{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T18:40:12Z","timestamp":1759776012923},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"S4","license":[{"start":{"date-parts":[[2014,12,4]],"date-time":"2014-12-04T00:00:00Z","timestamp":1417651200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s13198-014-0323-5","type":"journal-article","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T13:29:08Z","timestamp":1417613348000},"page":"2064-2070","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Fault tree analysis based on TOPSIS and triangular fuzzy number"],"prefix":"10.1007","volume":"8","author":[{"given":"Hongping","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xi","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yuxian","family":"Du","sequence":"additional","affiliation":[]},{"given":"Chenwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rehan","family":"Sadiq","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,4]]},"reference":[{"issue":"1","key":"323_CR1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s13198-012-0092-y","volume":"3","author":"L Barber\u00e1","year":"2012","unstructured":"Barber\u00e1 L, Crespo A, Viveros P, Stegmaier R (2012) Advanced model for maintenance management in a continuous improvement cycle: integration into the business strategy. Int J Syst Assur Eng Manage 3(1):47\u201363","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"1","key":"323_CR2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0951-8320(01)00121-1","volume":"75","author":"M \u010cepin","year":"2002","unstructured":"\u010cepin M, Mavko B (2002) A dynamic fault tree. Reliab Eng Syst Saf 75(1):83\u201391","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"323_CR3","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1016\/0377-2217(95)00300-2","volume":"95","author":"DY Chang","year":"1996","unstructured":"Chang DY (1996) Applications of the extent analysis method on fuzzy AHP. Eur J Oper Res 95(3):649\u2013655","journal-title":"Eur J Oper Res"},{"issue":"1","key":"323_CR4","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/S0165-0114(98)00459-X","volume":"118","author":"CT Chen","year":"2001","unstructured":"Chen CT (2001) A fuzzy approach to select the location of the distribution center. Fuzzy Sets Syst 118(1):65\u201373","journal-title":"Fuzzy Sets Syst"},{"issue":"1","key":"323_CR5","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s13198-011-0053-x","volume":"2","author":"S Das","year":"2011","unstructured":"Das S, Sadiq R, Tesfamariam S (2011) An aggregative fuzzy risk analysis for flood incident management. Int J Syst Assur Eng Manage 2(1):31\u201340","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"10","key":"323_CR6","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1016\/S0305-0548(99)00069-6","volume":"27","author":"H Deng","year":"2000","unstructured":"Deng H, Yeh CH, Willis RJ (2000) Inter-company comparison using modified TOPSIS with objective weights. Comput Oper Res 27(10):963\u2013973","journal-title":"Comput Oper Res"},{"issue":"3","key":"323_CR7","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1016\/j.asoc.2011.11.011","volume":"12","author":"Y Deng","year":"2012","unstructured":"Deng Y, Chen Y, Zhang Y, Mahadevan S (2012) Fuzzy Dijkstra algorithm for shortest path problem under uncertain environment. Appl Soft Comput 12(3):1231\u20131237","journal-title":"Appl Soft Comput"},{"issue":"1","key":"323_CR8","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/24.855536","volume":"49","author":"JB Dugan","year":"2000","unstructured":"Dugan JB, Sullivan KJ, Coppit D (2000) Developing a low-cost high-quality software tool for dynamic fault-tree analysis. Reliab IEEE Trans 49(1):49\u201359","journal-title":"Reliab IEEE Trans"},{"issue":"4","key":"323_CR9","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/s13198-012-0082-0","volume":"2","author":"A Francisque","year":"2011","unstructured":"Francisque A, Rodriguez MJ, Sadiq R, Miranda LF, Proulx F (2011) Classification of heterotrophic plate counts (HPC) in a water distribution network: a fuzzy rule-based approach. Int J Syst Assur Eng Manage 2(4):286\u2013300","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"4","key":"323_CR10","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/s007660200016","volume":"7","author":"G Helmer","year":"2002","unstructured":"Helmer G, Wong J, Slagell M, Honavar V, Miller L, Lutz R (2002) A software fault tree approach to requirements analysis of an intrusion detection system. Requir Eng 7(4):207\u2013220","journal-title":"Requir Eng"},{"issue":"1","key":"323_CR12","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.arcontrol.2004.12.002","volume":"29","author":"R Isermann","year":"2005","unstructured":"Isermann R (2005) Model-based fault-detection and diagnosis\u2013status and applications. Annu Rev Control 29(1):71\u201385","journal-title":"Annu Rev Control"},{"issue":"1","key":"323_CR13","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/s13198-012-0100-2","volume":"4","author":"J Jaise","year":"2013","unstructured":"Jaise J, Kumar NA, Shanmugam NS, Sankaranarayanasamy K, Ramesh T (2013) Power system: a reliability assessment using FTA. Int J Syst Assur Eng Manage 4(1):78\u201385","journal-title":"Int J Syst Assur Eng Manage"},{"key":"323_CR14","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.knosys.2012.04.007","volume":"35","author":"B Kang","year":"2012","unstructured":"Kang B, Deng Y, Sadiq R, Mahadevan S (2012) Evidential cognitive maps. Knowl-Based Syst 35:77\u201386","journal-title":"Knowl-Based Syst"},{"key":"323_CR15","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.knosys.2012.04.015","volume":"35","author":"J Liu","year":"2012","unstructured":"Liu J, Chan FT, Li Y, Zhang Y, Deng Y (2012) A new optimal consensus method with minimum cost in fuzzy group decision. Knowl-Based Syst 35:357\u2013360","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"323_CR16","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1016\/j.amc.2008.05.047","volume":"206","author":"I Mahdavi","year":"2008","unstructured":"Mahdavi I, Mahdavi-Amiri N, Heidarzade A, Nourifar R (2008) Designing a model of fuzzy TOPSIS in multiple criteria decision making. Appl Math Comput 206(2):607\u2013617","journal-title":"Appl Math Comput"},{"issue":"2","key":"323_CR17","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/S0377-2217(03)00020-1","volume":"156","author":"S Opricovic","year":"2004","unstructured":"Opricovic S, Tzeng GH (2004) Compromise solution by MCDM methods: a comparative analysis of VIKOR and TOPSIS. Eur J Oper Res 156(2):445\u2013455","journal-title":"Eur J Oper Res"},{"issue":"1","key":"323_CR18","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0951-8320(02)00107-2","volume":"78","author":"KA Reay","year":"2002","unstructured":"Reay KA, Andrews JD (2002) A fault tree analysis strategy using binary decision diagrams. Reliab Eng Syst Saf 78(1):45\u201356","journal-title":"Reliab Eng Syst Saf"},{"issue":"2\u20134","key":"323_CR19","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/s00607-011-0179-3","volume":"94","author":"G Rebner","year":"2012","unstructured":"Rebner G, Auer E, Luther W (2012) A verified realization of a Dempster\u2013Shafer based fault tree analysis. Computing 94(2\u20134):313\u2013324","journal-title":"Computing"},{"key":"323_CR20","unstructured":"Sadeghpour Gildeh B, Gien D (2001) La distance-Dp, q et le cofficient de corr\u00e9lation entre deux variables al\u00e9atoires floues.\u00a0Actes de LFA, 97\u2013102"},{"issue":"12","key":"323_CR21","doi-asserted-by":"crossref","first-page":"2139","DOI":"10.1016\/j.microrel.2006.01.007","volume":"46","author":"MH Shu","year":"2006","unstructured":"Shu MH, Cheng CH, Chang JR (2006) Using intuitionistic fuzzy sets for fault-tree analysis on printed circuit board assembly. Microelectron Reliab 46(12):2139\u20132148","journal-title":"Microelectron Reliab"},{"issue":"3","key":"323_CR22","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/s13198-011-0077-2","volume":"2","author":"G Srinivas","year":"2011","unstructured":"Srinivas G, Verma AK, Srividya A, Khattri SK (2011) A level-1 PSA based systemic approach to optimal technical specifications of safety systems in nuclear power plants. Int J Syst Assur Eng Manage 2(3):234\u2013240","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"5","key":"323_CR23","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/TR.1983.5221727","volume":"32","author":"H Tanaka","year":"1983","unstructured":"Tanaka H, Fan LT, Lai FS, Toguchi K (1983) Fault-tree analysis by fuzzy probability. Reliab IEEE Trans 32(5):453\u2013457","journal-title":"Reliab IEEE Trans"},{"issue":"4","key":"323_CR24","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/s13198-011-0038-9","volume":"1","author":"KS Trivedi","year":"2010","unstructured":"Trivedi KS, Grottke M, Andrade E (2010) Software fault mitigation and availability assurance techniques. Int J Syst Assur Eng Manage 1(4):340\u2013350","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"6","key":"323_CR25","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.1016\/j.ress.2009.01.004","volume":"94","author":"A Volkanovski","year":"2009","unstructured":"Volkanovski A, \u010cepin M, Mavko B (2009) Application of the fault tree analysis for assessment of power system reliability. Reliab Eng Syst Saf 94(6):1116\u20131127","journal-title":"Reliab Eng Syst Saf"},{"issue":"10","key":"323_CR26","doi-asserted-by":"crossref","first-page":"2564","DOI":"10.1016\/j.physa.2013.01.054","volume":"392","author":"D Wei","year":"2013","unstructured":"Wei D, Deng X, Zhang X, Deng Y, Mahadevan S (2013) Identifying influential nodes in weighted networks based on evidence theory. Phys A 392(10):2564\u20132575","journal-title":"Phys A"},{"issue":"6","key":"323_CR27","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1080\/01969720590961727","volume":"36","author":"D Yong","year":"2005","unstructured":"Yong D, Qi L (2005) A TOPSIS-based centroid\u2013index ranking method of fuzzy numbers and its application in decision-making. Cybern Syst 36(6):581\u2013595","journal-title":"Cybern Syst"},{"issue":"3","key":"323_CR28","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338\u2013353","journal-title":"Inf Control"},{"issue":"1","key":"323_CR29","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/0020-0255(75)90017-1","volume":"9","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA (1975a) The concept of a linguistic variable and its application to approximate reasoning-III. Inf Sci 9(1):43\u201380","journal-title":"Inf Sci"},{"issue":"3","key":"323_CR30","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","volume":"8","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA (1975b) The concept of a linguistic variable and its application to approximate reasoning\u2014I. Inf Sci 8(3):199\u2013249","journal-title":"Inf Sci"},{"issue":"4","key":"323_CR31","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/0020-0255(75)90046-8","volume":"8","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA (1975c) The concept of a linguistic variable and its application to approximate reasoning\u2014II. Inf Sci 8(4):301\u2013357","journal-title":"Inf Sci"},{"issue":"5","key":"323_CR32","doi-asserted-by":"crossref","first-page":"2356","DOI":"10.1016\/j.asoc.2012.12.035","volume":"13","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Zhang Z, Deng Y, Mahadevan S (2013) A biologically inspired solution for fuzzy shortest path problems. Appl Soft Comput 13(5):2356\u20132363","journal-title":"Appl Soft Comput"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0323-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-014-0323-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0323-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0323-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T15:40:33Z","timestamp":1717602033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-014-0323-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,4]]},"references-count":31,"journal-issue":{"issue":"S4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["323"],"URL":"https:\/\/doi.org\/10.1007\/s13198-014-0323-5","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,4]]}}}