[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 523-526.

• Interdiscipline & Application • Previous Articles     Next Articles

Simulation Modeling of Complex Engineering Project Schedule Risk AssessmentBased on Multi Agent

YAN Gong-da, DONG Peng, WEN Hao-lin   

  1. Department of Management Engineering and Equipment Economic,Naval University of Engineering,Wuhan 430033,China
  • Online:2019-06-14 Published:2019-07-02

Abstract: In order to solve the problems of complex engineering projects schedule risk assessmentdue to their complex structure,long cycle and numerous risk factors,a project schedule risk assessment model based on the multi agent was established by the Anylogic software.In this model,a “process” agent,a “process flow” agent,a “risk factor” agent and a“control” agentwere were designed by taking into account the process state,transformation conditions and the internal processing behavior of the state.Multiple nested relations between the “process flow” and the “process” were formed by “risk factors”.The risk factors sensitivity analysis of a certain type of marine diesel engine maintenance project was completed through simulation experiments,then it come up with the risk factors in important processes that should be taken measures to give priority to control.Experiment results show that the model for complex engineering project schedule risk assessment has a certain reference value.

Key words: Engineering project, Multi agent, Risk assessment, Schedule risk

CLC Number: 

  • TP391.9
[1]ASSAF S A,AL-HEJJI S.Causes of delay in large construction projects[J].International Journal of Project Management,2006,24(4):349-357.
[2]LUU V T,KIM S Y,TUAN N V,et al.Ogunlana.Quantifying schedule risk in construction projects using Bayesian belief networks[J].International Journal of Project Management,2009,27(1):39-50.
[3]ÖKMEN Ö,ÖZTAS A.Construction project network evaluation with correlated schedule risk analysis model[J].Journal of Construction Engineering and Management,2008,134(1):49-63.
[4]JALILI Y,FORDA D N.Quantifying the impacts of rework,schedule pressure,and ripple effect loops on project schedule performance[J].Systerm Dynamics Review,2016,32(1):82-96.
[5]陈悦华,杨旭,杜厚磊.基于关键链的PERT项目群进度风险控制方法改进[J].施工技术,2015,44(6):71-74.
[6]徐霄枭.建设项目施工阶段工期风险分析[D].深圳:深圳大学,2016.
[7]李存斌,陆龚曙,李鹏,等.建设项目进度风险管理的系统动力学模型[J].华东电力,2012,40(2):178-182.
[8]柴国荣,许阳.进度视角下地铁项目施工安全风险的系统动力学分析[J].科技管理研究,2016,36(21):85-90.
[9]李杨,徐峰,谢光强,等.多智能体技术发展及其应用综述[J].计算机工程与应用,2018,54(9):13-21.
[10]刘志强.ZB船装备系统中修项目进度控制研究[D].广州:华南理工大学,2011.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] YONG Qi, JIANG Wei-na, LUO Yu-ze. Trial Risk Assessment System Based on Fuzzy Number Similarity [J]. Computer Science, 2021, 48(5): 209-216.
[3] WANG Xiao-xiao, WANG Ting-wen, MA Yu-ling, FAN Jia-yi, CUI Chao-ran. Credit Risk Assessment Method of P2P Online Loan Borrowers Based on Deep Forest [J]. Computer Science, 2021, 48(11A): 429-434.
[4] LIU Shan-shan, ZHU Hai-long, HAN Xiao-xia, MU Quan-qi, HE Wei. Enterprise Risk Assessment Model Based on Principal Component Regression and HierarchicalBelief Rule Base [J]. Computer Science, 2021, 48(11A): 570-575.
[5] YE Zi-wei, GUO Yuan-bo, LI Tao, JU An-kang. Extended Attack Graph Generation Method Based on Knowledge Graph [J]. Computer Science, 2019, 46(12): 165-173.
[6] ZHAN Xiong, GUO Hao, HE Xiao-yun, LIU Zhou-bin, SUN Xue-jie, CHEN Hong-song. Research on Security Risk Assessment Method of State Grid Edge Computing Information System [J]. Computer Science, 2019, 46(11A): 428-432.
[7] YANG De-jie, ZHANG Ning, YUAN Ji, BAI Lu. Individual Credit Risk Assessment Based on Stacked Denoising Autoencoder Networks [J]. Computer Science, 2019, 46(10): 7-13.
[8] LIN Xiao-hua and JIA Wen-hua. FMEA Method Combining OWA Operator and Fuzzy DEMATEL [J]. Computer Science, 2016, 43(Z11): 362-367.
[9] TANG Cheng-hua, TIAN Ji-long, TANG Shen-sheng, ZHANG Xin and WANG Lu. Risk Assessment of Software Vulnerability Based on GA-FAHP [J]. Computer Science, 2015, 42(9): 134-138.
[10] LU Zhi-gang,LIU Jun-rong and LIU Bao-xu. Risk Assessment Methods of Complex Network Based on GTST-MLD [J]. Computer Science, 2014, 41(7): 194-199.
[11] LIU Jin-hang and XIA Hong-xia. New Methods of Software Requirements Risk Assessment Using UML [J]. Computer Science, 2014, 41(6): 131-135.
[12] . Distributed Network Risk Assessment Method Based on Attack Graph [J]. Computer Science, 2013, 40(2): 139-144.
[13] . Multi-Agents Network Security Risk Evaluation Model Based on Attack Graph [J]. Computer Science, 2013, 40(2): 148-152.
[14] . Combat Super Network Multi Agent Model [J]. Computer Science, 2012, 39(7): 44-47.
[15] HE Jian-hong,BAI Xiao-ying,HU Lin-ping. Quantitative Risk Analysis of Software Project Schedule Management [J]. Computer Science, 2011, 38(4): 164-169.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!