Next Article in Journal
“Avoidance” or “Approach”?—The Compensatory Consumption Psychological Mechanism of Environmental Moral Emotions on Green Sports Stadium Consumption Intention
Previous Article in Journal
Comparative Stability Analysis of High and Steep Rock Slopes Before and After Ecological Restoration Using Rocscience Slide
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Calculation of Buffer Zone Size for Critical Chain of Hydraulic Engineering Considering the Correlation of Construction Period Risk

1
State Grid Xinyuan Group Co., Ltd., Beijing 100052, China
2
Shandong Taishan Pumped Storage Co., Ltd., Tai’an 271000, China
3
School of Water Conservancy, North China University of Water Resources and Electric Power, Zhengzhou 450046, China
*
Author to whom correspondence should be addressed.
Buildings 2026, 16(3), 557; https://doi.org/10.3390/buildings16030557
Submission received: 26 November 2025 / Revised: 22 January 2026 / Accepted: 27 January 2026 / Published: 29 January 2026
(This article belongs to the Topic Sustainable Building Materials)

Abstract

Due to their large scale, long duration, complex geological conditions, and multiple stakeholders, water conservancy engineering projects are subject to diverse, interrelated, and uncertain risk factors that affect the construction timeline. Traditional critical chain buffer calculation methods, such as the cut-and-paste method and the root variance method, typically assume the independence of risks, which limits their effectiveness in addressing schedule delays caused by correlated risk events. To overcome this limitation, this paper proposes a novel critical chain buffer calculation approach that explicitly incorporates risk correlation analysis. A fuzzy DEMATEL-ISM-BN model is employed to systematically identify the interrelationships and influence pathways among schedule risk factors. Bayesian network inference is then used to quantify the overall occurrence probability while accounting for risk correlations. By integrating critical chain management theory, risk impact coefficients are introduced to improve the traditional root variance method, resulting in a buffer calculation model that captures interdependencies among schedule risks. The effectiveness of the proposed model is validated through a case study of the X Pumped Storage Power Station. The results indicate that, compared with conventional methods, the proposed approach significantly enhances the robustness of project schedule planning under correlated risk conditions while appropriately increasing buffer sizes. Consequently, the adaptability and reliability of schedule control are improved. This study provides novel theoretical tools and practical insights for schedule risk management in complex engineering projects.

1. Introduction

In the field of project management, the Critical Chain Method (CCM) is a widely recognized approach for project planning and execution. By incorporating mechanisms such as project buffers and feeding buffers, CCM effectively addresses inherent task uncertainties and mitigates the impact of human factors, including the “student syndrome.” Determining appropriate buffer sizes is crucial for minimizing planned project duration while maximizing the probability of on-time completion. Consequently, buffer sizing represents an issue of substantial theoretical interest and practical significance.
The development of buffer estimation methods has progressed from empirical simplifications to increasingly sophisticated approaches. Early representative methods include the cut-and-paste technique proposed by Goldratt et al. [1], which defines the project buffer as half the sum of the safety times of activities on the critical chain, and Newbold’s [2] root variance method, which is derived from the central limit theorem. Subsequent studies extensively examined the applicability and rationality of these foundational approaches. For instance, Herroelen et al. [3,4], based on monitoring data from projects of different scales, found that although the cut-and-paste method is computationally simple, it tends to produce overly conservative buffers and is more suitable for small-scale projects. Hoel et al. [5] employed Monte Carlo simulation to determine buffer sizes as the deviation between completion durations at specified confidence levels and the mean duration, thereby reducing dependence on managerial judgment. In recent years, research on buffer estimation has shifted toward more multidimensional and refined methodologies. On the one hand, scholars have sought to more accurately characterize the fuzziness and uncertainty of activity durations. Kołodziej et al. [6] applied fuzzy logic models to buffer estimation to reduce overall project duration, while Fatemeh et al. [7] used triangular interval fuzzy sets to flexibly quantify activity uncertainty. Li et al. [8] further explored data-driven approaches for dynamic buffer adjustment. On the other hand, the research scope has expanded to incorporate multiple constraints, including resources, information, and human factors. Wu et al. [9] improved scheduling efficiency in multi-project environments by jointly optimizing resource and buffer allocation. Nie et al. [10,11,12] conducted a series of studies integrating multi-objective and multi-resource constraints with relay potential, various forms of information entropy, and flexible resource substitution efficiency in buffer zones. Zhang Junguang et al. [13,14] introduced the concepts of resource time value and activity elasticity to guide the configuration and consumption of resource buffers. Huang Jianwen et al. [15] proposed a buffer setting method that explicitly considers resource flexibility, while Zhang Junguang et al. [16] further developed a milestone-based phased buffer monitoring strategy from the perspective of activity- and phase-level risk measurement. These studies have substantially enriched the theoretical and methodological foundations of buffer management. However, a common limitation of these mainstream approaches is their implicit assumption that the risk factors affecting project duration are independent or can be linearly aggregated. Multi-criteria decision analysis (MCDA) methods are widely used in engineering risk studies to rank the importance of risk factors and identify priorities, owing to their ability to integrate multidimensional evaluation information. However, MCDA methods generally yield static weights or ranking results, which limits their ability to capture causal dependencies among risk factors and to represent probabilistic risk propagation mechanisms. Moreover, such methods are not well suited to directly supporting quantitative critical chain buffer calculations. Regardless of whether statistical root mean square variance methods, Monte Carlo simulation, or more advanced approaches incorporating fuzziness, entropy, resource constraints, or multi-criteria decision analysis (MCDA) for risk prioritization are employed, existing buffer calculation methods have not systematically integrated inter-risk correlations, chain reactions, or nonlinear interactions. Consequently, the resulting buffers may be insufficient to fully absorb the compounded and amplified uncertainty arising from interconnected risk networks. In contrast, DEMATEL and ISM are well suited to revealing causal structures among risk factors, while Bayesian networks excel at probabilistic reasoning under uncertainty. Together, these methods are well aligned with the research objective of this study, namely the calculation of buffer zones based on risk associations.
In engineering project schedule risk analysis, another important research stream focuses on the interrelationships and influence mechanisms among risk factors. To examine complex risk networks, scholars have employed a variety of systems analysis methods. For instance, Bai Libiao et al. [17] applied the Analytic Network Process (ANP) to analyze interactive relationships among schedule risk indicators in highway project portfolio construction and integrated System Dynamics (SD) to develop a risk level assessment model. Liu Junyan [18] introduced Bayesian networks (BNs) into schedule risk analysis by establishing a BN–CPM model to infer correlations among risk factors. Huang Jianwen et al. [19] combined the Interpretive Structural Model (ISM) with System Dynamics to investigate the transmission pathways of schedule risks in underground cavern complex construction. Huang Ying et al. [20] considered both linkage uncertainty and project characteristic uncertainty in buffer setting. Based on the Work Breakdown Structure (WBS) and a risk checklist approach, they identified schedule uncertainties in metro station construction projects, established an uncertainty indicator system, and determined safety factors for buffer size calculation.
Overall, these approaches have contributed to revealing the structural complexity, causal relationships, and dynamic evolution of project schedule risk systems. However, a notable limitation persists: analytical models that focus on risk identification and assessment are often weakly integrated with project schedule management tools oriented toward planning and decision-making, such as the Critical Chain Method (CCM). Consequently, analytical outputs—such as risk priority rankings and inter-factor correlation structures—cannot be readily or quantitatively translated into input parameters for critical chain buffer sizing. This disconnect substantially constrains the practical applicability of risk analysis results in supporting final buffer-setting decisions.
In recent years, buffer estimation methodologies have continued to evolve and can generally be classified into three categories. First, approaches grounded in statistical principles—such as root mean square variance methods and Monte Carlo simulation—typically assume the independence of risk events and therefore have limited capability to capture risk correlations. Second, fuzzy theory–based methods are effective in handling uncertainty but largely overlook the structural relationships among risks. Third, approaches based on entropy theory or resource flexibility broaden the dimensions of buffer configuration; however, they still lack quantitative modeling of interconnections within the risk system. In addition, although MCDA methods can be used to rank risk importance, their analytical outputs cannot be directly transformed into quantitative input parameters for critical chain buffer calculations. Overall, existing studies exhibit notable deficiencies in addressing risk interdependencies, particularly due to the absence of a systematic framework that integrates risk structural analysis with dynamic buffer configuration. A comparison of current key chain buffer research methods is shown in Table 1.
Based on a comparative review of the existing research background and methodologies, previous studies have made notable progress in critical chain buffer setting, uncertainty characterization, and schedule risk analysis. However, most of these studies implicitly assume the independence of risk factors, which makes it difficult to capture the structural interconnections and transmission effects among schedule risks in complex engineering projects. At the same time, although some approaches are capable of ranking risks or conducting qualitative risk analyses, their results are often difficult to translate directly into quantitative decision-making inputs required for critical chain buffer determination. Consequently, how to effectively embed the structural characterization of schedule risk interdependencies into the critical chain buffer calculation process remains an open research question. To address this issue, this study conducts systematic research centered on the core question: How do schedule risk interdependencies influence critical chain buffer setting? Considering the interrelated nature of risk factors in practice, this paper identifies schedule risk factors in water conservancy projects using the X Pumped Storage Power Station as a case study and constructs an integrated methodological framework based on fuzzy DEMATEL, ISM, and Bayesian networks. Through quantitative evaluation of both individual risk factors and their interrelationships, this study further explores buffer calculation methods for construction schedules in water conservancy projects. Specifically, this study focuses on critical chain buffer determination in hydraulic engineering projects and undertakes the following research tasks: (1) systematically identifying schedule risk factors in hydraulic engineering construction and establishing a six-dimensional risk framework encompassing construction, design, client, supervision, natural, and social factors; (2) integrating fuzzy DEMATEL, ISM, and Bayesian network methods to construct a risk correlation structural model, clarify causal relationships and hierarchical pathways among risk factors, and enable quantitative inference of risk occurrence probabilities; (3) incorporating critical chain management theory and introducing risk impact coefficients to improve the traditional root mean square variance method, thereby proposing a buffer calculation model that explicitly accounts for risk correlation structures; (4) validating the proposed model through a case study of the X Pumped Storage Power Station and conducting comparative analyses with conventional buffer estimation approaches.

