.2. FMs → BMs

The behavior of an agent i in a multi-agent environment is assumed to be initially in its nominal mode i N o m .
Nominal mode i N o m contains a set of activities υ . Each activity υ has a set of FMs. The set i I F A C covers all possible FMs that are generated within the agent during the execution of any activity υ . Moreover, i E F A C covers the set of all possible failure modes that occur by other external agents.
For each agent i, a set of failure modes i F M is defined as an in Equation (8):
i F M = i I F A C i E F A C
Equation (9) computes the behavioral mode i B M of an agent i as a function ϑ of the set of the active failure modes i F M of that agent.
i B M = ϑ ( i F M )
If i F M does not contain any FM elements, i F M = ϕ , then the i B M of the agent i is nominal i N o m . On the other hand, any addition of a failure mode element to the set of active failure modes leads to a disruption of the behavioral mode (connection b).
Figure 8 represents the proposed model (GDABM). The figure shows the interaction between an agent i and its environment. The GDABM is composed of: (1) Risk Model Block (FM): It has the set of failure modes available in the GDABM in addition to their causes and consequences. Sources/causes of failure modes are described in a dynamic fault tree and their consequences are illustrated in an event tree. For each failure mode, there is an associated behavioral mode to be triggered (2) Behavioural Mode (BM) module contains a set of degraded modes that are possible to occur in addition to the nominal mode. (3) Set of Variables: It holds the static characteristics of the agent. (4) Set of Attributes: It holds the dynamic characteristics of the agent. (5) Agent’s environment: It holds the external agents.

7. Case Study: Modelling Chemical Reactor/Operator Using GDABM

This section has a detailed case study of a multi-agent system that uses the proposed Generic Dynamic Agent-Based Model (GDABM) for risk analysis to models and simulates both nominal and degraded conditions of a chemical reactor system that is widely used in the industry [107].
The chemical reactor takes input products from two different production lines, P r o d u c t i o n L i n e 1 and P r o d u c t i o n L i n e 2 . The chemical reactor mixes the two products together in a chemical reaction resulting in an output product. The output product is placed in a third production line P r o d u c t i o n L i n e 3 . The chemical reactor system consists of two main agents agent reactor and agent operator as shown in Figure 9.

7.1. Agent Reactor

The agent reactor has production lines P r o d u c t i o n L i n e 1 and P r o d u c t i o n L i n e 2 .
The agent reactor is connected to the three valves ( v 1 , v 2 , and v 3 ). Valves v 1 and v 2 are the input valves used to load products to the reactor. Valve v 3 is used to unload the products. The reactor is equipped with a level sensor that reads the current v o l u m e of the product inside the reactor in real-time. During a chemical reaction, the reactor enters in a state lock then it will remain unlock once the reaction is done.
The agent reactor has one attribute ( V m a x ) that represents the maximum capacity of the reactor in addition to seven variables that are described as follows:
  • V o l u m e V: It has the current volume of the product in the reactor,
  • G a s C o n c e n t r a t i o n ( G C ): It has the concentration of the gas in the reactor’s environment,
  • R e l e a s e R a t e R R : It is the rate in which the gas is released from the reactor.
  • Input I v 1 : It is the valve used to load the products from P r o d u c t i o n L i n e 1 when v 1 is open.
  • Input I v 2 : It is the valve used to load the products from P r o d u c t i o n L i n e 2 when v 2 is open.
  • Output O v 3 : It is the valve used to unload products to P r o d u c t i o n L i n e 3 when v 3 is open.
  • State S: It describe the state of the reactor that can be Locked L or Unlocked U.
The reactor’s nominal mode has two activities transform products, and wait. Transform products is the activity that transforms two quantities of consumed elements, P 1 and P 2 , to produce P 3 (produced element), as shown in Figure 10. The t r a n s f o r m p r o d u c t activity is only enabled when the reactor has products ready and its state is Locked. In the nominal mode, whenever the state of the reactor is Unlocked, Wait activity is triggered.

7.2. Agent Operator

The agent operator has two attributes. The first one is the G a s C o n c e n t r a t i o n T h r e s h o l d ( γ ) which is the maximum value of the gas concentration above which it is considered to be toxic and needs immediate attention. The second one is the e x p o s u r e T i m e ( τ ) that represents the maximum exposure time of an operator to a toxic Gas release before being out of order (irreversible state). It has also four variables:
  • Input P 1 : It is the maximum quantity of products to be loaded from P r o d u c t i o n L i n e 1 .
  • Input P 2 : It is the maximum quantity of products to be loaded from P r o d u c t i o n L i n e 2 .
  • Output P 3 : It is the maximum quantity of products to be unloaded from the reactor.
  • State S 2 : It describe the state of the reactor that can be Idle, Inactive, or Out of order.
Initially, the operator and the reactor agents are assumed to be functioning properly in their associated nominal modes.
The operator’s nominal mode has four activities:
  • Load: The load activity is the process of filling the reactor’s production lines P r o d u c t i o n L i n e 1 and P r o d u c t i o n L i n e 2 with quantities P 1 and P 2 respectively.
    The products’ incoming rates to the production lines are assumed to be d v 1 and d v 2 respectively.
    The load activity is executed with consideration of the following: the total quantity of the products to be added to the reactor ( P 1 + P 2 ) in addition to the quantity of products inside the reactor (V) is less than or equal to V m a x as shown in Equation (10).
    P 1 + P 2 + V V m a x .
  • Unload: The unload activity is the process of pumping out an amount P 3 through P r o d u c t i o n L i n e 3 with outgoing rate d v 3 .
  • Wait1: This activity represents the process of waiting for the reactor to be Unlocked. It is a pre-process of the load activity in a Locked reactor.
  • Wait2: This activity represents the process of waiting for the chemical reaction to be performed in time τ . It is an intermediate process between the load and the unload activities.
The Load/Unload activities are only enabled when the state of the reactor is Unlocked. In the nominal mode, whenever the state of the reactor is locked, a Wait activity is triggered.

