A knowledge graph for the vulnerability of construction safety system in megaprojects based on accident inversion

被引:0
|
作者
Yang, Yingliu [1 ]
Xiang, Pengcheng [1 ]
机构
[1] Chongqing Univ, Sch Management Sci & Real Estate, Chongqing 400045, Peoples R China
关键词
Text mining; Association rules; Complex network; Knowledge graph; Construction safety systems in megaprojects; Vulnerability;
D O I
10.1016/j.engappai.2025.110630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing vulnerability of construction safety systems in megaprojects (CSSMs) poses significant challenges to their safety management and control. To address this obstacle, this study retrodicts the accidents based on text mining using the Bidirectional Encoder Repre-sentations from Transformers Topic (BER-Topic) model to uncover topic and topic words related to the vulnerabilities of CSSMs. The vulnerability indicator system (VIS) is established by considering the exposure, sensitivity, and adaptability of the vulnerability of CSSMs. Subsequently, an improved Decision-making Trial and Evaluation Laboratory (DEMATEL) method based on association rules is proposed to reduce the subjectivity in assigning weights to vulnerability indicators, and a topological network based on complex network is constructed to identify the characteristics of VIS. Based on this, a knowledge graph of vulnerabilities in CSSMs is developed. Finally, taking into account the occurrence probability and the actual losses incurred of vulnerability indicators, a vulnerability assessment model for CSSMs is proposed. The research findings are: 1) Based on the BER-Topic model, 32 topics and topic words related to the vulnerability of CSSMs are mined. 2) A VIS for CSSMs is constructed, including 42 indicators across three dimensions of exposure (19), sensitivity (14), and adaptability (9), involving four aspects: humans, machines, environment, and management. 3) The key points for vulnerability management and control in CSSMs are Inaccurate implementation of geological remediation plans, Rusting of connecting components, and Unlicensed personnel operating, among others, which have strong intermediary roles.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Construction of Knowledge Graph in Storage Domain Based on Knowledge Context
    Qiu, Xiaoping
    Chen, Jiong
    Computer Engineering and Applications, 2023, 59 (14) : 94 - 106
  • [22] Construction of Earth Observation Knowledge Hub Based on Knowledge Graph
    Cai, Kuangsheng
    Chen, Zugang
    Li, Jin
    Wang, Shaohua
    Li, Guoqing
    Li, Jing
    Guo, Hengliang
    Chen, Feng
    Zhu, Liping
    TRANSACTIONS IN GIS, 2024, 28 (07) : 2445 - 2462
  • [23] Construction of recipe knowledge graph based on user knowledge demands
    Cui, Jingfeng
    Zhang, Xiuchen
    Zheng, Dejun
    JOURNAL OF INFORMATION SCIENCE, 2023,
  • [24] Developing an Integrated Construction Safety Management System for Accident Prevention
    Yoon, Sihoo
    Chang, Taeyoun
    Chi, Seokho
    JOURNAL OF MANAGEMENT IN ENGINEERING, 2024, 40 (06)
  • [25] The Brittle System Analysis of the Construction Accident and Its Safety Management
    Zhang, Shoujian
    Qiao, Tuan
    Sun, Zhi
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2012, : 59 - 63
  • [26] A Method to Construct Vulnerability Knowledge Graph based on Heterogeneous Data
    Sun, Yizhen
    Lin, Dandan
    Song, Hong
    Yan, Minjia
    Cao, Linjing
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 740 - 745
  • [27] Research on Automatic Vulnerability Mining Model Based on Knowledge Graph
    Chen, Ze
    Zuo, Xiaojun
    Hou, Botao
    Dong, Na
    Chang, Jie
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2020, 29 (7-8)
  • [28] Construction safety predictions with multi-head attention graph and sparse accident networks
    Mostofi, Fatemeh
    Togan, Vedat
    AUTOMATION IN CONSTRUCTION, 2023, 156
  • [29] Construction of Event Graph for Ship Collision Accident Analysis to Improve Maritime Traffic Safety
    Ma, Jun
    Wang, Yang
    Wang, Liguang
    Xu, Luhui
    Zhao, Jiong
    COMPLEXITY, 2024, 2024
  • [30] Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge Graph Vulnerability Analysis and Reinforcement Verification Mechanism of Network Routing Mechanism based on Knowledge Graph
    Zhang, Yu
    Zhuang, Yi
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 39 - 43