2. Calculation Model for Critical Chain Buffer Size Considering the Risk Association of Construction Period

To address the aforementioned research gaps, this chapter first outlines the decision-making logic of the constructed methodological framework. The research approach follows a three-tiered progressive process: “risk structure identification—risk correlation quantification—buffer zone decision-making.” First, the fuzzy DEMATEL method identifies the causal attributes and relative importance of schedule risk factors, providing a quantitative foundation for subsequent structural modeling. Second, the ISM method is integrated to construct a hierarchical correlation structure of risk factors, which is then mapped into a Bayesian network topology to enable probabilistic inference of risk correlation effects. Finally, the risk impact results from the above model are incorporated into the critical chain buffer calculation model, transforming risk correlation analysis into engineering schedule decision-making.

2.1. Identification of Risk Factors in Construction Period

During engineering construction, both schedule and safety risks are influenced by multiple stakeholders and a range of complex, multidimensional factors. From the perspective of construction participants, risks may arise from insufficient experience with key construction technologies—such as large underground cavern group support, high-pressure steel pipe welding and installation, and steep inclined shaft excavation—as well as from delays in critical processes caused by shortages of essential resources (e.g., specialized equipment) and uncertainties induced by changes in construction plans. Design-related risks primarily affect the early stages of a project. Design errors, defects, or calculation inconsistencies may lead to significant discrepancies between design schemes and actual construction conditions, resulting in large-scale design modifications or rework and consequently disrupting the construction schedule. Organizational and coordination deficiencies among multiple parties—including owners, designers, contractors, and supervisors—as well as external stakeholders, such as local governments and supporting enterprises, can further exacerbate communication barriers, leading to project delays or resource idling. Supervision-related risks may occur when supervisory bodies lack sufficient technical competence or exhibit cognitive biases, potentially leading to misjudgment of construction schemes or the imposition of unreasonable acceptance requirements. Inadequate supervision and inspection, together with delayed acceptance procedures, can cause process interruptions, while ineffective communication with stakeholders may distort information and amplify problems, directly affecting critical chain activities. In addition, external natural factors—including adverse construction conditions, extreme weather events, unforeseen disasters, and construction-induced geological hazards—may affect the project’s critical path through force majeure events. Social factors, such as policy adjustments, changes in ecological protection requirements, disputes over land compensation and resettlement, interruptions in external resource supply (e.g., construction electricity, blasting materials, and equipment), and work stoppages caused by environmental impacts (e.g., vibration, noise, and pollution affecting nearby residents), further interact to influence overall project progress.

2.2. Determination of Construction Period Risk Factors

After analysis of construction period risk factors [21], the risk factors affecting the project construction period are shown in Table 2.

2.3. Construction of Construction Period Risk Correlation Structure Model Based on Fuzzy DEMATEL-ISM-BN

The primary concept of the fuzzy DEMATEL-ISM-BN model is as follows: First, based on the established risk factor system, the fuzzy DEMATEL method is adopted to address the inherent ambiguity in expert judgment. Experts’ assessments of the direct influence relationships among risk factors are quantified using triangular fuzzy numbers, and the Converting Fuzzy data into Crisp Scores (CFCS) defuzzification algorithm is subsequently applied to transform the fuzzy evaluations into a crisp direct influence matrix. Subsequently, the comprehensive influence matrix D is calculated, from which the influence degree (ei), affectedness degree (fi), centrality (Mi), and causality degree (Ni) of each risk factor are derived. This process enables the identification of key risk factors and their causal characteristics within the system.
Second, by integrating DEMATEL and ISM, the comprehensive influence matrix is transformed into an accessibility matrix through appropriate threshold setting, thereby capturing the transmission relationships among risk factors. By iteratively analyzing the reachability and antecedent sets, the complex risk system is decomposed into distinct hierarchical levels, ultimately yielding a multi-level hierarchical explanatory structure of schedule risk factors. This structure intuitively reveals the interaction pathways and hierarchical relationships among risks and provides a structural foundation for subsequent Bayesian network construction.
Finally, the hierarchical structure obtained from ISM is mapped onto the topology of a Bayesian network. The prior probabilities of root nodes are determined by aggregating triangular fuzzy numbers derived from expert assessments, while the conditional probabilities of non-root nodes are calculated using the Noisy-OR gate model. By leveraging the probabilistic inference capability of Bayesian networks, the posterior occurrence probabilities of risk factors can be computed under given prior information. Furthermore, the quantitative effects of state changes in individual risk factors on related nodes can be evaluated, enabling dynamic and probabilistic analysis of risk correlation effects. The specific model framework is shown in Figure 1.

2.3.1. Fuzzy DEMATEL Factor Attribute Analysis

Based on the theory of triangular fuzzy numbers, natural language variables are used to provide fuzzy evaluations for each factor, thereby determining their importance and interrelationships. Building on relevant research [22], five levels of influence degree were established. As the score increased, the strength of the influence between factors grew, and conversely, it weakened when the score decreased. The influence of each factor on itself was defined as “NO.” The triangular fuzzy numbers corresponding to each level, along with their descriptions, are presented in Table 3.
A total of n experts are invited to rate the mutual influence of each risk factor at the time of occurrence according to the above five influence degree levels, and then the scoring results are converted into the form of triangular fuzzy numbers in sequence. Let ( l i j k , m i j k , r i j k ) represent the scoring result of the k-th expert on the influence degree of the i-th factor on the j-th factor in the factor set, where k { k | 1 , 2 , , n } . The CFCS method is applied to defuzzify the fuzzy numbers of expert scores. The processing steps are shown in Equations (1)–(7).
(1) To accommodate the structural characteristics of triangular fuzzy numbers, the normalization process is defined as shown in Equations (1)–(3).
x l i j k = l i j k min l i j k max r i j k min l i j k
x m i j k = m i j k min m i j k max r i j k min l i j k
x r i j k = r i j k min l i j k max r i j k min l i j k
(2) As shown in Equations (4)–(6), the normalized triangular fuzzy number is transformed into a left standard value x * l i j k and a right standard value x * r i j k , based on which the overall standard value x * i j k is calculated.
x * l i j k = x m i j k 1 + x m i j k x l i j k
x * r i j k = x r i j k 1 + x r i j k x m i j k
x i j k = x * l i j k ( 1 x * l i j k ) + x * r i j k x * r i j k 1 x * l i j k + x * r i j k
(3) Defuzzification. Equation (7) illustrates the calculation and conversion of the k-th expert’s score result on the degree of effect of the i-th factor on the j-th factor to the clear value b i j k :
b i j k = min l i j k + x i j k × ( max r i j k min l i j k )
Equation (8) is used to determine the average score of the i-th factor on the j-th factor after all experts’ fuzzy scores on the effect of the i-th factor on the j-th factor are transformed into unambiguous scoring values, as indicated in Equation (8):
b i j = 1 n k = 1 n b i j k
(4) Establishment of a direct influence matrix. According to the influence of horizontal column factors on vertical column factors, Equation (9) illustrates how the direct influence matrix B is created by filling up the matrix with the previously defuzzified impact values between factors.
B = b i j n × n
(5) Calculation of the normalized influence matrix. The row sum maximum normalization method is used to normalize the matrix B, and the normalization directly affects the matrix G, as shown in Equation (10).
G = 1 max 1 i n j n b i j B
(6) Establishment of a comprehensive impact matrix. The direct and indirect influence relationships between all elements are depicted in the comprehensive influence matrix. The comprehensive influence matrix D can be obtained by continuously multiplying the normalized direct influence matrix G, as shown in Equation (11).
D = ( G + G 2 + + G n ) = n = 1 G n = G I G
where the identity matrix is denoted by I.
(7) Each factor’s impact degree, affectedness degree, centrality, and causality may be computed using the complete influence matrix D. The total effect of a particular factor on all other risk factors in the system is represented by the influence degree ei; a larger value indicates a stronger ability of the factor to exert influence on the system. The calculation formula is given as follows:
e i = j = 1 n d i j ( i = 1 , 2 , , n )
The affectedness degree fi. represents the total impact that a given risk factor receives from all other risk factors in the system. A higher value of fi. indicates that the factor is more susceptible to influences from other factors. The calculation formula is given as follows:
f i = i = 1 n d i j ( i = 1 , 2 , , n )
The degree of the center Mi stands for an individual factor’s total significance inside the complicated system as a whole. It is calculated as the total of its impacted and influence degrees. A higher value of Mi means that the factor has a bigger influence on the system’s overall changes. The following is the expression for the calculation formula:
M i = e i + f i
The causality degree Ni reflects the tendency of an individual factor with respect to its influencing role within the system. It is calculated as the difference between the influence degree and the affectedness degree of the factor. A higher value of Ni suggests that the factor is more likely to act as a catalyst for system change. Factor I is categorized as a cause factor when Ni > 0; otherwise, it is recognized as an effect factor. The following is the expression for the calculation formula:
N i = e i f i
The outputs of this section include the centrality and causal attributes of each risk factor, which serve as the basis for defining the risk stratification criteria in the subsequent ISM modeling.

