Advances in Fuzzy Systems

Advances in Fuzzy Systems / 2012 / Article
Special Issue

Real-Life Applications of Fuzzy Logic

View this Special Issue

Research Article | Open Access

Volume 2012 |Article ID 957697 |

Abolfazl Doostparast Torshizi, Jamshid Parvizian, "A Hybrid Approach to Failure Analysis Using Stochastic Petri Nets and Ranking Generalized Fuzzy Numbers", Advances in Fuzzy Systems, vol. 2012, Article ID 957697, 12 pages, 2012.

A Hybrid Approach to Failure Analysis Using Stochastic Petri Nets and Ranking Generalized Fuzzy Numbers

Academic Editor: Zeng-Guang Hou
Received25 Apr 2012
Accepted04 Sep 2012
Published18 Oct 2012


We present a novel failure analysis approach combining structural properties of stochastic Petri Nets and flexibility of fuzzy logic. Firstly, we develop a powerful fuzzy ranking technique. We analyze major drawbacks of existing ranking techniques. Then we demonstrate the capabilities of the presented algorithm to overcome such drawbacks. The approach considers weight, spread, and difference of coordinate of the center of gravity (COG) point of each fuzzy number and is able to deal with a wide variety of fuzzy numbers. Using this technique, we utilize isomorphism between stochastic Petri Nets and their corresponding Markov chains and present a failure analysis algorithm incorporating some critical factors. This algorithm can be implemented in diverse industrial applications.

1. Introduction

Failure can be defined as any unwanted deviation from the desired predetermined plan, which may lead to any kind of human injuries or damages of machines. In order to perform corrective actions, prioritizing failures is necessary. One of the most popular risk analysis procedures aiming to prioritizing failure states is Failure Mode and Effect Analysis (FMEA) which is based on three factors of severity, detectability, and occurrence of failure. This method was introduced in 1960s. Its wide applications are documented by Braglia et al. [1] and Stamatis [2]. Process of calculating risk priority numbers in this method consists of multiplication of the three-mentioned risk factors. It is apparent that various combinations of risk factors may lead to a constant risk priority number. This is the most critical challenge FMEA faces. However, there are many other weaknesses in this method which makes it impractical in real world problems [3, 4].

Up to now, many different approaches have been presented to overcome the limitations of FMEA. These methods rely on diverse techniques such as grey theory [4], Bayesian Nets [5], Monte Carlo simulation [6], Markov models [7], and fuzzy logic [8]. Among all these techniques, fuzzy logic has been extensively applied in risk analysis. Fuzzy logic is capable of handling vagueness of human suggestions; so that it is useful in prioritizing risky behaviors of the systems.

Fuzzy risk analysis is a new field firstly introduced by Schmucker [9]. This method is similar to traditional FMEA; however, risk parameters are fuzzy numbers. Fuzzy arithmetic is used to obtain fuzzy risk priority numbers. This method is rather versatile although suffers from ignoring many critical risk parameters. Using fuzzy risk analysis and fuzzy arithmetic, many different researches have been performed so far. Among them, combination of fuzzy risk analysis and ranking methods are extensively studied. Based on Schmucker [9], a fuzzy risk analysis method using signal/noise ratio was presented by Chen and Wang [10], in which fuzzy risk priority numbers were ranked by this ratio. Different kinds of fuzzy numbers such as generalized ones and their application in safety analysis are investigated by S. M. Chen and J. H. Chen [11, 12]. Application of similarity measures between fuzzy numbers is investigated in [1113]. The fuzzy risk analysis method proposed by Schmucker [9] is widely utilized in so many researches performed so far. Fuzzy risk analysis methods are based on either ranking techniques or similarity measures, with differences only in prioritization style. In ranking based methods fuzzy risk priority numbers (FRPN) are ranked by different ranking techniques; while in similarity based techniques, the same FRPN are ranked by measuring the similarity level between FRPN and some predetermined linguistic variables.

Failure analysis techniques traditionally rely on static evaluation of systems, which fails in tracking risky behaviors. Hence, implementing dynamic tools to enable auditors to monitor systems dynamically seems beneficial. One of the most common tools in modeling dynamic systems are Petri Nets (PN) [21, 22]. PN are powerful modeling methods which can simulate behaviors of systems dynamically in such a way that different states of the system can be visualized. There are many different versions of Petri Nets including timed, stochastic, and colored. In stochastic Petri Nets firing of transitions depend on a stochastic variable with exponential distribution.

In this paper, we introduce a novel failure analysis method in which the Petri Net model of the system is constructed. This model includes different potential risks. According to isomorphism between live bounded stochastic Petri Nets and Markov chains, fuzzy steady state probabilities are calculated in the form of generalized trapezoidal fuzzy numbers. In these fuzzy probabilities, the weight of each fuzzy number is a combination of several new risk factors. Finally, these fuzzy probabilities are ranked by a new powerful fuzzy ranking method.

The rest of the paper is structured as follows. In Section 2, the bases of Stochastic Petri Nets (SPN) are given. SPN with fuzzy parameters and their application in safety analysis of the systems are summarized in Section 3. In Section 4, a novel ranking method of generalized fuzzy numbers is presented and compared with other methods in the field. In Section 5, we deal with a risk prioritizing method using SPN and generalized fuzzy numbers which opens a new field in risk prioritizing techniques literature. In Section 6, an illustrative example is presented to clarify the methods proposed in the paper. The paper is concluded in Section 7.

2. Stochastic Petri Nets

SPN are a family member of Petri Nets in which firing rates are exponentially distributed. Before introducing SPN, we present the definition of Petri Nets introduced by Petri [23]. Petri Net (PN) is a five-tuple, where(1) is a finite set of places pictured by circles,(2) is a finite set of transitions pictured by bars, (3) is an input function that defines the set of directed arcs from to where ,(4) is an output function that defines the set of directed arcs from to ,(5) is a marking whose th component represents the number of tokens in the ith place. An initial marking is denoted by . The tokens are pictured by dots.

PN are able to model systems dynamically. One of the crucial drawbacks in utilizing ordinary PN is their inability in handling some important factors such as time and vagueness. To solve such problems various kinds of nets such as timed, fuzzy, and stochastic PN have been developed.

In SPN, the set of firing rates are exponentially distributed, such that each transition can be fired only after an exponentially distributed time delay with parameter elapses.

An important aspect of stochastic PN is their isomorphism with Markov chains. It has been proved that live and bounded SPN are isomorphic to continuous-time Markov chains [24]. This important property makes SPN analysis straightforward. In SPN, each marking of the net is equivalent to the states of its corresponding Markov chain. Therefore, some important factors, like steady state probabilities, are easily computed. Here, we present the formal definition of SPN.

A SPN is a six-tuple, where(1) is a finite set of places,(2) is a finite set of transitions with , and ,(3) is an input function that defines the set of directed arcs from to where ,(4) is an output function that defines the set of directed arcs from to ,(5) is a marking whose th component represents the number of tokens in the th place. An initial marking is denoted by , and(6) is a firing function whose th component represents the firing rate of the th transition where denotes the firing rate of and is the set of all possible real values.

Firing rules in SPN are simply similar to ordinary PN with a difference only in firing times of transitions. In SPN, when a transition is enabled, all tokens in the upstream places remain in their places until the firing time of the corresponding transition elapses; then the tokens deposited in upward places are removed and added to all downward places of that transition.

In order to construct the corresponding Markov chain of SPN, the reachability graph of the net must be constructed first. Then using (1), the steady state probabilities can be calculated, in which is the probability of being in state ; and . From steady state distribution , this is possible to predict the performance of the system. For more details the reader is referred to Bause and Kritzinger [25].

3. Stochastic Petri Nets with Fuzzy Parameters

Safety is the knowledge of utilizing recorded data to predict potential failure in future. In normal conditions, failures occur rarely. Thus, expertise in predicting the frequency of different failure states is necessary. Suggestions by experts are usually vague and do not include specific numerical values and are given often in linguistic variables. Classical mathematics faces difficulties in handling nondeterministic values. Fuzzy set theory is a powerful method for handling vague conditions.

In this paper, according to vagueness of experts’ knowledge in predicting failure rates of different risky states, we propose a new approach to determine fuzzy steady state probabilities based on generalized fuzzy numbers.

As explained earlier, SPN are isomorphic to continuous-time Markov chains; thus steady state probabilities can be computed by dominating rules on Markov chains. We consider the failure rates of each potential risk in the system as a fuzzy number. Let us introduce some notations used in the rest of the paper; for more information, see [26].

Definition 1. A fuzzy number is a convex normalized fuzzy set of the real line such that(1)there exists exactly one with ( is called the mean value of );(2) is piecewise continuous.

For the sake of computational efficiency, some special forms of fuzzy numbers with triangular or trapezoidal membership functions are used. Sometimes, a more general form of fuzzy numbers is needed. For instance, in this paper, generalized fuzzy numbers are used with the extra feature of weighted membership functions. Their generality is according to the weight of the mean value or the supremum of their membership function. In Figure 1 a generalized trapezoidal fuzzy number is depicted.

Definition 2. An alpha cut (-cut) of a fuzzy number , if it is a subset of the set , is defined as: On the other hand, each fuzzy number can be represented by its alpha cut. For example, in a fuzzy number we have in which values of and are the lower and upper bounds of this alpha cut, respectively.
Fuzzy arithmetic offers two concepts: extension principle and operations between alpha cuts. In this paper, we rely on the second concept since it can be adapted by the extension principle; in addition, incorporating alpha cuts is easier.
Let us consider two fuzzy numbers and and their alpha cuts and , respectively. Operations between fuzzy numbers in the framework of alpha cuts are in which, The dividing operation among fuzzy numbers is defined as

4. Ranking Method of Generalized Fuzzy Numbers

Application of fuzzy sets theory in reliability and safety engineering has been an active field of research in recent years. One of the most alluring fuzzy techniques is ranking of fuzzy numbers. Chen and Wang [10] proposed a fuzzy risk analysis method based on signal/noise ratio. For more details, reader is referred to [1113].

In this section, we propose a novel approach for ranking generalized trapezoidal fuzzy numbers. This approach will be used for risk analysis in the following sections. The algorithm is as follows.

Step 1. Consider the generalized fuzzy number . Use (7) for standardizing the generalized fuzzy number

Step 2. Calculate the center of gravity point of the standard fuzzy number, (7),

Step 3. Calculate the standard deviation of each standardized fuzzy number, It is apparent that the interval of the obtained standard deviation is [0, 1.1547]. Variation of a crisp value is zero and variation of the generalized fuzzy number (−1, −1, −1, −1:) is 1.1547.

Step 4. Calculate the difference of coordinate of each fuzzy number from the least value, in which

Step 5. Calculate the ranking value of each standard generalized trapezoidal fuzzy number,

Notation 1. The proposed ranking method concentrates on crisp value of the fuzzy number in contrast to its deviation.

Example 3. In order to demonstrate the capabilities of the method we have compared the ranking output with six other important and common ranking techniques. This comparison is performed for two groups of fuzzy numbers, Figures 2 and 3.
The ranking is shown and compared for the first group in Table 1. This is clear that S. M. Chen and J. H. Chen [11] method fails to rank the fuzzy numbers and . This is the case whenever the deviations and (mean value × weight) are the same for fuzzy numbers, [27].
It is noteworthy to mention that in our proposed method, crisp value of the fuzzy number has priority over its deviation and spread. Therefore, the number has priority over the other fuzzy numbers.
The second group, Figure 3, consists of eight sets of fuzzy numbers with different shapes and deviations suitable to evaluate our ranking algorithm [12]. Table 2 gives the result of ranking for this group, ranked using the proposed method and seven different algorithms presented in the literature. The highlighted items indicate invalid ranking by different algorithms. Cheng’s method [14] and Chu’s method [15] cannot rank fuzzy numbers of the second and third sets. Murakami’s technique [16] gives the same result for the two members of set 3. Yager’s method [17], as one of the most common ranking techniques, gives the same result for set 2, set 3, and set 4. This shows that this algorithm is not capable of ranking fuzzy numbers in general. All these algorithms fail in ranking of fuzzy numbers in the set 5. S. J. Chen’s and S. M. Chen’s method [18] ranks the numbers correctly; however, the ranking scores are very close to each other. For sets 2 and 6, Lee and Chen’ method [19] ranks the fuzzy numbers in an incorrect order.
As noted before, the main focus of the method proposed in the current paper is on crisp values of fuzzy numbers; that is why S. M. Chen’s and J. H. Chen’s method [11] has a valid but different ranking result. The latter method puts priority on variation and spread of numbers instead of their crisp values.
According to the results presented in Table 2, Figure 5 shows the percentage of correct answers of the compared methods. It can be seen that only the proposed method and the approach proposed by S. J. Chen and S. M. Chen [18] has successfully solved the entire fuzzy sets of Figure 3.

Ranking method

S. M. Chen and J. H. Chen [11]0.13750.1375
The proposed method1.684860.30964

Ranking methodSet 1Set 2Set 3Set 4Set 5Set 6Set 7Set 8

Cheng's method [14]0.58310.70710.58310.58310.58310.58310.4610.58310.4243 0.58310.58310.76730.72410.680.72750.7462
Chu and Tsao’s method [15] −
Murakami et al.’s method [16] −
Yager's method [17] −
S. J. Chen and S. M. Chen's method [18]0.44560.48840.42390.44560.44560.47280.3565 0.44560.4240.860.44560.74730.41280.40050.37190.41550.3979
S. M. Chen and J. H. Chen’s method [11]0.25790.42980.25370.25790.25790.27740.20630.25790.25371−0.2580.25790.44280.40430.33540.40790.4196
Lee and Chen's method [19]0.609760.702230.615310.609760.60980.62990.50980.60970.61530.880.52440.52230.71520.69680.65070.68960.6695
The proposed method0.515781.719250.507370.515770.51580.55470.464190.51570.50733−0.51581.37541.69230.76920.65211.60531.462

Example 4. One of the latest fuzzy risk analysis approaches, based on ranking fuzzy numbers, is presented in [20], in which the ranking technique is based on the areas between the left and the right parts of the membership function of each fuzzy number with 1 and −1 as possible infimum and supremum values of fuzzy numbers. However this approach is not able to deal with symmetric fuzzy numbers. In such cases, the result of ranking for each symmetric fuzzy number will be zero. For example, consider two symmetric generalized fuzzy numbers and as depicted in Figure 4. Table 3 compares the results using Chen and Sanguansat method [20] and the current algorithm. It is clear that the Chen and Sanguansat method [20] is not able to rank symmetric generalized fuzzy numbers.

Ranking method

Chen and Sanguansat [20]00
Current paper0.30240.3464

5. Risk Prioritizing

Modeling complex systems using ordinary Petri Nets is a daunting task, since implementation of some concepts such as time, possibility, and probability is not considered in the initial definition of ordinary PN. Generally, analysis of complex systems includes two kinds of uncertainties [18]: stochastic situations and fuzzy states. For stochastic situations the behavior of system parameters is described by probability distribution functions. In other words, this kind of uncertainty models randomness. On the other hand, uncertainty in fuzzy form models the level of measurement accuracy using linguistic structures and insufficient information. There are many inaccuracy sources in systems, such as inaccurate internal operations. In some cases, uncertainty is the result of both randomness and inaccuracy, simultaneously. In stochastic PN, where time is the only existing stochastic parameter, system delays can be described by probability functions. It is worth to note that during system analysis, existing uncertainties may be hidden in the final results. Therefore, utilizing fuzzy set theory is an important alternative to overcome this drawback.

Although the dominant paradigm in describing uncertainties of models is stochastic modeling based upon probability, using such models is only appropriate for describing stochastic states among entire uncertain situations. This is more important when considering inaccuracy of some data which are not instinctively statistical [28].

Here, a comprehensive approach to prioritize different risk states of the system is presented. In this approach, by utilizing probability determination via steady state probabilities of stochastic PN, fuzzy probabilities of occurrence of each failure are calculated. In our approach, parameters of the exponential distribution are deemed to be generalized fuzzy numbers. Eventually, values of the resulting fuzzy probabilities are ranked by the novel ranking method presented in Section 3. In the following, we present the process of prioritization of failure modes. Our approach has three stages where each stage consists of several substages. This approach extends the method proposed in [29] to a risk analysis method.

Stage 1. (1) Modeling the desired system using Petri Nets and determining the entire failure modes and allocating exponential firing times to considered transitions.
(2) Constructing reachability graph of the net and determining all states.
(3) Incorporating (1) in order to calculate the steady state probabilities of the system parametrically based on exponential rates of system transitions.

Stage 2. (1) Conversion of parametric probabilities of (3) in Stage 1 to triangular fuzzy numbers considering each parameter.
(2) Determination of fuzzy probabilities based on alpha cuts of each fuzzy number using (4) to (6).
(3) Calculation of each probabilistic value () and determination of maximum and minimum values of this probability (). When , each probability must be in interval to be feasible; thus next steps are proceeded if this condition does not hold.
(4) Operations among fuzzy numbers using alpha cuts depend on minimum and maximum operators. This will provide a larger interval during the calculation. Theoretically, cut of a fuzzy number gives the largest interval of the number. Since our aim is to find the fuzzy probability values, the largest possible value of fuzzy numbers must be constrained to . Therefore, our aim is to find the shortest alpha:

Stage 3. (1) Converting each resulting failure probability to a generalized fuzzy number. This conversion is performed by combining severity index of each failure mode with fuzzy probabilities calculated in Stage 2. In this research, we have considered five critical factors to determine occurrence weight of each failure mode. These factors are maintenance costs, operational dependability, safety, failure detection methods, and repairing time.
In order to obtain these factors easily, we have provided some linguistic variables with their corresponding weights presented in Tables 4, 5, 6, 7, and 8. Finally, these critical factors must be combined to get the severity factor of each failure mode. This process includes a multiplication of these variables as in which represents the value of th factor from five critical factors influencing failure and represents the final severity measure of the failure .
(2) Ranking each generalized fuzzy probability provided in (1) in Stage 3 using the ranking technique proposed in Section 3.


Very dangerous, without warning and periodical inspection1
Very dangerous, without periodical inspection0.9
Very dangerous with automatic warning system0.8
Dangerous, without warning and periodical inspection0.7
Dangerous, with periodical inspection or warning system0.6
Average danger, without warning system and periodical inspection0.5
Average danger with warning system and periodical inspection0.4
Low danger, without warning system or periodical inspection0.3
Low danger, with warning system or periodical inspection0.2
Without any important risk0.1
No safety risk0


Very high, many numbers of machines malfunctioned1
Very high, loss of quality in many of machines0.9
High, an entire machine is off, a bottleneck is made for some sets of machines0.8
High, an entire machine is off0.7
Average to high, the initial performance of machine is lost but some tasks are possible to perform0.6
Average, the initial performance of machine is lost but some tasks are possible to perform0.5
Average, machine loses its functionality in some specific tasks0.4
Low, quality decrease in secondary functions of machines0.3
Low, machine loses a little part of its functionality0.2
Very low0.1
No dependability0


Very unlikely0.9
Very low0.7
Average to high0.4
Very high0.2
Nearly definite0.1
Completely definite0


Is not worth to fix1
Hardly worth to fix0.9
Average high0.6
Average low0.3
Low importance0.1
No cost0


Very time consuming, no worth to fix1
Long fixing time, hardly worth to fix0.9
Very time consuming to fix0.8
Long fixing time0.7
Average to high fixing time0.6
Average fixing time0.5
Short fixing time0.4
Fairly short fixing time0.3
Very short fixing time0.2
Fixing time not very important0.1
Fixing time negligible0

6. An Illustrative Example

In this section the approaches proposed in the paper are applied to a flexible manufacturing (FM) cell, adopted from [30]. This cell is of course adapted with the nature of failure analysis.The cell, Figure 6, has one incoming and one outgoing conveyor, one robotic arm, and one processing machine. Work-pieces enter the cell by an incoming conveyor and the robot (R) loads them to the machine (M). Since we want to consider different potential failure modes of the system, a breakdown loop is considered for the robot and processing machine which consists of a breakdown and a repair transition with their corresponding rates. When processing on M is over, it is unloaded by R and the work-piece will go to the outgoing conveyor. Now suppose that(1)the processing machine can have failure modes. M takes two time units to breakdown and a quarter time unit to be repaired. Therefore, the average failure and repair rates are 0.5 and 4, respectively;(2)robot loading and taking work-piece rate is 45 per unit time. Also its unloading rate plus average rate of M processing is 8 per unit time. Robot is not failure free; hence, breakdown and repair rates, for the robot, are 0.4 and 5, respectively;(3)time delays considered in this example are entirely exponential.

Now, the problem is to find fuzzy risk probabilities based on fuzzy steady state probabilities and risk parameters introduced earlier; then prioritizing them on the basis of the presented ranking technique. The Petri Net model of the system is live and bounded. Therefore, it is isomorphic with its corresponding Markov chain and the analysis can be performed by analysis of the Markov chain.

In order to find fuzzy probabilities, we have to delineate the reachability and the Markov chain of the corresponding stochastic Petri Net of the FM cell.

The description of places and transitions is represented in Tables 9 and 10, respectively. Transitions firing rates are displayed in Table 11.


P 1Work-piece ready
P 2Robot in progress
P 3Machine in process
P 4Robot in repair
P 5Machine in repair
P 6Robot idle
P 7Machine idle


Robot taking part
Machine is processing
Processing is finished and robot is unloading
Robot breakdown
Robot in repair
Machine breakdown
Machine in repair


Taking part by R45
R loading45
M process finished and R is unloading8
R breakdown0.4
R repaired5
M breakdown0.5
M repaired4

In order to apply the proposed method, transition firing rate must be converted to fuzzy form and their corresponding alpha cuts must be obtained. The results of this transformation are shown in Table 12.

Fuzzified ratesAlpha-cut representation

Based on Figure 8, parametric steady state probabilities are calculated using (1),

The resulting parametric steady state probabilities are where. After obtaining parametric steady state probabilities, they have to be converted to their corresponding fuzzy form. By applying fuzzified transition firing rates in steady state probabilities, fuzzy steady state probabilities are calculated. Therefore, the alpha cut representations of fuzzy steady state probabilities are Since the value of fuzzy probabilities must be in interval , we have to observe if they are out of this interval. When all the minimum and maximum bounds of each fuzzy number must be in ; however it is apparent that exceeds 1. On the other hand, all are positive. Therefore, the LP model of the problem, using (13), is given as: Using LP software or spreadsheets like Excel, we can find the optimal value of as 0.779. Thus the feasible fuzzy steady state probabilities will be as given in, Table 13.

Fuzzy number

In the next stage, the obtained fuzzy probabilities must be converted to generalized fuzzy numbers. According to Figure 8, we have two risky states in our model, and , so we just deal with them. We call and as risky states and , respectively. Based on our intuition, we consider risk factors for both and , as in Table 14.

Risk value


The weights of both risky states are

Finally, the resulting generalized fuzzy probability numbers are (Figures 910):

Now, we incorporate the proposed ranking method and rank these two fuzzy probability numbers. Their ranking score for the failure modes are (), ). Hence, has priority to perform corrective actions over because its fuzzy risk probability has a higher ranking score according to the ranking algorithm introduced in Section 4.

7. Conclusions

In this study we proposed a hybrid approach utilizing isomorphism between stochastic Petri Nets and Markov chains, and also a novel fuzzy ranking method. This approach is general and many different risk factors in the systems, which should be considered, are studied, for the first time. Another contribution of this paper is the application of fuzzy logic in determining steady state probabilities of systems and incorporating them in risk analysis.

The proposed methodology can be useful in most real life applications such as industrial systems; however, an important issue regarding this methodology is complexity. Although this method is quite efficient in dealing with small or medium sized Petri Nets but it would be hard to implement it on more complex nets. Therefore, presenting new approaches to improve efficiency of the prosed method in order to handle large scale problems can be an appropriate topic for future studies.


  1. M. Braglia, M. Frosolini, and R. Montanari, “Fuzzy critically assessment for failure modes and effect analysis,” International Journal of Quality & Reliability Management, vol. 20, no. 4, pp. 503–524, 2003. View at: Publisher Site | Google Scholar
  2. D. H. Stamatis, Failure Mode and Effect Analysis- FMEA From Theory to Execution, ASQC Quality Press, Milwaukee, Wis, USA, 1995.
  3. K. Xu, L. C. Tang, M. Xie, S. L. Ho, and M. L. Zhu, “Fuzzy assessment of FMEA for engine systems,” Reliability Engineering and System Safety, vol. 75, no. 1, pp. 17–29, 2002. View at: Publisher Site | Google Scholar
  4. C. L. Chang, C. C. Wei, and Y. H. Lee, “Failure mode and effects analysis using fuzzy method and grey theory,” Kybernetes, vol. 28, no. 9, pp. 1072–1080, 1999. View at: Google Scholar
  5. B. H. Lee, “Using Bayes belief networks in industrial FMEA modeling and analysis,” in Proceedings of the International Symposium on Product Quality and Integrity, pp. 7–15, January 2001. View at: Google Scholar
  6. M. Bevilacqua, “Monte Carlo simulation approach for a modified FMECA in a power plant,” Quality and Reliability Engineering International, vol. 17, no. 9, pp. 3–13, 2000. View at: Google Scholar
  7. A. D. Dominguez-Garcia, J. G. Kassakian, and J. E. Schindall, “Reliability evaluation of the power supply of an electrical power net for safety-relevant applications,” Reliability Engineering and System Safety, vol. 91, no. 5, pp. 505–514, 2006. View at: Publisher Site | Google Scholar
  8. J. B. Bowles and C. E. Pelaez, “Application of fuzzy logic to reliability engineering,” Proceedings of the IEEE, vol. 83, no. 3, pp. 435–449, 1995. View at: Publisher Site | Google Scholar
  9. K. J. Schmucker, Fuzzy Sets, Natural Language Computations, and Risk Analysis, Computer Science Press, Rockville, Md, USA, 1984.
  10. S. M. Chen and C. H. Wang, “Fuzzy risk analysis based on ranking fuzzy numbers using α-cuts, belief features and signal/noise ratios,” Expert Systems with Applications, vol. 36, no. 3, pp. 5576–5581, 2009. View at: Publisher Site | Google Scholar
  11. S. M. Chen and J. H. Chen, “Fuzzy risk analysis based on ranking generalized fuzzy numbers with different heights and different spreads,” Expert Systems with Applications, vol. 36, no. 3, pp. 6833–6842, 2009. View at: Publisher Site | Google Scholar
  12. S. M. Chen and J. H. Chen, “Fuzzy risk analysis based on similarity measures between interval-valued fuzzy numbers and interval-valued fuzzy number arithmetic operators,” Expert Systems with Applications, vol. 36, no. 3, pp. 6309–6317, 2009. View at: Publisher Site | Google Scholar
  13. S. H. Wei and S. M. Chen, “A new approach for fuzzy risk analysis based on similarity measures of generalized fuzzy numbers,” Expert Systems with Applications, vol. 36, no. 1, pp. 589–598, 2009. View at: Publisher Site | Google Scholar
  14. C. H. Cheng, “A new approach for ranking fuzzy numbers by distance method,” Fuzzy Sets and Systems, vol. 95, no. 3, pp. 307–317, 1998. View at: Google Scholar
  15. T. C. Chu and C. T. Tsao, “Ranking fuzzy numbers with an area between the centroid point and original point,” Computers and Mathematics with Applications, vol. 43, no. 1-2, pp. 111–117, 2002. View at: Publisher Site | Google Scholar
  16. S. Murakami, S. Maeda, and S. Imamura, “Fuzzy decision analysis on the development of centralized regional energy control system,” in Proceedings of IFAC Symposium on Fuzzy Informatics, Knowledge Representation and Decision Making, pp. 363–368, 1983. View at: Google Scholar
  17. R. R. Yager, “Ranking fuzzy subsets over the unit interval,” in Proceedings of 17th IEEE International Conference on Decision and Control, pp. 1436–1437, New York, NY, USA. View at: Google Scholar
  18. S. J. Chen and S. M. Chen, “Fuzzy risk analysis based on the ranking of generalized trapezoidal fuzzy numbers,” Applied Intelligence, vol. 26, no. 1, pp. 1–11, 2007. View at: Publisher Site | Google Scholar
  19. L. W. Lee and S. M. Chen, “Fuzzy risk analysis based on fuzzy numbers with different shapes and different deviations,” Expert Systems with Applications, vol. 34, no. 4, pp. 2763–2771, 2008. View at: Publisher Site | Google Scholar
  20. S. M. Chen and K. Sanguansat, “Analyzing fuzzy risk based on a new fuzzy ranking method between generalized fuzzy numbers,” Expert Systems with Applications, vol. 38, no. 3, pp. 2163–2171, 2011. View at: Publisher Site | Google Scholar
  21. T. Murata, “Petri nets: properties, analysis and applications,” Proceedings of the IEEE, vol. 77, no. 4, pp. 541–580, 1989. View at: Publisher Site | Google Scholar
  22. D. Vernez, D. Buchs, and G. Pierrehumbert, “Perspectives in the use of coloured Petri nets for risk analysis and accident modelling,” Safety Science, vol. 41, no. 5, pp. 445–463, 2003. View at: Publisher Site | Google Scholar
  23. M. Zhou and K. Venkatesh, Modeling, Simulation And Control of Flexible Manufacturing Systems, A Petri Net Approach, World Scientific, Singapore, 1999.
  24. M. K. Molly, “Performance analysis using stochastic Petri Nets,” IEEE Transactions on Computers, vol. 31, no. 9, pp. 913–917, 1982. View at: Google Scholar
  25. F. Bause and P. S. Kritzinger, Stochastic Petri Nets: An Introduction to The Theory, Vieweg, Braunschweig, Germany, 2nd edition, 2002.
  26. H. J. Zimmermann, Fuzzy Set Theory and Its Applications, Kluwer Academic, New York, NY, USA, 3rd edition, 1996.
  27. A. Doostparast Torshizi, Integrated risk analysis of systems based on Petri Nets analysis [Dissertation], Isfahan University of Technology, 2011.
  28. R. Viertl and D. Hareter, “Fuzzy information and stochastics,” Iranian Journal of Fuzzy Systems, vol. 1, no. 1, pp. 39–52, 2004. View at: Google Scholar
  29. F. Tüysüz and C. Kahraman, “Modeling a flexible manufacturing cell using stochastic Petri nets with fuzzy parameters,” Expert Systems with Applications, vol. 37, no. 5, pp. 3910–3920, 2010. View at: Publisher Site | Google Scholar
  30. M. C. Zhou and K. Venkatesh, Modeling, Simulation and Control of Flexible Manufacturing Systems: A Petri Net Approach, World Scientific, Singapore, 1999.

Copyright © 2012 Abolfazl Doostparast Torshizi and Jamshid Parvizian. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.