Next Article in Journal
Posidonia Spheroids Intercepting Plastic Litter: Implications for Beach Clean-Ups
Previous Article in Journal
Spatiotemporal Changes and the Prediction of Drought Characteristics in a Major Grain-Producing Area of China
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Extension Cloud Model and Grey Clustering Evaluation of Enterprise Safety Management System: Based on COWA-CRITIC Combination Weighting

School of Resources, Environment and Materials, Guangxi University, Nanning 530004, China
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(22), 15734; https://doi.org/10.3390/su152215734
Submission received: 31 August 2023 / Revised: 21 October 2023 / Accepted: 27 October 2023 / Published: 8 November 2023

Abstract

:
In order to address the issues of unclear risk grading control, lack of safety management, and hidden danger investigation and management processes, this paper used a mining enterprise as the backdrop for an engineering example. The “evaluation model of the overall construction level of the enterprise safety management system” is constructed from four aspects: “preliminary infrastructure”, “risk grading and control”, “hidden danger investigation and management processes”, and “Post-support work”. The safety evaluation level is divided into five levels, and the evaluation model is combined weighted by using the combined ordered weighted averaging (COWA) algorithm and the criteria importance through intercriteria correlation (CRITIC) method. In addition, the cloud model, the extension cloud model, and the grey clustering evaluation method are used for a thorough evaluation. Finally, the enterprise safety management system’s overall construction level is determined to be good. In order to effectively strengthen the enterprise safety management capability and prevent the occurrence of production safety accidents, this study provides a practical and thorough evaluation method for the evaluation of the enterprise safety management system. This method makes it easier to identify system weaknesses and provides a safety guarantee for the sustainable development of enterprises.

1. Introduction

Every nation and government in the world has placed a strong emphasis on safety management, and they all view it as one of the key goals of sustainable development. Simultaneously, effective safety management is a critical tool that businesses may utilize to achieve safe production and protect the lives, health, and property of employees. It is also a critical component that businesses need to attain sustainable and long-term growth. In China, safety management is seen as a key priority. Over the years, the state has released a number of laws, rules, and policies to help businesses set up standardized safety management systems and perform well in terms of safety management, and it has seen some success. According to Figure 1, the number of fatalities brought on by various production safety accidents in China declined from 69,434 in 2013 to 20,963 in 2022, with a general trend of nearly 70%. As the nation pays more and more attention to safety management, it can be seen that production safety accidents have been effectively controlled. However, because production safety accidents continue to result in a high number of fatalities each year, the outlook for production safety is still not good. According to industry statistics, there were up to 407 safety incidents in China’s non-coal mines in total in 2017, as a result of which 484 people died; there were up to 170 fatal incidents in China’s mines in 2019, with 1 fatal incident happening on average every 2.1 days; and there were 356 safety incidents in China’s mines in total in 2021, of which 265 fatal incidents occurred in China’s non-coal mines, resulting in 503 and 325 deaths, respectively. The root causes lie in the fact that the enterprise safety management method is incorrect, the safety management system is imperfect, safety management measures are not put into practice, etc. These problems will increase the likelihood of production safety accidents, which pose a serious threat to the operating personnel’s life, health, and property safety.
Currently, experts and academics from both home and abroad are conducting research using the safety management idea. The notion of safety management has been the subject of research performed by specialists and academics both domestically and internationally. According to Aven et al. [1], enterprise risk management (ERM) should concentrate on the connection between risk, uncertainty, knowledge, and performance. Additionally, Álvarez-Santos et al. [2] showed how businesses in the context of total quality and safety management can help to facilitate the development of safety management systems.
Meanwhile, experts and scholars have explored and tried various methods of safety evaluation, including the analytic hierarchy process (AHP), the entropy weight method, SCL (Safety Check List), the cloud model, extenics, the grey clustering evaluation method, etc. You et al. [3] combined the triangular fuzzy number method, the entropy weight method, the criteria importance through intercriteria correlation (CRITIC) method, and three rough set methods; simultaneously, they combined these six subjective and objective weight calculation methods based on Euclidean distance of information entropy and rough set to assign weights into comprehensive weights. After performing this, they evaluated the safety management status of four coal mining enterprises and confirmed the viability of this evaluation method. Guo et al. [4] combined the matter-element extension evaluation model with the cloud model to form the analytic network process (ANP) extension cloud comprehensive evaluation model and applied it to the safety management evaluation of subway construction sites. Jiskani et al. [5] established a thorough evaluation model using the entropy weighting approach and grey clustering to assess the safety status of 27 safety evaluation indicators in mines. They then suggested implementing treatment measures in the order they were recommended. Peng and Zhang [6] used the extension cloud model to assess the safety level of construction sites based on the weights established by the hierarchical analysis method and game theory; they began by considering the psychological factors in the organization of construction sites, which are frequently overlooked when building the safety level evaluation model. By using the extension cloud theory and the optimal cloud entropy method, Chen et al. [7] developed a safety evaluation system with four secondary indicators and fifteen tertiary indicators to assess the safety level of buildings in karst areas, ultimately achieving a safety evaluation level that is in line with the project’s actual safety condition. Li and Gong [8] built a safety evaluation model for a power grid data management system and used expert consultation methods and AHP to better ensure the safety of smart grid data. Guo et al. [9] evaluate the safety management capacities of construction sites by utilizing video surveillance inspections rather than on-site inspections, creating safety checklists, and finally, applying safety checklist analysis (SCA). Maihemuti et al. [10] offered eight improvement solutions to maintain the safe and stable functioning of power systems after using SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis to develop 24 internal and external evaluation variables for the safety of new energy power systems.
In addition, some scholars have conducted research on security risk evaluation. A semi-deterministic risk assessment method based on the fuzzy analytic hierarchy process (FAHP) was created by Mahdinia et al. [11], with the probability of impact and severity of consequences as two useful parameters for lowering safety risks in construction projects. In order to identify each type of risk, Klinke and Renn [12] proposed nine risk assessment criteria, six risk categories, and three risk management categories. They also created a decision tree to categorize each type of risk and matched a risk response strategy to each category, which significantly increased the feasibility and timeliness of the safety risk management procedure. Ju et al. [13] created a construction safety risk level evaluation model based on game theory and the extension cloud model. In order to undertake a thorough evaluation of the choice of wind farm address based on the ideal matter element extension evaluation model and the grey clustering evaluation model, Tan et al. [14] built a weight model integrating subjective and objective weights. Qiao et al. [15] combined the fuzzy comprehensive evaluation method with the clustering evaluation method to form a fuzzy grey clustering triangular function comprehensive evaluation model to evaluate the investment risk of wind power projects.
It is evident that current research is more concentrated on the evaluation of safety and risk levels during project construction or production operations and that there is little research on the evaluation of overall safety management levels in the context of mining enterprises. Most studies only use one evaluation method, which makes it challenging to guarantee the accuracy and reliability of evaluation results. When determining the weights of evaluation indicators, they do not take into account the issue of inaccurate weights due to complex levels and too many evaluation indicators, nor do they take into account the gaps and correlations between the indicators. Meanwhile, the existing safety evaluation methods include the analytic hierarchy process, matter-element extension theory, cloud model, fuzzy comprehensive evaluation method, BP neural network, extension cloud model, and grey clustering evaluation method. These evaluation techniques do, however, inevitably have some drawbacks and restrictions, such as the analytic hierarchy process’s excessive reliance on subjective factors, the matter-element extension theory’s correlation function’s overly objective nature, the fuzzy comprehensive evaluation’s insufficient consideration of the correlation between the evaluation indicators, and the BP neural network’s high data requirements and poor accuracy. It is also challenging to guarantee the correctness and dependability of the evaluation outcomes because the majority of studies only use one evaluation method.
Consequently, the COWA algorithm and the CRITIC method are combined and weighted in this research. Then, based on the weights obtained, it uses the cloud model, the extension cloud model, and the grey clustering evaluation method to form a comprehensive evaluation model. Finally, it uses the overall construction level of the enterprise safety management system to perform a comprehensive evaluation and reach a consistent evaluation level. The inadequacies of the pass evaluation model can be remedied by using this comprehensive evaluation model, which does a good job of accounting for the influence of subjective and objective criteria: the COWA algorithm can rearrange and combine data according to importance, rank objective data into priority positions, and assign weights first, which can well overcome the problem of too many information elements and get more objective weights. The CRITIC method can reflect the gap and correlation between indicators by calculating the contrast and conflict intensity of the indicators. The advantage of the extension cloud model over the matter-element extension theory is that it can rely on the benefits of randomness and vagueness of the cloud model to make up for the shortcomings of the randomness and vagueness of the characteristic values of things in the matter-element extension theory that have been ignored, combining the qualitative and quantitative advantages of matter-element extension theory. The grey clustering evaluation method, which has the benefits of the fuzzy comprehensive evaluation method and can also effectively handle the gray information of the evaluation object, is relatively easy to calculate and does not require a significant quantity of beginning data. The application of this comprehensive evaluation model may very well guarantee the accuracy and reliability of the evaluation results, offering a rigorous assurance for the accurate assessment of the company’s safety management level.