7.3. Failure Analysis of the Chemical Reactor/Operator Using GDABM

Figure 11 illustrates the Reactor/operator system with the proposed risk model that shows for every agent the set of all possible failure (including fault and event trees), and behavioral modes plus the mutual relation between them.
The Agents reactor/operator experience different failure events and failure modes. Table 3 contains seven different failure modes that are used as examples in this paper. The first failure mode F M 0 illustrates quantity above threshold in the reactor caused by the Transform products activity or a misread of the level sensor. The second failure F M 1 is overfilling that take place with the existence of a malfunctioned operator and level sensor failure followed by a quantity above threshold Figure 12.
F M 2 represents Over-temperature and F M 3 Over-pressure. The top event for the agent reactor is F M 4 that represents gas leakage from the reactor. F M 4 occurs when at least one of the failure modes F M 1 , F M 2 and F M 3 occur.
By consequence, reactor’ behavior mode changes from R N o m (nominal mode) to R D e g (degraded gas leakage mode) where the gas concentration is measured continuously through an activity called compute GC (gas concentration), and the agent reactor sends a g a s l e a k a g e message to the agent operator. F M 4 is considered as an external failure mode to the operator o p e r a t o r E F A C , as the failure occurs at the reactor rather than at the operator. Once F M 4 occurs, the behavioral mode of the agent Operator change form O N o m (nominal mode) to O D e g 1 (degraded mode), where the operator evaluates the risk level related to the Gas Leakage.
F M 5 is the failure mode of the operator representing a gas concentration G C exceeding the G a s C o n c e n t r a t i o n T h r e s h o l d γ . F M 5 is an internal failure mode r e a c t o r I F A C . F M 5 is BFM; since it depends on the condition whether the gas concentration exceeds the threshold value or not. F M 6 is a suffocation failure mode that occurs if the sequence of F M 4 , E 1 and F M 5 is valid. Once F M 6 is enabled, operator’ behavior mode changes from O D e g 1 (operator’s degraded mode 1) to O D e g 2 (operator’s degraded mode 2), where the state of the operator change from inactive to out of order due to the toxic inhalation.
Table 4 summarize the main events that might occur during the chemical reaction including their descriptions and probability of failure [108].
Those events and the related failure modes are then represented in a dynamic fault tree as shown in Figure 12.
A gas leakage eventually causes evaporation of Hydrogen sulfide H2S that reduces the volume level inside the reactor. The atmospheric dispersion of gases continues until the failure is fixed or the volume of the product becomes less than the c a p a c i t y m a x and hence it might eventually restore its nominal mode.
Table 5 represents the various activities and their associated equations where V + , G C + represent the products’ volume and the gas concentration in the environment of the reactor at the next time step (t+1), respectively. The activities C o m p u t e G C , A n a l y z e R i s k s , and O u t O f O r d e r are to be executed with failure presence by the agents Reactor/Operator as shown in Figure 11.
Figure 13 and Figure 14 represent the behavioral modes transitions for the agents Reactor and Operator.

8. Simulation Testbed

In literature, many software languages and tools specifically focused on ABMS development have become established as open-source ABMS platforms, such as NetLogo, Swarm [109], AnyLogic, Repast [110], JADE [111], and MASON [112]. A comparison between those simulators is presented in Table 6 according to many criteria.
GDABM was simulated using the Repast Simphony Simulator tool.
The simulation of this model provides the following additional features: (1) identifying and analyzing the risk among system components, (2) studying the risk propagation among these components, and (3) performing the risk evaluation process.

8.1. Simulation Results

The simulation results of the proposed model, when tested on the chemical reactor/operator case study discussed in Section 6 are presented in this section. Those results include a representation of the dynamic behavior of each agent in the studied system in addition to the resulting risk level.
Two agents were defined in the above case study: operator and reactor, with their full characteristics including (attributes, failure, and behavioral modes). A simulation of the chemical reactor/operator system was carried out for a duration of 45 simulation steps to show the dynamic behavior of the various agents in the system.
To test the functionality of the GDABM, experiments were conducted using four different values of the set ( V m a x , R R ) as follows: configuration 1 (30, 10,000), configuration 2 (30, 15,000), configuration 3 (20, 10,000), and configuration 4 (20, 15,000), and considering the following assumptions:
  • when a gas leakage occurs, the v o l u m e is to decrease by 2 L and the gas concentration G C is to increase by 10,000 part per million (ppm) at each step of the simulation.
  • the initial values of the variables are as follow: V o l u m e = 10, G C = 0, τ = 2, P 1 = 7 L, P 2 = 5 L and P 3 = 4 L.
  • once the leakage is repaired, the gas concentration is to decrease by 5000 ppm at each step of the simulation.
The ranking scale of the severity of harm η is represented in Table 7.
As the likelihood of the Gas Leakage failure ψ is 0.02 (using failure data cited in Table 4), which is between 10 3 P < 10 1 , it is considered as likely and the Risk level is evaluated in a dynamic way using the likelihood and the severity values as mentioned in Table 1.
Agent’s behavioral modes with the related risk level are represented graphically in Figure 15, Figure 16, Figure 17 and Figure 18 for the configuration C1, C2, C3, and C4, respectively. Table A1 and Table A2 in Appendix A show agents’ behavioral modes and the risk level values during the simulation of C1/C2 and C3/C4, respectively. For configurations C1/C3, the release rate is assumed to be 10,000 and V m a x is 30 for C1 and 20 for C3. The overall risk level is Moderate in C1 except for the time interval [17, 18]; it increases to be significant and the behavioral mode of the Operator agent is O D e g 2 . On the other hand, for C3, as we decreased V m a x to be 20, which reduces the amount of released materials, the risk level remains Moderate even with the existence of failure events. For C2/C4, the release rate is assumed to be 15,000 and V m a x is 30 for C1 and 20 for C4. Risk level reached High in C2 for the time intervals [16, 17] and [33, 34]. Those tables represent the failure propagation between agents and the dynamic agents’ behavior throughout the simulation.
The chemical reactor/operator multi-agent system was successfully modeled and simulated under the seven failure modes. The GDABM was able to study the dynamics of the various failure mode through risk analysis and risk assessment. GDABM also studies the correlation between agent failure and behavioral modes. GDABM has successfully shown how a change in the agent failure mode affects its behavioral mode and vice versa.

8.2. Comparison with Other Modeling Approaches

Numerical comparisons between the results obtained by current models are provided in [113]. Models studied in the comparison are system dynamics (SD) models, agent-based models (ABM), and discrete Event Simulation (DES) from a well-known case study (the spread of a disease).
The case study presented in this work (a reactor/operator system), is new. Therefore, similar studies based on alternative approaches are not available yet. The case study presented in this manuscript, which is a reactor/operator system, is considered novel. Therefore, similar studies based on alternative approaches are not available yet. The most relevant study found in [12] discusses the dynamic reliability of a steam generator using a Stochastic Hybrid Automaton with MCs, but this model does not provide full details about failure and behavioral modes, which are essential for dynamic risk analysis. Another comparison performed in [114] focuses on the limitations and capacities of different approaches, including Petri-nets and MCs to model a dynamic system rather than comparing the obtained numerical results. The work shows that the Petri-nets approach is a tool used for modeling systems with discrete events, but it is not adequate to be used for the continuous complex dynamic systems. This is demonstrated in the case of product level in the reactor agent. The strength of this method, such as modeling and simulating the system evolution by events occurrence, is not appropriate to be utilized in continuous dynamic systems. Numerically MCs generate the best values when used with stochastic events, but it requires a high computational effort in complex systems.
The same case study that was used in the paper was validated and verified when we simulated the classical ABM using Repast Simphony (2.0) open-source agent-based modeling and simulation platform, we got consistent results. A comparison between the proposed GDABM and the reference model (ABM) shows that GDABM provides higher levels of accuracy (Figure 19) (>15%). This is explained due to the detailed risk analysis performed in the proposed model, which reflects a better evaluation of the risk level with consideration of the temporal aspect (thanks to DFT).
Concerning the execution time (Figure 20), with the presence of the detailed analysis and the consideration of all analysis components, GDABM takes around 476 ms which is a bit slower than ABM (order of a few milliseconds) with consideration of a few number of agents (<10) that can raise up to 2 s for an important number of agents. This latency can be justified by the fact of representing the risk model in our proposed simulator and displaying more details about the active failure modes and their propagation in the system and the change in the informational state (attributes, behavioral mode, etc.) for every agent in the system.
Regarding the response time (Figure 21), G D A B M is measured to be faster than the reference model (ABM) in detecting and representing any change in the behavioral mode in real-time as it performs a real-time evaluation and analysis of possible failure modes. Furthermore, the details provided in the GDABM model allow the immediate detection of any failure, and, thus, the dynamic behavioral mode is up to date.
A common challenge was signed regarding the output whenever we increase the number of agents (hundreds) in the simulation and the interactions among them, a huge amount (MegaByte) of information and simulation results (change in the agent’s behavioral mode, change in the agent’s failure mode) should be extracted.

9. Conclusions

In this paper, a novel dynamic multi-agent model for risk analysis has been proposed and described thoroughly. The proposed model is called Generic Dynamic Agent-Based Model (GDABM) for risk analysis. This model represents the dynamic behavior of agents as a result of failure occurrence. It shows the failure propagation among the system’s components as well as the failure dependencies between those components. Each agent in the modeled system has a set of activities, attributes, failure modes, and behavioral modes. By studying the behavior of each agent in the system, GDABM was able to assess and analyze the risk of the entire system dynamically. GDABM thoroughly analyses dynamic systems in a coherent manner. It provides a graphical illustration of agents’ behavioral modes with failure causes and outcomes and shows the direct relation between agents’ behavioral modes transition and the activation/deactivation of a failure mode. A detailed case study of a chemical reactor/operator was provided. The case study used the GDABM to model various agents and their associated interactions. GDABM was able to simulate the behavior of the system in both nominal (failure-free) and degraded (failure) conditions. GDABM also analyzed the risk of the aforementioned systems. The goal of the proposed model is to analyze risks and to study the dynamic behavior of dynamic systems using multi-agents models. GDABM has proven to give very promising results when compared to the reference model (ABM) in terms of Accuracy (15%) and Response time (27%), for the execution time, GDABM signs an extra delay (13%) that can be accepted due to the real-time evaluation of active failure/behavioral modes.
The future work of this paper will be to use MCs for stochastic fuzzy failure, represent the population density in a dynamic way using a probability law, and test the model in different systems with a higher number of active agents and failure modes. Examples of such systems are dangerous good transportation, evacuation, and flood systems.

Author Contributions

Conceptualization, S.K.; methodology and approach, H.K.; software, S.K.; validation, H.K., S.K. and W.H.F.A.; formal analysis, S.K.; investigation, W.H.F.A.; resources, W.H.F.A.; data curation, S.K.; writing—original draft preparation, H.K.; writing—review and editing, W.H.F.A.; visualization, S.K.; supervision, S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ABMAgent-Based models
GDABMGeneric Dynamic Agent-Based models
ABMSAgent-Based Modeling and Simulation
SDSystem Dynamics
DEDiscrete Events
PNPetri Nets
MCsMonte Carlo Simulation
RARisk Analysis
FTAFault tree Analysis
BMBehavioral mode
FMFailure mode
BFMBoolean Failure mode
SFMStochastic Failure mode
CFMComplex Failure mode
EFACExternal Failure Agent Communication
IFACInternal Failure Agent Communication

Appendix A

Table A1. Agents behavioral modes for C1 and C2.
Table A1. Agents behavioral modes for C1 and C2.
ConfigurationTime StepReactor Behavioral ModeOperator Behavioral ModeRisk Level
C1[0, 14] R N o m O N o m M
V m a x = 30 [14, 17] R D e g O D e g 1 M
R R  = 10,000[17, 18] R N o m O D e g 2 S
[18, 23] R N o m O N o m M
[23, 25] R D e g O D e g 1 M
[25, 45] R N o m O N o m M
C2[0, 14] R N o m O N o m M
V m a x = 30 [14, 15] R D e g O D e g 1 M
R R = 15,000[15, 16] R D e g O D e g 1 S
[16, 17] R D e g O D e g 1 S
[16, 17] R D e g O D e g 2 H
[17, 18] R N o m O D e g 2 S
[18, 19] R N o m O D e g 2 S
[19, 22] R N o m O D e g 2 S
[22, 23] R N o m O D e g 2 M
[23, 24] R D e g O D e g 2 M
[24, 25] R D e g O D e g 2 S
[25, 31] R N o m O D e g 2 M
[31, 32] R D e g O D e g 2 M
[32, 33] R D e g O D e g 2 S
[33, 34] R D e g O D e g 2 H
[34, 35] R N o m O D e g 2 S
[35, 40] R N o m O D e g 2 M
[40, 41] R D e g O D e g 2 M
[41, 42] R D e g O D e g 2 S
[42, 45] R N o m O D e g 2 M
Table A2. Agents behavioral modes for C3 and C4.
Table A2. Agents behavioral modes for C3 and C4.
ConfigurationTime StepReactor Behavioral ModeOperator Behavioral ModeRisk Level
C3[0, 7] R N o m O N o m M
V m a x = 20 [7, 9] R D e g O D e g 1 M
R R  = 10,000[9, 15] R N o m O N o m M
[15, 17] R D e g O D e g 1 M
[17, 23] R N o m O N o m M
[23, 25] R D e g O D e g 1 M
[25, 31] R N o m O N o m M
[31, 33] R D e g O D e g 1 M
[33, 39] R N o m O N o m M
[39, 41] R D e g O D e g 1 M
[41, 45] R N o m O N o m M
C4[0, 7] R N o m O N o m M
V m a x = 20 [7, 9] R D e g O D e g 1 S
R R  = 15,000[9, 10] R N o m O D e g 2 M
[10, 15] R N o m O N o m M
[15, 16] R D e g O D e g 1 M
[16, 17] R D e g O D e g 1 S
[17, 18] R N o m O D e g 2 M
[18, 23] R N o m O N o m M
[23, 24] R D e g O D e g 1 M
[24, 25] R D e g O D e g 1 S
[25, 26] R N o m O D e g 2 M
[26, 31] R N o m O N o m M
[31, 32] R D e g O D e g 1 M
[32, 33] R D e g O D e g 1 S
[33, 34] R N o m O D e g 2 M
[34, 39] R N o m O N o m M
[39, 40] R D e g O D e g 1 M
[40, 41] R D e g O D e g 1 S
[41, 42] R N o m O D e g 2 M
[42, 45] R N o m O N o m M

References

  1. Taleb-Berrouane, M.; Khan, F.; Amyotte, P. Bayesian Stochastic Petri Nets (BSPN)-A new modelling tool for dynamic safety and reliability analysis. Reliab. Eng. Syst. Saf. 2020, 193, 106587. [Google Scholar] [CrossRef]
  2. Rebello, S.; Yu, H.; Ma, L. An integrated approach for system functional reliability assessment using Dynamic Bayesian Network and Hidden Markov Model. Reliab. Eng. Syst. Saf. 2018, 180, 124–135. [Google Scholar] [CrossRef]
  3. Gupta, R.; Kamal, R.; Suman, U. A QoS-supported approach using fault detection and tolerance for achieving reliability in dynamic orchestration of web services. Int. J. Inf. Technol. 2018, 10, 71–81. [Google Scholar] [CrossRef]
  4. Gascard, E.; Simeu-Abazi, Z. Quantitative analysis of dynamic fault trees by means of Monte Carlo simulations: Event-driven simulation approach. Reliab. Eng. Syst. Saf. 2018, 180, 487–504. [Google Scholar] [CrossRef]
  5. Bonabeau, E. Agent-based modeling: Methods and techniques for simulating human systems. Proc. Natl. Acad. Sci. USA 2002, 99, 7280–7287. [Google Scholar] [CrossRef] [Green Version]
  6. Yagi, I.; Mizuta, T. Analysis of the Impact of the Rule for Investment Diversification on Investment Performance using a Multi-agent Simulation. In Proceedings of the 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 7–11 July 2019; IEEE: New York, NY, USA, 2019; pp. 689–692. [Google Scholar]
  7. Mostafa, S.A.; Hazeem, A.A.; Khaleefahand, S.H.; Mustapha, A.; Darman, R. A collaborative multi-agent system for oil palm pests and diseases global situation awareness. In Proceedings of the Future Technologies Conference, Vancouver, BC, Canada, 15–16 November 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 763–775. [Google Scholar]
  8. Kanj, H.; Flaus, J. A Meta Model framework for Risk Analysis, Diagnosis and Simulation. In Safety and Reliability; CRC Press: Boca Raton FL, USA, 2014; pp. 2043–2049. [Google Scholar]
  9. Delaney, W. Dynamic Models and Discrete Event Simulation; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar]
  10. Borshchev, A.; Filippov, A. From system dynamics and discrete event to practical agent based modeling: Reasons, techniques, tools. In Proceedings of the 22nd International Conference of the System Dynamics Society, Oxford, UK, 25–29 July 2004; Citeseer: University Park, PA, USA, 2004; Volume 22, pp. 25–29. [Google Scholar]
  11. Min, H.; Zhou, G. Supply chain modeling: Past, present and future. Comput. Ind. Eng. 2002, 43, 231–249. [Google Scholar] [CrossRef]
  12. Babykina, G.; Brinzei, N.; Aubry, J.F.; Deleuze, G. Modeling and simulation of a controlled steam generator in the context of dynamic reliability using a Stochastic Hybrid Automaton. Reliab. Eng. Syst. Saf. 2016, 152, 115–136. [Google Scholar] [CrossRef]
  13. Trivedi, K.S.; Muppala, J.K.; Woolet, S.P.; Haverkort, B.R. Composite performance and dependability analysis. Perform. Eval. 1992, 14, 197–215. [Google Scholar] [CrossRef] [Green Version]
  14. Beamon, B.M. Supply chain design and analysis: Models and methods. Int. J. Prod. Econ. 1998, 55, 281–294. [Google Scholar] [CrossRef]
  15. Montreuil, B.; Labarthe, O.; D’amours, S.; Roy, D.; Ferrarini, A.; Espinasse, B.; Monteiro, T.; Anciaux, D. Simulation à base D’agents des Systèmes de Coordination et de Planification des Réseaux D’entreprises. La Simulation Pour la Gestion des Chaînes Logistiques; Traité IC2, Série Systèmes Automatisés, Caroline Thierry André Thomas et Gérard Bel. 2008, pp. 227–260. Available online: http://hdl.handle.net/20.500.11794/72363 (accessed on 3 April 2022).
  16. Kaegi, M.; Mock, R.; Kröger, W. Analyzing maintenance strategies by agent-based simulations: A feasibility study. Reliab. Eng. Syst. Saf. 2009, 94, 1416–1421. [Google Scholar] [CrossRef]
  17. Law, A.M.; Kelton, W.D.; Kelton, W.D. Simulation Modeling and Analysis; McGraw-Hill: New York, NY, USA, 2000; Volume 3. [Google Scholar]
  18. Brameret, P.A.; Rauzy, A.; Roussel, J.M. Automated generation of partial Markov chain from high level descriptions. Reliab. Eng. Syst. Saf. 2015, 139, 179–187. [Google Scholar] [CrossRef] [Green Version]
  19. DelSole, T. A fundamental limitation of Markov models. J. Atmos. Sci. 2000, 57, 2158–2168. [Google Scholar] [CrossRef]
  20. Cassandras, C.G.; Lafortune, S. Introduction to Discrete Event Systems; Springer Science & Business Media: New York, NY, USA, 2009. [Google Scholar]
  21. Melão, N.; Pidd, M. A conceptual framework for understanding business processes and business process modelling. Inf. Syst. J. 2000, 10, 105–129. [Google Scholar] [CrossRef]
  22. Degeling, K.; IJzerman, M.J.; Groothuis-Oudshoorn, C.G.; Franken, M.D.; Koopman, M.; Clements, M.S.; Koffijberg, H. Comparing Modeling Approaches for Discrete Event Simulations With Competing Risks Based on Censored Individual Patient Data: A Simulation Study and Illustration in Colorectal Cancer. Value in Health 2022, 25, 104–115. [Google Scholar] [CrossRef]
  23. Lang, S.; Reggelin, T.; Müller, M.; Nahhas, A. Open-source discrete-event simulation software for applications in production and logistics: An alternative to commercial tools? Procedia Comput. Sci. 2021, 180, 978–987. [Google Scholar] [CrossRef]
  24. Yuan, C.; Liao, Y.; Kong, L.; Xiao, H. Fault diagnosis method of distribution network based on time sequence hierarchical fuzzy petri nets. Electr. Power Syst. Res. 2021, 191, 106870. [Google Scholar] [CrossRef]
  25. Al-Ajeli, A.; Parker, D. Fault diagnosis in labelled Petri nets: A Fourier-Motzkin based approach. Automatica 2021, 132, 109831. [Google Scholar] [CrossRef]
  26. Arichi, F.; Cherki, B.; Djemai, M.; Djouadi, S. Fault diagnosis for discrete events systems described by partially observed Petri nets. ISA Trans. 2021, in press. [CrossRef]
  27. Lefebvre, D.; Basile, F. An approach based on timed Petri nets and tree encoding to implement search algorithms for a class of scheduling problems. Inf. Sci. 2021, 559, 314–335. [Google Scholar] [CrossRef]
  28. Modgil, V. Modelling and availability analysis of container manufacturing industry with Petri Nets. Mater. Today Proc. 2021, 56, 2730–2734. [Google Scholar] [CrossRef]
  29. Mahjoub, Y.I.; El-Alaoui, E.C.; Nait-Sidi-Moh, A. Logistic network modeling and optimization: An approach based on (max,+) algebra and coloured Petri nets. Comput. Ind. Eng. 2021, 158, 107341. [Google Scholar] [CrossRef]
  30. Erasmus, J.; Vanderfeesten, I.; Traganos, K.; Grefen, P. Using business process models for the specification of manufacturing operations. Comput. Ind. 2020, 123, 103297. [Google Scholar] [CrossRef]
