{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T03:05:11Z","timestamp":1761102311355},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T00:00:00Z","timestamp":1528761600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s00500-018-3291-x","type":"journal-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T04:51:11Z","timestamp":1528779071000},"page":"6379-6390","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Utilizing self-organization systems for modeling and managing risk based on maintenance and repair in petrochemical industries"],"prefix":"10.1007","volume":"23","author":[{"given":"F.","family":"Jaderi","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Zelina Z.","family":"Ibrahim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Mehdi","family":"Nikoo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Mohammad","family":"Nikoo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"issue":"16","key":"3291_CR1","first-page":"1888","volume":"3","author":"B Anvaripour","year":"2013","unstructured":"Anvaripour B, Sa\u2019idi E, Nabhani N, Jaderi F (2013) Risk analysis of crude distillation unit\u2019s assets in Abadan oil refinery using risk based maintenance. TJEAS J 3(16):1888\u20131892","journal-title":"TJEAS J"},{"key":"3291_CR2","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.jhazmat.2006.06.069","volume":"142","author":"NS Arunraj","year":"2007","unstructured":"Arunraj NS, Maiti J (2007) Risk-based maintenance\u2014techniques and applications. J Hazard Mater 142:653\u2013661","journal-title":"J Hazard Mater"},{"key":"3291_CR3","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.apm.2010.05.014","volume":"35","author":"M Bashiri","year":"2011","unstructured":"Bashiri M, Badri H, Hejazi TH (2011) Selecting optimum maintenance strategy by fuzzy interactive linear assignment method. Appl Math Model 35:152\u2013164","journal-title":"Appl Math Model"},{"issue":"1\u20133","key":"3291_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1012019526054","volume":"31","author":"C Booth","year":"2001","unstructured":"Booth C, McDonald JR, Mcarthur SDJ (2001) Forecasting and prediction applications in the field of power engineering. J Intell Rob Syst 31(1\u20133):159\u2013184","journal-title":"J Intell Rob Syst"},{"key":"3291_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s00477-007-0123-4","volume":"22","author":"Y Chetouani","year":"2008","unstructured":"Chetouani Y (2008) A neural network approach for the real time detection of faults, stoch. Environ Res Risk Assess 22:339\u2013349","journal-title":"Environ Res Risk Assess"},{"issue":"4","key":"3291_CR6","first-page":"76","volume":"5","author":"CU Chikezie","year":"2013","unstructured":"Chikezie CU, Olowosulu AT, Abejide OS (2013) Multiobjective optimization for pavement maintenance and rehabilitation programming using genetic algorithms. Arch Appl Sci Res 5(4):76\u201383","journal-title":"Arch Appl Sci Res"},{"issue":"1","key":"3291_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11269-009-9441-2","volume":"24","author":"S Christodoulou","year":"2010","unstructured":"Christodoulou S, Deligianni A (2010) A neurofuzzy decision framework for the management of water distribution networks. Water Resour Manag 24(1):139\u2013156","journal-title":"Water Resour Manag"},{"key":"3291_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1023\/A:1008331413864","volume":"13","author":"U Cortes","year":"2000","unstructured":"Cortes U, Sanchez-Marre M, Ceccaroni L (2000) Artificial intelligence and environmental decision support systems. Appl Intell 13:77\u201391","journal-title":"Appl Intell"},{"key":"3291_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/0471739421","volume-title":"Hazard analysis techniques for system safety","author":"CA Ericson","year":"2005","unstructured":"Ericson CA (2005) Hazard analysis techniques for system safety. Wiley, New York"},{"key":"3291_CR10","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1016\/j.neunet.2005.03.010","volume":"18","author":"KP Ferentinos","year":"2005","unstructured":"Ferentinos KP (2005) Biological engineering applications of feedforward neural networks designed and parameterized by genetic algorithms. Neural Netw 18:934\u2013950","journal-title":"Neural Netw"},{"issue":"1\u20134","key":"3291_CR11","first-page":"75","volume":"301","author":"J Gavin","year":"2005","unstructured":"Gavin J, Bowden GC (2005) Input determination for neural network models in water resources applications. Part 1\u2014background and methodology. J Hydrol 301(1\u20134):75\u201392","journal-title":"J Hydrol"},{"key":"3291_CR12","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1007\/s11269-011-9809-y","volume":"25","author":"FV Goncalves","year":"2011","unstructured":"Goncalves FV, Costa LH, Ramos HM (2011) ANN for hybrid energy system evaluation methodology and WSS case study. Water Resour Manag 25:2295\u20132317","journal-title":"Water Resour Manag"},{"key":"3291_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.jlp.2009.03.003","volume":"22","author":"L Guo","year":"2009","unstructured":"Guo L, Gao J, Yang J, Kang J (2009) Criticality evaluation of petrochemical equipment based on fuzzy comprehensive evaluation and a BP neural network. J Loss Prev Process Ind 22:469\u2013476","journal-title":"J Loss Prev Process Ind"},{"key":"3291_CR14","unstructured":"Gutta S, Philomi V, Trajkovic M (2005) United States Patent No. 6,965,885 B2. U.S. Patent and Trademark Office, Washington, DC"},{"key":"3291_CR15","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1016\/j.anucene.2007.08.011","volume":"35","author":"SMH Hadavi","year":"2008","unstructured":"Hadavi SMH (2008) Risk based genetic algorithm approach to optimize outage maintenance schedule. Ann Nucl Energy 35:601\u2013609","journal-title":"Ann Nucl Energy"},{"key":"3291_CR16","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.arcontrol.2004.12.002","volume":"29","author":"R Isermann","year":"2005","unstructured":"Isermann R (2005) Model-based fault-detection and diagnosis status and applications. Annu Rev Control 29:71\u201385","journal-title":"Annu Rev Control"},{"issue":"6","key":"3291_CR17","first-page":"2033","volume":"23","author":"F Jaderi","year":"2014","unstructured":"Jaderi F, Ibrahim ZZ, Jaafarzadeh N, Abdollah R, Yavari AR, Shamsudin MN, Nabavi SMB (2014) Criticality analysis using risk assessment based maintenance technique of Fajr Petrochemical Company. Pol J Environ Stud 23(6):2033\u20132037","journal-title":"Pol J Environ Stud"},{"key":"3291_CR18","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S0950-4230(00)00006-1","volume":"14","author":"FI Khan","year":"2001","unstructured":"Khan FI, Abbasi SA (2001) Risk analysis of a typical chemical industry using ORA procedure. J Loss Prev Process Ind 14:43\u201359","journal-title":"J Loss Prev Process Ind"},{"issue":"6","key":"3291_CR19","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.jlp.2003.08.011","volume":"16","author":"FI Khan","year":"2003","unstructured":"Khan FI, Haddara MM (2003) Risk-based maintenance (RBM): a quantitative approach for maintenance\/inspection scheduling and planning. J Loss Prev Process Ind 16(6):561\u2013573","journal-title":"J Loss Prev Process Ind"},{"issue":"B6","key":"3291_CR20","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1205\/psep.82.6.398.53209","volume":"82","author":"FI Khan","year":"2004","unstructured":"Khan FI, Sadiq R, Haddara MM (2004) Risk-based inspection and maintenance (RBIM) multiattribute decision-making with aggregative risk analysis. Inst Chem Eng Trans IChemE Part B Process Saf Environ Prot 82(B6):398\u2013411","journal-title":"Inst Chem Eng Trans IChemE Part B Process Saf Environ Prot"},{"key":"3291_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-00784-6","volume-title":"Self-organization and associative memory","author":"T Kohonen","year":"1988","unstructured":"Kohonen T (1988) Self-organization and associative memory, vol 8, 3rd edn. Springer, Berlin ISBN 978-3-642-88163-3","edition":"3"},{"issue":"2","key":"3291_CR22","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jlp.2005.01.002","volume":"18","author":"L Krishnasamy","year":"2005","unstructured":"Krishnasamy L, Khan F, Haddara M (2005) Development of a risk-based maintenance (RBM) strategy for a power-generating plant. J Loss Prev Process Ind 18(2):69\u201381","journal-title":"J Loss Prev Process Ind"},{"key":"3291_CR23","doi-asserted-by":"publisher","first-page":"9946","DOI":"10.1016\/j.eswa.2012.01.004","volume":"39","author":"G Kumar","year":"2012","unstructured":"Kumar G, Maiti J (2012) Modeling risk based maintenance using fuzzy analytic network process. Expert Syst Appl 39:9946\u20139954","journal-title":"Expert Syst Appl"},{"issue":"2","key":"3291_CR24","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10845-011-0604-7","volume":"24","author":"I Kutschenreiter-Praszkiewicz","year":"2013","unstructured":"Kutschenreiter-Praszkiewicz I (2013) Application of neural network in QFD matrix. J Intell Manuf 24(2):397\u2013404","journal-title":"J Intell Manuf"},{"key":"3291_CR25","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.ress.2005.01.004","volume":"91","author":"CMF Lapa","year":"2006","unstructured":"Lapa CMF, Pereira CMNA, Barros MPD (2006) A model for preventive maintenance planning by generic algorithms based in cost and reliability. J Reliab Eng Syst Saf 91:233\u2013240","journal-title":"J Reliab Eng Syst Saf"},{"key":"3291_CR26","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1016\/j.jlp.2011.03.004","volume":"24","author":"PK Marhavilas","year":"2011","unstructured":"Marhavilas PK, Koulouriotis D, Gemeni V (2011) Risk analysis and assessment methodologies in the work sites: on a review, classification and comparative study of the scientific literature of the period 2000\u20132009. J Loss Prev Process Ind 24:477\u2013523","journal-title":"J Loss Prev Process Ind"},{"key":"3291_CR27","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jhazmat.2008.03.055","volume":"159","author":"AS Markowski","year":"2008","unstructured":"Markowski AS, Mannan MS (2008) Fuzzy risk matrix. J Hazard Mater 159:152\u2013157","journal-title":"J Hazard Mater"},{"key":"3291_CR28","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.jlp.2009.06.011","volume":"22","author":"AS Markowski","year":"2009","unstructured":"Markowski AS, Mannan MS (2009) Fuzzy logic for piping risk assessment (pfLOPA). J Loss Prevent Proc Ind 22:921\u2013927","journal-title":"J Loss Prevent Proc Ind"},{"key":"3291_CR29","volume-title":"The maintenance management framework models and methods for complex systems maintenance","author":"AC M\u00e1rquez","year":"2007","unstructured":"M\u00e1rquez AC (2007) The maintenance management framework models and methods for complex systems maintenance. Springer, London"},{"key":"3291_CR30","volume-title":"Artificial intelligence","author":"N Michael","year":"2004","unstructured":"Michael N (2004) Artificial intelligence, 2nd edn. Addison-Wesley, Boston","edition":"2"},{"key":"3291_CR31","first-page":"319","volume":"33","author":"S Nestic","year":"2013","unstructured":"Nestic S, Djordjevic A, Aleksic A, Macuzic I, Stefanovic M (2013) Optimization of the maintenance process using genetic algorithms. Chem Eng Trans 33:319\u2013324","journal-title":"Chem Eng Trans"},{"key":"3291_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/TSE.2002.1033229","volume":"28","author":"DE Neumann","year":"2002","unstructured":"Neumann DE (2002) An enhanced neural network technique for software risk analysis. IEEE Trans Software Eng 28:9","journal-title":"IEEE Trans Software Eng"},{"key":"3291_CR33","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/849126","author":"M Nikoo","year":"2015","unstructured":"Nikoo M, Torabian Moghadam F, Sadowski L (2015a) Prediction of concrete compressive strength by evolutionary artificial neural networks. Adv Mater Sci Eng. \n                    https:\/\/doi.org\/10.1155\/2015\/849126","journal-title":"Adv Mater Sci Eng"},{"issue":"1","key":"3291_CR34","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s00366-013-0334-x","volume":"31","author":"M Nikoo","year":"2015","unstructured":"Nikoo M, Zarfam P, Sayahpour H (2015b) Determination of compressive strength of concrete using self organization feature map (SOFM). Eng Comput 31(1):113\u2013121. \n                    https:\/\/doi.org\/10.1007\/s00366-013-0334-x","journal-title":"Eng Comput"},{"issue":"1","key":"3291_CR35","first-page":"1","volume":"3","author":"M Oja","year":"2003","unstructured":"Oja M, Kaski S et al (2003) Bibliography of self-organizing map (SOM) papers: 1998\u20132001 addendum. Neural Comput Surv 3(1):1\u2013156","journal-title":"Neural Comput Surv"},{"issue":"2","key":"3291_CR36","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s13198-013-0165-6","volume":"4","author":"M Ram","year":"2013","unstructured":"Ram M (2013) On system reliability approach: a brief survey. Int J Syst Assur Eng Manag 4(2):101\u2013117","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"7\u20138","key":"3291_CR37","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1007\/s00521-014-1645-6","volume":"25","author":"L Sadowski","year":"2014","unstructured":"Sadowski L, Nikoo M (2014) Corrosion current density prediction in reinforced concrete by imperialist competitive algorithm. Neural Comput Appl 25(7\u20138):1627\u20131638. \n                    https:\/\/doi.org\/10.1007\/s00521-014-1645-6","journal-title":"Neural Comput Appl"},{"key":"3291_CR38","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.conbuildmat.2015.01.034","volume":"78","author":"I Sadowski","year":"2015","unstructured":"Sadowski I, Nikoo M, Nikoo M (2015) Principal component analysis combined with a self organization feature map to determine the pull-off adhesion between concrete layers. Constr Build Mater 78:386\u2013396. \n                    https:\/\/doi.org\/10.1016\/j.conbuildmat.2015.01.034","journal-title":"Constr Build Mater"},{"key":"3291_CR39","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jlp.2014.04.002","volume":"30","author":"E Sa\u2019idi","year":"2014","unstructured":"Sa\u2019idi E, Anvaripour B, Jaderi F, Nabhani N (2014) Fuzzy risk modeling of process operations in the oil and gas refineries. J Loss Prev Process Ind 30:63\u201373","journal-title":"J Loss Prev Process Ind"},{"key":"3291_CR40","first-page":"246","volume":"3","author":"MS Samhouri","year":"2009","unstructured":"Samhouri MS, Al-Ghandoor A, Fouad RH, Alhaji Ali SM (2009) An intelligent opportunistic maintenance (OM) system: agenetic algorithm approach. Jordan J Mech Ind Eng 3:246\u2013251","journal-title":"Jordan J Mech Ind Eng"},{"key":"3291_CR41","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.cmpb.2004.10.009","volume":"78","author":"A Subasi","year":"2005","unstructured":"Subasi A, Ercelebi E (2005) Classification of EEG signals using neural network and logistic regression. Comput Methods Progr Biomed 78:87\u201399","journal-title":"Comput Methods Progr Biomed"},{"key":"3291_CR42","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1108\/02656710610688202","volume":"23","author":"KM Tay","year":"2006","unstructured":"Tay KM, Lim CP (2006) Fuzzy FMEA with a guided rules reduction system for prioritization of failures. Int J Qual Reliab Manag 23:1047\u20131066","journal-title":"Int J Qual Reliab Manag"},{"issue":"2","key":"3291_CR43","doi-asserted-by":"publisher","first-page":"1434","DOI":"10.1016\/j.eswa.2007.01.009","volume":"34","author":"L Yu","year":"2008","unstructured":"Yu L, Wang S et al (2008) Credit risk assessment with a multistage neural network ensemble learning approach. Expert Syst Appl 34(2):1434\u20131444","journal-title":"Expert Syst Appl"},{"key":"3291_CR44","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ress.2008.06.002","volume":"94","author":"E Zio","year":"2009","unstructured":"Zio E (2009) Reliability engineering: old problems and new challenges. Reliab Eng Saf Syst 94:125\u2013141","journal-title":"Reliab Eng Saf Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3291-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3291-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3291-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T04:17:09Z","timestamp":1562041029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3291-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,12]]},"references-count":44,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["3291"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3291-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,12]]},"assertion":[{"value":"12 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All of the authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}]}}