<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A STUDY OF FUZZY METHODOLOGY OF TUNNEL BORING MACHINE IN THE PROJECT OF LUCKNOW METRO RAIL CORPORATION</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ubaid Asif Farooqui</string-name>
          <email>uasif2u@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Umar Khalid Farooqui</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>C.M. Tiwari</string-name>
          <email>cmtiwari.12@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mohammad Husain</string-name>
          <email>mohd.husain90@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Amity University Lucknow Campus</institution>
          ,
          <addr-line>Lucknow</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Maharishi University of Information Technology</institution>
          ,
          <addr-line>Lucknow</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Madinah</institution>
          ,
          <addr-line>Al Madinah Al Munawarah</addr-line>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This work is about study on the fuzzy operation methodology of tunnel boring machines and finding the optimum solution for the best approach of tunneling. Adaptive network-based fuzzy inference system used in a mathematical model of TBM, neural networking with fuzzy logic and the fuzzy cmeans clustering technique is used for soft soil and hard rock condition both with regression model developed by latest MATLAB technique to reduce error. UCS, BI, DPW, and Alpha degree constitute four geological technical variables that are utilized to develop regression equations for Rate of Penetration (ROP) to prevent unnecessary effort and save time and money in project.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;TBM</kwd>
        <kwd>ANFIS</kwd>
        <kwd>NN</kwd>
        <kwd>CLUSTERING METHOD</kwd>
        <kwd>FUZZY LOGIC</kwd>
        <kwd>UCS</kwd>
        <kwd>BI</kwd>
        <kwd>DPW and ROP</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>LUCKNOW METRO RAIL CORPORATION was faced with the challenge of connecting the metro
through densely populated city areas. Some citizens opposed trains crossing bridges close to
their homes, and for security reasons, some government institutions refused to allow trains to
pass close to sensitive locations like the secretariat.</p>
      <p>LMRC had the option to build an underground segment utilizing the existing technology of
tunneling because it was decided to make a particular piece of the Lucknow Metro
subterranean.</p>
      <sec id="sec-1-1">
        <title>1. Through Tunnel Boring Machine</title>
        <p>2. Using Cut and Cover Method
3. NATM (New Austrian Tunneling Method)
The TBM method was an obvious choice for the majority of subterranean tunnels because to its
efficacy and track record in metro areas of other cities. The nearby Underground stations for the
UP line and DOWN line are connected by twin separate Bored tunnels.
Currently, engineers must navigate a metro line through an underground tube while the city is
home to some extremely historic structures.</p>
        <p>The use of TUNNEL BORING MACHINE (TBM) was a smart move, however operating TBM is a
challenging chore. For this task to be monitored, data must be collected, analyzed, predicted,
and controlled. Estimating the tunnel-boring equipment's (TBM) efficiency of penetration is one
of the difficult jobs that must be completed in order to bore a tunnel. The hazards associated
with the high capital costs typical of boring operations may be decreased by estimating the
machine penetration rate. The key to successful tunnel boring is the ability to predict the tunnel
boring machine's effectiveness. Among the essential metrics utilized for performance prediction
of these machines, The precise energy consumption of wheel cutters, which is the volume of
power needed to obtain a unit volume of stone and soil.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. LITRATURE SURVEY</title>
      <p>Neuro-fuzzy techniques were utilized by Grima and Bruines to model TBM performance. To
predict the TBM performance, Benardos and Kaliampakos used artificial neural networks. A
neural network-based approach for predicting TBM performance was introduced by Zhao and
Gong. Acaroglu and Ozdemir developed a fuzzy logic model to forecast the precise amount of
energy needed to anticipate TBM performance. In a subsequent attempt, Yagiz proposed two
nonlinear prediction tools for the estimate of TBM performance artificial neural networks and
nonlinear multiple regression. Two key components of the TBM performance, including the
penetration rate and utilization factor, were examined by Torabi and Shirazi using A
computational social arts analytical program and a synthetic neural network. Yagiz and Karahan
used the particle swarm optimization (PSO) method to predict the rate of hard-rock TBM
breakthrough.</p>
      <p>The performance of TBMs can be anticipated using an adaptive neuroscience fuzzy inference
system built around Fuzzy C-Means Grouping Methodology (ANFIS-FCM), a unique data analysis
technique. In this model, the rate of penetration served as the output parameter, As input
variables, the intact rock brittleness (BI), alpha angle, planes of weakness, and uniaxial in nature
compressible strength (UCS) were all utilized. The ANFIS-estimating FCM's capabilities are
demonstrated using field data from open-access publications. Yet, as the primary function of
cutters is to shatter rock, significant advances in cutter design and metallurgy have been made.
Disc cutters, which are frequently used by TBMs and may cut an assortment of sandstone
different types with various qualities. Hard rock TBMs have utilized single disc cutters with
replacement disc rings for a long time because they have shown themselves to be effective and
dependable. When tip wear developed, the V-shape (V-profile) of early disc cutters produced a
sharp decline in efficiency. Constant cross-section (CCS) profiles began to take the place of
Vshape ring profiles in the late 1970s in order to preserve cutting efficiency after the tip wore
out. Mini disc cutters, often used after 30 cm (12 in.) in diameter, are disc cutters with a
diameter of between 49 cm (19 in.) and 8 cm (3 in.). The maximum cutting forces that discs can
withstand depend on the cutters' bearing capabilities, which decrease as disc diameter
increases. Little discs, however, penetrate more deeply than larger discs when applied with the
same force (Friant and Ozdemir, 1994).</p>
      <p>A project's schedule and cost are significantly impacted by the ability to produce precise
performance estimations when applying TBM technology. Several case studies demonstrate
how performance estimate errors can lead to project delays and expense overruns. The
penetration and progress rates as well as machine utilization serve as key performance
indicators for TBMs. One of the main functions of a disc cutter is to cut rock, and particular
efficiency, which is the amount of power needed by wheel cutters to do something, is used to
Identify the performance parameters for the machine. With a lower SE, the same amount of
material can be produced while excavating the rock much more effectively and with comparably
less expensive equipment. One of the reliable artificial intelligence methods, It has been shown
that the fuzzy c-means grouping algorithm based adaptive neuro fuzzy inference system
(ANFIS-FCM) is very good at identifying associations with input and output features.</p>
    </sec>
    <sec id="sec-3">
      <title>3. METHODOLOGY</title>
      <p>3.1</p>
      <sec id="sec-3-1">
        <title>Adaptive network-based fuzzy inference system used in a mathematical model of TBM:</title>
        <p>Without using exact quantitative analysis, the qualitative components of human understanding
and logic can be replicated by a fuzzy inference system. Information-processing software called
neural networks (NNs) is modeled after research, observation and analysis on functions of the
animal and human brain. A collection of interrelated components of processing that resemble
neurons make up NN. The instruction process provides a set of input data into the NNs and
verifies the desired output. It has been demonstrated that combining NNs with fuzzy logic (FL)
can reasonably simulate the psychological procedure for making decisions for skilled. Typical
NNs merely evolve the development process' values for weighting, therefore a neuro-fuzzy
decision-making system combines the learning capabilities of NNs with the FL's inference
process. A network structure made up of multiple nodes connected by directional links is an
adaptable neural network. Each node is defined by a node function that can have either fixed or
variable arguments. As soon as the fuzzy inference system (FIS) is in place, NN approaches can
be used to discover the rules' underlying assumptions and resulting parameters, which are
unknown, while lowering the error measure typically defined for each system variable. The
system is referred to as adaptive because of this optimization process. Five levels make up the
ANFIS architecture, and the model is briefly described below.</p>
        <p>
          Level 1: The membership grades of a linguistic label are generated by each node R in this layer.
For example, the   ℎ node's node feature could be:
  1 =   (P) =
1 +[( −  )2] 
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
here P is the each node's data, Ar is the linguistic term (listed in ascending order) attached to it,
and   , Kr , dr is the parameter set that alters the MF's forms . The "Premises factors" are the
name given to the variables in this level.
        </p>
        <p>
          Level 2: The "firing intensity" of every rule in this level is determined by compounding at each
node:
  2 =   =   (P).  (Q)
r = 1,2
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
Level 3: The  ℎ component of this level defines the proportion of the  ℎ rule's blazing
strength to the sum of all rules' blazing strengths:
  3 = ̅̅̅ =
        </p>
        <p>
          ∑2=1  
r = 1,2
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
        </p>
        <p>This level of output will be referred to as "normalized firing" strengths for simplicity.
Level 4: All nodes r at this level are nodes functions:
parameters at this level.</p>
        <p>
          4 = ̅̅̅   = ̅̅̅ (  

+   
+   )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
Where, ̅̅̅ is level 3's output. The term "consequent parameters" will be used to describe the
Level 5: The "comprehensive outcome" of this level is calculated by a single circular component
with the label "R," which adds together all of the signals coming in.
        </p>
        <p>
          5 = Comprehensive Outcome = ∑ ̅̅̅   = ∑    
∑  
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
        </p>
        <p>In this work, the antecedent MFs are also identified using FCM.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>The procedure of fuzzy c-means grouping</title>
        <p>The FCM is a Bezdek-invented data grouping technique where each data point is a member of a
group to the extent specified by the classification of membership of a cluster. FCM is used to
distribute a set of n vector   , where r = 1, 2,..., n, into C fuzzy groups.. In each group, a clump
center is found that minimizes the cost function of the dissimilarity measure. Thus, a quick
description of the FCM algorithm's steps follows. The cluster's initial nodes are   , r = 1, 2,..., C.
From the n points,  1 is randomly selected, followed by  2 and so on until  n . The following
equation is then used to build the composition of the matrix U:
 
=</p>
        <p>∑ =1( 
  )
1</p>
        <p>2⁄ −1
The formula provides the Euclidian distance that separates the  ℎ group and the 
ℎ value
is given by the formula</p>
        <p>= ‖  −   ‖ and w is the fuzziness index. The cost function is then
calculated using the equation shown below. If it falls below a specific threshold, the process is
stopped.</p>
        <p>L(U, 1,……. 2) = ∑
 =1   = ∑</p>
        <p>
          =1. ∑ =1  
 2
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
A fresh c fuzzy group with r = 1,2 focuses on  in the final step. To figure out C, apply the
equation below.
        </p>
        <p>= ∑ =1</p>
        <p>
          ∑ =1  
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3 Using the most recent version of MATLAB, 4 Regression Models for ROP are concluded:</title>
        <p>
          Technically, because their empirical correlation coefficients to ROP are more than 0.6, qualities
of boulders demonstrate the most precise factors for forecasting the ROP will be the UCS and
the BI. The DPW and alpha angle are also important measures to assess ROP because they have
correlation factors to ROP that are higher than 0.5. As a result, the following part will develop
regression models for ROP using four (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) rock technical attributes, UCS, BI, DPW, and Alpha.
        </p>
        <sec id="sec-3-3-1">
          <title>Model 1: Linear regression model (LRM)</title>
        </sec>
        <sec id="sec-3-3-2">
          <title>Model 1: Linear regression model (LRM)</title>
          <p>
            ROP (i) =  0(
            <xref ref-type="bibr" rid="ref1">1</xref>
            ) + 1(
            <xref ref-type="bibr" rid="ref1">1</xref>
            ) ·UCS+  2(
            <xref ref-type="bibr" rid="ref1">1</xref>
            )·BI+  3(
            <xref ref-type="bibr" rid="ref1">1</xref>
            )·DPW +  4(
            <xref ref-type="bibr" rid="ref1">1</xref>
            )·Alpha
          </p>
        </sec>
        <sec id="sec-3-3-3">
          <title>Model 2: Linear regression model with log(Alpha)</title>
          <p>
            ROP (ii) =  0(
            <xref ref-type="bibr" rid="ref2">2</xref>
            ) + 1(
            <xref ref-type="bibr" rid="ref2">2</xref>
            ) ·UCS+  2(
            <xref ref-type="bibr" rid="ref2">2</xref>
            )·BI+  3(
            <xref ref-type="bibr" rid="ref2">2</xref>
            )·DPW +  4(
            <xref ref-type="bibr" rid="ref2">2</xref>
            )·log(Alpha)
Model 3 : Nonlinear regression model with exponential Alpha (NLRM1)
          </p>
          <p>
            ROP (iii) =  0(
            <xref ref-type="bibr" rid="ref3">3</xref>
            ) + 1(
            <xref ref-type="bibr" rid="ref3">3</xref>
            ) ·UCS+  2(
            <xref ref-type="bibr" rid="ref3">3</xref>
            )·BI+  3(
            <xref ref-type="bibr" rid="ref3">3</xref>
            )·DPW +  4(
            <xref ref-type="bibr" rid="ref3">3</xref>
            )·(Alpha) 5(
            <xref ref-type="bibr" rid="ref3">3</xref>
            )
Model 4: Nonlinear regression model with both exponential DPW &amp; Alpha (NLRM2)
          </p>
          <p>
            ROP (iv) =  0(
            <xref ref-type="bibr" rid="ref4">4</xref>
            ) + 1(
            <xref ref-type="bibr" rid="ref4">4</xref>
            ) ·UCS+  2(
            <xref ref-type="bibr" rid="ref4">4</xref>
            )·BI+  3(
            <xref ref-type="bibr" rid="ref4">4</xref>
            )· DPW 4(
            <xref ref-type="bibr" rid="ref4">4</xref>
            ) +  5(
            <xref ref-type="bibr" rid="ref4">4</xref>
            )·(Alpha) 6(
            <xref ref-type="bibr" rid="ref4">4</xref>
            )
3.4
          </p>
        </sec>
      </sec>
      <sec id="sec-3-4">
        <title>Methodology for Data Processing</title>
        <p>To increase the effectiveness of networks in recognizing the links between inputs and outputs,
inputs and output data should be normalized prior to the training process. Moreover, scaling the
data to reduce the biassing of the networks and improving prediction accuracy are both greatly
aided by normalization. The time-consuming nature of training can be cut down through data
normalization. Modeling applications with input data of various scales can greatly benefit from
it. Many normalization</p>
        <p>methods, such as Z-Score normalization, Min-Max normalization,
sigmoid normalization, statistical column normalization, etc, are commonly used to scale up the
data, Nonetheless the Min-Max normalization method was employed for the purposes of this
study. This was made possible by Min-Max normalization's ability to preserve each feature's
variation following normalization. Moreover, this normalization technique can maintain all of
the data's relationships. Below is how the Min-Max normalization equation is expressed:

 =</p>
        <p>
          − 
 
− 
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
dataset's highest (lowest) possible raw input values.
where Y is the dataset's original value,   is the mapped value, and  
( 
) stands for the
Mean square error (MSE) and coefficient of determination (R2) are two more established
metrics used to evaluate the effectiveness of the networks in addition to normalization. The
following equation is used to compute MSE:
        </p>
        <p>MSE =
1</p>
        <p>
          ∑

 =1(ℎ − ℎ̂ )
2
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
where ℎ

and ℎ̂
        </p>
        <p>are the real and anticipated standard of the qth observation, accordingly,
and t is the quantity of samples utilized to train or test the network. It is common practice to
demonstrate the difference between measured and estimated network values using the MSE
criterion. You can also compute R2, or the coefficient of determination, as follows:
 2 = 1−
∑ =1(ℎ −ℎ̂ )2</p>
        <p>
          ∑ =1 ℎ2 −(∑ =1ℎ̂2⁄ )2

(
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
R2 is frequently used to illustrate the model's initial level of uncertainty. The ideal network
model, which is highly improbable to be created, has MSE=0 and R2 =1.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <p>A specialist who is familiar with the system that needs to be simulated specifies the number of
rules in a regular fuzzy inference system. However, no expert is available in the ANFIS
simulation; as a result, the total number of member functions (MFs) provided for every input
parameter is chosen intuitively, i.e., by charting the data sets and visually inspecting them, or
just by trial and error.
Using the MATLAB environment, the ANFIS-FCM model was used to this study's prediction
model to calculate the TBM penetration rate from the available data. In order to estimate TBM
performance, the ANFIS-FCM model's fuzzy architecture is depicted in Fig 4. The current study
used a dataset with 153 data points, 122 of which (or 80%) were used to build the model while
the other 31 data points were used to assess the model's performance. Table 1 provides more
information on the parameters of the ANFIS-FCM model.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and Discussion</title>
      <p>The forecast and evaluation of its utilization factor are two of the most crucial elements
influencing how well TBM performs. In actuality, TBM tunneling projects are more productive
when the utilization factor is accurately identified and calculated. Since the goal of the current
study is to anticipate the utilization approach in sandy soil tunneling (metropolitan
environment), correct locating and calculating the utilization proportion helps to avoid
potential machine damage as well as excessive project costs and time. However, there are
always unknown and unforeseen events in underground operations, requiring the use of smart
data analysis techniques.</p>
      <p>In this study, the hard rock TBM penetration rate was estimated using the ANFIS-FCM method.
The UCS, BI, DPW, and alpha angle of intact and bulk rocks, among others, have been discovered
to significantly affect TBM penetration. Consequently, the model was created using relevant
properties. It can be concluded that ANFIS-FCM is a dependable method of system modeling
that forecasts penetration rate with a very respectable level of resilience and accuracy.
With  2= 0.6765 and MSE= 0.0257. This study highlights the potential of the ANFIS-FCM
technique as a powerful tool for simulating several tunnel engineering-related problems.
When the outcomes of the various generated models were compared, the created model, which
was based on the regression model and ANN-FCM, was discovered to have a superior capacity
for training multiple linear regression and multi-layer perceptron neural networks. Last but not
least, given the importance of figuring out the utilization factor in tunneling project procedures.
It is advised to research and compare this coefficient in soft lands with other prediction
techniques like the support vector machine, genetic programming, and regression tree
technique, as well as compare it with the findings of this study.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements:</title>
      <p>Thanks to Lucknow metro rail corporation technical team, civil and electrical department and
special thanks to the TBM control unit team, Amity University Lucknow campus and Maharishi
University of Information Technology Lucknow, for help in this research work.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Abdi-Khanghah</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bemani</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naserzadeh</surname>
            <given-names>Z</given-names>
          </string-name>
          , Zhang
          <string-name>
            <surname>Z</surname>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>Prediction of solubility of Nalkanes in supercritical CO2 using RBF-ANN and MLP-ANN</article-title>
          .
          <source>J CO2 Util</source>
          <volume>25</volume>
          :
          <fpage>108</fpage>
          -
          <lpage>119</lpage>
          .https://doi.org/10.1016/j.jcou.
          <year>2018</year>
          .
          <volume>03</volume>
          .008
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Amoun</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharifzadeh</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shahriar</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rostami</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azali</surname>
            <given-names>ST</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Evaluation of tool wear in EPB tunneling of Tehran Metro, Line 7 Expansion</article-title>
          .
          <source>Tunn Undergr Space Technol</source>
          <volume>61</volume>
          :
          <fpage>233</fpage>
          -
          <lpage>246</lpage>
          . https://doi.org/10.1016/j.tust.
          <year>2016</year>
          .
          <volume>11</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Armaghani</surname>
            <given-names>DJ</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mohamad</surname>
            <given-names>ET</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Narayanasamy</surname>
            <given-names>MS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Narita</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yagiz</surname>
            <given-names>S</given-names>
          </string-name>
          (
          <year>2017a</year>
          )
          <article-title>Development of hybrid intelligent models for predicting TBM penetration rate in hard rock condition</article-title>
          .
          <source>Tunn Undergr Space Technol</source>
          <volume>63</volume>
          :
          <fpage>29</fpage>
          -
          <lpage>43</lpage>
          . https://doi.org/10. 1016/j.tust.
          <year>2016</year>
          .
          <volume>12</volume>
          .009
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Armaghani</surname>
            <given-names>DJ</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raja</surname>
            <given-names>RSNSB</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faizi</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rashid</surname>
            <given-names>ASA</given-names>
          </string-name>
          (
          <year>2017b</year>
          )
          <article-title>Developing a hybrid PSO- ANN model for estimating the ultimate bearing capacity of rock-socketed piles</article-title>
          .
          <source>Neural Comput Appl</source>
          <volume>28</volume>
          (
          <issue>2</issue>
          ):
          <fpage>391</fpage>
          -
          <lpage>405</lpage>
          . https://doi.org/10.1007/s00521-015-2072-z
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Aryafar</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikaeil</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haghshenas</surname>
            <given-names>SS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haghshenas</surname>
            <given-names>SS</given-names>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>Application of metaheuristic algorithms to optimal clustering of sawing machine vibration</article-title>
          .
          <source>Measurement</source>
          <volume>124</volume>
          :
          <fpage>20</fpage>
          -
          <lpage>31</lpage>
          . https://doi.org/10.1016/j.measurement.
          <year>2018</year>
          .
          <volume>03</volume>
          .056
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Avunduk</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Copur</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>Empirical modeling for predicting excavation performance of EPB TBM based on soil properties</article-title>
          .
          <source>Tunn Undergr Space Technol</source>
          <volume>71</volume>
          :
          <fpage>340</fpage>
          -
          <lpage>353</lpage>
          . https://doi.org/10.1016/j.tust.
          <year>2017</year>
          .
          <volume>09</volume>
          .016
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Benardos</surname>
            <given-names>AG</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaliampakos</surname>
            <given-names>DC</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Modelling TBM performance with artificial neural networks</article-title>
          .
          <source>Tunn Undergr Space Technol</source>
          <volume>19</volume>
          (
          <issue>6</issue>
          ):
          <fpage>597</fpage>
          -
          <lpage>605</lpage>
          . https://doi.org/10.1016/j.tust.
          <year>2004</year>
          .
          <volume>02</volume>
          .128
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Chen</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monteiro</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcon</surname>
            <given-names>E</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>Design of shared unit-dose drug distribution network using multilevel particle swarm optimization</article-title>
          .
          <source>Health Care Manag Sci</source>
          <volume>22</volume>
          (
          <issue>2</issue>
          ):
          <fpage>304</fpage>
          -
          <lpage>317</lpage>
          . https://doi.org/10.1007/s10729-018-9438-6
          <string-name>
            <surname>Dormishi</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ataei</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikaeil</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khalokakaei</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haghshenas</surname>
            <given-names>SS</given-names>
          </string-name>
          (
          <year>2019a</year>
          )
          <article-title>Evaluation of gang saws' performance in the carbonate rock cutting process using feasibility of intelligent approaches</article-title>
          .
          <source>Eng Sci Technol Int J</source>
          <volume>22</volume>
          (
          <issue>3</issue>
          ):
          <fpage>990</fpage>
          -
          <lpage>1000</lpage>
          . https://doi.org/10.1016/j.jestch.
          <year>2019</year>
          .
          <volume>01</volume>
          .007
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Dormishi</surname>
            <given-names>AR</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ataei</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khaloo Kakaie</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikaeil</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <article-title>Shaffiee Haghshenas S (2019b) Performance evaluation of gang saw using hybrid ANFIS-DE and hybrid ANFIS-PSO algorithms</article-title>
          .
          <source>J Min Environ</source>
          <volume>10</volume>
          (
          <issue>2</issue>
          ):
          <fpage>543</fpage>
          -
          <lpage>557</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Esmailzadeh</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shirzad</surname>
            <given-names>PJ</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haghshenas</surname>
            <given-names>SS</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Technical analysis of collapse in tunnel excavation and suggestion of preventing appropriate applicable methods (case study:sardasht dam second diversion tunnel)</article-title>
          .
          <source>Civ Eng J3(9)</source>
          :
          <fpage>682</fpage>
          -
          <lpage>689</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Faradonbeh</surname>
            <given-names>RS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haghshenas</surname>
            <given-names>SS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taheri</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikaeil</surname>
            <given-names>R</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>Application of selforganizing map and fuzzy c-mean techniques for rockburst clustering in deep underground projects</article-title>
          .
          <source>Neural Comput Appl</source>
          . https://doi.org/10.1007/s00521-019-04353-z
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Faris</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aljarah</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mirjalili</surname>
            <given-names>S</given-names>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>Improved monarch butterfly optimization for unconstrained global search and neural network training</article-title>
          .
          <source>Appl Intell</source>
          <volume>48</volume>
          (
          <issue>2</issue>
          ):
          <fpage>445464</fpage>
          . https://doi.org/10.1007/s10489-017-0967-3
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Farrokh</surname>
            <given-names>E</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Study of utilization factor and advance rate of hard rock TBMS</article-title>
          ,
          <source>Ph.D. Thesis</source>
          . The Pennsylvania State University Fattahi H,
          <string-name>
            <surname>Babanouri</surname>
            <given-names>N</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Applying optimized support vector regression models for prediction of tunnel boring machine performance</article-title>
          .
          <source>Geotech Geol Eng</source>
          <volume>35</volume>
          (
          <issue>5</issue>
          ):
          <fpage>2205</fpage>
          -
          <lpage>2217</lpage>
          . https://doi.org/10.1007/s10706-017- 0238-4
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Koizumi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Inaba</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Yamamoto</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <article-title>Theoretical analysis and seismic investigation for TBM jamming in squeezing fissile slate</article-title>
          .
          <source>Tunn. Undergr. Space Technol</source>
          .
          <year>2016</year>
          ,
          <volume>57</volume>
          ,
          <fpage>284</fpage>
          -
          <lpage>286</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Goel</surname>
            ,
            <given-names>R.K.</given-names>
          </string-name>
          <article-title>Experiences and lessons from the use of TBM in the Himalaya-A review</article-title>
          .
          <source>Tunn. Undergr. Space Technol</source>
          .
          <year>2016</year>
          ,
          <volume>57</volume>
          ,
          <fpage>277</fpage>
          -
          <lpage>283</lpage>
          . [Google Scholar] [CrossRef] Bilgin,
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>An appraisal of TBM performances in Turkey in difficult ground conditions and some recommendations</article-title>
          .
          <source>Tunn. Undergr. Space Technol</source>
          .
          <year>2016</year>
          ,
          <volume>57</volume>
          ,
          <fpage>265</fpage>
          -
          <lpage>276</lpage>
          . [Google Scholar] [CrossRef] Gong,
          <string-name>
            <given-names>Q.</given-names>
            ;
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          ; Ma,
          <string-name>
            <given-names>H.</given-names>
            ;
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <article-title>TBM tunnelling under adverse geological conditions: An overview</article-title>
          .
          <source>Tunn. Undergr. Space Technol</source>
          .
          <year>2016</year>
          ,
          <volume>57</volume>
          ,
          <fpage>4</fpage>
          -
          <lpage>17</lpage>
          . [Google Scholar] [CrossRef] Zhang,
          <string-name>
            <given-names>J.Z.</given-names>
            ;
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.W.</surname>
          </string-name>
          ; Zhang,
          <string-name>
            <given-names>D.M.</given-names>
            ;
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.L.</given-names>
            ;
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ;
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.J.</surname>
          </string-name>
          <article-title>Effect of ground surface surcharge on deformational performance of tunnel in spatially variable soil</article-title>
          .
          <source>Comput. Geotech</source>
          .
          <year>2021</year>
          ,
          <volume>136</volume>
          ,
          <fpage>104229</fpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Phoon</surname>
            ,
            <given-names>K.K.</given-names>
          </string-name>
          ; Zhang,
          <string-name>
            <given-names>D.M.</given-names>
            ;
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.W.</given-names>
            ;
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Novel approach to estimate vertical scale of fluctuation based on CPT data using convolutional neural networks</article-title>
          .
          <source>Eng. Geol</source>
          .
          <year>2021</year>
          ,
          <volume>294</volume>
          ,
          <fpage>106342</fpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [20]
          <string-name>
            <surname>YTao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>H.L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Cai</surname>
            ,
            <given-names>Y.Q.</given-names>
          </string-name>
          <article-title>Predictions of deep excavation responses considering model uncertainty: Integrating BiLSTM neural networks with Bayesian updating</article-title>
          .
          <source>Int. J. Geomech</source>
          .
          <year>2021</year>
          ,
          <volume>22</volume>
          ,
          <fpage>04021250</fpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>J.Z.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>H.W.</given-names>
          </string-name>
          ; Zhang,
          <string-name>
            <given-names>D.M.</given-names>
            ;
            <surname>Phoon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.K.</given-names>
            ;
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.Q.</given-names>
            ;
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Quantitative evaluation of geological uncertainty and its influence on tunnel structural performance using improved coupled Markov chain</article-title>
          .
          <source>Acta Geotech</source>
          .
          <year>2021</year>
          ,
          <volume>16</volume>
          ,
          <fpage>3709</fpage>
          -
          <lpage>3724</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Phoon</surname>
            ,
            <given-names>K.K.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kulhawy</surname>
            ,
            <given-names>F.H.</given-names>
          </string-name>
          <article-title>Characterization of geotechnical variability</article-title>
          .
          <source>Can. Geotech. J</source>
          .
          <year>1999</year>
          ,
          <volume>36</volume>
          ,
          <fpage>612</fpage>
          -
          <lpage>624</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>C.J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tien</surname>
            ,
            <given-names>Y.M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Juang</surname>
            ,
            <given-names>C.H.</given-names>
          </string-name>
          <article-title>Robust design of rock slopes with multiple failure modes: Modeling uncertainty of estimated parameter statistics with fuzzy number</article-title>
          .
          <source>Environ. Earth Sci</source>
          .
          <year>2014</year>
          ,
          <volume>72</volume>
          ,
          <fpage>2957</fpage>
          -
          <lpage>2969</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>H.H.</given-names>
          </string-name>
          ; Cho,
          <string-name>
            <given-names>H.N.</given-names>
            ;
            <surname>Seo</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.W.</surname>
          </string-name>
          <article-title>Risk assessment methodology for underground construction projects</article-title>
          .
          <source>J. Const. Eng. Manag</source>
          .
          <year>2004</year>
          ,
          <volume>130</volume>
          ,
          <fpage>258</fpage>
          -
          <lpage>272</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>H.B.</given-names>
          </string-name>
          ; Zhang,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>Risk assessment methodology for a deep foundation pit construction project in Shanghai, China</article-title>
          .
          <source>J. Const. Eng. Manag</source>
          .
          <year>2011</year>
          ,
          <volume>137</volume>
          ,
          <fpage>1185</fpage>
          -
          <lpage>1194</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Hyun</surname>
            ,
            <given-names>K.C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Min</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Choi, H.; Park, J.;
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>I.M.</given-names>
          </string-name>
          <article-title>Risk analysis using fault-tree analysis (FTA) and analytic hierarchy process (AHP) applicable to shield TBM tunnels</article-title>
          .
          <source>Tunn. Undergr. Space Technol</source>
          .
          <year>2015</year>
          ,
          <volume>49</volume>
          ,
          <fpage>121</fpage>
          -
          <lpage>129</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.Z.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <article-title>Fuzzy comprehensive Bayesian network-based safety risk assessment for metro construction projects</article-title>
          .
          <source>Tunn. Undergr. Space Technol</source>
          .
          <year>2017</year>
          ,
          <volume>70</volume>
          ,
          <fpage>330</fpage>
          -
          <lpage>342</lpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ; Zhang,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <article-title>A fuzzy evidential reasoning-based approach for risk assessment of deep foundation pit</article-title>
          .
          <source>Tunn. Undergr. Space Technol</source>
          .
          <year>2020</year>
          ,
          <volume>97</volume>
          ,
          <issue>103232</issue>
          .
          <fpage>1</fpage>
          -
          <lpage>103232</lpage>
          .
          <fpage>16</fpage>
          . [Google Scholar] [CrossRef]
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [29]
          <article-title>Advanced prediction of tunnel boring machine performance based on big data; Jinhui Li</article-title>
          ,
          <string-name>
            <given-names>Pengxi</given-names>
            <surname>Li</surname>
          </string-name>
          et al.,
          <year>2020</year>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Regression</given-names>
            <surname>Models</surname>
          </string-name>
          and
          <article-title>Fuzzy Logic Prediction of TBM Penetration Rate; Vu T</article-title>
          .Minh et al.
          <year>2017</year>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>