A Risk-Based Conceptual Design Method for Submarine Rescue Vehicle

Article Preview

Abstract:

In order to reduce the risks and uncertainties in conceptual design of submarine rescue vehicle (SRV), the paper proposed a risk-based conceptual design method, which consisted of three focus areas: problem setup, risk assessment, risk mitigation and decision support. Conventional risk assessment tools (e.g. probability risk assessment) were not suited for initial design because of lack of data, and a safety analysis model using fuzzy-logic approach employing fuzzy IF-THEN rules was introduced to carry out risk analysis in conceptual design. Subsequently, it was investigated that the main risky factors which influenced system risk in initial design were technology level of SRV, safety of SRV, task complexity, investment and repayment. And then a risk analysis model for submarine rescue vehicle was introduced. Lastly a case was studied to demonstrate the application of the model, and the results showed that it was an effective way to reduce the risks and uncertainties in conceptual design process.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

477-482

Citation:

Online since:

October 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H.S. Sii, T. Ruxton and J. Wang: Reliability Engineering & System Safety, Vol. 73 (2001), pp.19-34.

Google Scholar

[2] X.B. Huang, X.L. Huang and J.Q. Wang: Journal of Naval University of Engineering, Vol. 18 (2006) No.6, pp.53-57. (in Chinese)

Google Scholar

[3] T. Frantti and P. Mahonen: Engineering Applications of Artificial Intelligence, Vol. 14 (2001), pp.189-201.

Google Scholar

[4] V.K. Thomas: A Method for Scenario-based Risk Assessment for Robust Aerospace Systems (Ph.D., Georgia Institute of Technology, USA 2007), pp.79-236.

Google Scholar

[5] P. Lois, J. Wang, A. Wall and T. Ruxton: Tourism Management, Vol. 25 (2004), pp.93-109.

Google Scholar

[6] M. Tavana: Computers & Operations Research, Vol. 31 (2004), pp.1147-1164.

Google Scholar