2.3.2. ISM Construction Based on Fuzzy DEMATEL

Although the fuzzy DEMATEL method can quantify the strength of influence and causal attributes among risk factors, its results are primarily presented in matrix form, which makes it difficult to intuitively represent the hierarchical transmission relationships among risks. To further elucidate the hierarchical structure and transmission pathways within the risk system, the ISM method is introduced to structurally reorganize the DEMATEL outputs.
(1) Generate the reachability matrix. Equation (16) addresses a limitation of the fuzzy DEMATEL method—namely, its inability to capture the self-influence of variables—by integrating the comprehensive influence matrix with the identity matrix I to construct the overall influence matrix O. Considering that the influence among certain factors may be relatively weak, a threshold value λ is introduced to optimize matrix O. Using Equation (17), the elements of the matrix are then converted into binary values (0 or 1), thereby yielding the reachability matrix K.
O = o i j n × n = I + D
k i j = 1 , o i j λ 0 , o i j < λ
(2) Divide factor hierarchy. The reachability set L(ki) is the set of factors corresponding to the column with a value of 1 in the i-th row of the reachability matrix K. The antecedent set Q(ki) is the set of factors corresponding to the row with a value of 1 in the i-th column of the reachability matrix K. First, determine the highest-level factor. hi is the highest-level factor if there is a factor hi that satisfies Formula (18). Next, simplify the attainable matrix K by eliminating the rows and columns that correspond to hi from the matrix. Repeatedly perform the above operations until all factors are hierarchized and the final hierarchical structure is constructed.
L ( h i ) = Q ( h i ) L ( h i )
(3) The factor correlation structure is constructed using the reachability matrix, in which the rows and columns correspond to individual risk factors and the matrix elements represent the causal relationships among them. When the element in the i-th row and j-th column equals 1, a directed relationship from factor i to factor j is indicated. Based on the results of factor stratification, directed edges are drawn from lower-level factors to higher-level factors.
To enhance the parsimony and interpretability of the model, transitive reduction is applied to eliminate redundant cross-level transmission paths. Specifically, when indirect transmission paths between two risk factors already exist, the corresponding direct links are removed. This procedure highlights the principal structural relationships within the system and facilitates clearer visualization of the associative connections among risk factors.
The hierarchical risk structure obtained in this section not only reveals the transmission pathways of schedule risks but also provides direct structural evidence for defining node dependencies in the Bayesian network, thereby establishing the topological foundation for subsequent Bayesian network construction.

2.3.3. Prediction of Occurrence Probability of Risk Factors Under Risk Correlation Conditions

The fuzzy DEMATEL-ISM model effectively clarifies the connections and hierarchical structures between factors and constructs a correlation framework. However, the analytical results are limited to the structural level and do not quantify the extent of risk correlation under uncertain conditions. Given the inherent uncertainty and probabilistic characteristics of project schedule risks, this study maps the hierarchical structure derived from ISM into a Bayesian network (BN) topology. Triangular fuzzy numbers and the Noisy-OR gate model are employed to estimate the associated probability parameters. By leveraging the inference capability of the BN, the relationships among risk factors are quantified using probabilistic distributions [23]. This approach enables probabilistic inference of risk interdependencies while preserving the consistency of the underlying causal logic.
(1) Structure mapping
Both the ISM and Bayesian network (BN) models use directed relationships to represent interactions among variables, making their topological structures well suited for integration. In line with the principles of quantifiability, logical rigor, scientific rationality, and systematic completeness, nodes at different hierarchical levels in the ISM are mapped to root, intermediate, and leaf nodes within the BN topology.
(2) Parameter calculation
Once the BN topology is established, the methods used to estimate node parameters directly influence the validity and accuracy of model evaluation. Given the inherent uncertainty and fuzziness of engineering problems, this study adopts a hybrid approach that combines case statistics and expert judgment, integrates fuzzy set theory with the Noisy-OR gate model, and refines the probability estimation process. Consequently, the proposed model enables more scientifically grounded and rational inference and analysis.
(1) Prior probability calculation
Utilizing the concept of triangular fuzzy numbers, in conjunction with expert evaluation results, the grade standard for the root node’s prior probability is defined, with its linguistic value represented by triangular fuzzy numbers. The evaluation levels of “extremely high,” “high,” “medium,” “low,” and “very low” are used to assess the likelihood of each risk factor, with the corresponding triangular fuzzy numbers defined as follows: (0.7, 0.9, 1.0), (0.5, 0.7, 0.9), (0.3, 0.5, 0.7), (0.1, 0.3, 0.5), and (0.0, 0.1, 0.3). Here, ( l i k , m i k , r i k ) is used to represent the k-th expert’s rating result of the probability of occurrence of the i-th factor in the factor set, where k { k | 1 , 2 , , n } . In the same way, the CFCS method of Equations (1)–(7) is used to defuzzify the expert rating fuzzy numbers to obtain the prior probability of each root node.
(2) Determination of conditional probability
The Noisy-OR Gate model can solve the conditional probability of non-root nodes with less workload and optimize the calculation process under the condition of determining the Bayesian network topology and expert scoring. The Noisy-OR model assumes that each parent node can independently affect the state change of the child node. Let C be a set of parent nodes. The nodes in the set are independent of each other. Y is the only child node corresponding to the set C. First, it is necessary to determine the probability of the occurrence of a child node in the state of a single parent node, as shown in Equation (19):
  P i = ( Y C ¯ 1 , C ¯ 2 , C ¯ 3 , , C i , , C ¯ n )
In the formula, Ci represents the occurrence of node events, C ¯ i represents the non-occurrence of node events, and Pi represents the probability that Y occurs if and only if Ci occurs. The other terms in the conditional probability table of node Y can be determined by using Equation (20):
1 P i = C i C ( 1 P i )
When any parent node occurs, the conditional probability of the child node can be calculated according to Equation (21):
P ( Y ) = i = 1 n P i × P ( C i ) × P ( C n ) ¯
(3) Calculation of correlation degree
In Bayesian networks, the degree of correlation between nodes can be quantified using the Euclidean distance based on conditional probability distribution information [24]. Specifically, the Euclidean distance is calculated by measuring variations in the posterior probability distributions of child nodes resulting from changes in the state of a parent node, in accordance with the characteristics of the network’s conditional probability structure. The detailed procedure is as follows:
(1) Probability Distribution Extraction: For the target node and its parent, extract the conditional probability distribution of the child nodes in different states of the parent node;
(2) Distance calculation: Calculate the distance value D* according to the Euclidean formula for the probability distribution vector of the child node before and after the parent node state changes, as shown in Equation (22):
D * = i = 1 n ( p i q i ) 2
In the formula, pi and qi represent the probabilities of each state of the child node under two different parent node conditions. A larger Euclidean distance D* indicates that changes in the parent node’s state result in greater perturbations of the child node’s probability distribution, reflecting a stronger correlation between the parent and child nodes.
(4) Occurrence probability prediction
Using the forward inference function, the causal paths from parent to child nodes are followed. By inputting the prior probabilities of root nodes and the conditional probabilities of non-root nodes, the posterior probabilities of the risk factors can be calculated using the Bayesian inference formula. Specifically, this yields the probability Pc of each risk factor resulting from causal propagation.
The probability of risk occurrence obtained through Bayesian network inference is used as a key input parameter for calculating the risk impact coefficient in subsequent buffer zone analysis.

2.4. Buffer Size Calculation

Within the critical chain management framework, buffer sizing is essentially an engineering decision whose rationality depends on how comprehensively sources of schedule uncertainty are characterized. In real-world projects, schedule risks rarely occur independently; instead, interdependencies among risks can lead to cumulative or amplified effects. Therefore, it is necessary to introduce correction mechanisms that capture risk correlation characteristics beyond those addressed by traditional statistical methods.

