INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, e-ISSN 1841-9844, 14(5), 672-691, October 2019. Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory B. Liu, Y. Deng Baoyu Liu 1. Institute of Fundamental and Frontier Science University of Electronic Science and Technology of China Chengdu, 610054, China 2. School of Data and Computer Science Sun Yat-sen University, China Guangzhou, China Baoyu.L@hotmail.com Yong Deng* Institute of Fundamental and Frontier Science University of Electronic Science and Technology of China Chengdu, 610054, China *Corresponding author: prof.deng@hotmail.com Abstract: Failure mode and effects analysis (FMEA) is a useful technology for identifying the potential faults or errors in system, and simultaneously preventing them from occur- ring. In FMEA, risk evaluation is a vital procedure. Many methods are proposed to address this issue but they have some deficiencies, such as the complex calculation and two adjacent evaluation ratings being considered to be mutually exclusive. Aim- ing at these problems, in this paper, A novel method to risk evaluation based on D numbers theory is proposed. In the proposed method, for one thing, the assessments of each failure mode are aggregated through D numbers theory. For another, the com- bination usage of risk priority number (RPN) and the risk coefficient newly defined not only achieve less computation complexity compared with other methods, but also overcome the shortcomings of classical RPN. Furthermore, a numerical example is illustrated to demonstrate the effectiveness and superiority of the proposed method. Keywords: failure mode and effects analysis, Dempster-Shafer evidence theory, D numbers, risk evaluation, aggregate assessment. 1 Introduction Failure mode and effects analysis (FMEA) is an efficient technology for identifying potential faults, problems, risk, and errors from the system, procedure, and service. It improves the reliability by preventing these faults, problems, risks, and errors from occurring. Risk evaluation is a pivotal procedure in FMEA. Nowadays, FMEA is developed so fast that it is extensively applied in many fields, such as medical care [3,29,32,49,60], society [51], environmental protection [1,8], financial service [65], industry [2,24,69,78], and so on. A traditional method for risk evaluation in FMEA is the classical risk priority number (RPN), which is obtained by multiplying the grades of the occurrence assessment, severity as- sessment, and detection assessment. Therefore, how to aggregate the assessment information of Copyright ©2019 CC BY-NC Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 673 these three risk factors is a significant issue, especially when it comes to the information with uncertainty. Focusing on this problem, many math models such as fuzzy sets [14, 16, 17, 79], R numbers [53], D numbers [20], Z numbers [21,26,27,39,76] and evidence theory [10,55], have been applied to the real applications [37, 50]. In [28], Kim et al. present a general model to explain the functional relationship among the three factors, and use the model to discuss the unique role of each factor for comparing the risk of different failure modes. In [77], a new method to risk evaluation based on Dempster-Shafer evidence theory is proposed. Some other evidential FEMA are presented recently [5]. Nevertheless, although classical RPN is easy to use because of its succinct form, it is still criticized for its weaknesses. For example, the experts usually give the assessment with uncer- tainty or fuzzy information, but classical RPN is not appropriated to treat the fuzzy assessment. Furthermore, different combination of risk factors might acquire the same RPN, however, the potential risk might be totally different so that they might have different priorities. With the aim of overcoming these weaknesses, many methods, such as Chin’s method [9], are proposed. However, existing methods almost is not only too complex to calculation, but also do not take the non-exclusiveness between two adjacent rankings into account. Actually, because of the sub- jectivity of the experts, two adjacent estimation scales are supposed to be not exclusive mutually. In order to solve the problems, a novel method based on D number theory [13] is proposed in this paper. On the one hand, the assessments for each failure mode are aggregated through constructing and combining D numbers because two propositions are allowed to be non-exclusive in D numbers theory. On the other hand, RPN is applied in the proposed method so as to reduce the computation complexity, simultaneously, novel compute mode to RPN and risk coefficient present in this paper is capable to get rid of the weaknesses of the classical RPN. Last but not the least, an illustrative example is used to show the effectiveness and superiority of the proposed method. The remainder of this paper is organized as follows. Key concepts and previous theories are reviewed in short in Section 2. In Section 3, A novel risk evaluation in failure mode and effects analysis based on D numbers theory is proposed. To demonstrate the effectiveness and superiority of the proposed method, a numerical example is illustrated in Section 4. Last but not the least, A brief conclusion is drawn in Section 5. 2 Preliminaries 2.1 Dempster-Shafer evidence theory The real application is inevitable to deal with uncertainty [4, 6, 45–47]. Dempster-Shafer evidence theory (D-S theory) [10, 55], is a significant theory to handle uncertainty information [11]. Compared with Bayesian theory, it needs weaker conditions so that it is often deemed as an extension of the Bayesian theory. D-S theory is widely applicated in many fields, such as decision making [6,22,30,44,71], pattern recognition [40,41,43,73], evidential reasoning [15,42,74,83–85], risk and reliability [52,54], information fusion [59,61,75], uncertainty modelling [19,25,58] and conflict management [36,68,81]. Definition 1. Let Θ = {H1, H2, · · · , HN} be a finite nonempty set, which consist of N mutually exclusive elements. Let P(Θ) be the power set of Θ, which is composed of 2N elements. The basic probability assignment (BPA) function is defined as a mapping of the power set P(Θ) to a number between 0 to 1, that is m : P (Θ) → [0, 1], and which satisfies the following conditions: m (∅) = 0; (1) 674 B. Liu, Y. Deng ∑ A∈P(Θ) m (A) = 1. (2) The mass m(A) represents how strongly the evidence supports to A. Definition 2. Let m1, m2 be two BPAs defined on the frame of discernment Θ. The Dempster’s combination rule, denoted by m = m1 ⊕ m2, is defined as follows: m (A) = { 1 k−1 ∑ B∩C=A m1(B)m2(C), A 6= ∅ 0, A = ∅ (3) with K = ∑ B∩C=∅ m1(B)m2(C) (4) where K is a normalization constant which reflects the conflict of two bodies of evidence. Actually, 0 ≤ K ≤ 1. K = 0 shows the absence of conflict between two bodies of evidence. While K = 1 shows complete conflict between m1 and m2. Besides, when K = 1, the Dempster’s combination rule is not any longer applicable, a possible explanation is open world assumption [32, 33]. In order to make decision in terms of the BPA, a method called pignistic probability transformation is present in [57], which derive a distribution of probabilities from the BPA. The pignistic probability transformation function is defined as follows: Definition 3. Let m be a BPA on the frame of discernment Θ, a pignistic probability transfor- mation function BetPm : Θ −→ [0, 1] associated to m is defined by BetPm (x) = ∑ x∈A, A∈Θ 1 |A| m(A) 1 −m(∅) (5) where m (∅) 6= 1 and |A| is the cardinality of proposition A. 2.2 Fuzzy set theory Fuzzy sets were proposed independently by Zadeh [79] in 1965 as an extension of the classical notion of set. Fuzzy set theory is widely applied in many fields [23, 33, 72]. It reflects the stay of the object and its fuzzy concept as a fuzzy set. Then, it sets up the appropriate membership functions through fuzzy set about operation and transform, and analyzes the fuzzy object based on the fuzzy mathematics. In the objective world, there are many fuzzy phenomena. For example, when evaluating a person’s appearance, people usually use linguistic variables whose values are represented by words or sentences in a natural or artificial language, such as "very pretty", "pretty", "general", "ugly", and "very ugly". Definition 4. Denote L as the universe of discourse, a fuzzy set A is described by a membership function µA satisfying µA : L −→ [0, 1] where µA(x) is called the membership degree of x ∈ L belonging to fuzzy set A. For L = {x1, . . . ,xi, . . . , xn}, the fuzzy set (A,µA) is represent by µA (x1) x1 , . . . , µA (xi) xi , . . . , µA (xn) xn . Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 675 1 ! " #0 !(") x Figure 1: Graphical presentation of the triangular fuzzy number It is obvious that a fuzzy set is characterized entirely by its membership function. When µA(x) get value from {0, 1}, fuzzy set A degrade into a classical set. A is a fuzzy subset of the real number R, and its membership function satisfies µA (x) : R −→ [0, 1] where x is real number and there exists an element x0 such that µA = 1. Triangular fuzzy numbers are the most extensively applied fuzzy numbers. A triangular fuzzy number is usu- ally expressed as A = (a1,a2, a3), as graphically shown in Figure 1, which has the following membership function µA (x) = 0, x < a1 x−a1 a2−a1 , a1 ≤ x ≤ a2 a3−x a3−a2, a2 ≤ x ≤ a3 0, x > a3 (6) where a1 < a2 < a3. In practice, fuzzy numbers are bound up with linguistic variables to describe the fuzzy evolution to objects. 2.3 Risk priority number The real systems are too complicated to be modelled. Risk priority number (RPN) is a traditional and typical method to model and evaluate risk in FMEA. RPN is calculated by multiplying the grades of occurrence assessment (O), severity assessment (S), and detection assessment (D). That is RPN = O×S×D (7) where O stands for the probability of occurrence of failure mode, S refers to the severity of failure mode and D refers to the probability of failure being detected. The three risk factors are evaluated by FMEA experts using a 1 to 10 numeric scale. Besides, occurrence assessment is expressed in Table 1. The larger RPN is, the more important degree it is supposed to be assigned, referring to the failure mode should be more priority to be corrected. Although this method is easy to use because of its sententious form, traditional RPN is still criticized for its weaknesses. For example, traditional RPN does not take the weights of three risk factors into consideration. Besides, different combination of risk factors might acquire the same RPN, however, the potential risk might be totally different so that they might have different priorities. 676 B. Liu, Y. Deng 2.4 D numbers D number, is a useful tool to model uncertain information, which overcomes the shortcomings of Dempster-Sharfer theory [20]. Nowadays, D number is widely used in many fields such as decision making [7,19,31], risk assessment [18,29,35,67], reliability analysis [70,80], data fusion [8,62,66]. It is defined as follows: Definition 5. Let Ω be a finite nonempty set, D number is a mapping D : Ω −→ [0, 1], such that ∑ B⊆Ω D (B) ≤ 1 and D (∅) = 0 (8) where ∅ is the empty set and B is a subset of Ω. If D (B) = 1, the information is regarded to be complete while D (B) < 1, it is considered to be incomplete. Most importantly, different from D-S theory, D number does not request the elements of set Ω to be mutually exclusive. In order to express the non-exclusiveness in Ω, a fuzzy membership function is used to measure the exclusive/non-exclusive degree [82]. Definition 6. Let Ai and Aj be two non-empty elements in 2Ω, the non-exclusive degree between Ai and Aj is characterized by a fuzzy membership function u¬E as follows: u¬E : 2 Ω × 2Ω −→ [0, 1] (9) with u¬E (Ai,Aj) = { 1, Ai ∩Aj 6= ∅ p, p ∈ [0, 1], Ai ∩Aj = ∅ (10) besides, u¬E (Ai,Aj) = max x∈Ai, y∈Aj {u¬E(x,y)} (11) Let uE be the exclusive degree between Ai and Aj, then uE = 1 −u¬E. An illustrative example is given as follows to express the calculation of the non-exclusive degree. Table 1: Assessment rankings for occurrence in FMEA Ranking Probability of Occurrence Possible Failure Rate 10 Extremely high: failure almost inevitable ≥ 1/2 9 Very high 1/3 8 Repeated failures 1/8 7 High 1/20 6 Moderately high 1/80 5 Moderate 1/400 4 Relatively low 1/2000 3 Low 1/15000 2 Remote 1/150000 1 Nearly impossible ≤ 1/150000 Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 677 1 2 3 4 5 1 0 a b c Figure 2: Graphically presentation of fuzzy variables in Table 2 Example 7. Suppose there is a non-empty set Ω = {a,b,c}, where a,b,c are three fuzzy variables represented by triangular fuzzy numbers given in Table 2 and shown in Figure 2. The non- exclusiveness degree can be calculated as follows [12]: u¬E (A,B) = AreaA∩B AreaA + AreaB −AreaA∩B (12) where the areas of fuzzy numbers A and B are characterized by AreaA and AreaB, and the area of the overlap of A and B is AreaA∩B. Thus, according to Eq.12, we have u¬E (a,b) = Areaa∩b Areaa + Areab −Areaa∩b = 0.25 1 + 1 − 0.25 ≈ 0.1429 u¬E (b,c) = Areab∩c Areab + Areac −Areab∩c = 0.25 1 + 1 − 0.25 ≈ 0.1429 u¬E (a,b,c) = max{u¬E (a,b) ,u¬E (b,c)} = max{0.1429, 0.1429} = 0.1429 u¬E (a,{a,b}) = max{u¬E (a,a) ,u¬E (a,b)} = max{1, 0.1429} = 1 Similar with Dempster combination rule, the combination rule is discussed under two cases: complete information and incomplete information. Definition 8. (complete information). Let D1 and D2 be two numbers over Ω with∑ A⊆Ω D1 (A) = 1 and ∑ A⊆Ω D2 (A) = 1, the combination of D1 and D2, indicated by D = D1 ⊙ D2, is defined by D (A) = 0, A = ∅ 1 1−KD ( ∑ B∩C=A u¬E (B,C) D1 (B) D2 (C) +∑ B∪C=A,B∩C=∅ u¬E (B,C) D1 (B) D2 (C)), A 6= ∅ (13) with KD = ∑ B∩C=∅ (1 −u¬E (B,C) )D1 (B) D2 (C) (14) Table 2: The fuzzy number of fuzzy variables Fuzzy Variables Fuzzy Numbers a (1, 2, 3) b (2, 3, 4) c (3, 4, 5) 678 B. Liu, Y. Deng It is worth mentioning that this combination rule can be degenerated to the classical Demp- ster’s rule if u¬E = 0 for any B∩C = ∅. a numerical example is used to illustrate the combination of two D numbers under the complete information situation as follows: Example 9. There are two D numbers over Ω = {a,b}: D1 (a) = 0.4, D1 (b) = 0.6 D2 (a) = 0.9, D2 (b) = 0.1 And assume u¬E (a,b) = 0.1429. Thus, we have D′ = D1 ⊙ D2 that KD′ = (1 − 0.1429) × [0.4 × 0.1 + 0.6 × 0.9] = 0.4971 D′(a) = 1 1 − 0.4971 × 1 × 0.4 × 0.9 = 0.7159 D′(b) = 1 1 − 0.4971 × 1 × 0.6 × 0.1 = 0.1193 D′(a,b) = 1 1 − 0.4971 × 0.1429 × [0.4 × 0.1 + 0.6 × 0.9] = 0.1648 Definition 10. (incomplete information). Let D1 and D2 be two numbers over Ω with∑ A⊆Ω D1 (A) < 1 and∑ A⊆Ω D2 (A) < 1, the combination of D1 and D2, defined by D = D1 ⊙ D2 and calculated as follows: D(A) = { 0, A = ∅ f (Q1,Q2) Dt(A)∑ B⊆Ω Dt(B) , A 6= ∅ (15) with Dt (A) = ∑ B∩C=A u¬E (B,C) D1 (B) D2 (C) + ∑ B∪C=A,B∩C=∅ u¬E (B,C) D1 (B) D2 (C) ,∀ A ∈ Ω and Q1 = ∑ A⊆Ω D1(A), Q2 = ∑ A⊆Ω D2(A) (16) where f (Q1,Q2) is a function satisfying 0 ≤ f (Q1,Q2) ≤ max{Q1,Q2}, f (Q1,Q2) = 1 if Q1 = 1 and Q2 = 1. Next, a simple example is used to illustrate the combination process of D numbers according to Definition 10. Example 11. There are two D numbers over Ω = {a,b}: D1 (a) = 0.7, D1 (b) = 0.2 D2 (a) = 0.5, D2 (b) = 0.3 Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 679 Assume u¬E (a,b) = 0.1429, and let f (Q1,Q2) = Q1 ×Q2. Thus, we have D = D1 ⊙ D2 that f (Q1,Q2) = (0.7 + 0.2) × (0.5 + 0.3) = 0.72 Dt (a) = 0.7 × 0.5 = 0.35 Dt (b) = 0.2 × 0.3 = 0.06 Dt (a,b) = 0.1429 × (0.7 × 0.3 + 0.2 × 0.5) ≈ 0.044 Thus, ∑ B⊆Ω D1(B) = 0.35 + 0.06 + 0.044 = 0.454 D (a) = f (Q1,Q2) Dt (a)∑ B⊆Ω D1(B) ≈ 0.555 D (b) = f (Q1,Q2) Dt (b)∑ B⊆Ω D1(B) ≈ 0.095 D (a,b) = f (Q1,Q2) Dt (a,b)∑ B⊆Ω D1(B) ≈ 0.070 If there are n D numbers expressed as D1, D2, · · · , Dn, whose weights are w1,w2, · · · , wn, satisfying ∑n i=1 wi = 1. At first, the average D number among D1,D2, · · · ,Dn is defined as D̄ (A) = n∑ i=1 wiDi(A),∀A ⊆ Ω. (17) Then, the result of combination D1,D2, · · · ,Dn is acquired by combining average D number D̄ with itself n− 1 times. D = D̄ ⊙ D̄ ⊙ · · · ⊙ D̄ (18) where ⊙ is the combination rule given in Definition 8 and Definition 10. 3 Proposed method Failure mode and analysis (FMEA) is an efficient technology to identify and remove potential faults, errors and risk from systems. In FMEA, risk evaluation is a significant procession. Tradi- tionally, risk priority number (RPR) is used to evaluate risk, which is calculated by multiplying the grades of occurrence assessment (O), severity assessment (S), and detection assessment (D). Although classical RPN is easy to use for its concise form, it is still criticized for its weaknesses. For example, traditional RPN does not take the weights of three risk factors into consideration. Besides, different combination of risk factors might acquire the same RPN, however, the potential risk might be totally different so that they might have different priorities. So far, many methods are presented. Nevertheless, most of them not only have rather complex algorithm, but also do not consider the non-exclusiveness between two rankings in assessment. With the aim of solving these problems, in this paper, a novel method to risk evaluation based on D numbers theory is proposed. First of all, each assessment rating is treated as a fuzzy 680 B. Liu, Y. Deng variable which is represented as a fuzzy number. Then, non-exclusive degree between two ratings can be calculated. Next, for each failure mode, the assessments of experts are aggregated by D numbers theory. The assessments are treated as D numbers and then are combined by using D numbers combination rule. Furthermore, RPNs are calculated for ranking the failure mode. Last but not the least, when coming to the same RPN of some failure modes, a variable, named risk coefficient, is defined to rank the failure modes with the same RPN. The large risk coefficient is, the more important degree it is supposed to be assigned, referring to the failure mode should be more priority to be corrected. Step 1. Make sure the triangular fuzzy numbers for each rankings in assessment and calculate the non-exclusive degrees by 12. Step 2. The assessments of experts are regarded as D numbers, that is, for each failure mode, the assessments of each expert is constructed as a D number. Therefore, the aggregation of experts’ assessment of each failure mode by combining the corresponding D numbers. If information is complete, the equations in Definition 8 are used to the combination. If the information is incomplete, the equations in Definition 10 are applied to the combination. What is more, if different experts have different weights, it is supposed to put the 17 into use. Step 3. For the results of Step 2, use 5 to calculate pignistic probability transformation (PPT). Step 4. Calculate RPN. Firstly, calculate the mathematical expectation of each assessment. Then, use Eq. (7) to calculate the RPN of each failure mode. Step 5. Calculate risk coefficient. Definition 12. Let s be the standard deviation of the ratings of three assessments, defined as risk coefficient. As mentioned above, different combination of risk factors might acquire the same RPN, however, the potential risk might be totally different. In this paper, risk coefficient, the standard deviation of the ratings of three assessments, is used to evaluate such kinds of failure modes. As a matter of fact, this method is reasonable. For example, there are two failure modes, the assessments of which are shown in Table 3. Table 3: The assessments of three risk factors occurrence assessment severity assessment detection assessment FM1 1 10 6 FM2 2 6 5 Apparently, two failure modes have the same RPN. However, as is shown in Table 3, com- pared with FM2, FM1 has the better grade in occurrence assessment but performs worse in severity and detection assessment. Therefore, FM1 should be more priority to be corrected. When observing and analyzing the data, it is not difficult to find that the distribution of FM2’s data is more concentrated, which has smaller standard deviation. Besides, it is worth mention- ing that standard deviation is usually used to measure the risk in financial field. Thus, it is reasonable that the standard deviation of the ratings of three assessments is applied to measure the risk in risk evaluation. Step 6. Rank the failure modes though RPN. The larger RPN is, the more priority failure mode is supposed to be corrected. If the failure modes have the same RPN, their rankings depend on risk coefficient defined in Definition 12. The failure modes with the lager risk coefficient are assumed to be more significant and should be given higher priorities. Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 681 Table 4: The results of the risk evaluation Item Rating of risk factor Expert 1 Expert 2 Expert 3 O S D O S D O S D 1 3:40% 7 2 3:90% 7 2 3:80% 7 2 4:60% 4:10% 4:20% 2 2 8 4 2 8:70% 4 2 8 4 9:30% 3 1 10 3 1 10 3 1 10 3 4 1 6:80% 3 1 6 3:70% 1 6 3 7:20% 2:30% 5 1 3 2:50% 1 3 1:70% 1 3:60% 1 1:50% 2:30% 2:40% 6 2 6 5 2 6 5 2 6 5 7 1 7 3 1 7 3 1 7 3 8 3 5:60% 1 3 5:80% 1 3 5:80% 1 6:40% 6:20% 7:20% 9 2:90% 10:60% 4 2:75% 10:90% 4 2:80% 10:90% 4 1:10% 9:40% 1:25% 9:10% 1:20% 9:10% 10 1 10 6 1 10 6 1 10 6 11 1 10 5 1 10 5 1 10 5 12 1 10 6:60% 1 10 5:80% 1 10 6:70% 5:40% 4:20% 5:30% 13 1 10 5:80% 1 10 5 1 10 5 4:20% 14 1 10 6 1 10 6:80% 1 10 6 7:20% 15 2 7:95% 3 2 7 3 2 7 3:70% 6:5% 4:30% 16 2:90% 4 3 2:75% 4 3 2:80% 4 3:80% 1:10% 1:25% 1:20% 2:20% 17 2 5:90% 3 2 5:90% 3 2 5:60% 3 6:10% 6:10% 6:40% 4 Numerical example In order to demonstrate the effectiveness and superiority of the proposed method, a numer- ical example in [77] is solved in this section. Supposing there are three experts who evaluate 17 failure modes and identify the ratings of the three risk factors. The assessment results are expressed in Table 4. In this illustrative example, the weights of experts and risk factors are supposed to be equal to 1. Taking the failure mode 1 for example, the detailed computing is expressed as follows: Step 1. The ratings are represented by triangular fuzzy numbers listed in Table 5 and shown in Figure 3. From Table 4, the occurrence assessments of three experts are (3 : 40%, 4 : 60%), (3 : 90%, 4 : 10%) and (3 : 80%, 4 : 20%). Therefore, according to the Eq. (12), the non- 682 B. Liu, Y. Deng 0 1 2 3 4 5 6 7 8 9 10 Assessment Ranking 0 1 F u z z y M e m b e r sh ip D e g r e e Figure 3: Graphically presentation of fuzzy variables in Table 5 Table 5: The fuzzy numbers of the assessment ratings Assessment Ratings Fuzzy Numbers 1 (0, 1, 2) 2 (1, 2, 3) 3 (2, 3, 4) 4 (3, 4, 5) 5 (4, 5, 6) 6 (5, 6, 7) 7 (6, 7, 8) 8 (7, 8, 9) 9 (8, 9, 10) 10 (9, 10, 10) exclusiveness degrees are calculated as follows: u¬E (3, 3) = 1, u¬E (4, 4) = 1, u¬E (3,{3, 4}) = 1 u¬E (4,{3, 4}) = 1, u¬E (3, 4) = 0.25 1 + 1 − 0.25 ≈ 0.1429 Step 2. Construct D numbers and combine D numbers. According to Section 3, corre- sponding to the evaluations of three experts, three D numbers are constructed as follows: D1 (3) = 0.4, D1 (4) = 0.6 D2 (3) = 0.9, D2 (4) = 0.1 D3 (3) = 0.8, D3 (4) = 0.2 Then, because these D numbers have complete information, the combination among D1, D2 and D3 is calculated by 10-14, that is D1 ⊙ D2 ⊙ D3. At first, calculate D′ = D1 ⊙ D2: KD′ = (1 − 0.1429) × [0.4 × 0.1 + 0.6 × 0.9] = 0.4971 D′ (3) = 1 1 − 0.4971 × 1 × 0.4 × 0.9 = 0.7159 D′ (4) = 1 1 − 0.4971 × 1 × 0.6 × 0.1 = 0.1193 D′ (3, 4) = 1 1 − 0.4971 × 0.1429 × [0.4 × 0.1 + 0.6 × 0.9] = 0.1648 Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 683 0 2 4 6 8 10 12 14 16 18 0 2 4 6 8 10 12 14 16 18 The proposed method The method of J. Yang et al. Figure 4: The risk priority of the failure modes using two methods Next, calculate D = D′ ⊙ D3: KD = (1 − 0.1429) × [0.7159 × 0.2 + 0.1193 × 0.8] = 0.2045 D (3) = 1 1 − 0.2045 × [1 × 0.7159 × 0.8 + 1 × 0.1648 × 0.8] = 0.8857 D (4) = 1 1 − 0.2045 × [1 × 0.1193 × 0.2 + 1 × 0.1648 × 0.2] = 0.0714 D (3, 4) = 1 1 − 0.2045 × 0.1429 × [0.7159 × 0.2 + 0.1193 × 0.8] = 0.0429 Step 3. Calculate pignistic probability transformation (PPT) of the result of Step 2 by 5 BetP (3) = 0.8857 + 0.0429 2 ≈ 0.9071BetP (4) = 0.8857 + 0.0429 2 ≈ 0.0929 Step 4. The mathematical expectation of the occurrence assessment is 3 × 0.9071 + 4 × 0.0929 = 3.0929. Besides, three experts have the same evaluation to the severity assessment (S) and detection assessment (D) of failure mode 1, what is more, the evaluation are real numbers, 7 and 2, without any uncertainty. Thus, in these two assessments, the results through Step 1 to 4 are still 7 and 2. Step 5. Calculate the RPN of failure mode 1 (RPN1) by 7. RPN1 = O1 ×S1 ×D1 = 3.0929 × 7 × 2 = 43.3006 Step 6. Calculate the risk coefficient of the failure mode 1. x̄1 = 3.0929 + 7 + 2 3 ≈ 4.0310 s1 = √ 1 3 · [(3.0929 − 4.0310)2 + (7 − 4.0310)2 + (2 − 4.0310)2] ≈ 2.6287 The data of other failure modes are treated through Step 1 to 6 as mentioned above. Then, according to the RPNs and risk coefficients, the risk priorities of the failure modes are obtained, which are shown in Table 6. Meanwhile, in order to demonstrate the effectiveness of the proposed method, the results are compared with that of the J. Yang et al.’s method [77]. As shown in Table 6, the results of two methods are similar. Apart from failure mode 6, 11 and 13, other failure modes have the same risk priority rankings in both two methods. In addition, it is indicated that the five of highest risk priority rankings are failure mode 9, 2, 10, 684 B. Liu, Y. Deng Table 6: The results of the risk evaluation Failure mode RPN Risk coefficient The rankings of the proposed method The rankings of the J. Yang et al.’s method 1 43.3006 2.6287 9 9 2 64 3.0551 2 2 3 30 4.7258 12 12 4 18 2.5166 15 15 5 3.0726 1.1478 17 17 6 60 2.0817 5 3 7 21 3.0551 14 14 8 15.0657 2.0110 16 16 9 78.10103376 4.1593 1 1 10 60 4.5092 3 3 11 50 4.5092 7 6 12 51.452 4.5047 6 6 13 50 4.5092 7 6 14 60 4.5092 3 3 15 42 2.6458 10 10 16 23.5152 1.0203 13 13 17 30.4038 1.5643 11 11 14, and 6, which refers that these 5 faults are most likely to occur. Furthermore, in both two methods, failure mode 16, 7, 4, 8, and 5 have the five of lowest priorities, indicating that these 5 failures are almost impossible to happen. Figure 4 shows the comparison of risk priorities of two methods, in which the ranking is on the abscissa axis while the failure mode is on the vertical axis. As shown in Figure 4, two curves have the similar trend, which indicates that the proposed method is as effective as J. Yang et al.’s method. Nevertheless, the results also reflect the different evaluations using two methods, which precisely demonstrates the superiority of the proposed method. As seen in Figure 4, using J. Yang et al.’s method, failure mode 11, 12, 13 have the same risk priority, while failure mode 12 has the larger risk priority compared with failure mode 11 and failure mode 13 in the proposed method. Because the highest rating of failure mode 12 in detection assessment is 6, which is higher than that of failure mode 11, 13 in detection assessment. Thus, failure mode 12 is obviously supposed to have higher risk priority compare with failure mode 11 and failure mode 13. What is more, in J. Yang et al.’s method, failure mode 6, 10, 14 have the same risk priority, but in the proposed method, failure mode 6 has the lower risk priority compared with failure mode 10 and failure mode 14. Although these failure modes have the same RPN, compared with failure mode 10 and failure mode 14, failure mode 6 has two lower risk ratings in severity assessment and detection assessment and merely a lager rating in occurrence assessment. Therefore, failure mode 6 is supposed to have the lower risk priority compared with failure mode 10 and failure mode 14. Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 685 5 Conclusion In this paper, a novel method to risk evaluation in failure mode and effects analysis based on D numbers theory is proposed. In the proposed method, the application of the D numbers not only aggregates the fuzzy assessment in risk evaluation, but also takes the non-exclusiveness into account. Besides, the shortcomings of RPN are overcome successfully. Furthermore, the numer- ical example has demonstrated that the proposed method achieves less computation complexity compared with most existing method to risk evaluation in FMEA. In conclusion, the proposed method is an advanced and efficient method to risk evaluation in FMEA. Acknowledgement The work is partially supported by National Natural Science Foundation of China (Grant No. 61573290,61973332). Conflict of Interest The authors declare no conflict of interest. Bibliography [1] Adar, E.; Ince, M.; Karatop, B.; Bilgili, M. S. (2017). The risk analysis by failure mode and effect analysis (fmea) and fuzzy-fmea of supercritical water gasification system used in the sewage sludge treatment. Journal of Environmental Chemical Engineering, 5 (1), 1261–1268, 2017. [2] Ahn, J.; Noh, Y.; Park, S. H.; Choi, B. I.; Chang, D.; Ahn, J.; Noh, Y.; Park, S. H.; Choi, B. I.; Chang, D. (2017). Fuzzy-based failure mode and effect analysis (fmea) of a hybrid molten carbonate fuel cell (mcfc) and gas turbine system for marine propulsion. Journal of Power Sources, 364, 226–233, 2017. [3] Alimohammadzadeh, K.; Bahadori, M.; Jahangir, T.; Ravangard, R. (2017). Assessing com- mon medical errors in a children’s hospital nicu using failure mode and effects analysis (fmea). Trauma Monthly, in Press, 2017. [4] Biswas, S. K.; Devi, D.; Chakraborty, M. (2018). A hybrid case based reasoning model for classification in internet of things (iot) environment. Journal of Organizational and End User Computing (JOEUC), 30 (4), 104–122, 2018. [5] Cao, X.; Deng, Y. 2019. A new geometric mean fmea method based on information quality. IEEE Access, 7 (1), 95547–95554, 2019. [6] Capuano, N.; Chiclana, F.; Herrera-Viedma, E.; Fujita, H.; Loia, V. (2018). Fuzzy rank- ings for preferences modeling in group decision making. International Journal of Intelligent Systems, 33 (7), 1555–1570, 2018. [7] Chatterjee, K.; Zavadskas, E. K.; Tamosaitiene, J.; Adhikary, K.; Kar, S. (2018). A hybrid MCDM technique for risk management in construction projects. Symmetry, 10 (2), 46, 2018. [8] Chen, Y. C.; Tsai, P. Y. (2017). Evaluating the operational risks of biomedical waste using failure mode and effects analysis. Waste Manag Res, 35 (6), 593–601, 2017. 686 B. Liu, Y. Deng [9] Chin, K. S.; Wang, Y. M. ; Poon, G. K. K. et al. (2009). Failure mode and effects analysis using a group-based evidential reasoning approach[J]. Computers and Operations Research, 36 (6), 1768–1779, 2009. [10] Dempster, A. P. (1967). Upper and lower probabilities induced by a multivalued mapping, Annals of Mathematical Statistics, 38 (2), 325–339, 1967. [11] Deng, X.; Jiang, W. (2018). Dependence assessment in human reliability analysis using an evidential network approach extended by belief rules and uncertainty measures. Annals of Nuclear Energy, 117, 183–193, 2018. [12] Deng, X.; Jiang, W. (2019). Evaluating green supply chain management practices under fuzzy environment: a novel method based on D number theory. International Journal of Fuzzy Systems, 21, 1389–1402, 2019. [13] Deng, X.; Deng, Y. (2014). D numbers theory: a generalization of dempster-shafer theory. Computer Science, 2014. [14] Dzitac, I.; Filip, F. G.; Manolescu, M.-J. (2017). Fuzzy logic is not fuzzy: World-renowned computer scientist Lotfi A. Zadeh. International Journal of Computers Communications & Control, 12 (6), 748–789, 2017. [15] Fang, R.; Liao, H.; Yang, J.-B.; Xu, D.-L. (2019). Generalised probabilistic linguistic evi- dential reasoning approach for multi-criteria decision-making under uncertainty. Journal of the Operational Research Society, in press, 2019. [16] Fei, L.; Wang, H.; Chen, L.; Deng, Y. (2019). A new vector valued similarity measure for intuitionistic fuzzy sets based on owa operators. Iranian Journal of Fuzzy Systems, 16 (3), 113–126, 2019. [17] Feng, F.; Fujita, H.; Ali, M. I.; Yager, R. R.; Liu, X. (2018). Another view on generalized intuitionistic fuzzy soft sets and related multiattribute decision making methods, IEEE Transactions on Fuzzy Systems, 27 (3), 474–488, 2018. [18] Gao, X.; Deng, Y. (2019). The generalization negation of probability distribution and its application in target recognition based on sensor fusion. International Journal of Distributed Sensor Networks, 15 (5), 2019. [19] Gao, X.; Deng, Y. (2019). The negation of basic probability assignment, IEEE Access, 7 (1), 107006–107014, 2019. [20] Guan, X.; Liu, H.; Yi, X.; Zhao, J. (2018). The Improved Combination Rule of D Numbers and Its Application in Radiation Source Identification. Mathematical Problems in Engineer- ing, 2018, 10 pages, 2018. [21] Jiang, W.; Cao, Y.; Deng, X. (2019). A Novel Z-network Model Based on Bayesian Network and Z-number. IEEE Transactions on Fuzzy Systems, 2019. [22] Jiang, W.; Wei, B. (2018). Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making. International Journal of Systems Science, 49 (3), 582–594, 2018. [23] Jiang, W.; Wei, B.; Liu, X.; Li, X.; Zheng, H. (2018). Intuitionistic fuzzy power aggregation operator based on entropy and its application in decision making, International Journal of Intelligent Systems, 33 (1), 49–67, 2018. Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 687 [24] Jin, T.; Chen, C.; Chen, L.; Tian, H.; Zhu, D.; Jia, X. (2018). Failure mode and effects analysis of CNC machine tools based on spa, International Conference on System Reliability & Safety, 107–111, 2018. [25] Kang, B.; Deng, Y. (2019). The maximum Deng entropy, IEEE Access, 7 (1), 10.1109/AC- CESS.2019.2937679, 2019. [26] Kang, B.; Deng, Y.; Hewage, K.; Sadiq, R. (2019a). A method of measuring uncertainty for Z-number. IEEE Transactions on Fuzzy Systems, 27 (4), 731–738, 2019. [27] Kang, B.; Zhang, P.; Gao, Z.; Chhipi-Shrestha, G.; Hewage, K.; Sadiq, R. (2019b). Environ- mental assessment under uncertainty using dempster–shafer theory and z-numbers. Journal of Ambient Intelligence and Humanized Computing, Published online, doi: 10.1007/s12652– 019–01228–y, 2019. [28] Kim, K. O.; Zuo, M. J.; Kim, K. O.; Zuo, M. J. (2018). General model for the risk priority number in failure mode and effects analysis. Reliability Engineering & System Safety, 169, 321–329, 2018. [29] Lee, Y. C.; Kim, Y.; Huynh, J. W.; Hamilton, R. J. (2017). Failure modes and effects analysis for ocular brachytherapy. Brachytherapy, 16 (6), 1265–1279, 2017. [30] Li, M.; Xu, H.; Deng, Y. (2019). Evidential decision tree based on belief entropy. Entropy, 21 (9), 897, 2019. [31] Li, X.; Chen, X. (2018). D-Intuitionistic hesitant fuzzy sets and their application in multiple attribute decision making. Cognitive Computation, 10 (3), 496–505, 2018. [32] Li, X.; He, M.; Wang, H. (2017). Application of failure mode and effect analysis in managing catheter-related blood stream infection in intensive care unit. Medicine, 96 (51), e9339, 2017. [33] Li, Y.; Deng, Y. (2019). Intuitionistic Evidence Sets, IEEE Access, 7 (1), 106417–106426, 2019. [34] Lin, S.; Li, C.; Xu, F.; Liu, D.; Liu, J. (2018). Risk identification and analysis for new energy power system in China based on D numbers and decision-making trial and evaluation laboratory (DEMATEL). Journal of Cleaner Production, 180, 81–96, 2018. [35] Liu, B.; Hu, Y.; Deng Y. (2018). New Failure Mode and Effects Analysis based on D Numbers Downscaling Method, International Journal of Computers Communications & Control, 13(2), 205–220, 2018. [36] Liu, F.; Gao, X.; Zhao, J.; Deng, Y. (2019a). Generalized belief entropy and its application in identifying conflict evidence. IEEE Access 7 (1), 126625–126633, 2019. [37] Liu, H.; Li, Z.; Song, W.; Su, Q. (2017). Failure mode and effect analysis using cloud model theory and PROMETHEE method. IEEE Trans. Reliability, 66 (4), 1058–1072, 2017. [38] Liu, P.; Zhang, X. (2019). A multicriteria decision-making approach with linguistic D num- bers based on the Choquet integral. Cognitive Computation, 11 (4), 560–575, 2019. [39] Liu, Q.; Tian, Y.; Kang, B. (2019b). Derive knowledge of z-number from the perspective of dempster-shafer evidence theory. Engineering Applications of Artificial Intelligence, 85, 754–764, 2019. 688 B. Liu, Y. Deng [40] Liu, Z.; Liu, Y.; Dezert, J.; Cuzzolin, F. (2019c). Evidence combination based on credal belief redistribution for pattern classification. IEEE Transactions on Fuzzy Systems, DOI: 10.1109/TFUZZ.2019.2911915, 2019. [41] Liu, Z.; Pan, Q.; Dezert, J.; Han, J.-W.; He, Y. (2018a). Classifier fusion with contextual reliability evaluation. IEEE Transactions on Cybernetics, 48 (5), 1605–1618, 2018. [42] Liu, Z.-G.; Pan, Q.; Dezert, J.; Martin, A. (2018b). Combination of classifiers with optimal weight based on evidential reasoning. IEEE Transactions on Fuzzy Systems, 26 (3), 1217– 1230, 2018. [43] Luo, C.; Chen, Y.; Xiang, H.; Wang, W.; Wang, Z. (2018). Evidence combination method in time domain based on reliability and importance. Journal of Systems Engineering and Electronics, 29 (6), 1308–1316, 2018. [44] Luo, Z.; Deng, Y. (2019). A matrix method of basic belief assignment’s nega- tion in Dempster-Shafer theory. IEEE Transactions on Fuzzy Systems, 10.1109/T- FUZZ.2019.2930027, 2019. [45] Meng, D.; Li, Y.; Zhu, S.-P.; Lv, G.; Correia, J.; de Jesus, A. (2019). An enhanced reliability index method and its application in reliability-based collaborative design and optimization. Mathematical Problems in Engineering, 2019, 10 pages, 2019. [46] Meng, D.; Liu, M.; Yang, S.; Zhang, H.; Ding, R. (2018). A fluid–structure analysis approach and its application in the uncertainty-based multidisciplinary design and optimization for blades. Advances in Mechanical Engineering, 10 (6), 2018. [47] Meng, D.; Yang, S.; Zhang, Y.; Zhu, S.-P. (2019). Structural reliability analysis and uncertainties-based collaborative design and optimization of turbine blades using surrogate model. Fatigue & Fracture of Engineering Materials & Structures, 42(6), 1219–1227, 2019. [48] Mo, H.; Deng, Y. (2019). An evaluation for sustainable mobility extended by D numbers. Technological and Economic Development of Economy, 25 (5), 802–819, 2019. [49] Moreno, R. V.; Riera, S. I.; Alvarez, E. M.; Mendoza, J. A. B.; Vazquez, S. T.; Castellano, L. D.; Gonzalez, J. C. M. (2016). Improvement of the safety of a clinical process using failure mode and effects analysis: Prevention of venous thromboembolic disease in critically ill patients. Medicina Intensiva, 40 (8), 483–490, 2016. [50] Peeters, J. F. W.; Basten, R. J. I.; Tinga, T. (2018). Improving failure analysis efficiency by combining fta and fmea in a recursive manner. Reliability Engineering & System Safety, 172, 36–44, 2018. [51] Schuller, B. W.; Burns, A.; Ceilley, E. A.; King, A.; Letourneau, J.; Markovic, A.; Sterkel, L.; Taplin, B.; Wanner, J.; Albert, J. M. (2017). Failure mode and effects analysis: A community practice perspective, Journal of Applied Clinical Medical Physics, 18 (6), 258– 267, 2017. [52] Seiti, H.; Hafezalkotob, A. (2018). Developing pessimistic-optimistic risk-based methods for multi-sensor fusion: An interval-valued evidence theory approach. Applied Soft Computing, 72, 609–623, 2018. [53] Seiti, H.; Hafezalkotob, A.; MartĂnez, L. (2019). R-numbers, a new risk modeling associated with fuzzy numbers and its application to decision making, Information Sciences, 483, 206– 231, 2019. Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 689 [54] Seiti, H.; Hafezalkotob, A.; Najafi, S.; Khalaj, M. (2018). A risk-based fuzzy evidential framework for FMEA analysis under uncertainty: An interval-valued DS approach, Journal of Intelligent & Fuzzy Systems, 35 (2), 1419–1430, 2018. [55] Shafer, G. (1976). A Mathematical Theory of Evidence, Princeton University Press, Prince- ton, 1976. [56] Shankar, R.; Choudhary, D.; Jharkharia, S. (2018). An integrated risk assessment model: A case of sustainable freight transportation systems, Transportation Research Part D: Trans- port and Environment, 63, 662–676, 2018. [57] Smets, P.; Kennes, R. (1994). The transferable belief model. Artificial Intelligence, 66 (2), 191–234, 1994. [58] Song, Y.; Deng, Y. (2019). A new method to measure the divergence in evidential sensor data fusion. International Journal of Distributed Sensor Networks, 15 (4), DOI: 10.1177/1550147719841295, 2019. [59] Song, Y.; Deng, Y. (2019). Divergence measure of belief function and its application in data fusion. IEEE Access, 7 (1), 107465–107472, 2019. [60] Stojkovic, T.; Marinkovic, V.; Jaehde, U.; Manser, T. (2016). Using failure mode and effects analysis to reduce patient safety risks related to the dispensing process in the community pharmacy setting. Research in Social & Administrative Pharmacy Rsap, 13 (6), 1159–1166, 2016. [61] Su, X.; Li, L.; Shi, F.; Qian, H. (2018). Research on the fusion of dependent evidence based on mutual information. IEEE Access 6, 71839–71845, 2018. [62] Sun, L.; Liu, Y.; Zhang, B.; Shang, Y.; Yuan, H.; Ma, Z. (2016). An Integrated Decision- Making Model for Transformer Condition Assessment Using Game Theory and Modified Evidence Combination Extended by D Numbers, Energies, 9 (9), 697, 2016. [63] Sun, R.; Deng, Y. (2019a). A new method to identify incomplete frame of discernment in evidence theory. IEEE Access 7 (1), 15547–15555. [64] Sun, R.; Deng, Y. (2019b). A new method to determine generalized basic probability as- signment in the open world. IEEE Access, 7 (1), 52827–52835, 2019. [65] Tooranloo, H. S.; Ayatollah, A. S. (2016). Pathology the internet banking service quality using failure mode and effect analysis in interval-valued intuitionistic fuzzy environment. International Journal of Fuzzy Systems. 19 (1), 1–15, 2016. [66] Wang, N.; Liu, X.; Wei, D. (2018). A Modified D Numbers’ Integration for Multiple At- tributes Decision Making. IEEE Transactions on Fuzzy Systems, 20 (1), 104–115, 2018. [67] Wang, N.; Wei, D. (2018). A Modified D Numbers Methodology for Environmental Impact Assessment. Technological and Economic Development of Economy 24 (2), 653–669, 2018. [68] Wang, Y.; Zhang, K.; Deng, Y. (2019). Base belief function: an efficient method of conflict management. Journal of Ambient Intelligence and Humanized Computing, 10 (9), 3427–3437, 2019. 690 B. Liu, Y. Deng [69] Wang, Z.; Gao, J.-M.; Wang, R.-X.; Chen, K.; Gao, Z.-Y.; Zheng, W. (2018). Failure mode and effects analysis by using the house of reliability-based rough vikor approach. IEEE Transactions on Reliability, 67 (1), 230–248, 2018. [70] Xia, J.; Feng, Y.; Liu, L.; Liu, D.; Fei, L. (2019). On entropy function and reliability indicator for D numbers. Applied Intelligence, 49 (9), 3248–3266, 2019. [71] Xiao, F. (2019). EFMCDM: Evidential fuzzy multicriteria decision making based on belief entropy. IEEE Transactions on Fuzzy Systems, DOI: 10.1109/TFUZZ.2019.2936368, 2019. [72] Xiao, F.; Zhang, Z.; Abawajy, J. (2019). Workflow scheduling in distributed systems under fuzzy environment. Journal of Intelligent & Fuzzy Systems, DOI: 10.3233/JIFS–190483, Pre-press, 1–11, 2019. [73] Xu, X.; Xu, H.; Wen, C.; Li, J.; Hou, P.; Zhang, J. (2018a). A belief rule-based evidence updating method for industrial alarm system design. Control Engineering Practice, 81, 73– 84, 2018. [74] Xu, X.; Zheng, J.; Yang, J.-B.; Xu, D.-L.; Chen, Y.-W. (2017). Data classification using evidence reasoning rule, Knowledge-Based Systems, 116, 144–151, 2017. [75] Xu, X.-B.; Ma, X.; Wen, C.-L.; Huang, D.-R.; Li, J.-N. (2018b). Self-tuning method of pid parameters based on belief rule base inference. Information Technology and Control, 47 (3), 551–563, 2018. [76] Yager, R. R. (2012). On Z-valuations using Zadeh’s Z-numbers. International Journal of Intelligent Systems, 27 (3), 259–278, 2012. [77] Yang, J.; Huang, H. Z.; He, L. P.; Zhu, S. P.; Wen, D. (2011). Risk evaluation in failure mode and effects analysis of aircraft turbine rotor blades using Dempster-Shafer evidence theory under uncertainty, Engineering Failure Analysis, 18 (8), 2084–2092, 2011. [78] Yazdi, M.; Daneshvar, S.; Setareh, H. (2017). An extension to fuzzy developed failure mode and effects analysis (fdfmea) application for aircraft landing system. Safety Science, 98, 113–123, 2017. [79] Zadeh, L. A. (1965). Fuzzy sets, Information & Control, 8 (3), 338–353, 1965. [80] Zhang, J.; Zhong, D.; Zhao, M.; Yu, J.; Lv, F., (2019). An Optimization Model for Construc- tion Stage and Zone Plans of Rockfill Dams Based on the Enhanced Whale Optimization Algorithm. Energies, 12 (3), 466, 2019. [81] Zhang, W.; Deng, Y. (2019). Combining conflicting evidence using the DEMATEL method. Soft computing, 23 (17), 8207–8216, 2019. [82] Zhao, J.; Deng, Y. (2019). Performer selection in Human Reliability analysis: D numbers approach. International Journal of Computers Communications & Control, 14 (3), 437–452, 2019. [83] Zhou, M.; Liu, X.; Yang, J. (2017). Evidential reasoning approach for MADM based on incomplete interval value. Journal of Intelligent & Fuzzy Systems 33 (6), 3707–3721, 2017. [84] Zhou, M.; Liu, X.-B.; Chen, Y.-W.; Yang, J.-B. (2018). Evidential reasoning rule for MADM with both weights and reliabilities in group decision making. Knowledge-Based Systems, 143, 142–161, 2018. Risk Evaluation in Failure Mode and Effects Analysis Based on D Numbers Theory 691 [85] Zhou, M.; Liu, X.-B.; Yang, J.-B.; Chen, Y.-W.; Wu, J. (2019). Evidential reasoning ap- proach with multiple kinds of attributes and entropy-based weight assignment, Knowledge- Based Systems, 163, 358–375, 2019.