=Paper= {{Paper |id=Vol-3619/AISD_Paper_3 |storemode=property |title=A Study of Fuzzy Methodology of Tunnel Boring Machine in the Project of Lucknow Metro Rail Corporation |pdfUrl=https://ceur-ws.org/Vol-3619/AISD_Paper_3.pdf |volume=Vol-3619 |authors=Ubaid Asif Farooqui,Umar Khalid Farooqui,Chinta Mani Tiwari,Mohammad Husain Husain |dblpUrl=https://dblp.org/rec/conf/aisd/FarooquiFGTH23 }} ==A Study of Fuzzy Methodology of Tunnel Boring Machine in the Project of Lucknow Metro Rail Corporation== https://ceur-ws.org/Vol-3619/AISD_Paper_3.pdf
                         A STUDY OF FUZZY METHODOLOGY OF TUNNEL BORING
                         MACHINE IN THE PROJECT OF LUCKNOW METRO RAIL
                         CORPORATION
                         Ubaid Asif Farooqui1, Umar Khalid Farooqui2, C.M. Tiwari1, Mohammad Husain3
                         1Maharishi University of Information Technology, Lucknow, India
                         2 Amity University Lucknow Campus, Lucknow, India
                         3 University of Madinah, Al Madinah Al Munawarah, Saudi Arabia




                                            Abstract
                                            This work is about study on the fuzzy operation methodology of tunnel boring machines and finding
                                            the optimum solution for the best approach of tunneling. Adaptive network-based fuzzy inference
                                            system used in a mathematical model of TBM, neural networking with fuzzy logic and the fuzzy c-
                                            means clustering technique is used for soft soil and hard rock condition both with regression model
                                            developed by latest MATLAB technique to reduce error. UCS, BI, DPW, and Alpha degree constitute
                                            four geological technical variables that are utilized to develop regression equations for Rate of
                                            Penetration (ROP) to prevent unnecessary effort and save time and money in project.

                                            Keywords
                                             TBM, ANFIS, NN, CLUSTERING METHOD, FUZZY LOGIC, UCS, BI, DPW and ROP.1




                         1. INTRODUCTION
                         LUCKNOW METRO RAIL CORPORATION was faced with the challenge of connecting the metro
                         through densely populated city areas. Some citizens opposed trains crossing bridges close to
                         their homes, and for security reasons, some government institutions refused to allow trains to
                         pass close to sensitive locations like the secretariat.
                         LMRC had the option to build an underground segment utilizing the existing technology of
                         tunneling because it was decided to make a particular piece of the Lucknow Metro
                         subterranean.

                                1.   Through Tunnel Boring Machine
                                2.   Using Cut and Cover Method
                                3.   NATM (New Austrian Tunneling Method)

                         The TBM method was an obvious choice for the majority of subterranean tunnels because to its
                         efficacy and track record in metro areas of other cities. The nearby Underground stations for the
                         UP line and DOWN line are connected by twin separate Bored tunnels.




                         AISD 2023: First International Workshop on Artificial Intelligence: Empowering Sustainable Development September
                         4-5, 2023, co-located with International Conference on Artificial Intelligence: Towards Sustainable Intelligence,
                         (AI4S-2023), Pune, India
                            uasif2u@gmail.com (U. Asif Farooqui); ukfarooqui@gmail.com (U. Khalid Farooqui); cmtiwari.12@gmail.com(C.M.
                         Tiwari); mohd.husain90@gmail.com (M. Husain)
                            http://dblp.org/pid/95/7965.html (Mohammad Husain)
                                     Β© 2023 Copyright for this paper by its authors.
                                     Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
                                     CEUR Workshop Proceedings (CEUR-WS.org)

CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
   Figure 1: Tunnel Boring Machine. [29]

Currently, engineers must navigate a metro line through an underground tube while the city is
home to some extremely historic structures.
The use of TUNNEL BORING MACHINE (TBM) was a smart move, however operating TBM is a
challenging chore. For this task to be monitored, data must be collected, analyzed, predicted,
and controlled. Estimating the tunnel-boring equipment's (TBM) efficiency of penetration is one
of the difficult jobs that must be completed in order to bore a tunnel. The hazards associated
with the high capital costs typical of boring operations may be decreased by estimating the
machine penetration rate. The key to successful tunnel boring is the ability to predict the tunnel
boring machine's effectiveness. Among the essential metrics utilized for performance prediction
of these machines, The precise energy consumption of wheel cutters, which is the volume of
power needed to obtain a unit volume of stone and soil.


2. LITRATURE SURVEY
Neuro-fuzzy techniques were utilized by Grima and Bruines to model TBM performance. To
predict the TBM performance, Benardos and Kaliampakos used artificial neural networks. A
neural network-based approach for predicting TBM performance was introduced by Zhao and
Gong. Acaroglu and Ozdemir developed a fuzzy logic model to forecast the precise amount of
energy needed to anticipate TBM performance. In a subsequent attempt, Yagiz proposed two
nonlinear prediction tools for the estimate of TBM performance artificial neural networks and
nonlinear multiple regression. Two key components of the TBM performance, including the
penetration rate and utilization factor, were examined by Torabi and Shirazi using A
computational social arts analytical program and a synthetic neural network. Yagiz and Karahan
used the particle swarm optimization (PSO) method to predict the rate of hard-rock TBM
breakthrough.
The performance of TBMs can be anticipated using an adaptive neuroscience fuzzy inference
system built around Fuzzy C-Means Grouping Methodology (ANFIS-FCM), a unique data analysis
technique. In this model, the rate of penetration served as the output parameter, As input
variables, the intact rock brittleness (BI), alpha angle, planes of weakness, and uniaxial in nature
compressible strength (UCS) were all utilized. The ANFIS-estimating FCM's capabilities are
demonstrated using field data from open-access publications. Yet, as the primary function of
cutters is to shatter rock, significant advances in cutter design and metallurgy have been made.
Disc cutters, which are frequently used by TBMs and may cut an assortment of sandstone
different types with various qualities. Hard rock TBMs have utilized single disc cutters with
replacement disc rings for a long time because they have shown themselves to be effective and
dependable. When tip wear developed, the V-shape (V-profile) of early disc cutters produced a
sharp decline in efficiency. Constant cross-section (CCS) profiles began to take the place of V-
shape ring profiles in the late 1970s in order to preserve cutting efficiency after the tip wore
out. Mini disc cutters, often used after 30 cm (12 in.) in diameter, are disc cutters with a
diameter of between 49 cm (19 in.) and 8 cm (3 in.). The maximum cutting forces that discs can
withstand depend on the cutters' bearing capabilities, which decrease as disc diameter
increases. Little discs, however, penetrate more deeply than larger discs when applied with the
same force (Friant and Ozdemir, 1994).
A project's schedule and cost are significantly impacted by the ability to produce precise
performance estimations when applying TBM technology. Several case studies demonstrate
how performance estimate errors can lead to project delays and expense overruns. The
penetration and progress rates as well as machine utilization serve as key performance
indicators for TBMs. One of the main functions of a disc cutter is to cut rock, and particular
efficiency, which is the amount of power needed by wheel cutters to do something, is used to
Identify the performance parameters for the machine. With a lower SE, the same amount of
material can be produced while excavating the rock much more effectively and with comparably
less expensive equipment. One of the reliable artificial intelligence methods, It has been shown
that the fuzzy c-means grouping algorithm based adaptive neuro fuzzy inference system
(ANFIS-FCM) is very good at identifying associations with input and output features.

3. METHODOLOGY
3.1    Adaptive network-based fuzzy inference system used in a mathematical
       model of TBM:

Without using exact quantitative analysis, the qualitative components of human understanding
and logic can be replicated by a fuzzy inference system. Information-processing software called
neural networks (NNs) is modeled after research, observation and analysis on functions of the
animal and human brain. A collection of interrelated components of processing that resemble
neurons make up NN. The instruction process provides a set of input data into the NNs and
verifies the desired output. It has been demonstrated that combining NNs with fuzzy logic (FL)
can reasonably simulate the psychological procedure for making decisions for skilled. Typical
NNs merely evolve the development process' values for weighting, therefore a neuro-fuzzy
decision-making system combines the learning capabilities of NNs with the FL's inference
process. A network structure made up of multiple nodes connected by directional links is an
adaptable neural network. Each node is defined by a node function that can have either fixed or
variable arguments. As soon as the fuzzy inference system (FIS) is in place, NN approaches can
be used to discover the rules' underlying assumptions and resulting parameters, which are
unknown, while lowering the error measure typically defined for each system variable. The
system is referred to as adaptive because of this optimization process. Five levels make up the
ANFIS architecture, and the model is briefly described below.

Level 1: The membership grades of a linguistic label are generated by each node R in this layer.
For example, the π‘Ÿ π‘‘β„Ž node's node feature could be:
                                                      1
                            π‘‡π‘Ÿ1 = πœŒπ΄π‘Ÿ (P) =        π‘₯βˆ’π‘˜π‘Ÿ 2 𝑑                     (1)
                                              1 +[(    ) ] π‘Ÿ
                                                    πœŽπ‘Ÿ

here P is the each node's data, Ar is the linguistic term (listed in ascending order) attached to it,
and πœŽπ‘Ÿ, Kr , dr is the parameter set that alters the MF's forms . The "Premises factors" are the
name given to the variables in this level.

Level 2: The "firing intensity" of every rule in this level is determined by compounding at each
node:


                         π‘‡π‘Ÿ2 = π‘π‘Ÿ = πœŒπ΄π‘Ÿ (P).πœŒπ΅π‘Ÿ (Q)            r = 1,2                   (2)

Level 3: The π‘Ÿπ‘‘β„Ž component of this level defines the proportion of the π‘Ÿπ‘‘β„Ž rule's blazing
strength to the sum of all rules' blazing strengths:
                                    𝑍
                       π‘‡π‘Ÿ3 = Μ…Μ…Μ…
                             π‘π‘Ÿ = βˆ‘2 π‘Ÿ 𝑍           r = 1,2                 (3)
                                    π‘ž=1 π‘ž


 This level of output will be referred to as "normalized firing" strengths for simplicity.

Level 4: All nodes r at this level are nodes functions:
                           π‘‡π‘Ÿ4 = Μ…Μ…Μ…
                                 π‘π‘Ÿ π‘”π‘Ÿ = Μ…Μ…Μ…
                                         π‘π‘Ÿ (π›Όπ‘Ÿ 𝑃 + π›½π‘Ÿ 𝑄 + π›Ύπ‘Ÿ )                    (4)
Where, Μ…Μ…Μ…
       π‘π‘Ÿ is level 3's output. The term "consequent parameters" will be used to describe the
parameters at this level.

Level 5: The "comprehensive outcome" of this level is calculated by a single circular component
with the label "R," which adds together all of the signals coming in.

                                                                         βˆ‘π‘ 𝑔
                π‘‡π‘Ÿ5 = Comprehensive Outcome = βˆ‘ Μ…Μ…Μ…
                                                π‘π‘Ÿ πΊπ‘Ÿ = βˆ‘ π‘Ÿπ‘ π‘Ÿ                                 (5)
                                                                               π‘Ÿ

                   In this work, the antecedent MFs are also identified using FCM.



3.2     The procedure of fuzzy c-means grouping

The FCM is a Bezdek-invented data grouping technique where each data point is a member of a
group to the extent specified by the classification of membership of a cluster. FCM is used to
distribute a set of n vector π‘ƒπ‘Ÿ, where r = 1, 2,..., n, into C fuzzy groups.. In each group, a clump
center is found that minimizes the cost function of the dissimilarity measure. Thus, a quick
description of the FCM algorithm's steps follows. The cluster's initial nodes are π‘π‘Ÿ, r = 1, 2,..., C.
From the n points, 𝑃1 is randomly selected, followed by 𝑃2 and so on until 𝑃n . The following
equation is then used to build the composition of the matrix U:
                                               1
                               πœŒπ‘Ÿπ‘ž =               2⁄                    (6)
                                             π‘”π‘Ÿπ‘ž     π‘€βˆ’1
                                        𝑐
                                       βˆ‘π‘˜=1(     )
                                             π‘”π‘˜π‘ž


The formula provides the Euclidian distance that separates the π‘Ÿπ‘‘β„Ž group and the π‘žπ‘‘β„Ž value
is given by the formula π‘”π‘Ÿπ‘ž = β€–π‘π‘Ÿ βˆ’ π‘ƒπ‘žβ€– and w is the fuzziness index. The cost function is then
calculated using the equation shown below. If it falls below a specific threshold, the process is
stopped.
  L(U,𝑐1,…….𝑐2 ) = βˆ‘π‘π‘Ÿ=1 π½π‘Ÿ = βˆ‘π‘π‘Ÿ=1. βˆ‘π‘‘π‘ž=1 πœŒπ‘Ÿπ‘ž
                                            𝑀 2
                                               π‘”π‘Ÿπ‘ž                        (7)
A fresh c fuzzy group with r = 1,2 focuses on π‘π‘Ÿin the final step. To figure out C, apply the
equation below.
                                          βˆ‘π‘‘      𝑀π‘₯
                                                 πœŒπ‘Ÿπ‘ž π‘ž
                                      π‘π‘Ÿ = βˆ‘π‘ž=1
                                             𝑑                   (8)
                                                πœŒπ‘€
                                               π‘ž=1 π‘Ÿπ‘ž



3.3 Using the most recent version of MATLAB, 4 Regression Models for ROP are
    concluded:

Technically, because their empirical correlation coefficients to ROP are more than 0.6, qualities
of boulders demonstrate the most precise factors for forecasting the ROP will be the UCS and
the BI. The DPW and alpha angle are also important measures to assess ROP because they have
correlation factors to ROP that are higher than 0.5. As a result, the following part will develop
regression models for ROP using four (4) rock technical attributes, UCS, BI, DPW, and Alpha.
Model 1: Linear regression model (LRM)

   Model 1: Linear regression model (LRM)

                        (1)     (1)             (1)      (1)             (1)
           ROP (i) = 𝛽0 +𝛽1 Β·UCS+ 𝛽2 Β·BI+ 𝛽3 Β·DPW + 𝛽4 Β·Alpha

   Model 2: Linear regression model with log(Alpha)

                         (2)     (2)              (2)      (2)               (2)
            ROP (ii) = 𝛽0 +𝛽1 Β·UCS+ 𝛽2 Β·BI+ 𝛽3 Β·DPW + 𝛽4 Β·log(Alpha)

   Model 3 : Nonlinear regression model with exponential Alpha (NLRM1)

                       (3)     (3)              (3)      (3)             (3)             (3)
          ROP (iii) = 𝛽0 +𝛽1 Β·UCS+ 𝛽2 Β·BI+ 𝛽3 Β·DPW + 𝛽4 Β·(Alpha)𝛽5

   Model 4: Nonlinear regression model with both exponential DPW & Alpha (NLRM2)

                        (4)     (4)              (4)     (4)           (4)         (4)         (4)
          ROP (iv) = 𝛽0 +𝛽1 Β·UCS+ 𝛽2 Β·BI+ 𝛽3 Β· DPW𝛽4 + 𝛽5 Β·(Alpha)𝛽6

3.4     Methodology for Data Processing

To increase the effectiveness of networks in recognizing the links between inputs and outputs,
inputs and output data should be normalized prior to the training process. Moreover, scaling the
data to reduce the biassing of the networks and improving prediction accuracy are both greatly
aided by normalization. The time-consuming nature of training can be cut down through data
normalization. Modeling applications with input data of various scales can greatly benefit from
it. Many normalization methods, such as Z-Score normalization, Min-Max normalization,
sigmoid normalization, statistical column normalization, etc, are commonly used to scale up the
data, Nonetheless the Min-Max normalization method was employed for the purposes of this
study. This was made possible by Min-Max normalization's ability to preserve each feature's
variation following normalization. Moreover, this normalization technique can maintain all of
the data's relationships. Below is how the Min-Max normalization equation is expressed:

                                        π‘¦βˆ’π‘¦π‘šπ‘–π‘›
                               π‘Œπ‘€ = 𝑦                            (9)
                                        π‘šπ‘Žπ‘₯ βˆ’π‘¦π‘šπ‘–π‘›


where Y is the dataset's original value, π‘Œπ‘€ is the mapped value, and π‘¦π‘šπ‘Žπ‘₯ (π‘¦π‘šπ‘–π‘› ) stands for the
dataset's highest (lowest) possible raw input values.
Mean square error (MSE) and coefficient of determination (R2) are two more established
metrics used to evaluate the effectiveness of the networks in addition to normalization. The
following equation is used to compute MSE:

                                         1                           2
                              MSE = 𝑑 βˆ‘π‘‘π‘ž=1(β„Žπ‘ž βˆ’ β„ŽΜ‚π‘ž )                   (10)

where β„Žπ‘ž and β„ŽΜ‚π‘ž are the real and anticipated standard of the qth observation, accordingly,
and t is the quantity of samples utilized to train or test the network. It is common practice to
demonstrate the difference between measured and estimated network values using the MSE
criterion. You can also compute R2, or the coefficient of determination, as follows:
                                                           2
                                          βˆ‘π‘‘π‘ž=1(β„Žπ‘ž βˆ’β„Ž
                                                    Μ‚π‘ž )
                          𝑅 2 = 1βˆ’ 𝑑                             2          (11)
                                      βˆ‘π‘ž=1 β„Žπ‘ž2 βˆ’(βˆ‘π‘‘π‘ž=1β„Ž
                                                      Μ‚π‘ž2 ⁄𝑑 )

R2 is frequently used to illustrate the model's initial level of uncertainty. The ideal network
model, which is highly improbable to be created, has MSE=0 and R2 =1.

4. Results
A specialist who is familiar with the system that needs to be simulated specifies the number of
rules in a regular fuzzy inference system. However, no expert is available in the ANFIS
simulation; as a result, the total number of member functions (MFs) provided for every input
parameter is chosen intuitively, i.e., by charting the data sets and visually inspecting them, or
just by trial and error.




Figure 2: Fuzzy logic surface. [30]
Figure 3: Fuzzy logic rules viewer [30]


Using the MATLAB environment, the ANFIS-FCM model was used to this study's prediction
model to calculate the TBM penetration rate from the available data. In order to estimate TBM
performance, the ANFIS-FCM model's fuzzy architecture is depicted in Fig 4. The current study
used a dataset with 153 data points, 122 of which (or 80%) were used to build the model while
the other 31 data points were used to assess the model's performance. Table 1 provides more
information on the parameters of the ANFIS-FCM model.




Figure 4: An ANFIS-FCM Strategy Structure
Table 1
Modeling components for the ANFIS-FCM

                   Parameter                               Description
           Type of participation duty                               Gaussian
         participants perform produce                                 Linear
               Density of vertices                                       57
            numerous linear factors                                      25
          various nonlinear parameters                                   40
         Numerous parameters in total                                    65
           Total pairs of training data                                122

          combinations of test data in                                   31
                 numerical
             quantity of fuzzy rules                                     5



5. Conclusion and Discussion

The forecast and evaluation of its utilization factor are two of the most crucial elements
influencing how well TBM performs. In actuality, TBM tunneling projects are more productive
when the utilization factor is accurately identified and calculated. Since the goal of the current
study is to anticipate the utilization approach in sandy soil tunneling (metropolitan
environment), correct locating and calculating the utilization proportion helps to avoid
potential machine damage as well as excessive project costs and time. However, there are
always unknown and unforeseen events in underground operations, requiring the use of smart
data analysis techniques.
In this study, the hard rock TBM penetration rate was estimated using the ANFIS-FCM method.
The UCS, BI, DPW, and alpha angle of intact and bulk rocks, among others, have been discovered
to significantly affect TBM penetration. Consequently, the model was created using relevant
properties. It can be concluded that ANFIS-FCM is a dependable method of system modeling
that forecasts penetration rate with a very respectable level of resilience and accuracy.
With 𝑅 2= 0.6765 and MSE= 0.0257. This study highlights the potential of the ANFIS-FCM
technique as a powerful tool for simulating several tunnel engineering-related problems.
When the outcomes of the various generated models were compared, the created model, which
was based on the regression model and ANN-FCM, was discovered to have a superior capacity
for training multiple linear regression and multi-layer perceptron neural networks. Last but not
least, given the importance of figuring out the utilization factor in tunneling project procedures.
 It is advised to research and compare this coefficient in soft lands with other prediction
techniques like the support vector machine, genetic programming, and regression tree
technique, as well as compare it with the findings of this study.


Acknowledgements:
Thanks to Lucknow metro rail corporation technical team, civil and electrical department and
special thanks to the TBM control unit team, Amity University Lucknow campus and Maharishi
University of Information Technology Lucknow, for help in this research work.
References

[1] Abdi-Khanghah M, Bemani A, Naserzadeh Z, Zhang Z (2018) Prediction of solubility of N-
    alkanes in supercritical CO2 using RBF-ANN and MLP-ANN. J CO2 Util 25:108–
    119.https://doi.org/10.1016/j.jcou.2018.03.008
[2] Amoun S, Sharifzadeh M, Shahriar K, Rostami J, Azali ST (2017) Evaluation of tool wear in
    EPB tunneling of Tehran Metro, Line 7 Expansion. Tunn Undergr Space Technol 61:233–
    246. https://doi.org/10.1016/j.tust.2016.11.001
[3] Armaghani DJ, Mohamad ET, Narayanasamy MS, Narita N,Yagiz S (2017a) Development of
    hybrid intelligent models for predicting TBM penetration rate in hard rock condition.Tunn
    Undergr Space Technol 63:29–43. https://doi.org/10.
    1016/j.tust.2016.12.009
[4] Armaghani DJ, Raja RSNSB, Faizi K, Rashid ASA (2017b) Developing a hybrid PSO– ANN
    model for estimating the ultimate bearing capacity of rock-socketed piles. Neural Comput
    Appl 28(2):391–405. https://doi.org/10.1007/s00521-015-2072-z
[5] Aryafar A, Mikaeil R, Haghshenas SS, Haghshenas SS (2018) Application of metaheuristic
    algorithms to optimal clustering of sawing machine vibration. Measurement 124:20–31.
    https://doi.org/10.1016/j.measurement.2018.03.056
[6] Avunduk E, Copur H (2018) Empirical modeling for predicting excavation performance of
    EPB TBM based on soil properties. Tunn Undergr Space Technol 71:340–353.
    https://doi.org/10.1016/j.tust.2017.09.016
[7] Benardos AG, Kaliampakos DC (2004) Modelling TBM performance with artificial neural
    networks.         Tunn         Undergr        Space        Technol         19(6):597–605.
    https://doi.org/10.1016/j.tust.2004.02.128
[8] Chen L, Monteiro T, Wang T, Marcon E (2019) Design of shared unit-dose drug distribution
    network using multilevel particle swarm optimization. Health Care Manag Sci 22(2):304–
    317. https://doi.org/10.1007/s10729-018-9438-6
    Dormishi A, Ataei M, Mikaeil R, Khalokakaei R, Haghshenas SS (2019a) Evaluation of gang
    saws’ performance in the carbonate rock cutting process using feasibility of intelligent
    approaches.         Eng        Sci       Technol       Int        J      22(3):990–1000.
    https://doi.org/10.1016/j.jestch.2019.01.007
[9] Dormishi AR, Ataei M, Khaloo Kakaie R, Mikaeil R, Shaffiee Haghshenas S (2019b)
    Performance evaluation of gang saw using hybrid ANFIS-DE and hybrid ANFIS-PSO
    algorithms. J Min Environ 10(2):543–557
[10] Esmailzadeh A, Shirzad PJ, Haghshenas SS (2017) Technical analysis of collapse in
    tunnel excavation and suggestion of preventing appropriate applicable methods (case
    study:sardasht dam second diversion tunnel). Civ Eng J3(9):682–689
[11] Faradonbeh RS, Haghshenas SS, Taheri A, Mikaeil R (2019) Application of self-
    organizing map and fuzzy c-mean techniques for rockburst clustering in deep underground
    projects. Neural Comput Appl. https://doi.org/10.1007/s00521-019-04353-z
[12] Faris H, Aljarah I, Mirjalili S (2018) Improved monarch butterfly optimization for
    unconstrained global search and neural network training. Appl Intell 48(2):445464.
    https://doi.org/10.1007/s10489-017-0967-3
[13] Farrokh E (2012) Study of utilization factor and advance rate of hard rock TBMS, Ph.D.
    Thesis. The Pennsylvania State University Fattahi H, Babanouri N (2017) Applying
    optimized support vector regression models for prediction of tunnel boring machine
    performance. Geotech Geol Eng 35(5):2205–2217. https://doi.org/10.1007/s10706-017-
    0238-4
[14] Koizumi, Y.; Inaba, T.; Yamamoto, T. Theoretical analysis and seismic investigation for
    TBM jamming in squeezing fissile slate. Tunn. Undergr. Space Technol. 2016, 57, 284–286.
    [Google Scholar] [CrossRef]
[15] Goel, R.K. Experiences and lessons from the use of TBM in the Himalayaβ€”A review.
    Tunn. Undergr. Space Technol. 2016, 57, 277–283. [Google Scholar] [CrossRef]
[16]   Bilgin, N. An appraisal of TBM performances in Turkey in difficult ground conditions and
    some recommendations. Tunn. Undergr. Space Technol. 2016, 57, 265–276. [Google
    Scholar] [CrossRef]
[17] Gong, Q.; Yin, L.; Ma, H.; Zhao, J. TBM tunnelling under adverse geological conditions: An
    overview. Tunn. Undergr. Space Technol. 2016, 57, 4–17. [Google Scholar] [CrossRef]
[18] Zhang, J.Z.; Huang, H.W.; Zhang, D.M.; Zhou, M.L.; Tang, C.; Liu, D.J. Effect of ground
    surface surcharge on deformational performance of tunnel in spatially variable soil.
    Comput. Geotech. 2021, 136, 104229. [Google Scholar] [CrossRef]


[19]    Zhang, J.Z.; Phoon, K.K.; Zhang, D.M.; Huang, H.W.; Tang, C. Novel approach to estimate
     vertical scale of fluctuation based on CPT data using convolutional neural networks. Eng.
     Geol. 2021, 294, 106342. [Google Scholar] [CrossRef]
[20] YTao, Q.; Sun, H.L.; Cai, Y.Q. Predictions of deep excavation responses considering model
     uncertainty: Integrating BiLSTM neural networks with Bayesian updating. Int. J. Geomech.
     2021, 22, 04021250. [Google Scholar] [CrossRef]
[21] Zhang, J.Z.; Huang, H.W.; Zhang, D.M.; Phoon, K.K.; Liu, Z.Q.; Tang, C. Quantitative
     evaluation of geological uncertainty and its influence on tunnel structural performance
     using improved coupled Markov chain. Acta Geotech. 2021, 16, 3709–3724. [Google
     Scholar] [CrossRef]
[22] Phoon, K.K.; Kulhawy, F.H. Characterization of geotechnical variability. Can. Geotech. J.
     1999, 36, 612–624. [Google Scholar] [CrossRef]
[23] Xu, C.J.; Wang, L.; Tien, Y.M.; Chen, J.M.; Juang, C.H. Robust design of rock slopes with
     multiple failure modes: Modeling uncertainty of estimated parameter statistics with fuzzy
     number. Environ. Earth Sci. 2014, 72, 2957–2969. [Google Scholar] [CrossRef]
[24] Choi, H.H.; Cho, H.N.; Seo, J.W. Risk assessment methodology for underground construction
     projects. J. Const. Eng. Manag. 2004, 130, 258–272. [Google Scholar] [CrossRef]
[25] Zhou, H.B.; Zhang, H. Risk assessment methodology for a deep foundation pit
     construction project in Shanghai, China. J. Const. Eng. Manag. 2011, 137, 1185–1194.
     [Google Scholar] [CrossRef]
[26] Hyun, K.C.; Min, S.; Choi, H.; Park, J.; Lee, I.M. Risk analysis using fault-tree analysis (FTA)
     and analytic hierarchy process (AHP) applicable to shield TBM tunnels. Tunn. Undergr.
     Space Technol. 2015, 49, 121–129. [Google Scholar] [CrossRef]
[27] Wang, Z.Z.; Chen, C. Fuzzy comprehensive Bayesian network-based safety risk
     assessment for metro construction projects. Tunn. Undergr. Space Technol. 2017, 70, 330–
     342. [Google Scholar] [CrossRef]
[28] Wei, D.; Xu, D.; Zhang, Y. A fuzzy evidential reasoning-based approach for risk
     assessment of deep foundation pit. Tunn. Undergr. Space Technol. 2020, 97, 103232.1–
     103232.16. [Google Scholar] [CrossRef]
[29] Advanced prediction of tunnel boring machine performance based on big data;
    Jinhui Li, Pengxi Li et al.,2020
[30] Regression Models and Fuzzy Logic Prediction of TBM Penetration Rate; Vu
    T.Minh et al. 2017