2.4.1. Process Safety Time

The time of the process was estimated based on the Beta distribution. The crystal ball software was used for simulation to determine the predicted process duration values T95% and T50% corresponding to the confidence levels of 95% and 50%, respectively [25,26,27]. Calculate the safety time of Process a:
S T a = T 95 % T 50 %
The initial buffer bufferl of route l is:
b u f f e r l = a = 1 n ( S T a ) 2

2.4.2. Critical Chain Buffer Calculation Under Risk Correlation

In the literature [28], the impact of risk events on activities is determined by both the probability of occurrence and the severity of the events. In risk management, the product of these two factors is referred to as risk exposure. Therefore, this paper employs the DEMATEL model to analyze the attributes, importance, and interrelationships of risk factors affecting project progress and calculates the comprehensive impact Mi of each factor on the entire system. Using the fuzzy DEMATEL-ISM-BN model for the construction period risk correlation structure, the probability Pc of each risk factor resulting from causal transmission is determined. After normalizing Mi, the risk impact coefficient [28] of schedule risk on the entire system is calculated as follows:
ϑ = c = 1 m M c P c
In the formula, Mc is the normalized value of Mi, and ϑ is the risk impact coefficient of schedule risk on the entire complex system. There are m risk factors that affect the project progress.
The buffer size is calculated by a modified root variance method taking risk correlation into account. The project buffer PB and the import buffer FB are, respectively:
P B = 1 + ϑ a = 1 n ( S T a ) 2
F B = 1 + ϑ a = 1 n ( S T a ) 2

3. Example Analysis

3.1. Project Overview

Using the construction of a pumped storage power station as a case study, the network planning diagram is developed based on a comprehensive analysis of historical data from similar projects and on-site investigations. The project consists of 20 processes, with a planned construction duration of 1998 days. The basic project information is summarized in Table 4, and the progress planning diagram is shown in Figure 2, where L denotes a virtual activity.
The process list, logical relationships, and time parameters presented in Table 4 form the quantitative foundation of this case study. The identification of each process, together with its immediate predecessor and successor relationships, is derived from a comprehensive review of historical construction data from similar pumped storage power stations, the project’s construction organization design documents, and validation by on-site engineering technicians. This ensures that the network structure accurately reflects the typical construction logic and critical path characteristics of this type of project. The duration of each process is estimated using a three-point approach (a, m, b) based on the Beta distribution. These values are derived from the State Grid Xinyuan Group Co., Ltd. (Beijing, China), Science and Technology Project (SGXYTS00GCJS2400157), incorporating research on similar project durations to reasonably represent the uncertainty in process timelines. This table provides the foundational data for subsequent Monte Carlo simulations, critical chain identification, and buffer zone estimation.

3.2. Determine the Critical Route

Based on the established fundamental process information, Figure 2 provides a visual representation of the schedule network plan for this case study. This network serves as the basis for subsequent risk analysis and critical chain identification. By translating the logical relationships among processes defined in Table 4 into a visual network topology, the diagram clarifies the overall project structure and provides the foundation for subsequent Monte Carlo simulations. It establishes both the geometric framework and logical structure required to identify the critical path and calculate process safety margins. Simulation analyses conducted on this network enable the effective mapping of the abstract duration risk factors identified in Section 2 onto specific project elements. Consequently, the results obtained from the risk association model can be directly applied to buffer zone calculations for this project.
Based on the progress network schedule, the Monte Carlo Crystal Ball software was used to conduct 10,000 Beta(B)PERT distribution simulations for each process of this project. With T50% as the normal duration of each process and T95% as the safe completion time, the network progress plan after the simulation is shown in Figure 3. Taking process C as an example, the simulation distribution of process C is shown in Figure 3. For the normal duration of C, T50% = 235.11 (days) and T95% = 244.35 (days). According to Equation (23), STC = 244.35 − 235.11 = 9.24 (days). The critical route after simulation is B-D-G-I-M-O-R-S-T-U.

3.3. Calculation of Construction Period Risk Correlation Structure Model Based on Fuzzy DEMATEL-ISM-BN

3.3.1. Analysis of Project Progress Risk Factors Based on Fuzzy DEMATEL

Based on the 18 schedule risk factors and corresponding codes defined in the risk factor system for the pumped storage power station project (Section 2.2), a panel of experts was selected for evaluation. All participating experts hold senior technical titles (professor-level senior engineer or associate professor) and have more than ten years of experience in project management, design, or construction of pumped storage power stations or large-scale water conservancy and hydropower projects. Their professional backgrounds cover construction management, engineering design, project supervision, and client-side project management, ensuring a multidimensional and comprehensive understanding of the relevant risk factors. Expert selection was based on field relevance, depth of project experience, and representativeness of professional roles. The assessment adopted a combined approach using structured questionnaires and the Delphi method. In the first round, experts independently conducted fuzzy evaluations according to clearly defined risk factors and the assessment scale shown in Table 3. The research team subsequently compiled the responses and provided anonymized preliminary statistical feedback, enabling experts to discuss areas of divergence. Comparative analysis of expert scores across multiple rounds indicates that the dispersion of indicator scores decreased significantly after the second round, reflecting improved stability and convergence of expert opinions. Although expert judgment is inevitably influenced by individual experience, knowledge structure, and professional background, this study mitigated potential bias by emphasizing professional diversity during expert selection. Moreover, the anonymous, multi-round feedback mechanism of the Delphi method facilitated convergence through systematic comparison of differing viewpoints. As a result, the expert judgment outcomes demonstrate good stability and robustness within the given sample size while preserving opinion diversity.
This study defines the linguistic variables representing levels of influence as follows: no influence (NO), very low influence (VL), low influence (L), high influence (H), and very high influence (VH). Experts were asked to assess the degree of influence between risk factors, resulting in the collection of ten initial scoring matrices. The linguistic variables in these matrices were subsequently transformed into corresponding triangular fuzzy numbers for quantitative analysis.
(1) Construct a comprehensive impact matrix of risk factors during the construction period of pumped storage power stations
Using Equations (1)–(9), MATLAB R2022b software was employed to defuzzify the triangular fuzzy numbers in the ten scoring matrices and to compute the mean influence of each factor on the others, thereby obtaining the direct influence matrix. The row sums of the direct influence matrix were then calculated, and the maximum value was selected as the normalization benchmark. Normalization was performed according to Equation (10) to derive the normalized influence matrix. Subsequently, iterative multiplication was carried out in accordance with Equation (11), yielding the comprehensive influence matrix D, which is presented in Table 5.
The comprehensive impact matrix D shown in Table 5 indicates the strength of mutual influence among the 18 schedule risk factors. This matrix enables preliminary identification of several structural characteristics within the risk system. Firstly, examining the row-wise sum (impact degree ei), factors X32 (Insufficient owner organization and coordination capability), X61 (Impact of major social events), X31 (Untimely payment of project funds), and X13 (Construction plan changes) exert prominent driving influences across the entire system, acting as pivotal ‘hubs’ triggering risk chain reactions. Secondly, analyzing the column dimension (impact susceptibility fi), factors X13, X12 (Untimely resource supply), X63 (Interruption of external resource supply), and X43 (Inadequate implementation of work responsibilities and oversight) emerge as highly susceptible ‘vulnerable points’ prone to being affected by other risks. The status of each factor is largely contingent upon changes in other factors within the system. Of particular significance, certain factors—such as X13—exhibit both high influence and high susceptibility. This finding indicates that such factors act not only as critical risk outcomes but also as intermediate nodes in risk propagation, thereby warranting focused attention in risk management. This observation is consistent with the results reported in Reference [17]. Accordingly, the comprehensive influence matrix provides a robust quantitative basis for subsequent calculations of factor centrality and causality, thereby facilitating the clarification of causal attributes and the hierarchical structure of risks.
(2) Calculate centrality and cause degree
Determine the precise impact link between components by calculating the influence degree ei, affected degree fi, center degree Mi, and cause degree Ni of each risk factor produced by the fuzzy DEMATEL approach using the complete influence matrix D and combining Formulae (12)–(15). The calculation results are shown in Table 6.
Table 6 presents the influence, affectedness, centrality, and causality of each risk factor calculated using the fuzzy DEMATEL method. The centrality ranking reveals that X13 (Construction plan changes), X32 (Insufficient owner organization and coordination capability), and X12 (Untimely resource supply) occupy the top three positions, indicating that these factors constitute the core hubs influencing the project schedule system. Of particular note, both X13 and X12 exhibit high centrality coupled with negative causality. This corroborates a common phenomenon in engineering practice: frequent alterations to construction plans and delays in supplying critical resources often stem from the cumulative effects of multiple preliminary risks (such as design errors, inadequate coordination, or external events), rather than being isolated initial risk sources. This finding aligns with project management literature asserting that ‘schedule deviations typically manifest as consequences rather than causes’ (Reference [17]). Causality analysis further distinguishes factors into causal and consequential elements. For instance, X32 and X61 (Impact of major social events) exhibit significant positive causality, acting as key independent variables driving systemic risk evolution. This provides quantitative grounds for subsequent ISM stratification and prioritization of risk control measures.
(3) Analyze security risk factor attributes based on fuzzy DEMATEL
The centrality degree represents the overall influence of a factor within the system, with higher values indicating a greater impact on the system as a whole. The causality degree reflects the causal attribute of a factor. Based on the fuzzy DEMATEL results for each risk factor presented in Table 6, a causal relationship diagram of risk factors is constructed, as shown in Figure 4, where the vertical axis represents causality and the horizontal axis represents centrality.

