Mathematical model of risk assessment of the operation of critical infrastructure objects based on the theory of fuzzy logic
Abstract
Purpose: development of a mathematical model for assessing the risks of the operation of critical infrastructure objects based on the theory of fuzzy logic
Method: theory of probability, fuzzy logic theory, center of gravity method, modeling.
Findings: a mathematical model was developed for assessing the risks of the operation of critical infrastructure objects based on fuzzy logic theory. Its adequacy is verified on a practical example of calculating fuzzy and uncertain data.
Theoretical implications: the process of assessing risks as a result of enemy strikes has become more adaptive and accurate for further research.
Downloads
References
Amini, A., Jamil, N., Ahmad, A.R. & Sulaiman, H. (2017). A Fuzzy Logic Based Risk Assessment Approach for Evaluating and Prioritizing Risks in Cloud Computing Environment. Recent Trends in Information and Communication Technology Lecture Notes on Data Engineering and Communications Technologies, 650-659. https://doi.org/10.1007/978-3-319-59427-9_67 [Accessed date 1.10.2024].
Wang, Y.M., & Elhag, T.M.S. (2006). Fuzzy TOPSIS method based on alpha level sets with an application to bridge risk assessment. Expert Systems with Applications, 31(2), 309-319. https://doi.org/10.1016/j.eswa.2005.09.040 [Accessed date 1.10.2024].
Haimes, Y.Y. (2004). Risk modeling, assessment, and management. – John Wiley & Sons. URL: https://onlinelibrary.wiley.com/doi/book/10.1002/0471723908 [Accessed date 1.10.2024].
Fadyeyeva, I., & Gryniuk, O. (2017). Fuzzy modelling in risk assessment of oil and gas production enterprises’ activity. Baltic Journal of Economic Studies, 3 (4), 256–264. https://doi.org/10.30525/2256-0742/2017-3-4-256-264 [Accessed date 1.10.2024].
Murasov, R., Nikitin, A., Meshcheriakov, I., Pidhorodetskyi, M., & Poplavets, S. (2024). Improvement of the scientific and methodological apparatus for calculating the risks of occurrence and analyzing scenarios of emergency situations at critical infrastructure facilities. Social Development and Security, 14(1), 205-217. https://doi.org/10.33445/sds.2024.14.1.17 [Accessed date 1.10.2024].
Murasov, R., Nikitin, A., Meshcheriakov, I., Pidhorodetskyi, M., & Poplavets, S. (2024). Methodology for assessing threats and risks for critical infrastructure objects under emergency development scenarios. Modern Information Technologies in the Sphere of Security and Defence, 3(48), 35-43. https://doi.org/10.33099/2311-7249/2023-48-3-35-43 [Accessed date 1.10.2024].
Murasov, R., & Meshcheriakov, I. (2023). The information and technical method of preventing emergency situations of a terrorist nature by assessing the possibility of gradual growth of destructive events caused by the cascading consequences of the primary terrorist impact. Social Development and Security, 13(5), 180-191. https://doi.org/10.33445/sds.2023.13.5.17 [Accessed date 1.10.2024].
Fursenko, O.M., Chumachenko, S.M., & Karmazyn, S.V. (2015). Expert assessment of threats to objects of critical infrastructure of the gas transportation system of Ukraine using the method of analysis of hierarchies. Technogenic and ecological safety and civil protection, 9, 68-77. Available from: http://tes.igns.gov.ua/wp-content/uploads/2018/02/V9.pdf [Accessed date 1.10.2024].
Wolbers J., Groenewegen P., Mollee J., & Bím J. (2013). Incorporating Time Dynamics in the Analysis of Social Networks in Emergency Management. Journal of Homeland Security and Emergency Management, 10(2), 555-585. https://doi.org/10.1515/jhsem-2013-0019 [Accessed date 1.10.2024].
Yaremenko, O., & Strahnitskyi, Y. (2022). Detection and Management of Threats in the Structure of State Policy for Critical Infrastructure Protection. University Scientific Notes, 3 (87), 73-82. https://doi.org/10.37491/UNZ.87.6 [Accessed date 1.10.2024].
Ruban, I., Khudov, H., Makoveichuk, O., Khizhnyak, I., Khudov, V., Podlipaiev, V., Shumeiko, V., Atrasevych, O., Nikitin, A., & Khudov, R. (2019). Segmentation of opticalelectronic images from on-board systems of remote sensing of the earth by the artificial bee colony method. Eastern-European Journal of Enterprise Technologies, 2 (9-98), 37-45. https://doi: 10.15587/1729-4061.2019.161860 [Accessed date 1.10.2024].
Trysnyuk, V., Trysnyuk, T., Nikitin, A., Kurylo, A., & Demydenko, O. (2021). Geomodels of space monitoring of water bodies. E3S Web of Conferences, 280, art. no. 09016. https://doi: 10.1051/e3sconf/202128009016 [Accessed date 1.10.2024].
Abstract views: 116 PDF Downloads: 76
Copyright (c) 2024 Rustam Murasov, Anatolii Nikitin, Ivan Meshcheriakov

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).