ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A KNOWLEDGE BASED USER INTERFACE APPLICATION FOR RISK ASSESSMENT OF POWER PLANT CONSTRUCTION PROJECT

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.9, No. 11)

Publication Date:

Authors : ; ;

Page : 16-24

Keywords : Fuzzy Logic; Risk Assessment; Expert System;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The contracting of a power plant construction is usually regarded as a “high risk activity”, primarily due to the lack of sufficient environmental data. Risk management has significant potential to improve the performance of the venture. Nonetheless, this requires proper and structured methods to recognize and quantify both risk factors and their interactions and, most critically, knowledge and experience. There were significantly fewer efforts to develop. The built model uses a micro-system technique to introduce a new methodology for threat assessment to define the risks associated with building power station. The methodology for evaluation enables the use of linguistic and numerical risk factor evaluations. For transform linguistic and numerical evaluations, the Fuzzy Linguistic-Numerical Conversion Scheme (FLNCS) is adopted. The predictive analysis approach often incorporates the plan pre-mitigation contingency, which is the contingency fund of threat, if no mitigation technique is introduced. A new risk management model for the development and assessment of potential mitigation strategies for each threat under consideration is established. A newly developed threat management system contrasts the current exhausted contingency with the post-mitigation contingency, tracking the effects of the chosen reduction technique. The developed risk assessment system provides an early warning that informs users that a select mitigation technique may fail. It also specifies the appropriate time to start the control cycle based on a variety of subjective criteria. Once the threat management process has begun, the control method established defines, reviews, and selects the most effective control mechanisms in favor of the selected reduction approach. If the control intervention chosen fails, the control method established notifies the client of the evaluation of the risk management program. Such alerts enable users to avoid possible future failures with similar risk objects. The built user interface has been programmed with MATLAB for easy usage

Last modified: 2020-12-08 07:04:59