3.3.2. Construction of Security Risk Correlation Structure Based on ISM

(1) Reachable matrix construction based on fuzzy DEMATEL
Based on the comprehensive influence matrix D calculated in Section 3.3.1 and applying Equation (16), the overall influence matrix O is derived. Subsequently, multiple calculations are conducted to select an appropriate threshold λ, using the full impact matrix D’s mean and standard deviation added together to calculate the final threshold λ. Following screening and optimization, the reachability matrix K is obtained, as shown in Table 7.
Table 7 presents the reachability matrix K obtained by applying the threshold λ. This matrix constitutes a critical transformation step linking the fuzzy DEMATEL analysis with the Interpretive Structural Model (ISM). The distribution of binary entries in the matrix intuitively reveals both direct and indirect influence pathways among risk factors. Moreover, the sparse structure of the matrix reflects the asymmetry and selectivity of risk correlations, indicating that strong associations do not exist among all factors. This finding is consistent with the understanding that risk propagation in practical engineering systems follows specific pathways. By providing clear binary relationship inputs for subsequent hierarchical classification, the matrix ensures logical continuity from numerical assessment to structural modeling within the ISM framework.
(2) Establish a hierarchical structure of schedule risk factors
Based on the hierarchical analysis procedures applied to the reachability matrix K, the schedule risk factors of the pumped storage power station construction project are stratified into different levels. The results of the first-level stratification are presented in Table 8.
Table 8 details the process and outcomes of the first-level classification within the ISM methodology. This iteration identified X12, X13, X43, and X63 as first-level factors, indicating that within the current system architecture, these factors remain unaffected by the remaining factors in the system (i.e., the intersection of their reachable set and antecedent set equals their own reachable set). These factors occupy the most directly observable positions within the hierarchical structure. This process rigorously embodies the core principle of the ISM method—namely, decomposing complex systems into multi-level hierarchical structures—thereby laying a solid foundation for the subsequent construction of multi-level hierarchical models and for understanding the terminal effects of risk propagation.
Table 9 summarizes all five risk tiers ultimately derived from the ISM analysis, clearly revealing the multi-layered influence structure among schedule risk factors. From the fifth-tier causal layer (e.g., X61, X62) to the first-tier outcome layer, a complete risk transmission chain is formed. For instance, X61 (major social events) and X62 (land acquisition and resettlement issues) at Level 5, as deep-seated causes, drive risks at Level 4 involving the client and design parties (X32 and X24). These factors subsequently influence lower-level risks associated with construction execution and site supervision, ultimately manifesting at Level 1 as direct schedule delays, such as resource interruptions and design modifications. This multi-tiered structure demonstrates that project delays do not arise from isolated events but result from the sequential transmission and accumulation of risk factors across multiple levels, ranging from external environments and organizational management to on-site execution. This finding deepens the understanding of the systemic complexity of schedule risks in hydraulic engineering projects and provides structured evidence for the development of tiered and prioritized risk response strategies. Specifically, focusing solely on surface-level outcomes is insufficient; effective risk management requires proactive intervention in the underlying driving factors. This perspective is consistent with the principles of systemic risk management.
Based on the hierarchical division results in Table 9, directed connections are established according to the positions of “1” in the reachability matrix K, and transitive simplification eliminates unnecessary cross-level transmission pathways. Lastly, as seen in Figure 5, a risk explanation structure model is built to specify the risk association structure.
Figure 5 visually presents the multi-level hierarchical explanatory structure model for construction schedule risk factors, constructed using the fuzzy DEMATEL-ISM approach. This model clearly parses the inherently complex risk system into five distinct tiers, revealing the complete pathway of risk transmission from deep-seated root causes to surface-level symptoms in a top-down manner. Factors at the fifth tier (X31, X61, X62) constitute the fundamental drivers of the entire risk system, representing ‘deep-seated causes’ requiring strategic or externally coordinated attention. Factors at levels four to two (e.g., X32, X24) serve as ‘intermediate hubs’ for risk transmission and amplification, while first-level factors (e.g., X12 Untimely resource supply, X13 Construction plan changes) represent the ‘direct manifestations’ at the end of the risk chain—‘symptomatic indicators’ requiring immediate monitoring and response during project execution. This structural model not only validates the causal attributes (Ni) identified in the preceding DEMATEL analysis but, more significantly, provides a direct logical framework for constructing the subsequent Bayesian network topology. This ensures a seamless transition from qualitative structural analysis to quantitative probabilistic reasoning. The ultimate significance of this diagram lies in its ability to transform abstract risk “correlations” into concrete, visually explicit, and hierarchically organized “conduction pathways.” In doing so, it provides project managers with a clear and actionable roadmap for implementing systematic risk interventions that target root causes before surface-level symptoms emerge.

3.3.3. Calculation of Construction Period Risk Correlation Degree Based on ISM-BN

(1) ISM mapping to establish the BN structure.
Based on the engineering progress risk correlation structure obtained in Section 3.3.2, the risk interaction network is transformed into a Bayesian Network (BN) topological structure through multi-level hierarchical mapping. Interactions between nodes are defined as one-to-one causal connections, and the overall engineering construction progress risk is represented as a leaf node at the top level of the network. The BN model is constructed and visualized using the Bayesian network software GeNIe 4.0.
This study assumes that the causal structure among risk factors in the Bayesian network can be characterized by the results of the Interpretive Structural Model (ISM) analysis. This assumption ensures logical consistency in the network structure; however, it also implies that the inference results are, to some extent, dependent on the initial structural configuration. If implicit associations or dynamic evolutionary relationships among risk factors are not explicitly identified, they may affect the probabilistic inference outcomes. Consequently, the rationality and validity of the Bayesian network structure play a critical role in determining the reliability of the final analysis results.
(2) Projection of progress risk occurrence probability
Building on the content discussed in Section 3.3.2, ten experts were invited to assess the occurrence probabilities of the risk factors, integrating construction case data with their extensive professional experience and domain knowledge. Equations (1) and (8) were employed to process the experts’ linguistic assessments by converting them into prior probability levels for the root nodes using the corresponding triangular fuzzy numbers. The prior probability findings for the root nodes X34, X53, X64, X31, X51, X52, and X61 were then computed. The Noisy-OR model is subsequently employed to compute the occurrence probabilities of child nodes under different parent node states, thereby constructing the corresponding conditional probability tables. These probability parameters are then imported into the Bayesian network model in GeNIe for parameter learning. Using forward causal inference, the posterior probability distributions of the 18 risk factors are derived. Finally, the occurrence probability information for each factor is exported and aggregated for subsequent analysis. The reasoning results are presented in Figure 6:
(3) Sensitivity Analysis
The final event construction schedule risk is set to ‘target’, and a sensitivity analysis is conducted on each node within the model. The results are shown in Figure 7.
The color intensity in the diagram visually reflects the sensitivity of each risk factor to its overall impact on the system. Among these, six factors—X11 Insufficient construction experience, X32 Insufficient owner organization and coordination capability, X24 Insufficient geotechnical investigation depth, X64 Restrictions from surrounding residential environment, X51 Extreme weather conditions, and X62 Issues with land acquisition and resident relocation compensation—exhibit the deepest color, indicating the most significant influence on the stability of the project schedule risk system and the likelihood of ultimate schedule delays. These highly sensitive factors play pivotal roles within the system. Specifically, X62, as a causal factor, exerts broad effects on multiple other elements through various pathways. The remaining factors—X11, X32, X24, X64, and X51—act as typical “risk convergence points” or “critical transmission nodes,” being influenced by multiple upstream risks while exhibiting direct and substantial fluctuations in their own states that propagate to the final schedule outcome. The analysis not only validates the reliability of the previously established risk correlation structure model but also provides clear prioritization guidance for project management. From a practical risk control perspective, these highly sensitive factors should be prioritized for continuous monitoring and targeted intervention. Measures such as strengthening client coordination and effectively addressing land acquisition and resettlement issues are expected to yield the greatest improvements in the overall resilience of the project schedule system.
(4) Calculation of risk impact coefficient
Based on the calculation in Table 4, the comprehensive influence degree Mi of individual factors on the entire complex system was calculated and normalized. According to Equation (25), the construction period risk influence coefficient ϑ was calculated to be 0.566.

3.4. Buffer Size Calculation

3.4.1. Initial Buffer Calculation

The safety time and initial buffer of the process are calculated according to Equations (24)–(26). The calculation results are shown in Table 9.

3.4.2. Project Buffer Size Calculation

It can be calculated from Section 3.3.3 that the impact coefficient ϑ of the project duration risk is 0.566. According to Equations (25)–(27), when considering the occurrence of the project duration risk correlation, the calculation results of the inflow buffer and project buffer of this project are shown in Table 10.
The planned construction duration of the project is 1998 days. Considering the interdependencies among risk factors affecting project progress, the critical chain buffer calculated using the improved root variance method proposed in this study is 44.79 days, resulting in a total planned construction duration of 2042.79 days. In contrast, when inter-risk dependencies are ignored, the calculated buffer is only 28.6 days. Although the proposed method leads to a larger buffer size, it more effectively absorbs schedule-related risk impacts and enhances the feasibility and reliability of maintaining the planned project completion time.

