{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:04:00Z","timestamp":1762956240634,"version":"build-2065373602"},"reference-count":51,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,12,25]],"date-time":"2019-12-25T00:00:00Z","timestamp":1577232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The standard manufacturing organizations follow certain rules. The highest ubiquitous organizing principles in infrastructure design are modular idea and symmetry, both of which are of the utmost importance. Symmetry is a substantial principle in the manufacturing industry. Symmetrical procedures act as the structural apparatus for manufacturing design. The rapid growth of population needs outstrip infrastructure such as roads, bridges, railway lines, commercial, residential buildings, etc. Numerous underground facilities are also installed to fulfill different requirements of the people. In these facilities one of the most important facility is water supply pipelines. Therefore, it is essential to regularly analyze the water supply pipelines\u2019 risk index in order to escape from economic and human losses. In this paper, we proposed a simplified hierarchical fuzzy logic (SHFL) model to reduce the set of rules. To this end, we have considered four essential factors of water supply pipelines as input to the proposed SHFL model that are: leakage, depth, length and age. Different numbers of membership functions are defined for each factor according to its distribution. The proposed SHFL model takes only 95 rules as compared to the traditional mamdani fuzzy logic method that requires 1225 rules. It is very hard and time consuming for experts to design 1225 rules accurately and precisely. Further, we proposed a Do-it-Yourself (DIY) system for the proposed SHFL method. The purpose of the DIY system is that one can design the FIS model according to his or her need.<\/jats:p>","DOI":"10.3390\/sym12010044","type":"journal-article","created":{"date-parts":[[2019,12,25]],"date-time":"2019-12-25T11:07:48Z","timestamp":1577272068000},"page":"44","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Water Supply Pipeline Risk Analysis Methodology Based on DIY and Hierarchical Fuzzy Inference"],"prefix":"10.3390","volume":"12","author":[{"given":"Muhammad","family":"Fayaz","sequence":"first","affiliation":[{"name":"School of Arts and Sciences, University of Central Asia, Naryn 722918, Kyrgyzstan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Quoc Bao","family":"Pham","sequence":"additional","affiliation":[{"name":"Department of Hydraulic and Ocean Engineering, National Cheng-Kung University, Tainan 701, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nguyen Thi Thuy","family":"Linh","sequence":"additional","affiliation":[{"name":"Department of Hydraulic and Ocean Engineering, National Cheng-Kung University, Tainan 701, Taiwan"},{"name":"Faculty of Water Resource Engineering, Thuyloi University, Hanoi 100000, Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pham Thi Thao","family":"Nhi","sequence":"additional","affiliation":[{"name":"Institute of Research and Development, Duy Tan University, Danang 550000, Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dao Nguyen","family":"Khoi","sequence":"additional","affiliation":[{"name":"Faculty of Environment, University of Science, Vietnam National University Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad Shuaib","family":"Qureshi","sequence":"additional","affiliation":[{"name":"School of Arts and Sciences, University of Central Asia, Naryn 722918, Kyrgyzstan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8420-0119","authenticated-orcid":false,"given":"Abdul Salam","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Kuala Lumpur (UniKl-MIIT), Kuala Lumpur 50250, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shah","family":"Khalid","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; IT, University of Malakand, Chakdara 18800, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,25]]},"reference":[{"key":"ref_1","unstructured":"Kiefner, J.F., and Rosenfeld, M.J. (2012). The Role of Pipeline Age in Pipeline Safety, INGAA Foundation, INC."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1007\/s11269-010-9679-8","article-title":"Water network assessment and reliability analysis by use of survival analysis","volume":"25","author":"Christodoulou","year":"2011","journal-title":"Water Resour. Manag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.ssci.2015.11.018","article-title":"A decision aid gis-based risk assessment and vulnerability analysis approach for transportation and pipeline networks","volume":"84","author":"Inanloo","year":"2016","journal-title":"Saf. Sci."},{"key":"ref_4","unstructured":"Christodoulou, S., Aslani, P., and Deligianni, A. (2006, January 14\u201316). Integrated Gis-Based Management of Water Distribution Networks. Proceedings of the International Conference on Computing and Decision Making in Civil and Building Engineering, Montreal, QC, Canada."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1016\/j.corsci.2009.05.019","article-title":"Probability distribution of pitting corrosion depth and rate in underground pipelines: A monte carlo study","volume":"51","author":"Caleyo","year":"2009","journal-title":"Corros. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Tang, X., Liu, Y., Zheng, L., Ma, C., and Wang, H. (2009, January 4\u20135). Leak Detection of Water Pipeline Using Wavelet Transform Method. Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, Wuhan, China.","DOI":"10.1109\/ESIAT.2009.57"},{"key":"ref_7","unstructured":"Kleiner, Y., and Rajani, B. (2000, January 12\u201315). Considering Time-Dependent Factors in the Statistical Prediction of Water Main Breaks. Proceedings of the American Water Works Association Infrastructure Conference, Baltimore, MD, USA."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1061\/(ASCE)1076-0342(2002)8:4(122)","article-title":"Forecasting variations and trends in water-main breaks","volume":"8","author":"Kleiner","year":"2002","journal-title":"J. Infrastruct. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Inf. Control"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/S0165-0114(02)00517-1","article-title":"Modeling of hierarchical fuzzy systems","volume":"138","author":"Lee","year":"2003","journal-title":"Fuzzy Sets Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Fayaz, M., Ullah, I., Park, D.-H., Kim, K., and Kim, D. (2017). An integrated risk index model based on hierarchical fuzzy logic for underground risk assessment. Appl. Sci., 7.","DOI":"10.3390\/app7101037"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Fayaz, M., Ahmad, S., Ullah, I., and Kim, D. (2018). A blended risk index modeling and visualization based on hierarchical fuzzy logic for water supply pipelines assessment and management. Processes, 6.","DOI":"10.3390\/pr6050061"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4471","DOI":"10.1007\/s00500-018-3111-3","article-title":"A simplified implementation of hierarchical fuzzy systems","volume":"23","author":"Chang","year":"2019","journal-title":"Soft Comput."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Roelands, M., Claeys, L., Godon, M., Geerts, M., Feki, M.A., and Trappeniers, L. (2011). Enabling the masses to become creative in smart spaces. Architecting the Internet of Things, Springer.","DOI":"10.1007\/978-3-642-19157-2_3"},{"key":"ref_15","unstructured":"Coetzee, L., and Eksteen, J. (2011, January 11\u201313). Internet of things\u2014Promise for the Future? An Introduction. Proceedings of the IST Africa 2011 Conference & Exhibition, Gaborone, Botswana."},{"key":"ref_16","first-page":"542319","article-title":"DIY interface for enhanced service customization of remote IoT devices: A coap based prototype","volume":"11","author":"Khan","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_17","unstructured":"Hamm, S. (2019, November 11). The Internet of Things. Available online: https:\/\/www.ibm.com\/ibm\/history\/ibm100\/us\/en\/ideas\/sep2011china.html."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_20","unstructured":"LeHong, H., and Fenn, J. (2019, October 23). Hype cycle for emerging technologies 2011. Available online: https:\/\/www.gartner.com\/en\/documents\/1754719\/hype-cycle-for-emerging-technologies-2011."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of things: Vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_22","unstructured":"Herv\u00e1s, R., Lee, S., Nugent, C., and Bravo, J. (2014). Ariima: A real IoT implementation of a machine-learning architecture for reducing energy consumption. Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, Springer International Publishing."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3846","DOI":"10.1109\/JSEN.2013.2263379","article-title":"Towards the implementation of IoT for environmental condition monitoring in homes","volume":"13","author":"Kelly","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/j.comcom.2011.11.003","article-title":"Combining heterogeneous service technologies for building an internet of things middleware","volume":"35","author":"Gama","year":"2012","journal-title":"Comput. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/MCOM.2014.6710070","article-title":"From \u201csmart objects\u201d to \u201csocial objects\u201d: The next evolutionary step of the internet of things","volume":"52","author":"Atzori","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1109\/TII.2014.2306772","article-title":"User interoperability with heterogeneous IoT devices through transformation","volume":"10","author":"Xiao","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_27","unstructured":"(2019, November 11). What Is Raspberry Pi. Available online: https:\/\/www.raspberrypi.org\/help\/what-is-a-raspberry-pi\/."},{"key":"ref_28","first-page":"1","article-title":"The making of Arduino","volume":"26","author":"Kushner","year":"2011","journal-title":"IEEE Spectr."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Li, D., and Yao, W. (2016, January 13\u201315). Risk Assessment of Long-Distance Water Transmission Pipeline Based on Fuzzy Similarity Evaluation Approach. Proceedings of the 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), Changsha, China.","DOI":"10.1109\/FSKD.2016.7603331"},{"key":"ref_30","first-page":"157","article-title":"Risk assessment in underground coalmines using fuzzy logic in the presence of uncertainty","volume":"99","author":"Tripathy","year":"2018","journal-title":"J. Inst. Eng. (India): Ser. D"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.ijpe.2005.03.009","article-title":"A fuzzy approach for supplier evaluation and selection in supply chain management","volume":"102","author":"Chen","year":"2006","journal-title":"Int. J. Prod. Econ."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jlp.2015.11.023","article-title":"A fuzzy multi criteria risk assessment based on decision matrix technique: A case study for aluminum industry","volume":"40","author":"Gul","year":"2016","journal-title":"J. Loss Prev. Process Ind."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1016\/j.proeng.2014.02.194","article-title":"A case study on risk assessment of long distance water supply system","volume":"70","author":"Zhang","year":"2014","journal-title":"Procedia Eng."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ullah, I., Fayaz, M., and Kim, D. (2018). Analytical modeling for underground risk assessment in smart cities. Appl. Sci., 8.","DOI":"10.3390\/app8060921"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Fayaz, M., Ullah, I., and Kim, D.-H. (2018). Underground risk index assessment and prediction using a simplified hierarchical fuzzy logic model and Kalman filter. Processes, 6.","DOI":"10.3390\/pr6080103"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.asoc.2006.12.001","article-title":"Designing a hierarchical fuzzy logic controller using the differential evolution approach","volume":"7","author":"Cheong","year":"2007","journal-title":"Appl. Soft Comput."},{"key":"ref_37","unstructured":"Leadbeater, C., and Miller, P. (2004). The Pro-Am Revolution: How Enthusiasts are Changing Our Society and Economy, Demos."},{"key":"ref_38","unstructured":"Roeck, D.D., Slegers, K., Criel, J., Godon, M., Claeys, L., Kilpi, K., and Jacobs, A. (2012, January 14\u201317). I would Diyse for It!: A Manifesto for Do-It-Yourself Internet-of-Things Creation. Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense through Design, Copenhagen, Denmark."},{"key":"ref_39","unstructured":"Jin, Z., and Bose, B.K. (2002, January 5\u20138). Evaluation of Membership Functions for Fuzzy Logic Controlled Induction Motor Drive. Proceedings of the IEEE 2002 28th Annual Conference of the Industrial Electronics Society, IECON 02, Sevilla, Spain."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MC.2013.63","article-title":"The internet of things: The next technological revolution","volume":"46","author":"Feki","year":"2013","journal-title":"Computer"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Scott, G., and Chin, J. (2013, January 17\u201318). A DIY Approach to Pervasive Computing for the Internet of Things: A Smart Alarm Clock. Proceedings of the 5th Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK.","DOI":"10.1109\/CEEC.2013.6659445"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Hang, L., and Kim, D. (2018). Design and implementation of cloud-centric configuration repository for DIY IoT applications. Sensors, 18.","DOI":"10.3390\/s18020474"},{"key":"ref_43","unstructured":"Heath, N. (2019, November 12). How IBM\u2019s Node-Red is Hacking Together the Internet of Things. Available online: http:\/\/www. techrepublic.com\/article\/node-red."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Kleinfeld, R., Steglich, S., Radziwonowicz, L., and Doukas, C. (2014, January 8). Glue.Things: A Mashup Platform for Wiring the Internet of Things with the Internet of Services. Proceedings of the 5th International Workshop on Web of Things, Cambridge, MA, USA.","DOI":"10.1145\/2684432.2684436"},{"key":"ref_45","unstructured":"Quoc, H.N.M., Serrano, M., Le-Phuoc, D., and Hauswirth, M. (2012, January 11\u201315). Super Stream Collider\u2013Linked Stream Mashups for Everyone. Proceedings of the Semantic Web Challenge at ISWC 2012, Boston, MA, USA."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Hyemin, L., Dongig, S., Eunsoo, P., Injung, H., Gyeonghwan, H., and Dongkun, S. (2017, January 8\u201310). Open Software Platform for Companion IoT Devices. Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2017.7889367"},{"key":"ref_47","unstructured":"PTC (2019, October 23). Enterprise IoT Solutions and Platform Technology. Available online: https:\/\/www.ptc.com\/en\/products\/iiot\/thingworx-platform."},{"key":"ref_48","unstructured":"Particle (2018, January 23). Connect Your Internet of Things (IoT) Devices. Available online: https:\/\/www.particle.io\/."},{"key":"ref_49","unstructured":"Klir, G.J., and Yuan, B. (1995). Fuzzy Sets and Fuzzy Logic: Theory and Applications, Prentice Hall."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Fayaz, M., Ullah, I., and Kim, D. (2019). An optimized fuzzy logic control model based on a strategy for the learning of membership functions in an indoor environment. Electronics, 8.","DOI":"10.3390\/electronics8020132"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Fayaz, M., and Kim, D. (2018). A prediction methodology of energy consumption based on deep extreme learning machine and comparative analysis in residential buildings. Electronics, 7.","DOI":"10.3390\/electronics7100222"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/1\/44\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:45:29Z","timestamp":1760190329000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/1\/44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,25]]},"references-count":51,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["sym12010044"],"URL":"https:\/\/doi.org\/10.3390\/sym12010044","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2019,12,25]]}}}