2. Methodology

2.1. Calculating Combined Weights

2.1.1. COWA Algorithm for Calculating Weight

By combining the number of improved weight vectors to determine the indicator weights, Chinese researchers were able to create the COWA algorithm, which was based on the ordered weighted averaging (OWA) algorithm proposed by Professor Yager [16] in the United States. The COWA algorithm is calculated as follows [17,18]:
(1)
Establishing the Scoring Dataset
Based on the aforementioned scoring results for each level of indicators, the initial data set (a1, a2, …, aj, …, an) is created. The initial data are then sorted in descending order starting at number 0 to obtain the restructured data set (b0, b1, b2, …, bj, …, bn−1), where b0 ≥ b1 ≥ b2 ≥ …≥ bj ≥ …≥ bn−1.
(2)
Calculating the Weighted Vector
The sorted reorganized data bj are assigned using the combinatorial number, and the weighted vector is also computed using Equation (1).
ω j + 1 = C n 1 j j = 0 n 1 c n 1 j = C n 1 j 2 n 1             j = 0,1 , 2 , , n 1
where j = 0 n 1 ω j + 1 = 1 , C n 1 j denotes the number of combinations after removing j data from n−1 data.
(3)
Calculation of Absolute and Relative Weight
The weighting vector ω j + 1 is used to weight the data bj in the restructured data set. Following that, the absolute weight of each evaluation indicator is then calculated using Equation (2), and the relative weight of each indication is determined using Equation (3).
ω ¯ i = j = 0 n 1 ω j + 1 b j
ω i = ω ¯ i i = 1 m ω ¯ i     ( i = 1,2 , , m )
where i 1 , m , j [ 1 , n ] , α 0,1 , and m denotes the number of indicators.

2.1.2. CRITIC Method for Calculating Weight

The CRITIC method is a comprehensive weighting method put forth by Diakoulaki [19] in 1995 for the evaluation of multi-indicators. It reflects the objective weights of the indicators by assessing the degree of contrast and conflict between the indicators [20], which is able to simplify the complex correlation data between the indicators and obtain a more precise weight. The strength of the contrast is expressed in terms of standard deviation; the larger the standard deviation, the more unstable the data are and the higher the weight obtained. The conflict is expressed in terms of the correlation coefficient. The larger the correlation coefficient, the smaller the conflict will be; on the other hand, the smaller the correlation coefficient, the lower the weight obtained. The CRITIC method is calculated as follows [21,22]:
(1)
Establishing the Initial Scoring Matrix
The above scoring matrices B1, B2, B3, and B4 are used as the initial data matrix X, respectively, and Xnp is the value of the scoring by expert n on the indicator p.
  X = ( X i j ) n × p x 11 x 1 p x n 1 x n p
(2)
Dimensionless Processing Indicator
The CRITIC method of dimensionless processing usually includes forward and reverse processing [23], as shown in Equations (5) and (6).
Positive indicators:
x i j = X i j m i n ( X 1 j , X 2 j , , X n j ) max X 1 j , X 2 j , , X n j m i n ( X 1 j , X 2 j , , X n j )
Negative indicators:
x i j = min X 1 j , X 2 j , , X n j X i j max X 1 j , X 2 j , , X n j m i n ( X 1 j , X 2 j , , X n j )
(3)
Calculation of Indicator Variability and Conflict
Indicator variability is usually reflected by calculating the standard deviation Sj with Equation (7); the higher the Sj value, the more information the indicator can convey and the more significant it is. Indicator conflict is usually reflected by calculating the Rj with Equation (8); the smaller the Rj, signifying a higher degree of information overlap, the indicator and other indicators of the conflict will be less and obtain a lower degree of importance [24].
x ¯ j = 1 n i = 1 n x i j S j = i = 1 n ( x i j x ¯ j ) 2 n 1
R j = i = 1 p ( 1 r i j )
where rij denotes the correlation coefficient of evaluation indicators i and j.
(4)
Calculation of Information Volume and Indicator Weight
The amount of information in the indicator is usually reflected by calculating the standard deviation Cj with Equation (9); the higher Cj, the more significant it is and it obtains a bigger weight.
C j = S j i = 1 p 1 r i j = S j × R j
Finally, the objective weight ω j of the jth evaluation indicator is calculated by Equation (10).
ω j = C j j = 1 p C j

2.1.3. Combined Weighting

The multiplicative combination weighting method can combine the weights determined by two different methods well, so the multiplicative combination weighting method Equation (11) is used to combine the weights determined by the COWA algorithm and the CRITIC method [25] and the value of the combined weighting ω is obtained.
ω = ω i ω j i = 1 n ω i ω j

2.2. Construction of Extension Cloud Evaluation Model

The extension cloud model is formed by combining the matter-element extension theory with a cloud model and replacing the eigenvalues of objects in the matter-element extension theory with the numerical eigenvalues of the cloud model [26]. The following are the steps in the evaluation of the extension cloud model [27,28].

2.2.1. Construction of Matter-Element to Be Evaluated and Standard Cloud

(1)
Construction of matter-element to be evaluated
The extension cloud model creates the object element R to be evaluated in the extension cloud model by replacing the eigenvalues V of objects in the matter-element extension theory with three numerical eigenvalues from the standard cloud model: expectation Ex, entropy En, and hyper entropy He [29].
R = N C 1 ( E x 1 , E n 1 , H e 1 ) N C 2 ( E x 2 , E n 2 , H e 2 ) N C n ( E x n , E n n , H e n )
where N is the matter-element to be evaluated, Cn is the evaluation object, and (Exn, Enn, Hen) is the cloud eigenvalue of the matter-element to be evaluated for Cn.
(2)
Determine the Standard Cloud
The calculation of the digital eigenvalues of the standard cloud parameters includes bilateral constraints and unilateral constraints, and the three digital eigenvalues (Ex, En, He) of the comment set are usually calculated and determined using the bilateral constraints [Xmin, Xmax] [30], and the calculation formula is shown in Equation (13).
E x = X m a x + X m i n 2 E n = X m a x X m i n 6 H e = k
where Xmax and Xmin denote the upper and lower limits of the score range corresponding to the evaluation level. The value of He reflects the randomness of the indicator, and k = 0.1 is taken to reflect realism.

2.2.2. Calculating Cloud Correlation

(1)
Calculating Indicator Layer Correlation
Let the score value of each indicator in the evaluation system be cloud drop x, and then generate a random number En′, which is subject to normal distribution with the expectation of En and the standard deviation of He. Then, the cloud correlation μ between the scoring value x of each indicator and the standard cloud is computed by Equation (14). Finally, the correlation obtained from the computation of each indicator is composed into a comprehensive judgment matrix Mi.
μ = e x p ( x E x ) 2 ( E n ) 2
M i = μ 11 μ 12 μ 1 n μ m 1 μ m 2 μ m n
where μmn is the cloud correlation of evaluation indicator m under evaluation level n, m is the number of evaluation indicators, and n is the evaluation level.
(2)
Calculating Target Layer Correlation
Equation (16) is used to calculate the criterion layer correlation UB, while Equation (17) is used to calculate the target layer correlation U.
U B = W C × M
U = W B × U B
where WC is the indicator weight of the indicator layer and WB is the indicator weight of the criterion layer.

2.2.3. Determination of Evaluation Levels

The principle of maximum affiliation is typically used to determine the evaluation level. The evaluation grade of the evaluation object N is j if Uj(N) = maxj=(1,2,…,n)Uj(N) in the evaluation vector U [31]. However, the use of the principle of maximum affiliation in determining the comprehensive evaluation grade can lead to situations where information is lost [32], so the comprehensive evaluation grade is determined by calculating the variable eigenvalue j′ through Equation (18) and the evaluation grade that is closest to the variable eigenvalue is the final comprehensive evaluation grade.
U ¯ j N = U j N m i n j U j ( N ) m a x j U j N m i n j U j ( N ) j = j = 1 n j × U ¯ j ( N ) j = 1 n U ¯ j ( N )

2.3. Construction of Grey Clustering Evaluation Model

Grey clustering evaluation method is an evaluation method that divides the evaluation level into grey categories and corresponds to a whitening weight function, respectively, and then calculates the whitening weights of each evaluation object at different grey categories, thus determining the grey category of the evaluation object. The following are the evaluation steps for the grey clustering evaluation method [33,34].

2.3.1. Constructing a Grey Clustering Evaluation Matrix

The grey clustering evaluation matrix X was created by using the scoring matrix.
X i = x i 11 x i 1 p x i n 1 x i n p
where i is the number of indicators in the indicator layer, and p is the number of experts.

2.3.2. Determine the Evaluation Level and Construct the Whitening Weight Function

According to the determined evaluation grade, the evaluation grade is divided into Based on the determined evaluation level, the evaluation level is divided into a corresponding number of grey categories. For the upper limit grey category, use the upper limit measure whitening weight function. For the lower limit grey category, use the lower limit measure whitening weight function. For the intermediate grey category, use the intermediate measure whitening weight function [35].

2.3.3. Constructing the Grey Clustering Weight Matrix

When the evaluation index xij belongs to grey category e, the clustering coefficient X i j e = k = 1 p f e ( x i j k ) , the total clustering coefficient X i j = e = 1 5 [ X i j e ] , and the grey clustering weight vector r i j e = X i j e X i j . Finally, the grey clustering weight vector is used to form the grey clustering weight matrix Ri.
R i = r i 11 r i 12 r i 110 r i 21 r i 22 r i 210 r i n 1 r i n 2 r i n 10

2.3.4. Construction of a Comprehensive Evaluation Matrix and Calculation of Evaluation Values

Firstly, the clustering evaluation matrix Zi of each indicator in the criterion layer is calculated by Equation (21), the comprehensive evaluation matrix Z 0 = [ Z 1 , Z 2 , , Z n ] T is obtained, and then the clustering evaluation is carried out to obtain the comprehensive evaluation vector M.
Z i = ω i × R i
where ω is the combined weight of each indicator in each layer.
M = w 0 Z 0 = M 1 , M 2 , , M n
Determine the evaluation grade of each indicator based on the principle of maximum affiliation. And, in order to reduce the loss of information due to the use of the principle of maximum affiliation when determining the comprehensive evaluation grade, the comprehensive evaluation value W was obtained by multiplying the comprehensive evaluation vector M with the grey category centroid vector U through Equation (23), thus determining the comprehensive evaluation grade.
W = M × U T

3. Case Analysis

3.1. Establishing the Evaluation Structure and Scoring

3.1.1. Establishing a Hierarchical Evaluation Structure

In this study, a mining enterprise is used as the engineering example background, and a hierarchical evaluation structure consisting of a target layer, criterion layer, and indicator layer is built in accordance with the actual situation of the enterprise, and the pertinent literature is reviewed [36,37,38]. The target layer A is set to be the “evaluation of the overall construction level of safety management system”, and the criterion layer B is set to be the “construction of preliminary infrastructure”, “risk grading and control”, “hidden danger investigation and management”, and “post-support work”. The indication layer C, which comprises 7, 10, 7, and 6 indicators, are set up. Table 1 displays the final hierarchical evaluation structure that has been built.

3.1.2. Scoring Dataset Acquisition

The evaluation levels have been classified into five categories after taking into account professional perspectives and examining the pertinent literature: “excellent”, “good”, “qualified”, “poor”, and “very poor”, which correspond to score ranges of [100,90], (90, 75], (75, 60], (60, 30], and (30, 0], respectively.
By distributing questionnaires to pertinent researchers and on-site managers of businesses, the results of ten surveys were gathered, and the scoring matrices B1, B2, B3, and B4 for each indicator were constructed. In the matrix, the columns stand in for evaluators, while the rows represent assessment indications.
B 1 = 88 70 80 83 86 60 90 91 74 86 85 85 65 89 96 75 90 90 93 73 98 90 74 89 85 86 77 88 80 60 74 65 70 65 70 85 66 83 83 88 70 86 98 75 90 93 91 80 96 88 65 88 86 83 62 71 77 61 69 65 70 55 73 85 65 75 75 70 50 80             B 2 = 89 91 85 91 95 87 88 88 76 85 86 93 79 95 90 89 80 89 85 90 90 96 91 96 95 89 90 86 90 91 83 88 80 85 90 86 89 92 83 90 75 80 69 79 80 70 78 79 61 77 88 90 86 93 87 76 83 88 75 79 96 98 90 98 96 90 96 91 90 95 74 80 80 85 89 71 85 85 69 88 70 74 65 78 80 60 70 74 63 66 80 95 70 90 85 70 65 75 60 75 B 3 = 88 66 85 90 84 70 82 80 74 76 85 80 79 88 90 86 89 93 89 80 86 90 83 89 89 86 80 90 85 70 80 78 77 70 86 92 80 90 89 85 80 85 96 90 98 96 95 91 90 89 71 88 89 89 80 75 70 69 71 71 66 65 61 85 70 80 85 75 65 65             B 4 = 80 79 85 60 66 83 86 80 88 65 65 80 90 86 90 70 79 90 88 80 85 60 70 88 74 66 61 59 65 75 85 85 74 65 74 80 93 90 90 75 86 88 82 85 86 61 60 77 70 68 65 55 65 73 75 79 70 65 70 85
The scoring matrix A for a criterion level indicator is obtained by calculating the average score of each expert regarding each indicator of the indicator level under a criterion level.
A = 80 88 81 76 82 88 80 77 88 91 88 84 84 87 87 79 69 75 78 67 80 85 86 77 89 94 94 87 78 81 83 75 67 70 68 66 71 77 78 74
The Cronbach’s alpha coefficient [39] was used to assess the validity and dependability of the score data. Higher values denote more reliable data when α ≥ 0.9 denotes very reliable data, when 0.9 > α ≥ 0.8 denotes relatively reliable data, when 0.8 > α ≥ 0.7 denotes acceptable data, when 0.7 > α ≥ 0.6 denotes doubtful data, when 0.6 > α ≥ 0.5 denotes bad data, and when 0.5 > α denotes unacceptable data.
The estimated alpha coefficients for B1 are 0.959 > 0.9, B2 is 0.968 > 0.9, B3 is 0.954 > 0.9, B4 is 0.921 > 0.9, and A is 0.979 > 0.9. The scoring information was highly reliable. Therefore, the scoring data had high reliability.

3.2. Calculating Combined Weights

3.2.1. COWA Algorithm for Calculating Weight

Firstly, take the first column score of indicator C11 as an example. The reorganization data set is obtained as (98, 96, 91, 90, 88, 88, 85, 85, 80, 77), and similarly, the overall reorganization data matrix of indicator C11 and other indicators can be obtained. Then, Equation (1) is applied to calculate the weighting vector, as shown in Table 2. Finally, Equations (2) and (3) are applied to calculate the absolute and relative weights of the indicators, respectively, as shown in Table 3.
In the table, S1–S10 denote raters; B1–4 denote guideline layers B1B4; C1–7 denote indicator layers C1–C7; C2–10 denote indicator layers C2–C10; C3–7 denote indicator layers C3–C7; and C4–6 denote indicator layers C4–C6.

3.2.2. CRITIC Method for Calculating Weight

First, the aforementioned scoring matrices B1, B2, B3, and B4 are utilized as the initial data matrix X, and because the scoring data are all positive indicators, Equation (5) is employed for the normalization procedure. Following the computation of the indicator variability, conflict, and information, the indicator objective weights ω j are eventually determined. The calculation results are shown in Table 3.

3.2.3. Combined Weighting

The multiplicative combination assignment method is applied to obtain the combination assignment weight values ω is shown in Table 3.

3.3. Construction of Extension Cloud Evaluation Model

3.3.1. Evaluation of Extension Cloud Model

Firstly, the digital eigenvalues of the standard cloud comment set are obtained by applying Equation (13) as follows: excellent (95, 1.6667, 0.1), good (82.5, 2.5, 0.1), qualified (67.5, 2.5, 0.1), poor (47.5, 4.1667, 0.1), and very poor (17.5, 5.8333, 0.1). Then, the cloud correlation of each indicator is obtained from Equation (14), which obtains the cloud correlation matrix between the scoring values of the evaluation indicators of the indicator layer and the standard cloud, M1, M2, M3, and M4.
M 1 = 0.0001 0.1062 0 0 0 0 0 0.9232 0 0 0 0.9992 0 0 0 0 0.835 0 0 0 0 0.9928 0 0 0 0 0 0.7725 0.0001 0 0 0.8147 0 0 0             M 2 = 0 0.9716 0 0 0 0.0005 0.0553 0 0 0 0 0.4864 0 0 0 0.0016 0.0341 0 0 0 0.0008 0.046 0 0 0 0 0.3345 0 0 0 0 0.9992 0 0 0 0 0.678 0 0 0 0 0.0138 0.0087 0 0 0 0.9079 0 0 0 M 3 = 0 0.2785 0 0 0 0 0.0311 0.0036 0 0 0 0.7022 0 0 0 0 0.2779 0 0 0 0 0.9992 0 0 0 0 0.0343 0.0031 0 0 0 0.7942 0 0 0             M 4 = 0 0.9968 0 0 0 0 0.5581 0 0 0 0 0.464 0 0 0 0 0 0.2778 0.0006 0 0 0 0.6055 0 0 0 0.9716 0 0 0
Finally, Equation (16) is used to calculate the criterion layer correlation UB, while Equation (17) is used to calculate the target layer correlation U.
U B = 0 0.5586 0.2361 0 0 0.0003 0.4617 0.0009 0 0 0 0.4605 0.001 0 0 0 0.4914 0.1375 0.0001 0
U = [ 0.0001 , 0.4864 , 0.0737 , 0 , 0 ]
Based on the principle of maximum affiliation, the evaluation grades of “preliminary infrastructure construction B1”, “risk grading and control B2”, “hidden danger investigation and management B3”, and “post-support work B4” are all good. Meanwhile, in order to reduce the information loss caused by the application of the principle of maximum affiliation, Equation (18) was calculated to obtain U ¯ 1 N = 0.0002 , U ¯ 2 N = 1 , U ¯ 3 N = 0.1573 , U ¯ 4 N = 0 , U ¯ 5 N = 0 , and the degree of the comprehensive evaluation grade of relevance of j′ = 2.1357, which is the closest to level 2.

3.3.2. Comparison and Validation of Cloud Model

In order to verify the accuracy of the evaluation results, the evaluation results obtained from the extension cloud model are compared with the cloud diagram generated by the cloud model. According to the numerical eigenvalues (Ex, En, He) calculated for each indicator and the number of operations set to 3000, we finally obtained the cloud diagrams: Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6.
In Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6, the horizontal axis represents the rating value, and the vertical axis represents the cloud correlation degree. The red, orange, yellow, blue, and green cloud maps correspond to five evaluation levels, while the black cloud map corresponds to the cloud evaluation level of the evaluation object.
It can be seen that the evaluation result of the “Preliminary infrastructure construction B1” cloud diagram is between qualified and good but leans more toward good, so the evaluation grade is good. The results of the “Risk classification and control B2” cloud diagram evaluation are highly overlapped with good results, so the evaluation grade is good. The results of the “Hidden danger investigation and management B3” cloud diagram evaluation mostly overlap with good, but with a slight bias toward the pass, so the evaluation grade is good. The results of the “Post-support work B4” cloud diagram evaluation are very close to the deviation between qualified and good but lean more toward good, so the evaluation grade is good. The results of the comprehensive evaluation cloud diagram “Evaluation of the overall construction level of safety management system A” are very close to good, only with a slight bias in favor of qualified, so the evaluation grade is good.

3.4. Construction of Grey Clustering Evaluation Model

Firstly, the grey clustering evaluation matrix X was created by combining the scoring matrices B1, B2, B3, and B4 for each of the aforementioned indicators. Meanwhile, according to the determined evaluation grade, the evaluation grade is divided into five grey categories e = 1, 2, 3, 4, 5, corresponding to “excellent”, “good”, “qualified”, “poor”, “very poor”, and the middle value of each grey category is taken as the center point of the grey category U = (95,82.5,67.5,47.5,17.5). Construct whitening weight functions based on the grey category, as shown in Table 4.

Constructing the Grey Clustering Weight Matrix

Then, the clustering coefficients, total clustering coefficient, and the grey clustering weight vector of evaluation indicators B1, B2, B3, and B4 at each grey category are calculated, respectively, and the gray clustering weight vectors comprise the grey clustering weight matrices of each evaluation indicator in the index layer R1, R2, R3, and R4. The clustering weight vectors are the columns of the matrix, while the rows of the matrix are the metrics in the metrics layer.
R 1 = 0.3413 0.3399 0.2594 0.0594 0 0.2377 0.2737 0.3047 0.1839 0 0.3010 0.3205 0.2864 0.0921 0 0.2959 0.3324 0.2753 0.0964 0 0.3058 0.3226 0.2764 0.0952 0 0.2314 0.2664 0.2959 0.2064 0 0.3185 0.3229 0.2726 0.0860 0             R 2 = 0.3106 0.3262 0.2734 0.0898 0 0.3492 0.3368 0.2594 0.0547 0 0.2910 0.3146 0.2816 0.1128 0 0.3518 0.3402 0.2571 0.0508 0 0.3498 0.3424 0.2573 0.0505 0 0.2893 0.3091 0.2827 0.1190 0 0.3075 0.3263 0.2740 0.0949 0 0.3208 0.3332 0.2681 0.0780 0 0.2723 0.2985 0.2859 0.1434 0 0.3161 0.3257 0.2720 0.0862 0 R 3 = 0.3339 0.3359 0.2638 0.0665 0 0.2695 0.3010 0.2939 0.1357 0 0.3180 0.3336 0.2679 0.0807 0 0.3341 0.3353 0.2640 0.0665 0 0.3179 0.3369 0.2497 0.0955 0 0.2703 0.3043 0.2903 0.1351 0 0.3003 0.3201 0.2741 0.1055 0             R 4 = 0.3050 0.3260 0.2749 0.0941 0 0.2895 0.3200 0.2803 0.1103 0 0.2929 0.3127 0.2793 0.1151 0 0.2219 0.2555 0.3025 0.2201 0 0.2442 0.2789 0.3030 0.1744 0 0.3009 0.3283 0.2746 0.0963 0
Finally, the clustering evaluation matrix Zi of each indicator in the criterion layer is calculated by Equation (21), the comprehensive evaluation matrix Z0 is obtained, and then the clustering evaluation is carried out to obtain the comprehensive evaluation vector M = [ 0.2993 , 0.3172 , 0.2766 , 0.1068 , 0 ] .
Z 0 = 0.2889 0.3096 0.2813 0.1202 0 0.3161 0.3248 0.2711 0.0880 0 0.3031 0.3217 0.2739 0.1013 0 0.2796 0.3061 0.2847 0.1296 0
According to the principle of maximum affiliation, the grey category of “Preliminary infrastructure construction B1”, “Risk grading and control B2”, “Hidden danger investigation and management B3”, and “Post-support work B4” is e = 2, so the evaluation grade is good. Meanwhile, in order to reduce the loss of information due to the use of the principle of maximum affiliation when determining the comprehensive evaluation grade, the comprehensive evaluation value W = 78.3525 was obtained through Equation (23).
Therefore, the comprehensive evaluation value of the target level “Evaluation of the overall construction level of safety management system A” is 78.3525, which belongs to the score range of (90,75], and the comprehensive evaluation grade is good.

4. Results and Discussion

Based on the comprehensive evaluation results of three evaluation methods: the extension cloud model, the cloud model, and the grey clustering evaluation method, it can be seen that the evaluation results of the criterion layer are consistent with those of the target layer, and both are classified as good. In the indicator layer, the evaluation results of “Importance level of leadership”, “Choice of risk identification methods”, “Choice of risk evaluation methods”, and “Risk level classification” are good in the extension cloud model, while the evaluation results are excellent in the grey clustering evaluation method. All other indications are good, with the exception of those that qualify: “Safety production standardization construction level”, “Overall cultural level of employees”, “Internal and external communication mechanism”, and “Publicity and education of the system”.
As a result, although the enterprise’s overall construction level of the safety management system is fairly good, there is still potential for further optimization, which can be begun from the indicators with lower evaluation levels. For the “Safety production standardization construction level”, we can check and rectify each deduction in line with the demands of the work safety standardization evaluation in order to raise the level. For the “Overall cultural level of employees”, remedial action can be taken to compensate for the low literacy level of employees by enhancing professional knowledge and skills education after joining the workforce or by appropriately raising the threshold of academic qualifications for joining the workforce. The “Internal and external communication mechanism” can be improved by enhancing communication feedback, expanding communication methods, setting up suggestion rewards, and other measures so as to motivate employees to participate in communication. The “Publicity and education of the system” can be improved through the regular organization of the safety management system publicity and education conference, the organization of the safety system knowledge contests, and other forms to enhance the staff’s understanding of the enterprise’s safety system.

5. Limitations and Further Research

The scoring data will inevitably be influenced by some degree of subjective factors because the scoring data are obtained in the form of questionnaires, even though this study has minimized the degree of influence of subjective factors in determining the weights of the indicators by combining the COWA operator with the CRITIC method of assigning weights. Second, in determining the structure of the evaluation indicators, although this study has maximized the consideration of various factors in a variety of ways, it is inevitable that there will be cases of ill-consideration. To reduce the impact of subjective factors and ensure the reliability of the data, future studies should further optimize the collection of evaluation data and look for better reliability and validity tests for the gathered scoring data. In addition, since the comprehensive assessment approach can be effectively applied to the field of safety evaluation, future studies can focus on using the method in a variety of other fields to increase its applicability.
Some more sophisticated advanced optimization algorithms have been developed, including self-adaptive algorithms, polyploid algorithms, metaheuristics, hybrid heuristics, hyper-heuristics, and island algorithms. The problems of large-scale black-box optimization, CDT truck operation planning, vehicle transportation routing decision-making, accident prevention countermeasures at road junctions, and pheromone maps applications can now be effectively solved using these algorithms in the fields of reinforcement learning [40], scheduling [41], transportation [42], decision-making [43], and hyper-heuristics [44], respectively. In order to improve safety evaluation outcomes, further study can be directed toward applying these algorithms to safety management evaluation or combining them with conventional evaluation techniques.

6. Conclusions

The COWA algorithm and the CRITIC method were combined in this paper, and using the multiplier weighting method to combine the weights will result in comprehensive weights that can address the problem of having too many components in the indicators as well as comprehensively account for gaps and correlations between them. Meanwhile, the overall construction level of the mining enterprise’s safety management system was evaluated by using the extension cloud model, cloud model, and grey clustering evaluation method, and it was finally determined the evaluation level of the enterprise’s overall construction level of safety management system is good, and the evaluation level of each evaluation indicator of the criterion layer is good. This method overcomes the problem of the inaccuracy and unreliability of the evaluation results caused by the use of a single evaluation method.
According to the evaluation grade of indicator level that was determined by the extension cloud model and grey clustering evaluation method, the evaluation grade of the four evaluation indicators, namely, “Safety production standardization construction level”, “Overall cultural level of employees”, “Internal and external communication mechanism”, and “Publicity and education of the system”, are only qualified. This method may effectively improve the enterprise safety management capability and achieve the sustainable development of enterprise safety by identifying the weak points in the enterprise safety management system and suggesting appropriate improvement actions.

Author Contributions

Conceptualization, S.D. and X.L.; methodology, S.D.; investigation, Y.Y., X.H., H.D. and W.X.; data curation, S.D.; visualization, S.D. and X.J.; writing—original draft preparation, S.D.; writing—review and editing S.D. and X.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aven, T.; Thekdi, S. Enterprise Risk Management; Taylor and Francis: New York, NY, USA, 2020. [Google Scholar]
  2. Álvarez-Santos, J.; Miguel-Dávila, J.; Herrera, L.; Nieto, M. Safety Management System in TQM environments. Saf. Sci. 2018, 101, 135–143. [Google Scholar] [CrossRef]
  3. You, Q.; Yao, Q.; Song, R.; Yu, K.; Xu, C.; Cao, H. Multi-dimensional safety risk assessment on coal mines under the profitability dilemma. Sci. Rep. 2023, 13, 2687. [Google Scholar] [CrossRef] [PubMed]
  4. Guo, Q.; Amin, S.; Hao, Q.; Haas, O. Resilience assessment of safety system at subway construction sites applying analytic network process and extension cloud models. Reliab. Eng. Syst. Saf. 2020, 201, 106956. [Google Scholar] [CrossRef]
  5. Jiskani, I.M.; Han, S.; Rehman, A.U.; Shahani, N.M.; Tariq, M.; Brohi, M.A. An Integrated Entropy Weight and Grey Clustering Method-Based Evaluation to Improve Safety in Mines. Min. Metall. Explor. 2021, 38, 1773–1787. [Google Scholar] [CrossRef]
  6. Peng, J.; Zhang, Q. Safety Performance Assessment of Construction Sites under the Influence of Psychological Factors: An Analysis Based on the Extension Cloud Model. Int. J. Env. Res. Pub. He. 2022, 19, 15378. [Google Scholar] [CrossRef] [PubMed]
  7. Chen, H.; Yang, S.; Feng, Z.; Liu, Y.; Qin, Y. Safety evaluation of buildings adjacent to shield construction in karst areas: An improved extension cloud approach. Eng. Appl. Artif. Intel. 2023, 124, 106386. [Google Scholar] [CrossRef]
  8. Li, D.; Gong, Y. The design of power grid data management system based on blockchain technology and construction of system security evaluation model. Energy Rep. 2022, 8, 466–479. [Google Scholar] [CrossRef]
  9. Guo, S.; Li, J.; Liang, K.; Tang, B. Improved safety checklist analysis approach using intelligent video surveillance in the construction industry: A case study. Int. J. Occup. Saf. Ergo. 2021, 27, 1064–1075. [Google Scholar] [CrossRef]
  10. Maihemuti, S.; Wang, W.; Wu, J.; Wang, H. New energy power system operation security evaluation based on the SWOT analysis. Sci. Rep. 2022, 12, 12680. [Google Scholar] [CrossRef]
  11. Mahdinia, M.; Yarandi, M.S.; Jafarinia, E.; Soltanzadeh, A. Development of a New Technique for Safety Risk Assessment in Construction Projects Based on Fuzzy Analytic Hierarchy Process. ASCE-ASME J. Risk Uncertain. Eng. Syst. Part A Civ. Eng. 2021, 7, 04021037. [Google Scholar] [CrossRef]
  12. Klinke, A.; Renn, O. A new approach to risk evaluation and management: Risk-based, precaution-based, and discourse-based strategies. Risk Anal. 2002, 22, 1071–1094. [Google Scholar] [CrossRef] [PubMed]
  13. Ju, W.; Wu, J.; Kang, Q.; Jiang, J.; Xing, Z. A method based on the theories of game and extension cloud for risk assessment of construction safety: A case study considering disaster-inducing factors in the construction process. J. Build. Eng. 2022, 62, 105317. [Google Scholar] [CrossRef]
  14. Tan, Q.; Wei, T.; Peng, W.; Yu, Z.; Wu, C. Comprehensive evaluation model of wind farm site selection based on ideal matter element and grey clustering. J. Clean. Prod. 2020, 272, 122658. [Google Scholar] [CrossRef]
  15. Qiao, H.; Wen, S.; Wu, L.; Zeng, B. Research on wind power project investment risk evaluation based on fuzzy-gray clustering trigonometric function. Energy Rep. 2022, 8, 1191–1199. [Google Scholar] [CrossRef]
  16. Yager, R.R. On Ordered Weighted Averaging Aggregation Operators in Multicriteria Decisionmaking. In Readings in Fuzzy Sets for Intelligent Systems; Dubois, D., Prade, H., Yager, R.R., Eds.; Morgan Kaufmann: Cambridgem, MA, USA, 1993; pp. 80–87. [Google Scholar]
  17. Su, G.; Jia, B.; Wang, P.; Zhang, R.; Shen, Z. Risk identification of coal spontaneous combustion based on COWA modified G1 combination weighting cloud model. Sci. Rep. 2022, 12, 2992. [Google Scholar] [CrossRef]
  18. Zhang, J.; Lang, X.; Jing, Y.; Kang, J.; You, Q.; Shang, Z.; Shi, M.; Dai, H. Vulnerability assessment of hydrogen stations based on cloud center of gravity theory. Int. J. Hydrogen. Energy 2023, 5, 295. [Google Scholar] [CrossRef]
  19. Diakoulaki, D.; Mavrotas, G.; Papayannakis, L. Determining objective weights in multiple criteria problems: The critic method. Comput. Oper. Res. 1995, 22, 763–770. [Google Scholar] [CrossRef]
  20. Abdel-Basset, M.; Mohamed, R. A novel plithogenic TOPSIS- CRITIC model for sustainable supply chain risk management. J. Clean. Prod. 2020, 247, 119586. [Google Scholar] [CrossRef]
  21. Khargotra, R.; Kumar, R.; András, K.; Fekete, G.; Singh, T. Thermo-hydraulic characterization and design optimization of delta-shaped obstacles in solar water heating system using CRITIC-COPRAS approach. Energy 2022, 261, 125236. [Google Scholar] [CrossRef]
  22. Ye, F.; Sun, J.; Wang, Y.; Nedjah, N.; Bu, W. A novel method for the performance evaluation of institutionalized collaborative innovation using an improved G1-CRITIC comprehensive evaluation model. J. Innov. Knowl. 2023, 8, 100289. [Google Scholar] [CrossRef]
  23. Zhang, L.; Cheng, Q.; Qu, S. Evaluation of Railway Transportation Performance Based on CRITIC-Relative Entropy Method in China. J. Adv. Transp. 2023, 2023, 5257482. [Google Scholar] [CrossRef]
  24. Zhong, S.; Chen, Y.; Miao, Y. Using improved CRITIC method to evaluate thermal coal suppliers. Sci. Rep. 2023, 13, 195. [Google Scholar] [CrossRef] [PubMed]
  25. Du, Y.; Zheng, Y.; Wu, G.; Tang, Y. Decision-making method of heavy-duty machine tool remanufacturing based on AHP-entropy weight and extension theory. J. Clean. Prod. 2020, 252, 119607. [Google Scholar] [CrossRef]
  26. Li, Q.; Wang, Z.; Lu, L.; Ma, Q. Construction Risk Evaluation of Poor Geological Channels Based on Cloud Model-Improved AHP-Matter-Element Theory. Sustainability 2021, 13, 9632. [Google Scholar] [CrossRef]
  27. Dong, J.; Liu, D.; Liu, Y.; Huo, H.; Dou, X.; Bao, A. Trading performance evaluation for traditional power generation group based on an integrated matter-element extension cloud model. Energy Rep. 2021, 7, 3074–3089. [Google Scholar] [CrossRef]
  28. Lu, Y.; Zhang, G.; Qi, J.; Huang, Y. Operational state assessment of cross-linked polyethylene power cable on the basis of an optimized cloud matter-element theory. Sustain. Energy Techn. 2021, 48, 101584. [Google Scholar] [CrossRef]
  29. Zou, Y.; Zhang, Y.; Ma, Z. Emergency Situation Safety Evaluation of Marine Ship Collision Accident Based on Extension Cloud Model. J. Mar. Sci. Eng. 2021, 9, 1370. [Google Scholar] [CrossRef]
  30. Wu, T.; Gao, Y.; Zhou, Y.; Sun, H. A novel comprehensive quantitative method for various geological disaster evaluations in underground engineering: Multidimensional finite interval cloud model (MFICM ). Environ. Earth Sci. 2021, 80, 1–18. [Google Scholar] [CrossRef]
  31. Yao, X.; Deng, H.; Zhang, T.; Qin, Y. Multistage fuzzy comprehensive evaluation of landslide hazards based on a cloud model. PLoS ONE 2019, 14, e0224312. [Google Scholar] [CrossRef]
  32. Gu, H.; Fu, X.; Zhu, Y.; Chen, Y.; Huang, L. Analysis of Social and Environmental Impact of Earth-Rock Dam Breaks Based on a Fuzzy Comprehensive Evaluation Method. Sustainability 2020, 12, 6239. [Google Scholar] [CrossRef]
  33. Karakoç, Ö.; Avni Es, H.; Fırat, S.Ü. Evaluation of the development level of provinces by grey cluster analysis. Procedia Comput. Sci. 2019, 158, 135–144. [Google Scholar] [CrossRef]
  34. Zhao, B.; Ren, Y.; Gao, D.; Xu, L. Performance ratio prediction of photovoltaic pumping system based on grey clustering and second curvelet neural network. Energy 2019, 171, 360–371. [Google Scholar] [CrossRef]
  35. Xie, N.M.; Su, B.T.; Chen, N.L. Construction mechanism of whitenization weight function and its application in grey clustering evaluation. J. Syst. Eng. Electron. 2019, 30, 121–131. [Google Scholar]
  36. Khalid, U.; Sagoo, A.; Benachir, M. Safety Management System (SMS) framework development—Mitigating the critical safety factors affecting Health and Safety performance in construction projects. Saf. Sci. 2021, 143, 105402. [Google Scholar] [CrossRef]
  37. Pilanawithana, N.M.; Feng, Y.; London, K.; Zhang, P. Framework for measuring resilience of safety management systems in Australian building repair and maintenance companies. J. Saf. Res. 2023, 85, 405–418. [Google Scholar] [CrossRef] [PubMed]
  38. Yang, W.; He, S. Coal mine safety management index system and environmental risk model based on sustainable operation. Sustain. Energy Techn. 2022, 53, 102721. [Google Scholar] [CrossRef]
  39. Lee, J.C. Coefficient alpha and the internal structure of tests. Psychometrika 1951, 16, 297–334. [Google Scholar]
  40. Chen, M.; Tan, Y. SF-FWA: A Self-Adaptive Fast Fireworks Algorithm for effective large-scale optimization. Swarm. Evol. Comput. 2023, 80, 101314. [Google Scholar] [CrossRef]
  41. Dulebenets, M.A. An Adaptive Polyploid Memetic Algorithm for scheduling trucks at a cross-docking terminal. Inform. Sci. 2021, 565, 390–421. [Google Scholar] [CrossRef]
  42. Pasha, J.; Nwodu, A.L.; Fathollahi-Fard, A.M.; Tian, G.; Li, Z.; Wang, H.; Dulebenets, M.A. Exact and metaheuristic algorithms for the vehicle routing problem with a factory-in-a-box in multi-objective settings. Adv. Eng. Inform. 2022, 52, 101623. [Google Scholar] [CrossRef]
  43. Singh, P.; Pasha, J.; Moses, R.; Sobanjo, J.; Ozguven, E.E.; Dulebenets, M.A. Development of exact and heuristic optimization methods for safety improvement projects at level crossings under conflicting objectives. Reliab. Eng. Syst. Saf. 2022, 220, 108296. [Google Scholar] [CrossRef]
  44. Singh, E.; Pillay, N. A study of ant-based pheromone spaces for generation constructive hyper-heuristics. Swarm. Evol. Comput. 2022, 72, 101095. [Google Scholar] [CrossRef]
Figure 1. Number of fatalities in production safety accidents in China.
Figure 1. Number of fatalities in production safety accidents in China.
Sustainability 15 15734 g001
Figure 2. Preliminary infrastructure construction B1 cloud diagram.
Figure 2. Preliminary infrastructure construction B1 cloud diagram.
Sustainability 15 15734 g002
Figure 3. Risk grading and control B2 cloud diagram.
Figure 3. Risk grading and control B2 cloud diagram.
Sustainability 15 15734 g003
Figure 4. Hidden danger investigation and management B3 cloud diagram.
Figure 4. Hidden danger investigation and management B3 cloud diagram.
Sustainability 15 15734 g004
Figure 5. Post-support work B4 cloud diagram.
Figure 5. Post-support work B4 cloud diagram.
Sustainability 15 15734 g005
Figure 6. Evaluation of overall construction level of safety management system A cloud diagram.
Figure 6. Evaluation of overall construction level of safety management system A cloud diagram.
Sustainability 15 15734 g006
Table 1. Security management hierarchy evaluation structure.
Table 1. Security management hierarchy evaluation structure.
Target LayerCriterion LayerIndicator Layer
Evaluation of the overall construction level of safety management system APreliminary infrastructure construction B1Importance level of leadership C11
Safety production standardization construction level C12
Soundness of relevant departments and institutions C13
Degree of safety education and training C14
Degree of capital investment in safety production C15
Overall cultural level of the employees C16
Integrity of security system documentsC17
Risk grading and control B2Division of work units C21
Choice of risk identification methods C22
Scope of risk identification C23
Choice of risk evaluation methods C24
Risk level classification C25
Development and implementation of risk control measures C26
Risk control hierarchy division C27
Establishment of risk grading and control checklist C28
Dynamic updates of risks C29
Risk disclosure C210
Hidden danger investigation and management B3Development of the hidden dangers investigation plan C31
Reporting of hidden dangers C32
Hidden dangers investigation and control measures C33
Establishment of checklist and ledger for hidden dangers investigation and control C34
Dynamic updates of hidden dangers C35
Rectification and acceptance of hidden dangers C36
Closed-loop management C37
Post-support work B4Updating and improvement of the system C41
Implementation of the appraisal, reward, and punishment system C42
Archiving and management of recorded documents C43
Internal and external communication mechanism C44
Publicity and education of the system C45
Continuous improvement capability C46
Table 2. Indicator weighting vectors.
Table 2. Indicator weighting vectors.
S1S2S3S4S5S6S7S8S9S10
B1–40.00200.01760.07030.16410.24610.24610.16410.07030.01760.0020
C1–70.00200.01760.07030.16410.24610.24610.16410.07030.01760.0020
C2–100.00200.01760.07030.16410.24610.24610.16410.07030.01760.0020
C3–70.00200.01760.07030.16410.24610.24610.16410.07030.01760.0020
C4–60.00200.01760.07030.16410.24610.24610.16410.07030.01760.0020
Table 3. COWA, CRITIC weight, and combined weight.
Table 3. COWA, CRITIC weight, and combined weight.
IndicatorCOWACRITICCombined Weight
Absolute
Weight
Relative
Weight
Indicator VariabilityIndicator ConflictInformation VolumeWeight
criterion layerB179.58790.24627.6420.1781.3610.20750.2032
B284.89450.26277.6330.2151.6380.24980.2610
B382.42970.2557.1030.3222.2840.34820.3532
B476.30080.23616.5120.1961.2750.19440.1826
indicator layerC1187.83400.15726.4940.8835.7340.08440.0945
C1268.70120.1235.8360.9795.7160.08410.0737
C1383.87700.15027.561.0237.730.11370.1217
C1483.25980.14919.6490.9088.7640.1290.1370
C1584.06640.15058.8920.928.1770.12030.1290
C1665.57420.11749.4991.86217.6840.26020.2176
C1785.27150.152710.1261.39814.1590.20830.2266
C2183.89060.09948.2391.67313.7810.08440.0841
C2289.97270.10667.9762.80722.3840.13710.1464
C2380.34960.09528.9851.57614.1560.08670.0827
C2489.82230.10646.9922.22215.5330.09510.1014
C2589.16600.10565.8131.5318.9020.05450.0577
C2680.05660.094910.6961.44515.4520.09460.0899
C2783.77540.09939.4662.43323.0350.1410.1403
C2886.25780.10226.4642.11413.6640.08370.0857
C2975.45120.089411.6221.66819.3820.11870.1063
C21085.27540.1019.0461.88417.040.10430.1055
C3187.92190.15157.2461.2559.0960.11060.1182
C3274.08010.12768.2391.87515.4440.18770.1690
C3385.43160.14727.8911.088.5210.10360.1076
C3487.98830.15167.3071.2599.2010.11180.1196
C3583.69340.14428.3430.9417.8540.09550.0971
C3677.13870.13298.2461.28910.6320.12920.1211
C3784.12500.144910.3792.07421.5230.26160.2674
C4182.99410.18087.4991.1228.4130.12460.1343
C4280.82420.17617.6571.2769.7720.14470.1520
C4382.21480.179110.8951.73318.8820.27960.2986
C4462.82620.13695.8171.317.6220.11290.0922
C4568.20700.14867.7751.81114.0830.20860.1849
C4681.96880.17865.8591.4948.7530.12960.1380
Table 4. Grey category whitening weight function.
Table 4. Grey category whitening weight function.
Evaluation GradeGrey CategoryGrey NumberWhitening Weight Function
Excellente = 1 1 [ 0,95 , ) f 1 x i j k = x i j k 95 , x i j k [ 0,95 ] 1 , x i j k [ 95 , ) 0 , x i j k [ 0 , )
Goode = 2 2 [ 0,82.5,165 ] f 2 x i j k = x i j k 82.5 , x i j k [ 0,82.5 ] ( 165 x i j k ) 82.5 , x i j k [ 82.5,165 ] 0 , x i j k [ 0,165 ]
Qualifiede = 3 3 [ 0,67.5,135 ] f 3 x i j k = x i j k 67.5 , x i j k [ 0,67.5 ] ( 135 x i j k ) 67.5 , x i j k [ 67.5,135 ] 0 , x i j k [ 0,135 ]
Poore = 4 4 [ 0,47.5,95 ] f 4 x i j k = x i j k 47.5 , x i j k [ 0,47.5 ] ( 95 x i j k ) 47.5 , x i j k [ 47.5,95 ] 0 , x i j k [ 0,95 ]
Very Poore = 5 5 [ 0,17.5,35 ] f 5 x i j k = 1 , x i j k [ 0,17.5 ] 35 x i j k , x i j k [ 17.5,35 ] 0 , x i j k [ 0,35 ]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Duan, S.; Li, X.; Jiang, X.; Huang, X.; Yang, Y.; Du, H.; Xiao, W. Extension Cloud Model and Grey Clustering Evaluation of Enterprise Safety Management System: Based on COWA-CRITIC Combination Weighting. Sustainability 2023, 15, 15734. https://doi.org/10.3390/su152215734

AMA Style

Duan S, Li X, Jiang X, Huang X, Yang Y, Du H, Xiao W. Extension Cloud Model and Grey Clustering Evaluation of Enterprise Safety Management System: Based on COWA-CRITIC Combination Weighting. Sustainability. 2023; 15(22):15734. https://doi.org/10.3390/su152215734

Chicago/Turabian Style

Duan, Shanda, Xuefeng Li, Xiashi Jiang, Xuxing Huang, Yihao Yang, Han Du, and Wuning Xiao. 2023. "Extension Cloud Model and Grey Clustering Evaluation of Enterprise Safety Management System: Based on COWA-CRITIC Combination Weighting" Sustainability 15, no. 22: 15734. https://doi.org/10.3390/su152215734

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop