{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T15:56:53Z","timestamp":1775836613131,"version":"3.50.1"},"reference-count":61,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2016,11,15]],"date-time":"2016-11-15T00:00:00Z","timestamp":1479168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2013CB036005"],"award-info":[{"award-number":["2013CB036005"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51608529"],"award-info":[{"award-number":["51608529"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Decision-making under risk assessment involves dealing with the matter of uncertainty, especially in projects such as tunnel construction. Risk control should include not only measures to reduce the possible consequence of incident, but also exploration measures (information collecting measures) to reduce the uncertainty of the incident. The classical risk assessment model in engineering is     R = P \u00d7 C     which only takes account of the assessment and decision-making of possible consequences. It cannot provide theoretical guidance for taking exploration measures. The paper presents an advanced methodology to assess the effectiveness of exploration measures in decision-making. The methodology classifies risk into two attributes: hazard (expected value) and uncertainty (entropy). On this basis, a generalized model of decision-making under risk assessment is proposed. This model extends the use of the classical assessment model to a more general case. The reason for taking exploration measures and assessment of such measures\u2019 effectiveness could be explained well by this developed model. This model can also serve as a descriptive model for many risk problems and provide a decision-making basis for a variety of risk types. Moreover, the assessment process and calculation method are applied with some case studies.<\/jats:p>","DOI":"10.3390\/e18110404","type":"journal-article","created":{"date-parts":[[2016,11,15]],"date-time":"2016-11-15T10:25:31Z","timestamp":1479205531000},"page":"404","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Decision-Making Model under Risk Assessment Based on Entropy"],"prefix":"10.3390","volume":"18","author":[{"given":"Xin","family":"Dong","sequence":"first","affiliation":[{"name":"State Key Laboratory for Diasaster Prevention &amp; Mitigation of Explosion &amp; Impact, PLA University of Science and Technology, Nanjing 210007, China"}]},{"given":"Hao","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Diasaster Prevention &amp; Mitigation of Explosion &amp; Impact, PLA University of Science and Technology, Nanjing 210007, China"}]},{"given":"Yuanpu","family":"Xia","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Diasaster Prevention &amp; Mitigation of Explosion &amp; Impact, PLA University of Science and Technology, Nanjing 210007, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0392-8715","authenticated-orcid":false,"given":"Ziming","family":"Xiong","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Diasaster Prevention &amp; Mitigation of Explosion &amp; Impact, PLA University of Science and Technology, Nanjing 210007, China"}]}],"member":"1968","published-online":{"date-parts":[[2016,11,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0886-7798(96)00014-4","article-title":"Risk and risk analysis in rock engineering","volume":"11","author":"Einstein","year":"1996","journal-title":"Tunn. Undergr. Space Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1111\/risa.12132","article-title":"Foundational issues in risk assessment and risk management","volume":"34","author":"Aven","year":"2014","journal-title":"Risk Anal."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"193","DOI":"10.3724\/SP.J.1235.2012.00193","article-title":"Risk assessment and management in underground rock engineering\u2014An overview","volume":"4","author":"Brown","year":"2012","journal-title":"J. Rock Mech. Geotech. Eng."},{"key":"ref_4","unstructured":"Baecher, G.B., and Christian, J.T. (2003). Reliability and Statistics in Geotechnical Engineering, Wiley."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Fenton, G.A., and Griffiths, D.V. (2008). Risk Assessment in Geotechnical Engineering, Wiley.","DOI":"10.1002\/9780470284704"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Honjo, Y., Suzuki, M., Hara, T., and Zhang, F. (2009). Geotechnical Risk and Safety, CRC Press.","DOI":"10.1201\/9780203867310"},{"key":"ref_7","unstructured":"Juang, C.H., Phoon, K.K., Puppala, A.J., Green, R.A., and Fenton, G.A. (2011). GeoRisk 2011: Geotechnical Risk Assessment and Management, ASCE."},{"key":"ref_8","first-page":"155","article-title":"Dempster\u2013Shafer theory of evidence: Potential usage for decision making and risk analysis in construction project management","volume":"4","author":"Taroun","year":"2011","journal-title":"Built Hum. Environ. Rev."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Jensen, F.V., and Nielsen, T.D. (2007). Bayesian Networks and Decision Graphs, Springer. [2nd ed.].","DOI":"10.1007\/978-0-387-68282-2"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.tust.2011.07.003","article-title":"Risk analysis during tunnel construction using Bayesian networks: Porto metro case study","volume":"27","author":"Sousa","year":"2012","journal-title":"Tunn. Undergr. Space Technol."},{"key":"ref_11","unstructured":"Sousa, R.L. (2010). Risk Analysis for Tunneling Projects. [Ph.D. Thesis, Massachusetts Institute of Technology]."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1061\/(ASCE)0733-9364(2004)130:2(258)","article-title":"Risk assessment methodology for underground construction projects","volume":"130","author":"Choi","year":"2004","journal-title":"J. Constr. Eng. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1185","DOI":"10.1061\/(ASCE)CO.1943-7862.0000391","article-title":"Risk assessment methodology for a deep foundation pit construction project in Shanghai, China","volume":"137","author":"Zhou","year":"2011","journal-title":"J. Constr. Eng. Manag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s11069-008-9306-7","article-title":"Lava flow simulations using discharge rates from thermal infrared satellite imagery during the 2006 Etna Eruption","volume":"50","author":"Vicari","year":"2009","journal-title":"Nat. Hazards"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.tust.2013.05.001","article-title":"Risk assessment of water inrush in karst tunnels based on attribute synthetic evaluation system","volume":"38","author":"Li","year":"2013","journal-title":"Tunn. Undergr. Space Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1843","DOI":"10.1007\/s12517-014-1365-3","article-title":"Risk assessment of water inrush in karst tunnels and software development","volume":"8","author":"Li","year":"2015","journal-title":"Arab. J. Geosci."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ge, Y.H., Li, S.C., Zhang, Q.S., and Lu, W. (2009, January 23\u201324). Risk analysis of water inrush into karst tunnel using fuzzy comprehensive evaluation method. Proceedings of the International Workshop on Intelligent Systems and Applications (ISA 2009), Wuhan, China.","DOI":"10.1109\/IWISA.2009.5073097"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"82","DOI":"10.3846\/13923730.2013.843583","article-title":"Proposing a new methodology based on fuzzy logic for tunnelling risk assessment","volume":"20","year":"2014","journal-title":"J. Civ. Eng. Manag."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.tust.2013.10.005","article-title":"Research on risk assessment system for water inrush in the karst tunnel construction based on GIS: case study on the diversion tunnel groups of the Jinping II Hydropower Station","volume":"40","author":"Li","year":"2014","journal-title":"Tunn. Undergr. Space Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.acme.2012.03.008","article-title":"Risk evaluation of tunneling projects","volume":"12","author":"Fouladgar","year":"2012","journal-title":"Arch. Civ. Mech. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.ress.2007.03.025","article-title":"A semi-quantitative approach to risk analysis, as an Alternative to QRAs","volume":"93","author":"Aven","year":"2008","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_22","unstructured":"Von Neumann, J., and Morgenstern, O. (1944). The Theory of Games and Economic Behavior, Princeton University Press."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.ress.2015.04.021","article-title":"On how to understand and acknowledge risk","volume":"142","author":"Amundrud","year":"2015","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.ejor.2007.01.012","article-title":"Risk attributes theory: Decision making under risk","volume":"186","author":"He","year":"2008","journal-title":"Eur. J. Oper. Res."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1126\/science.1134239","article-title":"The neural basis of loss aversion in decision-making under risk","volume":"315","author":"Tom","year":"2007","journal-title":"Science"},{"key":"ref_26","unstructured":"Karagoz, S., Aydin, N., and Isikli, E. (2017). Intelligence Systems in Environmental Management: Theory and Applications, Springer."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2307\/1914185","article-title":"Prospect theory: An analysis of decision under risk","volume":"47","author":"Kahneman","year":"1979","journal-title":"Econometrica"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1287\/deca.1060.0077","article-title":"The respective roles of risk and decision analysis in decision support","volume":"3","author":"Dillon","year":"2006","journal-title":"Decis. Anal."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1016\/j.ejor.2004.01.031","article-title":"A measure of risk and a decision-making model based on expected utility and entropy","volume":"164","author":"Yang","year":"2005","journal-title":"Eur. J. Oper. Res."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1287\/mnsc.41.1.23","article-title":"Risk, return, and utility","volume":"41","author":"Bell","year":"1995","journal-title":"Manag. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1287\/mnsc.45.4.519","article-title":"Measures of perceived risk","volume":"45","author":"Jia","year":"1999","journal-title":"Manag. Sci."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/S0377-2217(96)00254-8","article-title":"Relative risk-value models","volume":"103","author":"Dyer","year":"1997","journal-title":"Eur. J. Oper. Res."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Pedrycz, W., and Chen, S.M. (2015). Granular Computing and Decision-Making: Interactive and Iterative Approaches, Springer.","DOI":"10.1007\/978-3-319-16829-6"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41066-015-0012-z","article-title":"DCC: A framework for dynamic granular clustering","volume":"1","author":"Peters","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s41066-015-0003-0","article-title":"Granular computing, computational intelligence, and the analysis of non-geometric input spaces","volume":"1","author":"Livi","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s41066-015-0006-x","article-title":"Managing multi-granularity linguistic information in qualitative group decision making: An overview","volume":"1","author":"Xu","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s41066-015-0004-z","article-title":"Multi-objective evolutionary design of granular rule-based classifiers","volume":"1","author":"Antonelli","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s41066-015-0009-7","article-title":"A comparison of three approaches for estimating (synthesizing) an interval type-2 fuzzy set model of a linguistic term for computing with words","volume":"1","author":"Mendel","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s41066-015-0007-9","article-title":"Granular meta-clustering based on hierarchical, network, and temporal connections","volume":"1","author":"Lingras","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s41066-015-0002-1","article-title":"Interactive granular computing","volume":"1","author":"Skowron","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s41066-015-0008-8","article-title":"Bridging gaps between several forms of granular computing","volume":"1","author":"Dubois","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s41066-015-0005-y","article-title":"Enforcing situation awareness with granular computing: A systematic overview and new perspectives","volume":"1","author":"Loia","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s41066-015-0011-0","article-title":"A triarchic theory of granular computing","volume":"1","author":"Yao","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s41066-015-0013-y","article-title":"Orthopairs and granular computing","volume":"1","author":"Ciucci","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s41066-015-0014-x","article-title":"Solving equations (and systems of equations) under uncertainty: How different practical problems lead to different mathematical and computational formulations","volume":"1","author":"Kreinovich","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s41066-016-0015-4","article-title":"Granular computing as a basis of human-data interaction: A cognitive cities use case","volume":"1","author":"Wilke","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s41066-016-0017-2","article-title":"Semi-greedy heuristics for feature selection with test cost constraints","volume":"1","author":"Min","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s41066-016-0016-3","article-title":"Evolving granular analytics for interval time series forecasting","volume":"1","author":"Maciel","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s41066-016-0018-1","article-title":"A neuro fuzzy algorithm for learning from complex granules","volume":"1","author":"Apolloni","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s41066-016-0020-7","article-title":"A study of granular computing in the agenda of growth of artificial neural networks","volume":"1","author":"Song","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s41066-016-0021-6","article-title":"Rule-based systems: A granular computing perspective","volume":"1","author":"Liu","year":"2016","journal-title":"Granul. Comput."},{"key":"ref_52","unstructured":"Cover, T.M., and Thomas, J.A. (2012). Elements of Information Theory, Wiley."},{"key":"ref_53","unstructured":"Renyi, A. (July, January 20). On measures of entropy and information. Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Berkeley, CA, USA."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1007\/BF01016429","article-title":"Possible generalization of Boltzmann-Gibbs statistics","volume":"52","author":"Tsallis","year":"1988","journal-title":"J. Stat. Phys."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Chen, B., Wang, J., Zhao, H., and Principe, J. (2016). Insights into Entropy as a Measure of Multivariate Variability. Entropy, 18.","DOI":"10.3390\/e18050196"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"3590","DOI":"10.3390\/e16073590","article-title":"Normalized Expected Utility-Entropy Measure of Risk","volume":"16","author":"Yang","year":"2014","journal-title":"Entropy"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"6560","DOI":"10.3390\/e17106560","article-title":"Expected Utility and Entropy-Based Decision-Making Model for Large Consumers in the Smart Grid","volume":"17","author":"Gao","year":"2015","journal-title":"Entropy"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"He, D., Xu, J., and Chen, X. (2016). Information-Theoretic-Entropy Based Weight Aggregation Method in Multiple-Attribute Group Decision-Making. Entropy, 18.","DOI":"10.3390\/e18060171"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.ejor.2006.07.033","article-title":"Remarks on \u201cA measure of risk and a decision-making model based on expected utility and entropy\u201d by Jiping Yang and Wanhua Qiu (EJOR 164 (2005), 792\u2013799)","volume":"182","author":"Fischer","year":"2007","journal-title":"Eur. J. Oper. Res."},{"key":"ref_61","unstructured":"International Tunneling Association (2004). Guidelines for tunneling risk management. Tunn. Undergr. Space Technol., 19, 617\u2013643."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/18\/11\/404\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:35:31Z","timestamp":1760211331000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/18\/11\/404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,15]]},"references-count":61,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2016,11]]}},"alternative-id":["e18110404"],"URL":"https:\/\/doi.org\/10.3390\/e18110404","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,15]]}}}