  31. Wang, W.; Chen, T.; Indulska, M.; Sadiq, S.; Weber, B. Business process and rule integration approaches—An empirical analysis of model understanding. Inf. Syst. 2022, 104, 101901. [Google Scholar] [CrossRef]
  32. Achmad, A.L.H.; Chaerani, D.; Perdana, T. Designing a Food Supply Chain Strategy during COVID-19 Pandemic using an Integrated Agent-Based Modelling and Robust Optimization. Heliyon 2021, 7, e08448. [Google Scholar] [CrossRef] [PubMed]
  33. Gurtner, G.; Delgado, L.; Valput, D. An agent-based model for air transportation to capture network effects in assessing delay management mechanisms. Transp. Res. Part Emerg. Technol. 2021, 133, 103358. [Google Scholar] [CrossRef]
  34. Grether, D.; Fürbas, S.; Nagel, K. Agent-based modelling and simulation of air transport technology. Procedia Comput. Sci. 2013, 19, 821–828. [Google Scholar] [CrossRef] [Green Version]
  35. Datta, A.; Winkelstein, P.; Sen, S. An agent-based model of spread of a pandemic with validation using COVID-19 data from New York State. Phys. A Stat. Mech. Its Appl. 2022, 585, 126401. [Google Scholar] [CrossRef]
  36. Bao, Y. Room evacuation in the presence of obstacles using an agent-based model with turning behavior. Simul. Model. Pract. Theory 2021, 113, 102385. [Google Scholar] [CrossRef]
  37. Aslanyan, L.; Krasnoproshin, V.; Ryazanov, V.; Sahakyan, H. Logical-Combinatorial Approaches in Dynamic Recognition Problems. arXiv 2021, arXiv:2101.11066. [Google Scholar] [CrossRef]
  38. Ortiz-Posadas, M.R. The logical combinatorial approach applied to pattern recognition in medicine. In New Trends and Advanced Methods in Interdisciplinary Mathematical Sciences; Springer: Berlin/Heidelberg, Germany, 2017; pp. 169–188. [Google Scholar]
  39. Chumachenko, D.; Meniailov, I.; Bazilevych, K.; Chumachenko, T. On intelligent decision making in multiagent systems in conditions of uncertainty. In Proceedings of the 2019 XIth International Scientific and Practical Conference on Electronics and Information Technologies (ELIT), Lviv, Ukraine, 16–18 September 2019; IEEE: New York, NY, USA, 2019; pp. 150–153. [Google Scholar]
  40. Roberts, D.T. Applying risk assessment at the worker level: Applications to electrical safety. IEEE Ind. Appl. Mag. 2018, 25, 18–24. [Google Scholar] [CrossRef]
  41. Selvik, J.; Abrahamsen, E. Explicit and implicit inclusion of time in the definitions of risk and reliability. In Safety and Reliability; Taylor & Francis: London, UK, 2021; Volume 40, pp. 9–27. [Google Scholar]
  42. Dhieb, N.; Ghazzai, H.; Besbes, H.; Massoud, Y. A Secure AI-driven Architecture for Automated Insurance Systems: Fraud Detection and Risk Measurement. IEEE Access 2020, 8, 58546–58558. [Google Scholar] [CrossRef]
  43. Bansal, S.; Selvik, J.T. Investigating the implementation of the safety-diagnosability principle to support defence-in-depth in the nuclear industry: A Fukushima Daiichi accident case study. Eng. Fail. Anal. 2021, 123, 105315. [Google Scholar] [CrossRef]
  44. Xu, S.; Kim, E.; Haugen, S. Review and comparison of existing risk analysis models applied within shipping in ice-covered waters. Saf. Sci. 2021, 141, 105335. [Google Scholar] [CrossRef]
  45. Shariff, G.; Yong, J.; Salleh, N.; Siow, C.L. Risk Assessment of Building Fire Evacuation with Stochastic Obstructed Emergency Exit. In Proceedings of the 2019 4th International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE), Kedah, Malaysia, 27–29 November 2019; IEEE: New York, NY, USA, 2019; pp. 1–5. [Google Scholar]
  46. Cui, W.; Xingfen, W.; Wenying, Z. The Research on Cross-border Online Shopping Transaction Risk Based on Online Data Access. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; IEEE: New York, NY, USA, 2019; pp. 5331–5335. [Google Scholar]
  47. Permana, R.A.; Ridwan, A.Y.; Yulianti, F.; Kusuma, P.G.A. Design of Food Security System Monitoring and Risk Mitigation of Rice Distribution In Indonesia Bureau of Logistics. In Proceedings of the 2019 IEEE 13th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Bali, Indonesia, 3–4 October 2019; IEEE: New York, NY, USA, 2019; pp. 249–254. [Google Scholar]
  48. Stapelberg, R.F. Handbook of Reliability, Availability, Maintainability and Safety in Engineering Design; Springer Science & Business Media: New York, NY, USA, 2009. [Google Scholar]
  49. Marvin, R.; Arnljot, H. System Reliability Theory: Models, Statistical Methods, and Applications; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2004. [Google Scholar]
  50. Suzuki, T.; Izato, Y.I.; Miyake, A. Identification of accident scenarios caused by internal factors using HAZOP to assess an organic hydride hydrogen refueling station involving methylcyclohexane. J. Loss Prev. Process Ind. 2021, 71, 104479. [Google Scholar] [CrossRef]
  51. Luengo, M.M.; Kolios, A. Failure mode identification and end of life scenarios of offshore wind turbines: A review. Energies 2015, 8, 8339–8354. [Google Scholar] [CrossRef] [Green Version]
  52. Wu, W.S.; Yang, C.F.; Chang, J.C.; Château, P.A.; Chang, Y.C. Risk assessment by integrating interpretive structural modeling and Bayesian network, case of offshore pipeline project. Reliab. Eng. Syst. Saf. 2015, 142, 515–524. [Google Scholar] [CrossRef]
  53. Kabir, S. An overview of fault tree analysis and its application in model based dependability analysis. Expert Syst. Appl. 2017, 77, 114–135. [Google Scholar] [CrossRef] [Green Version]
  54. Merle, G.; Roussel, J.M.; Lesage, J.J.; Bobbio, A. Probabilistic algebraic analysis of fault trees with priority dynamic gates and repeated events. IEEE Trans. Reliab. 2009, 59, 250–261. [Google Scholar] [CrossRef] [Green Version]
  55. Fussell, J.; Aber, E.; Rahl, R. On the quantitative analysis of priority-AND failure logic. IEEE Trans. Reliab. 1976, 25, 324–326. [Google Scholar] [CrossRef]
  56. Dugan, J.B.; Bavuso, S.J.; Boyd, M.A. Dynamic fault-tree models for fault-tolerant computer systems. IEEE Trans. Reliab. 1992, 41, 363–377. [Google Scholar] [CrossRef] [Green Version]
  57. Kabir, S.; Walker, M.; Papadopoulos, Y. Dynamic system safety analysis in HiP-HOPS with Petri Nets and Bayesian Networks. Saf. Sci. 2018, 105, 55–70. [Google Scholar] [CrossRef] [Green Version]
  58. Kaiser, B.; Gramlich, C.; Förster, M. State/event fault trees—A safety analysis model for software-controlled systems. Reliab. Eng. Syst. Saf. 2007, 92, 1521–1537. [Google Scholar] [CrossRef]
  59. Dai, L.; Ehlers, S.; Rausand, M.; Utne, I.B. Risk of collision between service vessels and offshore wind turbines. Reliab. Eng. Syst. Saf. 2013, 109, 18–31. [Google Scholar] [CrossRef]
  60. Hodgson, E.E.; Essington, T.E.; Samhouri, J.F.; Allison, E.H.; Bennett, N.J.; Bostrom, A.; Cullen, A.C.; Kasperski, S.; Levin, P.S.; Poe, M.R. Integrated risk assessment for the blue economy. Front. Mar. Sci. 2019, 6, 609. [Google Scholar] [CrossRef]
  61. Leimeister, M.; Kolios, A. A review of reliability-based methods for risk analysis and their application in the offshore wind industry. Renew. Sustain. Energy Rev. 2018, 91, 1065–1076. [Google Scholar] [CrossRef]
  62. Yuge, T.; Yanagi, S. Quantitative analysis of a fault tree with priority AND gates. Reliab. Eng. Syst. Saf. 2008, 93, 1577–1583. [Google Scholar] [CrossRef]
  63. Barozzi, M.; Contini, S.; Raboni, M.; Torretta, V.; Moreno, V.C.; Copelli, S. Integration of Recursive Operability Analysis, FMECA and FTA for the Quantitative Risk Assessment in biogas plants: Role of procedural errors and components failures. J. Loss Prev. Process Ind. 2021, 71, 104468. [Google Scholar] [CrossRef]
  64. Alfonsi, A.; Mandelli, D.; Parisi, C.; Rabiti, C. Risk analysis virtual ENvironment for dynamic event tree-based analyses. Ann. Nucl. Energy 2022, 165, 108754. [Google Scholar] [CrossRef]
  65. Queral, C.; Fernández-Cosials, K.; Zugazagoitia, E.; Paris, C.; Magan, J.; Mendizabal, R.; Posada, J. Application of Expanded Event Trees combined with uncertainty analysis methodologies. Reliab. Eng. Syst. Saf. 2021, 205, 107246. [Google Scholar] [CrossRef]
  66. Albania, K. Analysis of international risk management standards (advantages and disadvantages). Eur. J. Res. Reflect. Manag. Sci. 2017, 5, 323–329. [Google Scholar]
  67. Teng, H.W. A spherical Monte Carlo approach for calculating value-at-risk and expected shortfall in financial risk management. In Proceedings of the 2017 Winter Simulation Conference (WSC), Las Vegas, NV, USA, 3–6 December 2017; pp. 469–480. [Google Scholar] [CrossRef]
  68. Benson, R.; Kellner, D. Monte Carlo Simulation for Reliability. In Proceedings of the 2020 Annual Reliability and Maintainability Symposium (RAMS), Palm Springs, CA, USA, 27–30 January 2020; pp. 1–6. [Google Scholar] [CrossRef]
  69. Prasetyo, Y.T.; Tabares, B. A Simulation-based Method for Predicting the Time-varying Passenger Demand at Metro Rail Transit Line 3 Using Monte Carlo Simulation. In Proceedings of the 2020 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Singapore, 14–17 December 2020; pp. 118–122. [Google Scholar] [CrossRef]
  70. Hwang, I.M.; Ha, J.H. Human health risk assessment of toxic elements in South Korean cabbage, Kimchi, using Monte Carlo simulations. J. Food Compos. Anal. 2021, 102, 104046. [Google Scholar] [CrossRef]
  71. Kolios, A.; Collu, M.; Brennan, F. Reliability of floating foundation concepts for vertical axis wind turbines. In Proceedings of the 11th International Symposium on Practical Design of Ships and Other Floating Structures, Rio de Janeiro, Brazil, 19–24 September 2010; Volume 2, pp. 1483–1491. [Google Scholar]
  72. Bharatbhai, M.G. Failure mode and effect analysis of repower 5M wind turbine. Int. J. Adv. Res. Eng. Sci. Technol. 2015, 2, 2394–2444. [Google Scholar]
  73. Song, G.; Khan, F.; Wang, H.; Leighton, S.; Yuan, Z.; Liu, H. Dynamic occupational risk model for offshore operations in harsh environments. Reliab. Eng. Syst. Saf. 2016, 150, 58–64. [Google Scholar] [CrossRef]
  74. Abimbola, M.; Khan, F.; Khakzad, N. Dynamic safety risk analysis of offshore drilling. J. Loss Prev. Process Ind. 2014, 30, 74–85. [Google Scholar] [CrossRef]
  75. Zhang, X.; Sun, L.; Sun, H.; Guo, Q.; Bai, X. Floating offshore wind turbine reliability analysis based on system grading and dynamic FTA. J. Wind. Eng. Ind. Aerodyn. 2016, 154, 21–33. [Google Scholar] [CrossRef]
  76. Garcia Lladó, M. Structural Reliability Analysis and Robust Design of Offshore Wind Turbine Support Structures. Master’s Thesis, Universitat Politècnica de Catalunya, Barcelona, Spain, 2015. [Google Scholar]
  77. Scheu, M.N.; Kolios, A.; Fischer, T.; Brennan, F. Influence of statistical uncertainty of component reliability estimations on offshore wind farm availability. Reliab. Eng. Syst. Saf. 2017, 168, 28–39. [Google Scholar] [CrossRef]
  78. Bouissou, M.; Elmqvist, H.; Otter, M.; Benveniste, A. Efficient Monte Carlo simulation of stochastic hybrid systems. In Proceedings of the 10th International Modelica Conference 2014, Lund, Sweden, 10–12 March 2014. [Google Scholar]
  79. Aslansefat, K.; Kabir, S.; Gheraibia, Y.; Papadopoulos, Y. Dynamic Fault Tree Analysis: State-of-the-Art in Modeling, Analysis, and Tools. In Reliability Management and Engineering: Reliability Management and Engineering; CRC Press: Boca Laton, FL, USA, 2020; pp. 73–112. [Google Scholar]
  80. Abar, S.; Theodoropoulos, G.K.; Lemarinier, P.; O’Hare, G.M. Agent Based Modelling and Simulation tools: A review of the state-of-art software. Comput. Sci. Rev. 2017, 24, 13–33. [Google Scholar] [CrossRef]
  81. Nguyen, J.; Powers, S.T.; Urquhart, N.; Farrenkopf, T.; Guckert, M. An Overview of Agent-based Traffic Simulators. arXiv 2021, arXiv:2102.07505. [Google Scholar] [CrossRef]
  82. Castro, B.M.; de Melo, Y.D.A.; Dos Santos, N.F.; da Costa Barcellos, A.L.; Choren, R.; Salles, R.M. Multi-agent simulation model for the evaluation of COVID-19 transmission. Comput. Biol. Med. 2021, 136, 104645. [Google Scholar] [CrossRef]
  83. Khodabandelu, A.; Park, J. Agent-based modeling and simulation in construction. Autom. Constr. 2021, 131, 103882. [Google Scholar] [CrossRef]
  84. Dorri, A.; Kanhere, S.S.; Jurdak, R. Multi-agent systems: A survey. IEEE Access 2018, 6, 28573–28593. [Google Scholar] [CrossRef]
  85. Roberts, S.A.; Hougen, D.F. Information and Resource Sharing in Reinforcement Learning Agents Subject to Risk. In Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China, 6–9 December 2019; IEEE: New York, NY, USA, 2019; pp. 1959–1966. [Google Scholar]
  86. Shrime, M.G.; Iverson, K.R.; Yorlets, R.; Roder-DeWan, S.; Gage, A.D.; Leslie, H.; Malata, A. Predicted effect of regionalised delivery care on neonatal mortality, utilisation, financial risk, and patient utility in Malawi: An agent-based modelling analysis. Lancet Glob. Health 2019, 7, e932–e939. [Google Scholar] [CrossRef] [Green Version]
  87. Li, W.; Yuan, J.; Ji, C.; Wei, S.; Li, Q. Agent-Based Simulation Model for Investigating the Evolution of Social Risk in Infrastructure Projects in China: A Social Network Perspective. Sustain. Cities Soc. 2021, 73, 103112. [Google Scholar] [CrossRef]
  88. Gong, C.; Tang, K.; Zhu, K.; Hailu, A. An optimal time-of-use pricing for urban gas: A study with a multi-agent evolutionary game-theoretic perspective. Appl. Energy 2016, 163, 283–294. [Google Scholar] [CrossRef]
  89. Jabeur, N.; Al-Belushi, T.; Mbarki, M.; Gharrad, H. Toward leveraging smart logistics collaboration with a multi-agent system based solution. Procedia Comput. Sci. 2017, 109, 672–679. [Google Scholar] [CrossRef]
  90. Aerts, J.C. Integrating agent-based approaches with flood risk models: A review and perspective. Water Secur. 2020, 11, 100076. [Google Scholar] [CrossRef]
  91. Wang, Z.; Jia, G. Tsunami evacuation risk assessment and probabilistic sensitivity analysis using augmented sample-based approach. Int. J. Disaster Risk Reduct. 2021, 63, 102462. [Google Scholar] [CrossRef]
  92. Nadi, A.; Edrisi, A. Adaptive multi-agent relief assessment and emergency response. Int. J. Disaster Risk Reduct. 2017, 24, 12–23. [Google Scholar] [CrossRef]
  93. Alghunaim, S.A.; Sayed, A.H. Distributed coupled multi-agent stochastic optimization. IEEE Trans. Autom. Control 2019, 65, 175–190. [Google Scholar] [CrossRef] [Green Version]
  94. Gallab, M.; Bouloiz, H.; Garbolino, E.; Tkiouat, M.; ElKilani, M.A.; Bureau, N. Risk analysis of maintenance activities in a LPG supply chain with a Multi-Agent approach. J. Loss Prev. Process Ind. 2017, 47, 41–56. [Google Scholar] [CrossRef]
  95. Ribeiro, J.; Saghezchi, F.B.; Mantas, G.; Rodriguez, J.; Abd-Alhameed, R.A. HIDROID: Prototyping a Behavioral Host-Based Intrusion Detection and Prevention System for Android. IEEE Access 2020, 8, 23154–23168. [Google Scholar] [CrossRef]
  96. Munir, M.S.; Abedin, S.F.; Tran, N.H.; Han, Z.; Hong, C.S. A Multi-Agent System Toward the Green Edge Computing with Microgrid. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; IEEE: New York, NY, USA, 2019; pp. 1–7. [Google Scholar]
  97. Drissi, S.; Benhadou, S.; Medromi, H. A New Collaborative Risk Assessment Model for Cloud Computing. Rev. Méditerr. Télécommun. 2015, 5. [Google Scholar]
  98. Gontis, V.; Kononovicius, A. Consentaneous agent-based and stochastic model of the financial markets. PLoS ONE 2014, 9, e102201. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  99. Lux, T.; Marchesi, M. Scaling and criticality in a stochastic multi-agent model of a financial market. Nature 1999, 397, 498–500. [Google Scholar] [CrossRef]
  100. Dawid, H.; Gemkow, S.; Harting, P.; Kabus, K.; Neugart, M.; Wersching, K. Skills, innovation, and growth: An agent-based policy analysis. Jahrb. Natl. Stat. 2008, 228, 251–275. [Google Scholar]
  101. Dawid, H.; Gemkow, S.; Harting, P.; Neugart, M. On the effects of skill upgrading in the presence of spatial labor market frictions: An agent-based analysis of spatial policy design. J. Artif. Soc. Soc. Simul. 2009, 12, 5. [Google Scholar]
  102. Dawid, H.; Neugart, M. Agent-based models for economic policy design. East. Econ. J. 2011, 37, 44–50. [Google Scholar] [CrossRef] [Green Version]
  103. Rasmussen, J. Outlines of a Hybrid Model of the Process Plant Operator. In Monitoring Behaviour and Supervisory Control; Sheridan, T., Johannsen, G., Eds.; Plenum Publishing Co.: New York, NY, USA, 1976; pp. 371–384. [Google Scholar]
  104. Diergardt, M. Modeling Complex Scenarios in Computer Based Information Systems for Risk Analysis; ETH Zurich, Laboratory for Safety Analysis: Zurich, Switzerland, 2006. [Google Scholar]
  105. Lee, J.; Mitici, M. An integrated assessment of safety and efficiency of aircraft maintenance strategies using agent-based modelling and stochastic Petri nets. Reliab. Eng. Syst. Saf. 2020, 202, 107052. [Google Scholar] [CrossRef]
  106. Kaegi, M.; Mock, R.; Ziegler, R.; Nibali, R. Information systems’ risk analysis by agent-based modelling of business processes. In Proceedings of the Seventeenth European Safety and Reliability Conference (ESREL’06), Estoril, Portugal, 18–22 September 2006; Taylor & Francis Group: London, UK, 2006; pp. 2277–2284. [Google Scholar]
  107. Santacesaria, E.; Tesser, R. The Chemical Reactor from Laboratory to Industrial Plant: A Modern Approach to Chemical Reaction Engineering with Different Case Histories and Exercises; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
  108. Mohsendokht, M. Risk assessment of uranium hexafluoride release from a uranium conversion facility by using a fuzzy approach. J. Loss Prev. Process Ind. 2017, 45, 217–228. [Google Scholar] [CrossRef]
  109. Garzón, M.; Rojas-Galeano, S. An Agent-Based Model of Urban Pigeon Swarm Optimisation. In Proceedings of the 2019 IEEE Latin American Conference on Computational Intelligence (LA-CCI), Guayaquil, Ecuador, 11–15 November 2019; IEEE: New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
  110. Bai, S. An agent-based negotiation model and its implementation in Repast. arXiv 2020, arXiv:2004.06135. [Google Scholar]
  111. Bergenti, F.; Caire, G.; Monica, S.; Poggi, A. The first twenty years of agent-based software development with JADE. Auton. Agents -Multi-Agent Syst. 2020, 34, 36. [Google Scholar] [CrossRef]
  112. D’Auria, M.; Scott, E.O.; Lather, R.S.; Hilty, J.; Luke, S. Assisted Parameter and Behavior Calibration in Agentbased Models with Distributed Optimization. In Proceedings of the International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS’20), Salamanca, Spain, 6–8 October 2020. [Google Scholar]
  113. Shiflet, A.B.; Shiflet, G.W. Introduction to Computational Science: Modeling and Simulation for the Sciences; Princeton University Press: Princeton, NJ, USA, 2014. [Google Scholar]
  114. Aubry, J.F.; Babykina, G.; Brinzei, N.; Medjaher, S.; Barros, A.; Berenguer, C.; Grall, A.; Langeron, Y.; Ngoc Nguyen, D.; Deleuze, G.; et al. The APPRODYN project: Dynamic reliability approaches to modeling critical systems. Superv. Saf. Complex Syst. 2012, 141–179. [Google Scholar] [CrossRef]
Figure 1. Classification of dynamic modeling Approaches.
Figure 1. Classification of dynamic modeling Approaches.
Applsci 12 05062 g001
Figure 2. A classification of the presented reliability-based methods for risk analysis.
Figure 2. A classification of the presented reliability-based methods for risk analysis.
Applsci 12 05062 g002
Figure 3. Agent interaction with the environment.
Figure 3. Agent interaction with the environment.
Applsci 12 05062 g003
Figure 4. Proposed features to be added for the classical agent model.
Figure 4. Proposed features to be added for the classical agent model.
Applsci 12 05062 g004
Figure 5. Behavioral mode of an agent.
Figure 5. Behavioral mode of an agent.
Applsci 12 05062 g005
Figure 6. An Activity Process Module.
Figure 6. An Activity Process Module.
Applsci 12 05062 g006
Figure 7. A Bow-Tie Diagram Activity.
Figure 7. A Bow-Tie Diagram Activity.
Applsci 12 05062 g007
Figure 8. Generic Dynamic Agent-Based Risk Model (GDABM).
Figure 8. Generic Dynamic Agent-Based Risk Model (GDABM).
Applsci 12 05062 g008
Figure 9. Chemical Operator/reactor.
Figure 9. Chemical Operator/reactor.
Applsci 12 05062 g009
Figure 10. Transform-Product Activity.
Figure 10. Transform-Product Activity.
Applsci 12 05062 g010
Figure 11. Reactor/Operator with the risk model.
Figure 11. Reactor/Operator with the risk model.
Applsci 12 05062 g011
Figure 12. Dynamic Fault Tree.
Figure 12. Dynamic Fault Tree.
Applsci 12 05062 g012
Figure 13. Behavioral modes of the Agent Reactor.
Figure 13. Behavioral modes of the Agent Reactor.
Applsci 12 05062 g013
Figure 14. Behavioral modes of the Agent Operator.
Figure 14. Behavioral modes of the Agent Operator.
Applsci 12 05062 g014
Figure 15. Agent’s behavioral modes with the related Risk Level during simulation C1.
Figure 15. Agent’s behavioral modes with the related Risk Level during simulation C1.
Applsci 12 05062 g015
Figure 16. Agent’s behavioral modes with the related Risk Level during simulation C2.
Figure 16. Agent’s behavioral modes with the related Risk Level during simulation C2.
Applsci 12 05062 g016
Figure 17. Agent’s behavioral modes with the related Risk Level during simulation C3.
Figure 17. Agent’s behavioral modes with the related Risk Level during simulation C3.
Applsci 12 05062 g017
Figure 18. Agent’s behavioral modes with the related Risk Level during simulation C4.
Figure 18. Agent’s behavioral modes with the related Risk Level during simulation C4.
Applsci 12 05062 g018
Figure 19. Comparison of the Accuracy for both ABM and GDABM.
Figure 19. Comparison of the Accuracy for both ABM and GDABM.
Applsci 12 05062 g019
Figure 20. Comparison of the Execution times for both ABM and GDABM.
Figure 20. Comparison of the Execution times for both ABM and GDABM.
Applsci 12 05062 g020
Figure 21. Comparison of the response times for both ABM and GDABM.
Figure 21. Comparison of the response times for both ABM and GDABM.
Applsci 12 05062 g021
Table 1. Risk Level Classification.
Table 1. Risk Level Classification.
Severity of Harm ( η )
Likelihood ofCatast-Rophic:Serious: ExtensiveModerate: MedicalMinor: FirstNegligible: No
Occurrence ( ψ )Death, InjuriesToxic ReleaseTreatment RequiredAid TreatmentInjuries or Illness
Very LikelyHHHSS
ψ 10 1
LikelyHHSSM
10 3 ψ < 10 1
ModerateHHSML
10 6 ψ < 10 3
UnlikelyHSMLL
10 9 ψ < 10 6
RareSSMLL
ψ < 10 9
Table 2. A comparison between the main reliability methods.
Table 2. A comparison between the main reliability methods.
MethodCapabilitiesLimitationsReference
FMEAEasy implementationCompetent facilitator[51]
for reaching consensus[72]
in scoring
FTA,Visual representationCumbersomeness in[59]
ETAof events relationscase of highly
granulated analysis
BTAEfficient link ofCommon cause and[73]
ETA and FTAdependency failures[74]
DynamicRepresentation ofInaccurate results for[75]
FTAdependent eventsinappropriate SDE
HAZOPStructure descriptionExtensive[61]
of hazarddocumentation
MCSDirect simulation,Large computational[76]
easy to implementeffort[77]
Table 3. Agents failure modes.
Table 3. Agents failure modes.
Failure ModeTypeAgentDescription
F M 0 BooleanReactorQuantity above
threshold ( V > V m a x )
F M 1 ComplexReactorOverfilling
F M 2 ComplexReactorOvertemperature
F M 3 ComplexReactorOverpressure
F M 4 ComplexReactorLeakage
F M 5 BooleanOperatorToxic inhalation
( G C > γ )
F M 6 ComplexOperatorSuffocation
Table 4. Description of the main events and their corresponding failure probabilities.
Table 4. Description of the main events and their corresponding failure probabilities.
EventDescriptionProbabilitySource
E1Operator failure of abnormal situations cognition2.11 × 10 3 Expert
E2Failure of the temperature controller3.52 × 10 4 Historical data
E3Over temperature in1.38 × 10 2 Expert
work environment
E4Operator fails to shut down the reactor due to over temperature4.52 × 10 2 Expert
E5Air cooling system failure8.94 × 10 2 Expert
E6Level sensor failure3.54 × 10 2 Expert
E7Operator fails to shut down the reactor due to over-pressure2.67 × 10 2 Expert
E8Over pressure in the reactor due to blockage1.45 × 10 2 Expert
E9Pressure controller failure3.52 × 10 4 Historical data
E10Power supply failure8.36 × 10 2 Expert
E11Failure of the steam supply1.43 × 10 2 Expert
E12Valve failure6.80 × 10 6 Historical data
Table 5. Activities equations.
Table 5. Activities equations.
ActivityEquationInputOutputDuration
Load V + = V + P 1 + P 2 I v 1 = I v 2 = 1 I v 1 = I v 2 = 01
Transform-product V + = V 1.1 S1 = lockS1 = unlock5
Unload V + = V P 3 O v 3 = 1 O v 3 = 01
Compute Gas G C + = G C + R R S1 = lockS1 = unlock1
Concentration V + = V 2
Analyse Risks R L = f ( ψ , η ) S2 = IdleS2 = Inactive1
Out Of Order S2 = InactiveS2 = OutOfOrder2
Table 6. Comparison between GDABM and reference simulators.
Table 6. Comparison between GDABM and reference simulators.
ParameterSwarmRepastMasonGDABM
LicenseGeneral Public Licence (GPL)GPLGPLGPL
User BaseDiminishingLargeIncreasingLarge
Execution’ SpeedFastModerateFastestModerate
Graphical user interface (GUI)LimitedGoodGoodGood
Built-in ability to create movies and animationsNoYesYesYes
Easy of learning, programmingPoorModerateModerateModerate
Geographical information system (GIS)YesYesYesYes
Full detailed Risk analysisNoNoNoYes
Failure analysisNoNoNoYes
Behavioral modes IdentificationYesYesYesYes
Table 7. Threshold limit values for GC.
Table 7. Threshold limit values for GC.
GC (× 10 3  ppm)≤10[10:20][20:30][30:40]≥40
SeverityNegligibleMinorModerateSeriousHigh
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kanj, H.; Aly, W.H.F.; Kanj, S. A Novel Dynamic Approach for Risk Analysis and Simulation Using Multi-Agents Model. Appl. Sci. 2022, 12, 5062. https://doi.org/10.3390/app12105062

AMA Style

Kanj H, Aly WHF, Kanj S. A Novel Dynamic Approach for Risk Analysis and Simulation Using Multi-Agents Model. Applied Sciences. 2022; 12(10):5062. https://doi.org/10.3390/app12105062

Chicago/Turabian Style

Kanj, Hassan, Wael Hosny Fouad Aly, and Sawsan Kanj. 2022. "A Novel Dynamic Approach for Risk Analysis and Simulation Using Multi-Agents Model" Applied Sciences 12, no. 10: 5062. https://doi.org/10.3390/app12105062

APA Style

Kanj, H., Aly, W. H. F., & Kanj, S. (2022). A Novel Dynamic Approach for Risk Analysis and Simulation Using Multi-Agents Model. Applied Sciences, 12(10), 5062. https://doi.org/10.3390/app12105062

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop