Vous êtes sur la page 1sur 14

Risk Analysis, Vol. 27, No. 5, 2007 DOI: 10.1111/j.1539-6924.2007.00972.

Water Quality Failures in Distribution Networks—Risk


Analysis Using Fuzzy Logic and Evidential Reasoning

Rehan Sadiq,1 ∗ Yehuda Kleiner,1 and Balvant Rajani1

The evaluation of the risk of water quality failures in a distribution network is a challenging
task given that much of the available data are highly uncertain and vague, and many of the
mechanisms are not fully understood. Consequently, a systematic approach is required to
handle quantitative-qualitative data as well as a means to update existing information when
new knowledge and data become available. Five general pathways (mechanisms) through
which a water quality failure can occur in the distribution network are identified in this article.
These include contaminant intrusion, leaching and corrosion, biofilm formation and microbial
regrowth, permeation, and water treatment breakthrough (including disinfection byproducts
formation). The proposed methodology is demonstrated using a simplified example for water
quality failures in a distribution network. This article builds upon the previous developments
of aggregative risk analysis approach. Each basic risk item in a hierarchical framework is
expressed by a triangular fuzzy number, which is derived from the composition of the likelihood
of a failure event and the associated failure consequence. An analytic hierarchy process is
used to estimate weights required for grouping noncommensurate risk sources. The evidential
reasoning is proposed to incorporate newly arrived data for the updating of existing risk
estimates. The exponential ordered weighted averaging operators are used for defuzzification
to incorporate attitudinal dimension for risk management. It is envisaged that the proposed
approach could serve as a basis to benchmark acceptable risks in water distribution networks.

KEY WORDS: Analytic hierarchy process; distribution networks; evidential reasoning; exponential or-
dered weighted average operators; fuzzy logic; water quality

1. INTRODUCTION pipes and distribution tanks. While water quality can


be compromised at any component, failure at the dis-
Safety of drinking water is a high priority of water
tribution level can be extremely critical because it is
purveyors and stakeholders (owners and customers).
closest to the point of delivery and, with the exception
A typical modern water supply system comprises the
of a rare filtering device at the consumer level, there
water source (groundwater or surface water, including
are virtually no safety barriers before consumption.
the catchment basin), transmission mains, treatment
plants, and a distribution network, which includes
1.1. Water Quality Failures
1 Buried Utilities Research, Urban Infrastructure Program, In-
stitute for Research in Construction (IRC), National Research Water quality is generally defined by a collection
Council of Canada (NRC), Ottawa, ON, Canada. of upper and lower limits on selected indicators (con-
∗ Address correspondence to Rehan Sadiq, Buried Utilities Re-
taminants) in the water (Maier, 1999), which can be
search, Urban Infrastructure Program, Institute for Research
in Construction (IRC), National Research Council of Canada
classified into three broad categories: physical, chemi-
(NRC), Ottawa, ON, Canada K1A 0R6; rehan.sadiq@nrc-cnrc. cal, and biological contaminants. The upper and lower
gc.ca. limits are often governed by regulations (Swamee &

1381 0272-4332/07/0100-1381$22.00/1 
C 2007 Society for Risk Analysis
1382 Sadiq, Kleiner, and Rajani

Biofilm is a deposit consisting of microorganisms,


microbial products, and detritus at the surface of pipes
or tanks. Biological regrowth may occur when injured
bacteria enter from the treatment plant into the dis-
tribution network. Under favorable conditions, such
as nutrient supply (e.g., organic carbon) in the wa-
ter and long residence time, these bacteria can at-
tach themselves to surfaces, rejuvenate, and grow in
storage tanks and on rough inner surfaces of water
mains. The regrowth of microorganisms in the distri-
bution network results in an increased chlorine de-
Fig. 1. Pathways for water quality failures in water distribution
networks. mand, which has two adverse effects: (a) a reduction
in the level of free available chlorine may hinder the
Tyagi, 2000). A water distribution network acts as a network’s ability to contend with local occurrences of
complex reactor in which various processes occur si- contamination (US EPA, 1999), and (b) an increased
multaneously. The water quality in the distribution level of disinfection to satisfy the chlorine demand of
network, which is an outcome of these processes, con- biofilm may result in higher concentrations of disin-
tinuously changes both temporally and spatially. A fection byproducts (DBPs).
water quality failure event is often defined as an ex- Internal corrosion of metallic pipes and plumb-
ceedance of one or more water quality indicators from ing devices may increase the concentration of metal
specific regulations, or in the absence of regulations, compounds in the water. Different metals go through
exceedance of guidelines or self-imposed, customer- different corrosion processes, but in general low pH
driven limits. Water quality failures in distribution water, high dissolved oxygen, high temperature, and
networks can generally be classified into the follow- high levels of dissolved solids increase corrosion rates.
ing major categories or pathways (Kleiner, 1998), also Metals such as lead and cadmium may leach into
described in Fig. 1: the water from pipes, causing significant health ef-
r Contaminant intrusion into the distribution fects. Secondary metals such as copper (from home
plumbing), iron (distribution pipes), and zinc (galva-
network through system components,
r Biofilm formation and regrowth of microor- nized pipes) may leach into water causing taste, odor,
and color (red or rusty water) problems in addition
ganisms in a distribution network,
r Water treatment breakthrough of bacteria to some minor health-related risks (Kleiner, 1998).
Leaching of chemicals into the water supply can of-
and/or chemicals, formation of disinfection
ten come from the internal lining and coating of pipes
byproducts (DBPs),
r Leaching of chemicals, release of corrosion
(e.g., volatile organic compounds), causing physico-
chemical water quality failure with adverse health and
byproducts, and
r Permeation of organic compounds from the
aesthetic consequences.
Permeation is a phenomenon in which contami-
soil through system components.
nants (notably hydrocarbons) from a polluted site mi-
An intrusion of contaminants into the water dis- grate through the walls of plastic pipes. Three stages
tribution network can occur through storage tanks are observed in permeation: (a) organic chemicals
(animals, dust-carrying bacteria, infiltration) and present in the soil partition between the soil and the
pipes. Intrusion through water mains may occur dur- plastic wall, (b) the chemicals defuse through the
ing or after maintenance and repair events, through pipe wall, and (c) the chemicals partition between
broken or corroded (pinholes or cracks) pipes and the pipe wall and the water inside the pipe (Kleiner,
joints/gaskets, and through cross-connections (Kir- 1998). In general, the risk of contamination through
meyer et al., 2001). Whenever the water pressure in a permeation is relatively small as compared to other
pipe is very low or negative, the risk of contamination mechanisms.
through backflow or through leaky pipes increases.
This can happen when the pipe is de-pressurized for
1.2. Risk Analysis Techniques
repair or during transient pressures (e.g., when the hy-
drant is used for fire extinguishing or water hammer Commonly, “risk” refers to the joint probabilities
events). of an occurrence of an event and its consequences
Water Quality Failures in Distribution Networks 1383

and “risk analysis” refers to a process of an estima- 1986). Recently, MacGillivray et al. (2006) provided
tion of the frequency and physical consequences of an excellent review of some of these risk analysis and
undesirable events (Ricci et al., 1981). Risk analysis decision-making strategies. This review critically an-
may include a range of techniques from a simple qual- alyzes and reports a wide range of research studies
itative analysis (e.g., preliminary hazard analysis) to that use the above risk analysis techniques, primarily
very complex quantitative techniques (e.g., Bayesian focusing on drinking water supply systems.
networks) for dynamic systems. A brief discussion on The quantification of the risk of contamination
some of the risk analysis techniques is provided in this in water distribution networks is a difficult task.
section. Water distribution networks comprise many (some-
Preliminary hazard analysis (PHA) is a qualita- times thousands of) kilometers of pipes of different
tive technique for conducting hazard assessment in ages and various materials, which are subjected to
chemical process industries. The PHA can identify varying operational and environmental conditions. In
systems/processes that require further examination addition, limited performance and deterioration data
to control major hazards (Fullwood & Hall, 1988). are available since pipes are buried structures. Finally,
Hazard and operability study (HAZOP) is a tech- some of the failure processes are not well understood
nique also commonly employed in chemical process and the diagnosis of contamination is very difficult
industries for estimating safety risk and operability because there is generally a time lag between the oc-
improvements (Sutton, 1992). Failure mode and ef- currence of failure and the time at which the conse-
fects analysis (FMEA) is commonly used in reliabil- quences (e.g., outbreaks) are observed.
ity engineering to analyze potential failure modes in Both set theory and probability theory are the
a system and rank them according to their severity. classical mathematical frameworks for characterizing
When the FMEA is extended to criticality analysis, uncertainties. Since the 1960s, a number of general-
the technique is called failure mode and effects criti- izations of these frameworks have been developed to
cality analysis (FMECA) (Chakib et al., 1992). formalize different types of uncertainties. Klir (1999)
Tree-based (hierarchical) techniques are also reported that well-justified measures of uncertainties
widely used to perform risk analysis. A fault tree is a are available not only in the classical set theory and
logical diagram that shows the relation between sys- probability theory, but also in the fuzzy set theory
tem failure, i.e., a specific undesirable event in the (Zadeh, 1965), possibility theory (Dubois & Parade,
system, and failures of the components of the system 1988), and the Dempster-Shafer (D-S) theory (Demp-
(Vincoli, 1994). Event tree analysis (ETA) is a tech- ster, 1968; Shafer, 1976). Klir (1995) proposed a com-
nique to illustrate the sequence of outcomes that may prehensive general information theory (GIT) to en-
arise after the occurrence of a selected initial event capsulate these concepts into a single framework and
(Suokas & Rouhiainen, 1993). Cause-consequence established links among them.
analysis (CCA) combines cause analysis (described Sadiq et al. (2004) developed a hierarchical (or
by fault trees) and consequence analysis (described tree-based) structure that broke down the overall risk
by event trees). of water quality failures in a distribution network into
Techniques for the analysis of dynamic systems basic risk items. Risk was characterized qualitatively
can involve methods such as digraph/fault graph, dy- (or linguistically) based on fuzzy techniques com-
namic ETA, Bayesian networks, or fuzzy cognitive bined with an analytic hierarchy process (AHP). This
maps. The digraph/fault graph technique uses the article builds upon the previous developments and ad-
mathematics and language of graph theory, which dresses four important aspects of the aggregative risk
constructs the risk model by replacing system ele- analysis in distribution networks. These aspects are:
ments with AND and OR gates. Bayesian networks (a) risk fuzzification—mapping of triangular fuzzy
(BN) are directed acyclic graphs, in which nodes rep- numbers of basic risk items to 5-tuple fuzzy risk set,
resent variables and directed arcs describe the condi- (b) risk aggregation—aggregating fuzzy risk for hi-
tional dependence relations embedded in the model. erarchical structure, (c) risk updating—using eviden-
Though the conditional probabilities are often dif- tial reasoning to fuse newly arrived data (or belief)
ficult to obtain, BNs are considered as one of the with existing knowledge, and updating risk estimates
most popular dynamic modeling tools (Pearl, 1988). at any level in the hierarchical structure, and (d) us-
A fuzzy cognitive map (FCM) is an illustrative rep- ing exponential ordered weighted average (E-OWA)
resentation of the complex system that uses cause- operators for defuzzification to consider the deci-
effect relationships to perform risk analysis (Kosko, sionmaker’s attitude toward risk (level of optimism)
1384 Sadiq, Kleiner, and Rajani

when deriving the final expressions for aggregative Table II. Linguistic Definitions of Grades (Granulars) Using
risk. TFNs for Risk

Qualitative Triangular
Granulars Scale for Risk Fuzzy Number Centroid
2. THE PROPOSED FRAMEWORK (p) Level (L)a (TFN L ) (LP )

In many engineering problems, information 1 Very low [0, 0, 0.25] 0.08


about the probabilities of various risk items is vaguely 2 Low [0, 0.25, 0.5] 0.25
known or assessed. Fuzzy logic provides a language 3 Medium [0.25, 0.5, 0.75] 0.5
4 High [0.5, 0.75, 1] 0.75
with syntax and semantics to translate qualitative
5 Very high [0.75, 1, 1] 0.92
knowledge into numerical reasoning. When conduct-
ing risk analysis for complex systems, decisionmak- a For absolute zero and one, “none” and “certain” qualitative

ers, engineers, managers, regulators, and other stake- scales can be used, respectively. The TFNs for these qualitative
holders often articulate the risk in terms of linguis- scales are (0, 0, 0) and (1, 1, 1), respectively, for both likelihood
tic variables like very high, high, very low, low, etc. and peril.
The fuzzy-based techniques are able to deal effec-
tively with such vague and imprecise probabilities for changed or modified based on expert opinion or on
approximate reasoning, which subsequently help the Delphi-based surveys.
decision-making process. The risk of failure in the probabilistic realm is
Triangular fuzzy numbers (TFNs) are often used the joint probability of occurrence and consequences
for representing linguistic variables (Lee, 1996). A of failure. When the probabilities of occurrence and
more comprehensive description of fuzzy-based tech- failure are assumed to be independent of each other,
niques is not provided in this article because of space their joint probability is equal to the product of the
limitations. Interested readers are encouraged to con- respective probabilities. Under the same assumption
sult excellent texts on this topic written by Klir and of independence, the fuzzy risk of failure will be calcu-
Yuan (1995) and Ross (2004). lated as the product of the two fuzzy numbers denoted
by r and l. By definition, the product of two TFNs is
itself a TFN. Let TFN r be defined by the members
2.1. Risk Fuzzification (ar , br , cr ), and TFN l by (al , bl , cl ). The risk TFN rl for
Let the likelihood (probability) r of failure be de- these r and l is calculated by,
fined by the triangular fuzzy number TFN r and the x = TFN rl = TFN r × TFN l = (ar ∗ al , br ∗ bl , cr ∗ cl ).
consequence (or peril) l of failure be defined by TFN l . (1)
Table I describes an 11-grade scale for both r and l.
Let failure risk be defined by the 5-grade TFN L , de- For example, if an event has a likelihood r as high [0.6,
scribed in Table II. The definitions of TFNs can be 0.7, 0.8] and the peril l is unimportant [0.2, 0.3, 0.4],
the corresponding risk x will be a TFN rl [0.12, 0.21,

Qualitative Scale for Qualitative Scale for Triangular Fuzzy Number


Granular (q) Likelihood of Risk (r) Peril of Risk (l) (TFN r or TFN l )

1 Absolutely low Absolutely unimportant [0, 0, 0.1]


2 Extremely low Extremely unimportant [0, 0.1, 0.2]
3 Quite low Quite unimportant [0.1, 0.2, 0.3]
4 Low Unimportant [0.2, 0.3, 0.4] Table I. Linguistic Definitions of Grades
5 Mildly low Mildly unimportant [0.3, 0.4, 0.5] (Granulars) Using TFNs for Likelihood
6 Medium Neutral [0.4, 0.5, 0.6] and Peril
7 Mildly high Mildly important [0.5, 0.6, 0.7]
8 High Important [0.6, 0.7, 0.8]
9 Quite high Quite important [0.7, 0.8, 0.9]
10 Extremely high Extremely important [0.8, 0.9, 1]
11 Absolutely high Absolutely important [0.9, 1, 1]

Note: For absolute zero and one, “none” and “certain” qualitative scales can be used,
respectively. The TFNs for these qualitative scales are (0, 0, 0) and (1, 1, 1), respectively, for
both likelihood and peril.
Water Quality Failures in Distribution Networks 1385

Fig. 2. Estimating 5-tuple fuzzy set of


risk.

0.32]. There are five steps to convert fuzzy number In the example of Fig. 2, the fuzzy set X is [0.26,
TFN rl into fuzzy risk X—a normalized 5-tuple fuzzy 0. 6, 0.14, 0, 0], and can also be expressed as, X =
set. These steps are also illustrated in Fig. 2. [ 0.26
VL L
, 0.6 , 0.14 , 0 , 0 ].
M H VH
r Map TFN rl over TFN L (p = 5 grades defined
2.2. Risk Aggregation
over the universe of discourse of risk);
r determine the points where TFN rl intersects Fig. 3 illustrates the basic building blocks of the
each TFN L (Table II); proposed hierarchical structural model for the risk ag-
r use a maximum (or-type, t-conorm) operator if gregation. Each risk item is partitioned into its con-
TFN rl intersects any TFN L at more than one tributory factors, which are also risk items, and each of
point (Fig. 2); those can be further partitioned into lower-level con-
r establish a set of intersecting points (or the tributory factors. A unit that consists of a risk factor
maximum thereof if more than one) that de- (“parent”) and its contributory factors (“children”) is
fines a nonnormalized 5-tuple fuzzy set, X L , called a “family.” A risk unit with no children is called
(e.g., in Fig. 2, X L is [0.38, 0.88, 0.2, 0, 0], which a “basic risk item,” while the term risk item is used for
are the memberships of X L to the grades very all elements with offspring. The notation used for a
low, low, medium, high and very high risk, re- risk item is Xi,k j , where i is the ordinal number of risk
spectively); and item X in the current generation; j is the ordinal num-
r normalize X L to obtain fuzzy set X, where ber of the parent (in the previous generation); and k
membership µp of X L is transformed to µN p is the generation order of X. The indices i, j, and k are
of X by dividing each µp by the cardinality C used for risk item attributes as well, e.g., in the table
(sum of all memberships in a fuzzy set). of Fig. 3, the factors r i,k j and l i,k j denote likelihood and
µp µp peril (respectively) for the risk item Xi,k j .
µN
p = = . (2) Various “inferencing” methods can be used to

n
C
µp aggregate fuzzy sets; however, in this study, “infer-
p=1 encing” through weighted average is proposed to
1386 Sadiq, Kleiner, and Rajani

Fig. 3. A hierarchical structure for the


estimation of aggregative risk.

determine the aggregative risk. The weighted average have equal weights, wi,k j , which means that they can
inferencing refers to sum-prod fuzzy compositional be ignored altogether. Saaty (2001) described in detail
operator. There are different types of fuzzy composi- the AHP to derive weights. These weights are normal-
tion operators available like max-min (reflects low un- ized to a sum of unity, such that in any generation (k),
certainty range), sum-prod (reflects high uncertainty for n siblings with parent j, a set of weights can be
range), and mix of both max-min and sum-prod. These written as,
compositional operators express the various degrees
of and-ness and or-ness in the application of fuzzy  k  
n
wi,k j = w1, j , w2, j , ..., wn, j ,
k k
where wi,k j = 1.
sets. Logical operators like max-min are more restric-
i=1
tive than, say, sum-prod and max-prod. For simplicity (3)
the weighted average (sum-prod) is used in this study
(Sadiq et al., 2003). The process of evaluating aggregative risk in a
A weighting scheme is required when the respec- “family” with an aggregative structure is described us-
tive contributions of sibling risk items toward their ing the family (Fig. 3) of X22,1 (parent) and X33,2 , X34,2 ,
parent have noncommensurate units. Fig. 3 shows a X35,2 (children) as an example. For each of the sibling
general case where weights are assigned to each risk risk items, the likelihood r and peril l are assigned from
item. The notation used is wi,k j , which denotes the the 11-grade scaling system (Table I). TFN rl (x) is the
weight of Xi,k j relative to its siblings. When the respec- product of two fuzzy numbers TFN r and TFN l (Equa-
tive contributions of sibling risk items toward their tion (1)), which is then mapped over TFN L to obtain
parent have commensurate units, then all the siblings the 5-tuple fuzzy set X L (a nonnormalized fuzzy set
Water Quality Failures in Distribution Networks 1387

for risk). X L is then normalized to obtain the 5-tuple bilities are assigned to subsets as opposed to mutually
fuzzy sets X33,2 , X34,2 , X35,2 , representing the risk con- exclusive singletons. For example, let the universal set
tribution of each of the siblings toward their parent. {L, M, H} contain three basic elements. The frame of
For ease of manipulation, these 5-tuple sets can be discernment  comprise all combinations of the basic
arranged in a fuzzy assessment matrix, which is a 3 × elements in the universal set, in our example, the 8
5 matrix F(Xi,2 3
). The AHP is then applied, weights subsets of  are φ, {L}, {M}, {H}, {L, M}, {L, H},
w3,2 , w 4,2 , and w 35,2 are evaluated and arranged into
3 3 {M, H}, and {L, M, H}. The subset {L, M} means
a 3-member vector. The aggregative risk (or parent) {L} or {M}. Consequently, the subset {L, M, H} rep-
of the three siblings is the cross product of weights resents a complete ignorance situation (i.e., we do not
vector and the assessment matrix, yielding a 5-tuple know which will be the outcome, it can be any of L,
fuzzy set X22,1 , M, or H). It can be shown that  comprises 2n subsets
where n is number of basic elements.
 3   3 
2
X2,1 = w3,2 , w4,2
3
, w5,23
× F Xi,2 The D-S theory defines a basic probability assign-
  ment (bpa is denoted by m). Let evidence A be a sub-
= µ1N , µ2N , . . . , µ5N , (4) set of . The bpa m(A) is defined over the interval
[0, 1]. The bpa of a null set m(φ) = 0. The complement
where µN p (p = 1, 2, . . . , 5) are the membership values of A is always attributed to the complete ignorance,
of the aggregated risk with respect to the 5-grade risk
i.e., subset . For example, let evidence A = {{L},
scale.
{L, M}} so that m(A)L = 0.6 and m(A)L,M = 0.2, then
It should be noted that the process of evaluating
m(A) = 0.8 and m(A) = 1 – 0.8. For a given basic
r and l and mapping the product risk onto the 5-grade
probability assignment m, every nonignorant subset A
risk scale is necessary only for basic risk items, i.e.,
(i.e., m(A)
= 0) is called a focal element, e.g., in the ex-
those risk items that do not have children. All sub-
ample above, m(A)L and m(A)L,M are focal elements.
sequent risk aggregations from one generation to the
The D-S rule of combination defines how to com-
next are determined by only applying Equation (4)
bine evidence obtained from two or more sources.
using the appropriate relative weights. Consequently,
It strictly emphasizes agreements between multiple
it is useful to use notation that distinguishes between
sources and ignores all conflicting evidence through
basic and nonbasic risk items. In the remainder of this
normalization. A strict conjunctive operation (and-
article, the notation for a basic risk item will include
type or intersection type operator) using a “product”
an apostrophe at the generation index, i.e., if item X34,2
 is used to combine the evidences. For example, if B
is a basic risk item, it will be denoted by X34,2 . and C are two sources of information, the D-S rule of
combination establishes the joint bpa m1–2 (A) from
the aggregation of bpas m1 (B) and m2 (C),
2.3. Risk Updating Using Evidential Reasoning

(D-S Rule of Combination) m1 (B)m2 (C)
B∩C=A
In classical Bayesian inference, the sum of prob- m1−2 (A) = when A
= φ;
abilities of any set A and its complement, p(A) + 1−K
p(¬A) = 1. This implies that knowledge about A can m1−2 (φ) = 0, (5)
be used to derive a belief about its complement. For 
example, let  = {A, B, C} be a frame of discern- where K = B∩C=φ m1 (B)m2 (C). K is the degree of
ment (also called a universe of discourse meaning all conflict between two bodies of evidence. It can be
possible outcomes), and let the evidence p(A) = a. shown that the denominator (1 − K) in Equation (5) is
According to equal noninformative priors (Laplace a normalization factor, which always brings the sum
Principle of Insufficient Reason), then p(B) = p(C) = of all m1–2 (A) values to unity. The above equations
0.5(1 − a), i.e., the probability of the complement of can be rewritten as,
A will be equally distributed in subsets B or C. 
m1 (B)m2 (C)
In contrast to the above, Dempster-Shafer (D-S)
m1−2 (A) = 
B∩C=A
theory is based on the premise that missing evidence . (6)
m1 (B)m2 (C)
(or lack of knowledge, or ignorance) about ¬A does B∩C

not justify an assumption about probabilities of B and
C (Alim, 1988). The D-S theory can be interpreted as Zadeh (1984) identified a serious shortcoming in the
a generalization of probability theory, where proba- D-S rule of combination due to the use of strict
1388 Sadiq, Kleiner, and Rajani

conjunctive operator (product). Sentz and Ferson new evidence is available; however, it is expected that
(2002) have provided an excellent review of various D-S updating will be done mainly at the level of basic
techniques to overcome this discrepancy. Recently, risk items. This process is thus used to combine the
Yager (2004) proposed the use of disjunctive oper- new information with prior information.
ators (or-type operator, denoted by ⊕), according to
which Equation (6) can be modified as,
 2.4. Risk Management (Using Defuzzification)
⊕[m1 (B), m2 (C)]
In the first generation of the aggregative structure
m1−2 (A) = 
B∩C=A
. (7) (i.e., the head of the pyramid), the final aggregative
⊕[m1 (B), m2 (C)]
B∩C

risk is a fuzzy set that can be defuzzified to provide
a single (crisp) measure of the risk, using one of the
A disjunctive logic using “max” operator can be several defuzzification techniques described in Chen
used in Equation (7). The approach described above and Hwang (1992). Lee (1996) proposed a simple de-
implicitly assumes that all sources of information are fuzzification technique as follows,
equally credible. Yager (2004) suggested a credibil-
ity transformation function, which discounts evidence Defuzzified risk = LP · X1,0
1
, (9)
with a credibility factor (α) and distributes the re- which means that the defuzzified risk is calculated as
maining evidence (1 − α) equally among n elements. a dot product of vector LP and the fuzzy number X11,0 ,
1−α where LP (given in Table II) is the 5-tuple vector rep-
m(A)α = m(A) · α + . (8) resenting centroid values of p linguistic risk constants.
n
The crisp value of risk can be misleading because of
For example, assume that the evidence obtained associated uncertainties and subjectivity in the use
from two different sources for risk item X21,1 is repre- of any defuzzification technique. An attitudinal di-
sented by fuzzy sets m1 (X21,1 ) = [0.5, 0.5, 0, 0, 0] and mension can be introduced in the defuzzification of
m2 (X21,1 ) = [0, 0.6, 0.4, 0, 0]. Assume further that the risk to alleviate (or at least have control over) this
corresponding credibility factors are α 1 = 1 and α 2 = issue.
0.5, respectively. The bodies of evidence are adjusted In the proposed framework, the ordered
and the D-S rule of combination is used to obtain the weighted operator (OWA) as described by Yager
fuzzy set m1−2 (X21,1 ) = [0.33, 0.33, 0.2, 0.07, 0.07]. In (1988) is selected as the method to consider the atti-
the hierarchical structure described earlier, D-S up- tude of the decisionmaker in defuzzifying the final risk
dating can be done at any level of the hierarchy when value. The OWA method was used for applications

Fig. 4. Characteristic curves for


representing functional relationships
between or-ness and parameter β to
determine E-OWA and crisp risk
estimates.
Water Quality Failures in Distribution Networks 1389

in decision making (Engemann et al., 1996), expert resent a simple relationship between the orness and
systems (Kacprzyk, 1990), and fuzzy systems (Yager a parameter β (Filev & Yager, 1998). The E-OWA
& Filev, 1994). A number of approaches have been weights are defined as follows:
suggested to obtain OWA weights (Yager, 1993).
O’Hagan (1988), for example, calculated the vector w1 = β; w2 = β(1 − β); . . . wn−1 = β(1 − β)n−2 and
of the OWA weights for a predefined or-ness (level wn = (1 − β)n−1 ; 0 ≤ β ≤ 1, (10)
of optimism) by maximizing the entropy of the OWA
weights using linear programming. Another (simpler) where n is the granularity of fuzzy risk. Once the
way of obtaining OWA weights involves the using of weights w p (p = 1, 2, . . . , n) are determined, the crisp
exponential OWA (E-OWA) operators, which rep- value of the fuzzy risk can be calculated by:

Fig. 5. Proposed framework for aggregative risk analysis.


1390 Sadiq, Kleiner, and Rajani


n cisionmaker’s chosen optimism level or or-ness. The
Defuzzified risk = w pµ N
p, (11) or-ness of an E-OWA operator takes on a value be-
p=1
tween zero (pessimistic) and unity (optimistic) and is
related to parameter β as follows:
where µN p are the normalized membership values of
the fuzzy risk to the risk levels, which are arranged 1  n

in a decreasing order of importance (i.e., VH, H, M, Or-ness = (n − p)w p . (12)


n − 1 p=1
L, VL). Parameter β is determined based on the de-

Fig. 6. Hierarchical structure for aggregative risk of water quality failure (Sadiq et al., 2004).
Water Quality Failures in Distribution Networks 1391

Fig. 4 illustrates some characteristic curves of or- type of water quality failure can be found in Sadiq
ness versus β for selected levels of granularity, as cal- et al. (2004). This structure is used to demonstrate the
culated using Equations (10) and (12). In summary, aggregative risk framework introduced in the previ-
the steps to estimate risk for a given level of optimism ous section. Table III lists 17 basic risk items for the
are: proposed structure. These basic risk items are po-
r Assume a level of optimism (or-ness); sitioned in the fourth and the third generations of
r calculate β using Equations (10) and (12) or the hierarchical structure, and are grouped into the
third and the second generation (respectively) risk
read the value of β from the characteristic
attributes, which in turn are grouped further up the
curve (Fig. 4) with the appropriate number of
hierarchy. The weight matrices wi,k j for each set of
granulars;
r determine weights using Equation (10); and
siblings were developed using the AHP technique as
r determine crisp risk estimates using Equa-
discussed earlier.
The process of basic risk evaluation and subse-
tion (11).
quent risk aggregation through all the generations
The risk estimates of alternative strategies at a were performed as described in the previous section.
desired level of optimism can be associated to cost- The final aggregated risk (first generation) was ob-
benefit analysis. The more optimistic the attitude, the tained X1,01
= { 0.38
VL
, 0.43
L
, 0.19
M
, 0.01
H
, V0H } and is plotted
higher the willingness to take risks and the lower the in Fig. 7. The final defuzzified aggregative risk was
cost of risk mitigation. Conversely, lower optimism determined for two levels of or-ness (optimism) 0.6
results in a conservative approach, which involves and 0.8 (Fig. 4). The crisp (defuzzified) risk estimates
higher costs. Fig. 5 provides a block diagram that il- varied between 0.14 and 0.06 for low and high opti-
lustrates the proposed framework. mistic attitudes, respectively.
In the context discussed here, the D-S updating is
demonstrated by reassessing risk based on available
3. WATER QUALITY FAILURE IN
new evidence on microbial contamination. This evi-
DISTRIBUTION NETWORKS
dence could consist of information such as an increase
Fig. 6 shows a simplified hierarchical structure for in off-the-shelf sales of gastrointestinal medication or
water quality failure. A detailed discussion on each additional cases reported at local clinics/pharmacies.

Basic Risk
Items Definition r i,k j l i,k j x = TFN L

4
X1,1 External source of contamination in storage tank 5 9 [0.21, 0.32, 0.45]
XL42,1 Internal source of contamination in storage tank 1 3 [0, 0, 0.3]
4 
X3,2 Contamination caused by broken pipes and gaskets 5 9 [0.21, 0.32, 0.45]
4 
X4,2 Contamination during maintenance events 2 8 [0, 0.07, 0.16]
4 
X5,2 Contamination caused by cross connection 6 7 [0.2, 0.32, 0.42]
3 
X3,2 Regrowth of biofilm in tanks and resuspension 3 8 [0.06, 0.14, 0.24]
3 
X4,2 Regrowth of biofilm in pipes and sloughing 2 7 [0, 0.06, 0.14]
4  Table III. Complete Data Set for Basic
X6,5 Disinfection byproducts coming through 5 10 [0.24, 0.36, 0.5]
treated water Risk Items for the Evaluation of Final
4  Aggregative Risk
X7,5 Residual concentration of disinfectants 7 4 [0.1, 0.18, 0.28]
4
X8,5 Residues of other treatment chemicals 5 2 [0, 0.04, 0.1]
4
X9,5 Trace chemicals of source water 3 7 [0.05, 0.12, 0.21]
3
X6,3 Injured and escaped organisms in water treatment 2 10 [0, 0.09, 0.2]
3
X7,4 Elastomers 0 8 [0, 0, 0]
3
X8,4 Organic pollutants 0 5 [0, 0, 0]
4 
X10,9 Leaching of pipe material 4 7 [0.1, 0.18, 0.28]
4
X11,9 Release of corrosion byproducts 8 9 [0.42, 0.56, 0.72]
3
X10,5 Leaching from liners and sealers in storage tank 3 5 [0.03, 0.08, 0.15]
1392 Sadiq, Kleiner, and Rajani

Fig. 7. Possibility mass functions for final


aggregative risk of water quality failure.


The new evidence m2 (X36,3 ) was expressed as [0, 0,
r it is modular and scalable and new knowledge
0.2, 0.8, 0], with a credibility (α 2 ) of 1. The old evi- and information can be accommodated at any

dence m1 (X36,3 ) was a 5-tuple fuzzy set [0.58, 0.42, 0, stage and in any form; for example, vulnera-
0, 0], which was assigned a credibility (α 1 ) of 0.8 with bility to terrorist acts (safety-related risk), hy-
respect to the new evidence. The D-S rule of combi- draulic failure, financial risk, etc. can be part
nation was used to update this risk item and the value of this framework;

of m1−2 (X36,3 ) changed to [0.26, 0.21, 0.05, 0.1, 0.37].
r it has the ability to update information based
The aggregative risk analysis was repeated to obtain a on newly arrived evidence;
final aggregative risk X11,0 = [0.33, 0.4, 0.19, 0.02, 0.05].
r more data result in less uncertainty, which,
After defuzzification, the crisp risk estimate changed when propagated through the hierarchical
from 0.14 to 0.15 for the low optimistic attitude level structure, can result in reduced aggregative
and from 0.06 to 0.09 for the high optimistic attitude risk; the proposed approach can help pinpoint
level. The results of pre- and post-update possibility (identify) those areas where more data would
mass functions are compared in Fig. 7. yield the highest benefits;
r it can be used for cost-benefit analysis to facil-
itate efficient budget allocation and prioritize
4. SUMMARY AND CONCLUSIONS
attention to those areas that have the most ad-
Water quality in the distribution network is a com- verse impact on total water distribution net-
plex issue, for which available data are scarce and of- work risk; and
ten highly uncertain, imprecise, and vague. In addi- r it is easily programmable for a computer ap-
tion, there is a high spatial and temporal variability in plication and can become a risk analysis tool
water quality may occur, and many of the controlling for a water distribution network.
processes are not currently well understood. A com-
prehensive framework of risk analysis was proposed The limitations of the proposed method are:
for water quality failures in the distribution network. r It may be sensitive to the selection of aggrega-
The advantages of the framework are: tion operators. Different mathematical opera-
r it enables the synthesis of both quantita- tors can be used for different segments of the
tive and qualitative information into a single model and trial and error approach can be used
framework; to avoid exaggeration and/or eclipsing. Exag-
r it can explicitly consider and propagate uncer- geration occurs when all basic risk items are of
tainties, for which probability distributions are relatively low risk, yet the final aggregative risk
not known; comes out unacceptably high. Eclipsing occurs
Water Quality Failures in Distribution Networks 1393

when one or more of the basic risk items are of Engemann, K. J., Miller, H. E., & Yager, R. R. (1996). Deci-
relatively high risk, yet the estimated aggrega- sion making with belief structure: An application in risk man-
agement. International Journal of Uncertainty, Fuzziness and
tive risk comes out as unacceptably low.
r This framework supports both qualitative and
Knowledge-Based Systems, 4, 1–6.
Filev, D. P., & Yager, R. R. (1998). On the issue of obtaining OWA
quantitative data. Some data may be sup- operator weights. Fuzzy Sets and Systems, 94, 157–169.
Fullwood, R. R., & Hall, R. E. (1988). Probabilistic Risk Assessment
ported by rigorous observations, while other in the Nuclear Power Industry, 1st ed. New York: Pergamon
data may be based on beliefs that are loosely Press.
supported by anecdotal information. These Kacprzy, J. (1990). Inductive learning from considerably erroneous
examples with a specificity based stopping rule. Proceedings of
two types of data should have different weights International Conference on Fuzzy Logic and Neural Networks,
in the aggregation process. The hierarchical Izuka, Japan, p. 819.
structure in its current form does not address Kirmeyer, G. J., Friedman, M., Martel, K., & Howie, D. (2001).
Pathogen Intrusion into Distribution System. Denver, CO:
this need to distinguish between data obtained AwwaRF.
from sources with different reliabilities. Kleiner, Y. (1998). Risk factors in water distribution systems. British
Columbia Water and Waste Association 26th Annual Confer-
ence. Whistler, B.C., Canada.
The structure presented in this article is but a sim- Klir, J. G. (1995). Principles of uncertainty: What are they? Why do
plified demonstration of the approach. A comprehen- we need them? Fuzzy Sets and Systems, 74, 15–31.
sive structure would require a major effort, including Klir, J. G. (1999). On fuzzy set interpretation of possibility theory.
Fuzzy Sets and Systems, 108, 263–273.
the collaboration of several experts with knowledge Klir, G. J., & Yuan, B. (1995). Fuzzy Sets and Fuzzy Logic—
in several disciplines. Theory and Applications. Englewood Cliffs, NJ: Prentice-Hall,
In the model development stages, the final ag- Inc.
Kosko, B. (1986). Fuzzy cognitive maps. International Journal of
gregative risk value is expected to have limited mean- Man-Machine Studies, 24, 65–75.
ing for the acceptability level of the risk to the Lee, H.-M. (1996). Applying fuzzy set theory to evaluate the rate
general public. It is envisaged that as the proposed of aggregative risk in software development. Fuzzy Sets and
Systems, 79, 323–336.
hierarchical structure is developed, risk items are MacGillivray, B. H., Hamilton, P. D., Strutt, J. E., & Pollard, S. J.
populated and subsequently improved upon (using T. (2006). Risk analysis strategies in the water utility sector:
newly obtained data/evidence), the developers and An inventory of applications for better and more credible de-
cision making. Critical Reviews in Environmental Science and
the guardians of the water distribution networks will Technology, 36(2), 85–139.
gain insight into acceptable risk levels as they are man- Maier, S. H. (1999). Modeling water quality for water distribution
ifested in the final fuzzy and/or defuzzified risk values. systems. Ph.D. thesis. Uxbridge: Brunel University.
O’Hagan, M. (1988). Aggregating template rule antecedents in
In the longer term, this approach could serve as a ba- real-time expert systems with fuzzy set logic. Proceedings 22nd
sis to benchmark acceptable risks in water distribu- Annual IEEE Asilomar Conference on Signals, Systems and
tion networks. A collaborative research project titled Computers. Pacific Grove, CA, pp. 681–689.
Pearl, J. (1988). Probabilistic Reasoning in Expert Systems. San Ma-
“Effect of aging water mains on water quality in the teo, CA: Morgan Kaufmann.
distribution systems” by the American Water Works Ricci, P. F., Sagen, L. A., & Whipple, C. G. (1981). Technological
Association Research Foundation (AwwaRF) and the Risk Assessment Series E: Applied Series No. 81, NATO Asi
Series, Erice (Italy).
National Research Council Canada (NRC) is dealing Ross, T. (2004). Fuzzy Logic with Engineering Applications, 2nd
with this issue. The result of this research project will ed. New York: Wiley.
be disseminated in coming years. Saaty, T. L. (2001). How to make a decision? In T. L. Saaty & L. G.
Vargas (Eds.), Models, Methods, Concepts and Applications of
the Analytic Hierarchy Process (ch. 1). Dordechet, MA: Kluwer
International Series.
REFERENCES Sadiq, R., Kleiner, Y., & Rajani, B. B. (2003). Forensics of water
quality failure in distribution system—A conceptual frame-
Alim, S. (1988). Application of Dempster–Shafer theory for inter- work. Journal of Indian Water Works Association, 35(4), 267–
pretation of seismic parameters. ASCE Journal of Structural 278.
Engineering, 114(9), 2070–2084. Sadiq, R., Kleiner, Y., & Rajani, B. B. (2004). Aggregative risk anal-
Chakib, K-Z., Alfred, Z. K., & Fleming, P. V. (1992). A smart fail- ysis for water quality failure in distribution networks. AQUA –
ure mode and effect analysis package. In Proceedings Annual Journal of Water Supply: Research & Technology, 53(4), 241–
Reliability and Maintainability Symposium (pp. 414–421). Las 261.
Vegas, NV. Sentz, K., & Ferson, S. (2002). Combination of Evidence in
Chen, S. J., & Hwang, C. L. (1992). Fuzzy Multiple Attribute Dempster-Shafer theory. SAND 2002-0835.
Decision-Making. New York: Springer-Verlag. Shafer, G. (1976). A Mathematical Theory of Evidence. Princeton,
Dempster, A. (1968). A generalization of Bayesian inference. Jour- NJ: Princeton University Press.
nal of Royal Statistical Society, Series B, 30, 205–247. Suokas, J., & Rouhiainen, V. (1993). Quality Management of Safety
Dubois, F., & Parade, H. (1988). Possibility Theory: An Approach and Risk Analysis. Amsterdam: Elsevier Science Publishers.
to Computerized Processing of Uncertainty. New York: Plenum Sutton, I. S. (1992). Process Reliability and Risk Management, 1st
Press. ed. New York: Van Nostrand Reinhold.
1394 Sadiq, Kleiner, and Rajani

Swamee, P. K., & Tyagi, A. (2000). Describing water quality with Yager, R. R. (1993). Families of OWA operators. Fuzzy Sets and
aggregate index. ASCE Journal of Environmental Engineering, Systems, 59, 125–148.
126(5), 451–455. Yager, R. R. (2004). On the determination of strength of belief for
US EPA. (1999). Microbial and Disinfection Byproduct Rules— decision support under uncertainty—Part II: Fusing strengths
Simultaneous Compliance Guidance Manual. United of belief. Fuzzy Sets and Systems, 142, 129–142.
States Environmental Protection Agency, EPA 815-R-99- Yager, R. R., & Filev, D. P. (1994). Parameterized “andlike” and
015. “orlike” OWA operators. International Journal of General Sys-
Vincoli, J. W. (1994). Basic Guide to Accident Investigation and Loss tems, 22, 297–316.
Control. New York: Van Nostrand Reinhold. Zadeh, L. A. (1965). Fuzzy sets. Information and Control, 8, 338–
Yager, R. R. (1988). On ordered weighted averagng aggregation 353.
operators in multi-criteria decision making. IEEE Transactions Zadeh, L. A. (1984). Review of books: A mathematical theory of
on Systems, Man and Cybernatics, 18, 183–190. evidence. AI Magazine, 5(3), 81–83.

Vous aimerez peut-être aussi