3.5. Comparative Analysis

To comprehensively validate the superiority of the proposed method, this section conducts a systematic comparative analysis with existing mainstream approaches across three dimensions: methodological principles, buffer-setting outcomes, and managerial applicability.
First, regarding methodological principles, both the traditional cut-and-paste approach [1] and the root variance method [2] assume risk independence and thus fail to account for inter-factor correlations. Although Monte Carlo simulation [5] can reflect overall uncertainty distributions, it similarly struggles to explicitly characterize causal relationships and dependency structures among risks. In contrast, the integrated fuzzy DEMATEL–ISM–BN model developed herein systematically identifies causal attributes, hierarchical structures, and probabilistic dependencies among risk factors, representing a methodological advancement from “independent risk aggregation” to “correlated risk networks.”
Second, concerning buffer-setting outcomes, as shown in Table 3, Table 4, Table 5, Table 6 and Table 7, the traditional root mean square variance method calculates a project buffer of 28.6 days. By contrast, the present method, while maintaining equivalent process safety time, incorporates the risk correlation effect (ρ = 0.566), increasing the buffer to 44.79 days. This adjustment constitutes a targeted response to potential chain delays arising from risk interdependencies rather than indiscriminate buffer expansion. Compared with the expected duration (2103 days) derived from the triple-time estimation method, the total duration (2042.79 days) obtained using the proposed method remains shorter after a reasonable buffer increase, demonstrating its ability to optimize the trade-off between buffer protection and schedule efficiency.
Finally, with respect to managerial applicability, existing approaches such as Reference [28] primarily rely on a single risk exposure value (RE = 0.45) for monitoring purposes. While higher RE values indicate greater influence on project outcomes and necessitate shorter monitoring cycles, the metric in [28] only considers the occurrence probability of individual risk factors and neglects direct interdependencies between risks. By contrast, the proposed methodology generates risk impact coefficients that more accurately reflect the actual risk network and enables the tracing of critical risk paths through Bayesian networks. This capability facilitates targeted monitoring and contingency planning, particularly enhancing progress risk prevention and control in large-scale water conservancy projects with strong inter-risk dependencies.
In summary, the proposed approach demonstrates substantial improvements over traditional methods across the three dimensions of theoretical modeling, outcome generation, and management support. Consequently, this methodology aligns more closely with engineering practice and provides a robust framework for proactive risk management in complex construction projects.

4. Conclusions

4.1. Research Findings

This study conducts a correlation analysis of construction schedule risk factors in pumped storage power station projects using a hybrid fuzzy DEMATEL–ISM–BN model, systematically identifying the intrinsic relationships and transmission pathways among six major categories of risk factors. By integrating Fuzzy DEMATEL, the Interpretive Structural Model (ISM), and Bayesian Networks (BN), the proposed model not only identifies causal and hierarchical relationships among risk factors but also enables probabilistic reasoning and quantitative analysis of risk propagation. Consequently, it reveals risk accumulation pathways that are difficult to capture under traditional assumptions of independent risks. Regarding critical chain buffer-setting methodology, the traditional root mean square variance approach is enhanced by incorporating a risk impact coefficient derived from the proposed model. This refinement allows buffer sizes to dynamically adjust according to the interrelated structure of the risk system, providing a more scientific and adaptive foundation for schedule control in complex risk environments. Case studies demonstrate that the methodology significantly enhances schedule robustness, improves the predictability of on-time completion, and reasonably increases buffer sizes. Overall, it offers a comprehensive solution for schedule risk management in large-scale, complex engineering projects, combining theoretical innovation with practical applicability.

4.2. Limitations and Future Work

Regarding the applicability of the proposed methodology, this study primarily targets large-scale engineering projects characterized by numerous risk factors, complex interrelationships, and stringent schedule constraints. The core of the analytical framework developed in this study lies in explicitly characterizing the interrelationships among schedule risks and embedding them into the critical chain buffer decision-making process. As a result, the framework exhibits strong potential for broader application in engineering projects that share similar risk characteristics and schedule management requirements. For projects with simpler risk structures or smaller scales, the multi-stage analytical framework may entail redundant implementation efforts and increased analytical complexity. Therefore, in practical applications, the methodology should be appropriately simplified or adjusted according to the project’s complexity and management requirements.
This study integrates systems thinking and probabilistic reasoning into the analysis of engineering schedule risks, moving beyond the traditional reliance on experiential judgments or static risk lists. It provides a novel theoretical framework and empirical evidence to support proactive and refined management of schedule risks in hydraulic engineering projects. Nonetheless, several limitations remain, highlighting potential avenues for future research. This study employs a multi-round anonymous Delphi method to mitigate the subjective influence of expert judgment. Nonetheless, expert evaluations remain inevitably shaped by individual experience, cognitive biases, and prior project backgrounds. Particularly when risk factors are not clearly defined or project information is incomplete, different experts may interpret the same risk differently, thereby affecting the results of subsequent risk correlation analyses. Such effects are primarily reflected in the estimation accuracy of correlation strengths, rather than in fundamental changes to the direction of risk relationships or the overall correlation structure. Consequently, this methodology is most suitable for engineering projects where risk identification is relatively comprehensive and experts demonstrate a high degree of cognitive consistency regarding the research subject. The case validation in this study is based on a single project, and therefore, the generalizability of the findings requires further testing across a broader range of project types and scales. Future research could integrate historical project databases with machine learning techniques to uncover risk correlation patterns, thereby enhancing the objectivity and predictive accuracy of model parameters. In addition, the Bayesian network structure constructed in this study is derived from the hierarchical classification obtained via the ISM. Subsequent studies could explore more flexible structural learning approaches that account for complex, nonlinear interactions among risk factors.

Author Contributions

Conceptualization, S.W.; methodology, S.W. and J.G. (Junqiang Ge); software, J.G. (Junqiang Ge); validation, S.W., J.Z. and S.S.; formal analysis, J.G. (Junqiang Ge) and J.Z.; investigation, Z.H.; resources, X.N.; data curation, J.G. (Jianuo Gu); writing—original draft preparation, Z.H.; writing—review and editing, S.S. and J.G. (Jianuo Gu); visualization, S.W.; supervision, X.N.; project administration, X.N. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by State Grid Xinyuan Group Co., Ltd. Science and Technology Project (SGXYTS00GCJS2400157), the Training Programme for Young Backbone Teachers of Higher Education Institutions in Henan Province (2024GGJS061) and the High-level Talent Research Start-up Project of North China University of Water Resources and Electric Power (202310024), the Natural Science Foundation of Henan (252300420469).

Data Availability Statement

The data presented in this study are available in article.

Conflicts of Interest

Authors Shengjun Wang, Junqiang Ge and Shengwei Su were employed by the company State Grid Xinyuan Group Co., Ltd. Authors Jikun Zhang and Zihang Hu were employed by the company Shandong Taishan Pumped Storage Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as potential conflicts of interest.

References

  1. Goldratt, E.M. Critical Chain; The North River Press: Great Barrington, MA, USA, 1997. [Google Scholar]
  2. Newbold, R.C. Project Management in the Fast Lane: Applying the Theory of Constraints; CRC Press: Boca Raton, FL, USA, 1998. [Google Scholar]
  3. Herroelen, W.; Leus, R. On the merits and pitfalls of critical chain scheduling. J. Oper. Manag. 2001, 19, 559–577. [Google Scholar] [CrossRef]
  4. Herroelen, W.; Leus, R.; Demeulemeester, E. Critical Chain Project Scheduling: Do Not Oversimplify. Proj. Manag. J. 2002, 33, 48–60. [Google Scholar] [CrossRef]
  5. Hoel, K.; Taylor, S.G. Quantifying buffers for project schedules. Prod. Inventory Manag. J. 1999, 40, 43–47. [Google Scholar]
  6. Kołodziej, K.M.; Łapuńka, I. Determining a Fuzzy Model of Time Buffer Size in Critical Chain Project Management. Eng. Manag. Prod. Serv. 2024, 16, 41–55. [Google Scholar] [CrossRef]
  7. Dalouchei, F.; Mousavi, S.M.; Antucheviciene, J.; Minaei, A. A Bi-Objective Model for Scheduling Construction Projects Using Critical Chain Method and Interval-Valued Fuzzy Sets. Buildings 2022, 12, 904. [Google Scholar] [CrossRef]
  8. Hongbo, L.; Yiwu, C.; Qiao, L.; Zhu, H. Data-driven project buffer sizing in critical chains. Autom. Constr. 2022, 135. [Google Scholar] [CrossRef]
  9. Wu, L.; Zhang, Q. Multi-project management of key chain of carbon fibre and composite materials based on chaos particle swarm optimisation. Int. J. Mater. Prod. Technol. 2023, 67, 281–301. [Google Scholar] [CrossRef]
  10. Nie, X.; Li, D.; Li, M.; Guo, Y.; Gao, D.; Sun, Y. Investigation of the Critical Chain Buffer Calculation Model Using Information Entropy and Relay Potential. IEEE Access 2024, 12, 157455–157465. [Google Scholar] [CrossRef]
  11. Nie, X.; Li, M.; Lu, J.; Wang, B. Research on Buffer Calculation Model of Critical Chain Based on Adjacency Information Entropy. Buildings 2023, 13, 942. [Google Scholar] [CrossRef]
  12. Nie, X.; Ling, L.; Su, B.; Wang, B. Research on Key Chain Buffer Calculation Method Considering Multi-objective Multi-Resource Constraints and Relay Potential. Water Power 2021, 47, 106–110. [Google Scholar]
  13. Zhang, J.; Ji, F. Project Buffer Management Based on Activity Resilience. Chin. J. Manag. 2020, 17, 924–930. [Google Scholar]
  14. Zhang, J.; Lyu, Y. Determination of Critical Chain Project Buffer Monitoring Cycle Based on Objective and Activity Risk. Oper. Res. Manag. Sci. 2024, 33, 86–92. [Google Scholar]
  15. Huang, J.; Wang, Y.; Wang, Y.; Gong, S.; Zhang, Y.; Ye, L. Critical chain buffer zone setting in project schedule management from resource flexibility perspective. Yangtze River 2022, 53, 149–154. [Google Scholar]
  16. Zhang, J.; Cheng, N. Determination of Critical Chain Project Monitoring Interval Based on Risk-Driven. Ind. Eng. Manag. 2021, 26, 10–17. [Google Scholar]
  17. Bai, L.; Zhang, L.; Sun, Y.; Yang, Q.; Qin, X. Prevention Strategy of Highway Project Portfolio Construction Schedule Risk. China J. Highw. Transp. 2021, 34, 203–214. [Google Scholar]
  18. Liu, J. Correlation analysis of scheduling risks based on BN-CPM. J. Hydroelectr. Eng. 2011, 30, 199–203. [Google Scholar]
  19. Huang, J.; Tan, Y.; Chen, M.; Wang, X.; Jiang, H.; Jiang, Y. Research on Risk Transfer Route of Underground Cavern Group Construction Schedule Based on ISM-SD. Water Resour. Power 2024, 42, 93–97. [Google Scholar]
  20. Huang, Y.; Zhang, L.; Wang, K. Metro Station Project Schedule Management Based on Link and Proiect Characteristics. Chin. J. Undergr. Space Eng. 2021, 17, 334–342. [Google Scholar]
  21. Li, X.; Tian, J.; Zheng, J.; Su, Z. Risk analysis on construction progress of water conservancy project. Water Resour. Hydropower Eng. 2018, 49, 141–147. [Google Scholar]
  22. Liu, R.; Zhang, J.; Han, X. Risk identifiation based on triangular fuzzy number for construction project. J. Harbin Inst. Technol. 2008, 10, 1617–1620. [Google Scholar]
  23. Zhang, Y.; Wang, X. Study on causes of unsafe behaviors of construction workers based on DEMAREL-ISM-BN. J. Saf. Sci. Technol. 2020, 16, 110–116. [Google Scholar]
  24. Wang, Q.; Jing, H.; Guo, Z.; Wang, Z. Risk early warning model of technological innovation achievements transformation in major construction proiects based on DEMATEL-ISM-BN. J. Railw. Sci. Eng. 2025, 22, 1315–1327. [Google Scholar]
  25. Ni, T.; Chang, H.; Song, T.; Xu, Q.; Huang, Z.; Liang, H. Non-intrusive Online Distributed Pulse Shrinking Based Interconnect Testing in 2.5D IC. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 2657–2661. [Google Scholar] [CrossRef]
  26. Ni, T.; Yao, Y.; Chang, H.; Lu, L.; Liang, H.; Yan, A. LCHR-TSV: Novel Low Cost and Highly Repairable Honeycomb-Based TSV Redundancy Architecture for Clustered Faults. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2019, 10, 2938–2951. [Google Scholar] [CrossRef]
  27. Hu, X.; Ma, P.; Gao, B.; Zhang, M. An Integrated Step-Up Inverter Without Transformer and Leakage Current for Grid-Connected Photovoltaic System. IEEE Trans. Power Electron. 2019, 34, 9814–9827. [Google Scholar] [CrossRef]
  28. Zhang, J.; Zhou, S. Buffer Sizing of Critical Chain Projects Based on Uncertainty. J. Ind. Technol. Econ. 2021, 40, 154–160. [Google Scholar]
Figure 1. Fuzzy DEMATEL-ISM-BN-Based Risk Correlation Structure Model Framework Diagram.
Figure 1. Fuzzy DEMATEL-ISM-BN-Based Risk Correlation Structure Model Framework Diagram.
Buildings 16 00557 g001
Figure 2. Schedule diagram of a certain pumped storage power station construction project.
Figure 2. Schedule diagram of a certain pumped storage power station construction project.
Buildings 16 00557 g002
Figure 3. Simulation distribution diagram of process C.
Figure 3. Simulation distribution diagram of process C.
Buildings 16 00557 g003
Figure 4. Risk factor causal relationship diagram.
Figure 4. Risk factor causal relationship diagram.
Buildings 16 00557 g004
Figure 5. Framework diagram of risk correlation structure model based on fuzzy DEMATEL-ISM-BN.
Figure 5. Framework diagram of risk correlation structure model based on fuzzy DEMATEL-ISM-BN.
Buildings 16 00557 g005
Figure 6. Forward reasoning of project schedule risks of pumped storage power station.
Figure 6. Forward reasoning of project schedule risks of pumped storage power station.
Buildings 16 00557 g006
Figure 7. Risk Sensitivity Analysis of Construction Progress for Pumped Storage Power Station Projects.
Figure 7. Risk Sensitivity Analysis of Construction Progress for Pumped Storage Power Station Projects.
Buildings 16 00557 g007
Table 1. A Comparative Study of Current Key Chain Buffer Research Methods.
Table 1. A Comparative Study of Current Key Chain Buffer Research Methods.
MethodConsider UncertaintyConsider Risk AssociationMajor Shortcomings
Cut-and-Paste MethodNoNoBuffer size is prone to becoming excessively large.
Root Mean Square Method, Monte Carlo MethodYesNoAssuming risk independence
Fuzzy CCMYesNoUnmodeled structural relationships
AHP, TOPSISPartPartPartial sorting, difficult to quantify transmission
Table 2. Risk factor system affecting project progress.
Table 2. Risk factor system affecting project progress.
Level 1 RiskLevel 2 Risk
Risk factor system affecting project progressConstruction Party Factors X1Insufficient construction experience X11
Untimely resource supply X12
Construction plan changes X13
Design Party Factors X2Design errors or defects X21
Delayed drawing supply X22
Design changes X23
Insufficient geotechnical investigation depth X24
Owner Party Factors X3Untimely payment of project funds X31
Insufficient owner organization and coordination capability X32
Supervision Party Factors X4Outdated supervision techniques and methods X41
Improper coordination and communication with the constructor or owner X42
Inadequate implementation of work responsibilities and oversight X43
Natural Factors X5Extreme weather conditions X51
Geological disasters X52
Societal Factors X6Impact of major social events X61
Issues with land acquisition and resident relocation compensation X62
Interruption of external resource supply X63
Restrictions from surrounding residential environment X64
Table 3. Triangular fuzzy number semantic conversion level table.
Table 3. Triangular fuzzy number semantic conversion level table.
Fuzzy Level DescriptionTriangular Fuzzy Number
Very low impact—NO(0.0, 0.1, 0.3)
Low impact—VL(0.1, 0.3, 0.5)
Medium impact—L(0.3, 0.5, 0.7)
High impact—H(0.5, 0.7, 0.9)
Extremely high impact—VH(0.7, 0.9, 1.0)
Table 4. Basic Information of a Certain Pumped Storage Power Station Construction Project.
Table 4. Basic Information of a Certain Pumped Storage Power Station Construction Project.
Activity NumberActivity NameImmediate Predecessor ActivityImmediate Successor ActivityThree-Parameter β Distribution
amb
BConstruction preparation-C, D, E, F170180190
DVentilation holeBG275290305
CConstruction support holes for the tailwater systemBH220235250
GUpper Layer Excavation of the PowerhouseDI, L400415430
EDiversion horizontal tunnel construction branch tunnelBJ130145160
FExcavation of Upper/Lower ReservoirBQ130140150
IMiddle and Lower Layer Excavation of the PowerhouseGM220235245
HTailrace Tunnel ConstructionCK280290300
MPowerhouse Floor Slab Concrete PouringIO232528
JDiversion horizontal tunnelEN105110117
KTailwater water filling testH, LU252835
OConstruction of the tail water pipe of the unitMR105110120
NConstruction of branch tunnel plugs in the horizontal tunnel of water diversionJP98105110
RUnit volute installation and pressure water testOS100108115
PWater diversion system filling and drainage testNU354555
QFilling of Upper/Lower ReservoirFU113511501165
SConcrete pouring for unit volute layer, turbine layer, busbar and generator layerRT107115120
TUnit installationSU390380400
UUnit debugging and trial operationK, T, P, Q-130140145
Table 5. Comprehensive impact matrix D.
Table 5. Comprehensive impact matrix D.
X11X12X13X21X22X23X24X31X32
X110.08410.22260.24710.10620.10770.15760.07610.10230.1157
X120.06920.13230.16320.06630.07640.09720.06280.09500.0885
X130.08220.19780.14470.07210.08440.16710.06840.09850.0963
X210.07750.16620.24650.07600.14350.22360.09170.09250.0985
X220.06760.12550.19920.06580.07750.17250.06890.08020.0860
X230.07260.16580.23510.06990.10400.10830.06950.09310.0923
X240.08110.17990.24860.13850.15970.23660.07630.09680.1031
X310.12510.27300.21530.08760.10490.13300.08220.11340.1938
X320.12010.24180.26060.09990.17390.20620.09490.18720.1518
X410.06930.12040.12260.06550.07540.09360.06210.07900.0880
X420.07710.13210.13440.06710.07890.09820.06350.08290.1186
X430.08410.13710.13930.06560.07530.09480.06180.07910.0871
X510.07410.23550.17250.07190.08270.10500.06810.08930.0946
X520.06970.21470.17990.06750.07770.09980.06400.08350.0888
X610.10630.25730.24740.09800.11840.14960.09280.18560.2267
X620.09970.21290.20210.09160.11030.13770.08670.19190.2071
X630.06710.21490.16010.06470.07450.09490.06130.09320.0862
X640.09010.18820.18400.08430.10240.12740.07990.11600.2043
X41X42X43X51X52X61X62X63X64
X110.09380.15470.22700.07510.07850.07270.09660.15560.0950
X120.07460.11220.14320.06260.06550.06070.07980.19860.0786
X130.08420.14250.19470.06800.07100.06580.08660.14880.0854
X210.08230.11920.13460.07070.07390.06850.09000.13380.0887
X220.07180.10350.11590.06180.06460.05990.07860.11350.0775
X230.07680.11160.12650.06590.06890.06380.08390.17770.0827
X240.08610.12450.14040.07400.07740.07170.09420.14050.0928
X310.10130.18200.21120.08190.08560.07930.11150.27500.1088
X320.13040.26900.23970.09400.09820.09100.21290.22380.1965
X410.08050.16970.21710.06190.06470.05990.07890.10760.0778
X420.11270.11330.20070.06330.06610.06130.08330.11870.0817
X430.13670.14670.12330.06160.06440.05970.07850.10910.0774
X510.07890.11320.12690.07020.14780.06580.08650.18950.0852
X520.07410.10680.12020.09390.06900.06180.08120.14470.0800
X610.11670.24040.25420.09250.09670.08960.19260.28100.1810
X620.10920.24280.23140.08640.09030.08370.12980.21890.2299
X630.07110.10260.11540.06110.06390.05920.07790.11680.0768
X640.10160.24400.21610.07960.08320.07710.21460.15300.1189
Table 6. Fuzzy DEMATEL analysis parameter results.
Table 6. Fuzzy DEMATEL analysis parameter results.
Risk FactorInfluence Degree eiAffected Degree fiCenter Degree MiCenter Degree Normalization McFactor Attributes
X112.2683359781.5169995873.7853355650.049481693Causative factor
X121.7267735063.4181376715.1449111770.067253989Outcome factor
X131.9585752963.5026446385.4612199330.07138876Outcome factor
X212.0774382991.4584784773.5359167760.046221305Causative factor
X221.690451581.8279816523.5184332320.045992761Outcome factor
X231.8686123242.5032880984.3719004220.057149236Outcome factor
X242.2221534171.3308654593.5530188760.046444863Causative factor
X312.5650923491.9598248644.5249172140.059149463Causative factor
X323.0920573172.2275926195.3196499360.069538164Causative factor
X411.6940776431.682678823.3767564630.04414077Causative factor
X421.7538381392.7988518714.552690010.059512508Outcome factor
X431.681707463.1385690854.8202765460.063010384Outcome factor
X511.9580068541.3243865763.282393430.042907262Causative factor
X521.7772733911.4296006883.2068740790.041920077Causative factor
X613.0267427721.2514362124.2781789840.055924115Causative factor
X622.7625059171.957361134.7198670470.061697836Causative factor
X631.6617145723.0066153874.6683299590.061024146Outcome factor
X642.4645019231.9145459024.3790478250.057242667Causative factor
Table 7. Reachable matrix K.
Table 7. Reachable matrix K.
X11X12X13X21X22X23X24X31X32X41X42X43X51X52X61X62X63X64
X11111001000011000010
X12011000000001000010
X13011001000011000010
X21011111000001000010
X22011011000000000000
X23011001000001000010
X24011111100011000010
X31111001011011000010
X32111011011111000111
X41001000000111000000
X42011000000011000000
X43011000000111000000
X51011000000001110010
X52011000000001010010
X61011001011011001111
X62011001011011000111
X63011000000000000010
X64011001001011000111
Table 8. ISM first-level division results.
Table 8. ISM first-level division results.
Risk FactorReachable Set LiAntecedent Set QiIntersectionHierarchy
X11X11, X12, X13, X23, X42, X43, X63X11, X31, X32X11-
X12X12, X13, X43, X63X11, X12, X13, X21, X22, X23, X24, X31, X32, X42, X43, X51, X52, X61, X62, X63, X64X12, X13, X43, X63The first floor
X13X11, X12, X13, X23, X42, X43, X63X11, X12, X13, X21, X22, X23, X24, X31, X32, X41, X42, X43, X51, X52, X61, X62, X63, X64X11, X12, X13, X23, X42, X43, X63The first floor
X21X12, X13, X21, X22, X23, X43, X63X21, X24X21-
X22X12, X13, X22, X23, X43, X63X21, X22, X24, X32X22, X23-
X23X12, X13, X23, X43, X63X11, X13, X21, X22, X23, X24, X31, X32, X61, X62, X64X13, X23-
X24X12, X13, X21, X22, X23, X24, X41, X43, X63X24X24-
X31X11, X12, X13, X23, X31, X32, X42, X43, X63X31, X61, X62X31The first floor
X32X11, X12, X13, X22, X23, X31, X32, X41, X42, X43, X62, X63, X64X31, X32, X61, X62, X64X31, X32, X62, X64The first floor
X41X13, X41, X42, X43X32, X41, X43X41, X43-
X42X12, X13, X42, X43X11, X13, X21, X24, X31, X32, X41, X42, X43, X61, X62, X64X13, X42, X43-
X43X12, X13, X41, X42, X43X11, X12, X13, X21, X23, X24, X61, X62, X41, X42, X43, X51, X52, X61, X62, X64X12, X13, X41, X42, X43The first floor
X51X12, X13, X43, X51, X52, X62X51X51-
X52X12, X13, X43, X52, X63X51, X52X52-
X61X12, X13, X23, X31, X32, X42, X43, X61, X62, X63, X64X61X61-
X62X12, X13, X23, X31, X32, X42, X43, X62, X63, X64X32, X61, X62, X64X62, X64-
X63X12, X13, X63X11, X12, X13, X21, X23, X24, X31, X32, X51, X52, X61, X62, X63, X64X12, X13, X63The first floor
X64X12, X13, X23, X32, X42, X43, X62, X63, X64X32, X61, X62, X64X32, X62, X64-
Table 9. Hierarchical distribution of risk factors.
Table 9. Hierarchical distribution of risk factors.
HierarchyRisk Factor
1X12, X13, X43, X63
2X22, X23, X42, X52
3X51, X11, X21, X41, X64
4X24, X32
5X31, X61, X62
Table 10. Buffer size calculation results.
Table 10. Buffer size calculation results.
Activity TypeActivityT95%T50%STiBufferFBPBProject Total Duration Calculation
Critical Path ActivitiesB180.07186.196.1228.6-44.792042.79
D289.94299.299.35-
G235.11244.359.24-
I414.98424.359.37-
M144.82154.379.55-
O140.01146.286.27-
R234.36241.67.24-
S280.01296.2916.28-
T25.1126.781.67-
U110.25114.23.95-
Non-Critical Path ActivitiesC28.531.93.410.0815.79
H110.62115.665.04
K104.78108.183.4
E107.87112.324.4514.1922.22
J44.9551.196.24
N1149.861159.139.27
P114.62118.283.66
F390.02396.26.1810.3616.22
Q139.4143.414.01
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, S.; Ge, J.; Zhang, J.; Su, S.; Hu, Z.; Gu, J.; Nie, X. Calculation of Buffer Zone Size for Critical Chain of Hydraulic Engineering Considering the Correlation of Construction Period Risk. Buildings 2026, 16, 557. https://doi.org/10.3390/buildings16030557

AMA Style

Wang S, Ge J, Zhang J, Su S, Hu Z, Gu J, Nie X. Calculation of Buffer Zone Size for Critical Chain of Hydraulic Engineering Considering the Correlation of Construction Period Risk. Buildings. 2026; 16(3):557. https://doi.org/10.3390/buildings16030557

Chicago/Turabian Style

Wang, Shengjun, Junqiang Ge, Jikun Zhang, Shengwei Su, Zihang Hu, Jianuo Gu, and Xiangtian Nie. 2026. "Calculation of Buffer Zone Size for Critical Chain of Hydraulic Engineering Considering the Correlation of Construction Period Risk" Buildings 16, no. 3: 557. https://doi.org/10.3390/buildings16030557

APA Style

Wang, S., Ge, J., Zhang, J., Su, S., Hu, Z., Gu, J., & Nie, X. (2026). Calculation of Buffer Zone Size for Critical Chain of Hydraulic Engineering Considering the Correlation of Construction Period Risk. Buildings, 16(3), 557. https://doi.org/10.3390/buildings16030557

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop