Real-time Site Safety Risk Detection for On-foot Building Construction Workers Using RFID

THESIS

Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State University

By

Nabeel Ali Mahmood

Graduate Program in

The Ohio State University

2016

Thesis Committee:

Dr. Tarunjit Butalia, Advisor

Dr. Rachel Kajfez

Dr. Charles Toth

Copyright by

Nabeel Ali Mahmood

2016

Abstract

The construction industry is deemed to be among one of the most dangerous industries for on-foot workers because of the unique nature and uncertainty of its environment. Although the construction industry is regarded as one of the main pedestals of economic development, the current safety evaluation solutions have not been developed well enough to adequately control safety risks. The large number of detrimental accidents indicate the need for replacing incomprehensive, inconsistent, and lagging risk evaluation approaches with a more consistent, uniform, and reliable technological solution for identification, prioritization, detection, evaluation, and control of safety risks. Radio Frequency Identification (RFID) based real-time risk detection solution for early identification and evaluation of predictable individual triggering risks presented in this research goes beyond the state-of-the-art of proximity sensing for safety risks. This study systemizes basic triggering risk events and uses fuzzy logic to play a key role of hosting the subjective linguistic risk evaluation values into computational values. Nevertheless, construction risks are not only limited to triggering risks as on-foot workers may be concurrently affected by several risks. The future work could achieve a real-time safety system for the evaluation of the combined effect of comprehensive risk drivers concurrently being exposed to on- foot . This could help in systemizing the basic triggering, basic enabling, and conditional risk drivers into a fuzzy fault tree model being a holistic prognostic approach for real-time risk assessment intelligent system that could be integrated with the methodology of real-time interactive risk detection. The real- time evaluation solutions make risks more recognizable and measurable for on- foot workers at the time of exposure to enhance adequate responses and proactive decisions for risk control, accidents prevention, and health protection. ii

Dedication

Dedicated to the souls of all the innocent casualties from the past and future.

iii

Acknowledgments

I acknowledge the continuous support of my advisor, Dr. Tarunjit Butalia, advisory committee members, Dr. Rachel Kajfez and Dr. Charles Toth, and my family who enriched my potentials and enhanced me to explore.

iv

Vita

January 2011...... Civil Engineering B.E.

December 2011 ...... Intern

August 2013 ...... LEED Green Associate

November 2013 ...... Project Management Professional

My key qualifications are the consolidation of engineering and leadership skills attained from working with professional and international organizations dealing with civil engineering and management disciplines. Moreover, I have a unique life story that drives my passion to strive for success in all my life events and projects.

Fields of Study

Major Field: Civil Engineering

v

Table of Contents

Abstract ...... ii

Dedication ...... iii

Acknowledgments ...... iv

Vita ...... v

Table of Contents ...... vi

List of Tables ...... ix

List of Figures ...... x

List of Abbreviations ...... xii

1 Chapter One: Introduction ...... 1

1.1 Introduction ...... 1

1.2 Statement of Problem ...... 5

1.3 Scope and Limitation of Study ...... 7

1.3.1 Objective of Study...... 7

1.3.2 Scope of Study ...... 8

1.4 Value of Research ...... 10

1.5 Research Outline ...... 13

2 Chapter Two: The Methodology for Safety Risk Detection Using RFID ...... 15

2.1 Methodology Outline ...... 15

2.1.1 Introduction ...... 15

vi

2.1.2 Methodology Principle Steps ...... 15

2.2 The Methodology for the Analytical Research ...... 16

2.2.1 Introduction ...... 16

2.2.2 Risk Detection Process ...... 16

2.2.3 Risk Detection Intelligent System Research Methodology ...... 19

2.2.3.1 Introduction...... 19

2.2.3.2 Accident Causation Analysis ...... 19

2.2.3.3 Risk Drivers Systemization ...... 20

2.2.3.4 Risk Analysis ...... 22

2.2.3.5 Risk Detection Intelligent System ...... 24

2.2.4 Risk Detection Method Design ...... 24

2.2.4.1 RFID Technology Compatibility Analysis (State-of-the-art) ...... 24

2.2.4.1.1 Radio Frequency Identification (RFID) Overview ...... 24

2.2.4.1.2 RFID Technology Use in Risk Management ...... 27

2.2.4.2 Real-time Risk Detection Method Design ...... 32

2.2.4.2.1 Introduction ...... 32

2.2.4.2.2 Risk Prioritization ...... 33

2.2.4.2.3 Risk Detection ...... 46

2.2.4.2.4 Risk Evaluation ...... 48

2.2.4.2.5 Risk Control ...... 49

2.2.4.2.6 Detection Method Summary ...... 51

3 Chapter Three: Systemization of Construction Safety Triggering Risks ...... 52

3.1 Introduction ...... 52

3.2 Domino theory ...... 54 vii

3.3 Systemization of Construction Safety Risks ...... 56

3.3.1 Introduction ...... 56

3.3.2 Basic Triggering Construction Risk Events ...... 58

3.3.2.1 Basic Triggering Risk Events Classification ...... 58

3.3.2.1.1 Falls, Slips, Trips Risks ...... 61

3.3.2.1.2 Struck by/Caught in Falling Objects Risks ...... 66

3.3.2.1.3 Struck by/Caught in Moving Objects Risks ...... 68

3.3.2.1.4 Exposure to Harmful Substances or Environments Risks ... 70

4 Chapter Four: Simulation of Risk Detection Method ...... 74

4.1 Introduction ...... 74

4.2 Detection Method Simulation Program ...... 74

4.2.1 Simulation Program Process ...... 74

4.2.2 Simulation Program Algorithm ...... 75

4.2.3 Simulation Program Cases ...... 79

5 Chapter Five: Conclusion ...... 94

5.1 Summary and Conclusion ...... 94

5.2 Recommendations ...... 97

5.3 Future Work ...... 97

6 References ...... 99

viii

List of Tables

Table 2.1 Basic Risk Values According to Severity and Likelihood of Harm ...... 39

Table 2.2 Subjective Description of Risk Likelihood Values ...... 40

Table 2.3 Subjective Description of Risk Severity Values ...... 41

Table 2.4 Fuzzy Sets Truth Values Membership Functions for Basic Risk ...... 43

Table 2.5 Area Under a Curve Range Limits Linked with Truth Values ...... 49

Table 2.6 Defuzzified Risk Linguistic Values Declared from Intelligent System . 50

ix

List of Figures

Figure 2.1 Diagnostic Risk Detection Process ...... 17

Figure 2.2 Process Design for the Prognostic Risk Detection System ...... 18

Figure 2.3 Process of Top-down Systemization of Risk Drivers ...... 22

Figure 2.4 The Fuzzy Logic Role for the Computation of Risk Values ...... 23

Figure 2.5 Baldwin Model Approach for Truth Values ...... 44

Figure 2.6 Fuzzy Sets Truth Values Graphs for Basic Risk Values ...... 45

Figure 2.7 Interaction Process between Objects with RFID Tag and Reader ..... 47

Figure 2.8 Process of Interaction between the System Components ...... 47

Figure 2.9 Fuzzy Logic Role for the Computation of Risk Values ...... 48

Figure 2.10 Process of the Interaction between Different System Components . 51

Figure 2.11 Process of Interaction of RFID Tag and Solution Elements ...... 51

Figure 3.1 : Heinrich’s Domino Theory ...... 55

Figure 3.2: Modified Heinrich’s Domino Theory ...... 56

Figure 4.1 Process of Interaction between Different System Components ...... 75

Figure 4.2 Programed Method Algorithm Flow Chart ...... 78

Figure 4.3 First Step in Risk Prioritization by Inspector, RFID Tag Defining starts with identification of Risk Subgroup ...... 81

x

Figure 4.4 Selecting the Risk type by Inspector for the Identification of Basic

Triggering Risk Event ...... 82

Figure 4.5 Selecting Risk Value by Inspector for the RFID Tag to be defined .... 83

Figure 4.6 As Risk Parameters are Set, the Inspector would Fetch from Database to Define RFID Tag ...... 84

Figure 4.7 Inspector would Push the Define Button if the Fetch Database

Indicated the Tag was Not Defined Previously ...... 85

Figure 4.8 RFID Tag is in worker range, Information is Received by Detection

Intelligent System on Right Side ...... 86

Figure 4.9 The Detection Intelligent System keeps a record of all Risks Detected by Worker during the Day ...... 87

Figure 4.10 One of the Risk Values Detected shown as Rotation Fuzzy Set ..... 88

Figure 4.11 One of the Risk Values Detected Shown as Rotation Fuzzy Set ..... 89

Figure 4.12 One of the Risk Values Detected Shown as Rotation Fuzzy Set ..... 90

Figure 4.13 One of the Risk Values Detected Shown as Rotation Fuzzy Set ..... 91

Figure 4.14 One of the Risk Values Detected Shown as Rotation Fuzzy Set ..... 92

Figure 4.15 One of the Risk Values Detected Shown as Rotation Fuzzy Set ..... 93

xi

List of Abbreviations

RFID Radio Frequency Identification

RF Radio Frequency

UHF Ultra-High Frequency

OIICS Occupational Injury and Illness Classification System

RBS Breakdown Structure

BLS U.S. Bureau of Labor Statistics

NIOSH National Institute of Safety and Health

OSHA Occupational Safety and Health Administration

ILO International Labor Organization

WHO World Health Organization

HSE Health and Safety Executive

OSH Occupational Safety and Health

WHS Workplace Health and Safety

PPE Personal Protective Equipment

FFTA Fuzzy Fault Tree Analysis

FTA Fault Tree Analysis

xii

1 Chapter One: Introduction

1.1 Introduction

The construction industry is regarded as one of the main drivers of

economic development. However, the construction industry is deemed to be one

of the most hazardous industries. The unique nature and safety uncertainty of

construction environments make the construction industry one of the most danger

prone industries. The construction sector is recognized for having one of the worst

safety history records among all industries. Many building construction activities

are inherently risky to safety and health of on-foot workers. Construction work may

involve working at heights, working around moving objects, working around

hazardous substances, or even working around a combination of several hazards;

construction site may constitute complex work environments with multiple health

and safety risks (NIOSH, 2004; BLS, 1992-2014; ILO, 2005; Jason, 2008).

In spite of remarkable improvements made in the health and safety

performance for reducing safety risks on construction sites by awareness, rules,

regulations, and specifications as well as interactive solutions, still there are

unusually high number of injuries. High construction accidents trends indicate that

1 there is still an essential need to improvise solutions to protect the health and safety of on-foot workers at construction sites (Minchuk et al., 2009; Rajendran et al., 2008).

A construction project is characterized by its diverse operations and multitude of participants that are mostly working together for the first time.

Nevertheless, even though construction workers are performing specific construction activities, they are exposed to more risks than workers associated with other occupational industries. Construction comprises of a wide range of unique and uncertain activities (Hinze & Applegate, 1991; Lezotte et al., 2006; The

Center for Construction Research and Training, 2013).

Fatal and non-fatal accidents occur on work sites as a result of different risks mainly associated with the construction site environment, negligence of workers, insufficient personal and site safety measures. Construction workers may be exposed to different types of site hazards, such as falling from various elevations, struck by moving or falling objects, electrocutions, and many other hazards.

Similar to most occupational industries, safety risks with the likelihood of harm at different severity levels will not cease to exist in the construction industry.

Causes of construction site accidents have been analyzed and evaluated by several research studies (Hinze et al., 1998). It was found that among the key factors of construction accidents is deficiencies with risk management including

2

risk detection, evaluation, and assessment of constructed site safety risks (Haslam et al., 2005).

Construction accidents are not just a simple fault of injured worker; instead, it is a combination of causes and effects of different factors. Risk identification, analysis, and evaluation are necessary steps for construction safety. Safety risk assessment is comprehensive evaluation of potential identified risk events that are present or could occur at any point in time or space. Identification and structuring

are performed through risk analysis. While risk management is the set of strategies and procedures to control the risk level and to mitigate its consequences; risk

management is essential for minimizing or even eliminating safety risks. However,

reliable risk detection and assessment are essential to ensure risk recognition,

correct selection and implementation of risk management procedures (Jannadi

and Almishari, 2003; Dvir et al., 2002).

Nevertheless, the construction industry lacks reliable methods for safety

risk detection and assessment. Furthermore, construction safety can be complex

to the extent that the safety evaluation could be unpredictable by traditional

measures. Radio Frequency Identification (RFID) is among the most important

technologies that could be applied to safety evaluation due to its unique features:

non-contact automatic identification, ability to access and track multiples of RFID

tagged objects, and the ability to operate without having a direct line of sight. Thus,

in this research, real-time RFID technology for early identification and evaluation

is enhanced using fuzzy logic for quantifying the predicted risk evaluation values.

3

During construction, safety risk is generally assessed in a qualitative

linguistic fashion based on the subjective judgment of supervisors, ,

inspectors, owner's representatives, or other construction safety representatives.

It is unrealistic to make assumptions of crisp numbers for such uncertain situations.

Therefore, in an effort to develop a construction risk evaluation model to bridge the

gap between qualitative safety risk perspective and scientific risk management

approaches; fuzzy logic is introduced to play a key role in converting subjective

linguistic values into representative computational sets (Zadeh, 1965).

Fuzzy sets are used for risk input values to have more realistic evaluation

values than what the crisp numbers reflect. The fuzzy logic is used as the input to

the analysis; in turn, leading to more accurate risk emulation values. Conveying

the realistic risk evaluation values in real-time could lead to adequate responses

to control the risk level and to mitigate its consequences. Then the use of fuzzy

logic will be inevitable for the practicality of construction site risk evaluation (Zadeh,

1975; Zadeh, 1983).

This research achieves a real-time safety risk detection system for

evaluating risk events at building construction site for on-foot worker. It adds to the

state-of-the-art by developing an intelligent system that communicates risk

identities, types, and levels, exceeding the current detection solutions which can

only detect the proximity of objects. The methodology of real-time detection is

based on technology interaction for real-time identification of construction safety

risks, making safety risks more recognizable for on-foot workers at the time of risk

4

exposure. The risk detection values can assist in establishing proactive decisions

for the control of risks and protection of health. Moreover, this research is part of the overall goal to integrate a real-time interactive risk detection methodology with an analytical prognostic intelligent system risk assessment model that combines the risk values of major concurrent risk drivers at the time of exposure. The future work can include the development of an assessment model in which an intelligent system analyzes the driving factors contributing to safety risk assessment using fuzzy fault tree analysis method. Based on the risk analysis factors, risk assessment approach can be used to determine the combined degree of health and safety risk exposure for construction workers.

1.2 Statement of Problem

The lack of real-time visibility, indication, information about the site risks types and levels may put construction workers in dangerous situations (Hinze and

Teizer, 2011). Although, a review of the state-of-the-art of construction industry shows the use of technology for risk management, there is a limited use of technology application for construction risk evaluation. RFID systems are being widely researched for construction applications to achieve cost, time, space, and waste reductions through better managing construction site aspects, e.g., inventory, logistics, tracking, inspections. Tracking of objects is improved by RFID

5

which increases the certainties and information availability to mitigate operational

risks (Jaselskis and El Misalami, 2003; Caldas et al., 2006).

RFID applications promote construction safety through decreasing struck

by risk (Ruff, 2001; Ruff, 2004a, Ruff, 2004b); however, RFID applications are

limited to providing real-time proximity sensing alerts (Marks and Teizer, 2012).

The existing real-time detection solutions exclude providing individual risk-specific information and the combined effect of the risks when presented concurrently. The problem which this study is attempting to resolve is the lack of identification and evaluation of the individual risks within real-time risk detection solutions. The RFID

technology solution for real-time risk detection could be effective in providing early

identification and evaluation of construction safety risks, making safety risks more

recognizable and measurable for on-foot workers at the time of risk exposure.

However, it could be useful to integrate the RFID sensing system with an intelligent

system that can analyze and evaluate the detected risk information.

It is important to assure the consistency and comprehensiveness of

identified risks, and hence this study provides systemization of the basic triggering

events. Furthermore, this research is an effort to bridge the risk management gap

constituted from misinterpreting qualitative safety measurements by using fuzzy

sets concept for quantifying the truth values of risk evaluation. Safety risk levels

are qualitatively measured by most safety engineers because of the difficulties of

assigning crisp number for risk events. Therefore, fuzzy intervals are used to

convert subjective linguistic values into representative computational sets which

6

leads to more accurate and consistent risk emulation values. Ultimately,

determining and conveying site safety risk values in real-time to construction site stakeholders could have great impacts toward improving construction safety

evaluation and accident prevention.

1.3 Scope and Limitation of Study

1.3.1 Objective of Study

The main objective of this study is to achieve the concept of real-time safety risk detection method toward prompting better response measures for accident prevention. The principle objective remains to attain early identification

& evaluation of predictable risk making risk more recognizable & measurable for on-foot worker at time of exposure using reliable & consistent technology. The following points summarized some of the limitations of the scope:

• Who: on-foot worker

• Where: building construction site

• When: time of exposure

• What: basic triggering risk events, types and levels

• How: prognostic intelligent method & Fuzzy logic using RFID

7

1.3.2 Scope of Study

The scope of this research is to achieve the concept of real-time safety risk

detection system for on-foot workers at building construction sites. The

fundamental focus of this research is the method design and projection of real-

time detection of individual triggering risk using RFID technology. The ultimate

scope of the future research succeeding this research can be to achieve a real- time safety risk assessment system for evaluating the combined affect of risks and safety events concurrently being exposed to the construction worker. The future

work could design and examin holistic approach for real-time risk assessment

system that integrates the methodology of real-time interactive risk detection with

prognostic analytical risk assessment intelligent system model based on fuzzy fault

tree analysis.

For this research, the real-time risk detection methodology is RFID

technology based solution for achieving the identification and evaluation of

predictable triggering risk. The detection solution alerting on-foot building workers

at the time of risk exposure could make risk more recognizable and measurable.

The proposed risk detection solution can have an intelligent system model being the link for interpreting the RFID tag’s risk information to be delivered to the worker.

The intelligent system could deliver the individual risk value without further holistic risk assessment process for the combined effect of all interacting risk drivers.

8

This study is focused on the worker interaction with triggering risk events.

Triggering risks caused by the construction site environment which excludes the enabling risks caused by the workers characteristics. The value of the detected risk could be defined, as per the risk detection method design, as fuzzy set of linguistic value evaluated by the inspection engineer according to relevant judgments, standards, and specifications. Moreover, this study does not attempt to promote or analyze certain specifications or standards of construction risks or safety.

As the main scope of this study is to achieve consistent and reliable site safety risk detection model, basic triggering risk events are identified in the model without further classification. For example, if there exist a triggering risk of struck by moving equipment, the further classification and the specifications of the equipment are beyond the scope of this study.

To achieve the research scope, the following questions are answered in the chapters of this study:

1. What is the methodology for achieving the real-time risk detection solution

using RFID based technology?

2. How does real-time risk detection methodology define roles of on-foot

construction workers as an end user and the role of safety inspectors?

3. How could fuzzy sets represent subjective linguistic risk evaluation values

to be delivered to the worker?

9

4. What are the principle triggering risk events affecting health and safety of

on-foot workers at building construction site?

5. How does the real-time identification and evaluation of risk assist in risk

control?

6. What are the recommendations for enhancing the use of real-time risk

detection?

1.4 Value of Research

Despite the continuously changing and evolving construction working

environments and conditions, safety risk identification is generally performed

manually (Toole, 2002) in current construction industry without effective

technological tools. Consequently, the risk evaluation and assessment values are

inconsistently subjective and are not delivered promptly to combat safety risks

effectively (Hinze and Godfrey, 2003). Furthermore, the state-of-the-art

demonstrated in this research discusses several technology-based solutions that are limited to proximity detection without having integrated solutions to deliver real- time risk detection or risk assessment. This research proposes a RFID technology based solution for real-time interactive detection for early identification and evaluation of construction safety risks, making safety risks more recognizable and measurable for on-foot workers at the time of risk exposure. The early detection of

10 construction site risk levels is essential for having appropriate risk controls and response measures.

In order to build risk evaluation model for the occurrence of risk events, the way in which these events come into existence must be studied. By referring to the domino theory, this research sets an effort for interfacing the risk detection methodology with accident causation model. The importance of this effort recognized by several researches. Interfaces between risk evaluation techniques and accident causation models could be helpful in analyzing the causal factors and conditions affecting the possibility of accident occurrence. Furthermore, this research is an effort to bridge the risk management gap constituted from misinterpreting qualitative safety regulations and measurements by using fuzzy sets concept for representing risk evaluation truth values (Khanzode et. al., 2012).

The system could be utilized as an evaluation tool to gauge the progress and effectiveness of risk control programs by detecting risk at different instances of time and space. By pointing out in real-time the risks that need safety controls and preventive measure considerations, the safety management could use this solution in order to manage and calibrate health and safety programs implemented at construction site. Furthermore, the real-time risk detection system could be used by safety managers for safety sampling, meaning that the safety managers could inspect the site using the risk detection solution and keep a record of observed risk values for further evaluation. This could help to identify weak zones or less protected areas at construction sites. Thus, having a reliable risk detection tool will

11 support decision makers to take suitable essential provisions to control risks and prevent accidents. Ultimately, a more reliable and consistent real-time risk detection system will improve overall construction performance of safety and health records will result in humanitarian, economic, and social benefits.

Although the work developed in this research is intended to be a prognostic tool for risk detection, it may have secondary uses for accident and near miss incident investigations. Typically, the accident site should be investigated while the conditions are uninterrupted. By having the real-time risk detection solution and after collecting the accident risk driver facts, the victim’s perspective of the before- the-fact safety evaluation could be regenerated. In addition to the risk detection benefit to the construction industry, the risk evaluation intelligent system could be utilized as an educational tool to show the interactions between different risks of construction sites and may enhance understanding of risk transfer to accident event leading to fatality or injury.

In the current construction industry, the combined effect of the several concurrent risks at a construction site is unrecognized or underestimated.

However, future work of this research could have an added value since it could provide real-time risk assessment values by computing combined effect of concurrent risks at the time of exposure, yielding a thorough risk assessment for on-foot workers. The future work to be developed could be a holistic approach accommodating a prognostic risk assessment intelligent system that can compute the combined influence of the risk drivers by fuzzy fault tree analysis. The fuzzy

12 fault tree analysis which is valued as a uniform method for structuring workplace risks, could be an adequate tool for elaborating the intelligent system accounting for the combined effect of the different concurrent risk events, i.e., triggering, enabling, and conditional risk events. Ultimately, interactions among various

construction site risk events through fuzzy fault tree analysis could yield a reliable and consistent system for computing combined risk values.

1.5 Research Outline

This section is dedicated to demonstrating the outline of this thesis document. Five different chapters constitute this thesis; each of the chapter’s

content is described as below.

Chapter One provides an introduction to the research through

demonstrating construction industry background, construction safety problems,

motivation and justification of the study. Scope and limitations are clarified for the

research topic of real-time risk detection. Research

objective, questions, and validation approach are stated within the scope and

limitations section.

Chapter Two provides the conceptual and theoretical framework of the real-

time risk detection methodology using RFID technology. The methodology

highlights the solution process, requirements, components, methods, and

expected outcomes. The design for the detection system is pivoted by the

13 prognostic risk analysis process. The risk detection process can show the fuzzy logic intelligent system as the analytical brain of the research. Ultimately, the real- time risk detection method is designed with the following steps: risk identification,

risk prioritization, risk detection, and risk control. The interactions between the

physical and intelligent components of the solution are illustrated in each of the

detection method steps. The state-of-the-art is presented to verify RFID

compatibility for real-time detection method. The methodology also refers to the

research path followed in the further chapters for achieving the detection solution.

Chapter Three provides the classification and description of the

construction site triggering risk drivers to provide risk breakdown structure used in

the detection method. The chapter elaborates on the accident causality models

that build up to the basis of risk drivers.

Chapter Four simulates real-time risk detection solutions for the elaborated

method and the systemized risk. The chapter elaborates on the subjective

linguistic risk evaluation values represented by fuzzy set membership function

models. It describes fuzzy logic approach adopted for this research. The simulation

of the intelligent system of the solution shows the fuzzification and defuzzification

of risk values as part of the risk detection method.

Chapter Five states the conclusion, recommendations, and proposed

future work. It discusses the simulation program performance and results.

14

2 Chapter Two: The Methodology for Safety Risk Detection Using RFID

2.1 Methodology Outline

2.1.1 Introduction

The methodology of this research demonstrates the intended vision of the

real-time safety risk detection system using RFID technology, referred as the

“solution”. Methodology also explains research path for achieving the solution with

reference to the chapters of this study. As the solution proposed in this research

is the real-time risk detection system including the set of procedures and methods

to operate the system; therefore, this methodology highlights the solution’s process

requirements, components, methods, steps, and expected outcomes.

2.1.2 Methodology Principle Steps

As this research is an analytical research effort, it is essential to define the

principle steps for the risk detection methodology as in the following order. The

methodology steps are defined and explained further in this chapter.

15

(1) The process design for the risk detection system.

(2) Developing risk detection intelligent system through site safety risk analysis.

(3) The method design for the solution of the real-time RFID risk detection

system. This step also includes the solution’s assembly design.

2.2 The Methodology for the Analytical Research

2.2.1 Introduction

This section demonstrates the steps of design for the solution of the real- time RFID risk detection. The design for the ultimate system solution can be

initiated by the design of the risk detection process showing the flow of the

prognostic detection approach steps. The detection process design shows the risk

detection intelligent system as the analytical brain of the research; thus, it is

essential to discuss the subject of the risk analysis approach used to achieve the

intelligent system. Thereafter, the method design of the real-time risk detection

solution is elaborated with the complete vision about the interactions between the

interactive and intelligent components of the solution.

2.2.2 Risk Detection Process Design

Risk detection is the process of evaluating the effect of the exposure to the

identified potential risks associated with the construction site. Although the risk 16 detection processes found in literature vary because of different applications and approaches, there are principle components generally found in risk detection systems. In contrast to prognostic risk detection, Figure 2.1 shows the general components flow for the iterative diagnostic risk detection process.

Event Risk Risk Risk Risk Control & Facts Identification Analysis Evaluation Monitoring

Figure 2.1 Diagnostic Risk Detection Process

However, the process for risk detection systems is dependent on its

applications; prognostic risks detection process is different than diagnostic; also

real-time detection solution will require a certain unique process to be addressed.

It is essential to demonstrate in Figure 2.2 the process design for the principle

steps of the real-time prognostic risk detection solution of this research. The

process is mainly split into two phases; the first phase is the analytical efforts to

reach the risk detection intelligent system through accident causation analysis, risk

drivers systemization, and risk analysis. The state-of-the-art would be discussed

under the technology compatibility analysis showing the added value of this risk

detection research. The method design of the real-time risk detection system can

be elaborated and simulated with specific steps: risk prioritization, risk detection,

risk evaluation, and risk control.

17

Accident Risk Drivers Risk Risk Detection Causation Systemization Analysis Intellegent System Analysis

Technology Compatibility Analysis Method Design for Real-time Risk Detection

Detection Method Simulation

Inspected Risk Risk Risk Risk Prioritization Detection Evaluation Control

Figure 2.2 Process Design for the Prognostic Risk Detection System

18

2.2.3 Risk Detection Intelligent System Research Methodology

2.2.3.1 Introduction

Developing the risk detection intelligent system is a crucial part for reaching

the real-time risk detection solution. In order to develop the risk detection intelligent

system, this research will go through several steps ordered as following: accident

causation analysis, risk drivers systemization, risk analysis, and risk detection intelligent system programming.

2.2.3.2 Accident Causation Analysis

Considering that the risk detection intelligent system could be a model to evaluate and predicted risk as a function of influencing factors, it is essential to have causation theory that can be the backbone of the prognostic risk detection model. Causation theories could define the relationships between a set of variables of a certain event. Shown in Figure 2.2, accident causation domain analysis mainly

includes reviewing several sources of literature that integrate risk drivers into

accident causation theory. Accident causation theories could be set a framework

for the identification and systemization of risk detection drivers. Thus, the principle

risk drivers could be comprehensively derived from mapping the influencing risk

factor of the accident causation theories.

19

The selection of accident causation models should be based on the compatibility with the intended prognostic risk detection approach. The modified

Heinrich’s domino theory is explained in this research; the theory agrees with the concept that the occupational risk is not just a result of a simple fault of the deceased worker; however, it is the combination of causes related to triggering work environments, enabling human actions, and lack of safety controls and

precautions. Nevertheless, this research is exclusively dealing with the detection

of the basic triggering risks, i.e., individual construction site environment risks.

After setting the framework of the construction site safety risk drivers, this leads to

the next step in Figure 2.2 of risk drivers’ systemization.

2.2.3.3 Risk Drivers Systemization

The accident causation analysis sets the main framework of the risk driver

for this research as basic triggering risk events. Further risk driver’s systemization

requires the identification of the risk sources, situations, or acts that might lead to

risk at a building construction site. As implied by the accident causation theory, risk

drivers are not limited to the basic risk events; they also include the conditioning

risk controllers and dampers such as safety measures and precautions which

control the risk effectiveness. Nevertheless, basic triggering risk events would be

the exclusive principle risk driver for risk detection of this research.

20

A long list could be derived from literature stating the basic triggering construction risks drivers from physical, chemical, biological or psychological factors. However, in order to have a comprehensive risk driver’s systemization for the purposes of this research, the triggering risk would be structured based on a risk breakdown structure (RBS). RBS could categorize the risk drivers into risk events categories. The aim of the research was not to reach an exhaustive list of detailed risk events but to principally define the common and possible basic triggering risk events. This research recognizes the difference between the risk events and root causes of risk.

Several literature studies, codes, and historical statistical information could be used be achieve the classification of risk drivers to a systemized structure

(OSHA, 1990). A top-down methodology process will be used for the risk driver’s systemization. Meaning that the risk drivers defined from the causation theory could be decomposed into the top level categories of risk drivers prior to defining subcategories and the detailed risk events, Figure 2.3 shows the methodology

process for top-down systemization of risk driver. Studies and references could be

selected to contribute to the systemization of risk drivers to best fit the prognostic

triggering risk detection approach. Hinze et al. (1998) and OSHA’s Occupational

Injury and Illness Classification System (OIICS) (BLS, 2012) events and source of

injury structuring would be remarkable references for the identification and

classification of the triggering risks, i.e., construction site environment risks.

21

Risk Drivers Categorization of Decomposition Structuring Identified Principle Risk Events into Risk Events Risk Events

Figure 2.3 Process of Top-down Systemization of Risk Drivers

2.2.3.4 Risk Analysis

Risk analysis sets the steps to quantify and compute risk in a comprehensive and meaningful way. Several risk analysis approaches and methods are found in literature; this study will demonstrate risk estimation method

used for occupational risk analysis.

The outcomes of the risk driver’s classification and systemization chapter

could be used for the risk analysis as shown in Figure 2.2. In this research, the risk

estimation method would be using fuzzy logic for accommodating the subjective

linguistic values. The fuzzy logic approach will be essential for the inspected risk

prioritization indicated in phase 2 of the methodology; fuzzy logic could facilitate

the quantification and computation of the qualitative linguistic risk inputs.

Figure 2.4 shows the fuzzy logic role for the computation of risk detection

values. After the safety inspector assigns a linguistic risk value for each of the

defined risks, fuzzification process takes place to convert the linguistic values into

fuzzy set values of the Baldwin rotational model to be stored on the RFID tag.

Therefore, after the detection process takes place, defuzzification of the results

22 could be performed according to the Baldwin’s rotational model initially used for the fuzzification process. The defuzzified risk value is a linguistic value that could be communicated to the user to be alerted.

Inspected Risk Risk Detection Fuzzy Risk Risk Subjective Value Fuzzification Process Output Defuzzification

Figure 2.4 The Fuzzy Logic Role for the Computation of Risk Values

The future work will include fuzzy fault tree analysis as a deductive process to develop the interactions and relations between the risk drivers’ events at several levels in order to achieve prognostic risk assessment computation system. The assessment values for the fault tree lower, intermediate and top undesired risk events could predict the risk values. Fuzzy fault tree analysis is the approach adopted in future research to develop a systematic quantification and accumulation of the combined basic and conditional risks events, unlike this research that is only concentrating on the basic triggering risk events detection only. In the future research, the overall construction site safety risk assessment value can be calculated from the fault tree analysis using fuzzy algebra.

23

2.2.3.5 Risk Detection Intelligent System

Ultimately, the risk detection intelligent system could be programmed to be a reflection of the fuzzy logic detection approach. The intelligent system could also be compatible with the real-time detection technology approach by incorporated features, i.e., database. The intelligent system could properly receive the risk values to be analyzed, thus the risk process shown in Figure 2.4 could be

performed. The output of the automated intelligence system could achieve the

research objective of providing the detected individual triggering risk value in a

timely fashion.

2.2.4 Risk Detection Method Design

2.2.4.1 RFID Technology Compatibility Analysis (State-of-the-art)

2.2.4.1.1 Radio Frequency Identification (RFID) Overview

Radio Frequency Identification (RFID) is among the most important technologies developed in the last century. Among RFID’s main features, the non- contact automatic identification and the ability to access and track multiples of

RFID tagged objects (Hunt et al., 2007). In addition, the RFID system could work

in many different environments and conditions. For instance, RFID system could

24 operate without having a direct line of sight and can even transmit through several materials, and RFID can operate effectively in wide temperature range (Furlani and

Stone, 1999; Sandip, 2005).

The wireless use of radio frequency electromagnetic fields is the main

technology used to transfer data from tags to readers. The data transferred is the

electronically defined and stored data in the RFID tags. RFID tags act as

transmitters; they are powered by RFID readers when at connection ranges

through electromagnetic induction of magnetic fields. When RFID reader is in the

connection range of RFID tags, the RFID tag transponder is excited to emit ultra-

high frequency (UHF) radio waves. RFID tags are mainly found in two types,

passive RFID tags and active RFID tags. The main difference between the passive

and active tags is the reading range of the tag; active tags are generally readable

at longer ranges than passive tags. Passive RFID tags have short read range from

1cm to 5m (Bhuptani and Moradpour, 2005). On the other hand, active RFID tags,

using power source, such as battery, could transmit its data at long ranges up to

hundreds of meters.

RFID tags comprise of small microchip and antenna. Each RFID tag has a

unique product identifier stored in the tag’s limited memory; the unique product

identifier can be hyperlinked to several related additional information through a

database. The unique product identifier could be used as a key into the database.

Although the tags can be found as read-only or read-write, the tag data is stored

in the tag’s non-volatile memory. The RFID tag’s circuit basically collects the Direct

25

Current (DC) power from the incident reader signal in range, then, the RFID tag processes the received radio-frequency signal and transmits its memory data through the tag’s antenna. Ultimately, the RFID reader sends an encoded radio signal to interrogate the RFID tag within the reading range, then the RFID tag broadcast radio signals with its unique product identifier which could be received by the interrogator RFID reader. The reader could be connected to computer intelligence system having the unique product identifiers database information for further data processing.

Considering that an RFID system, i.e., tags and readers, may be active or passive, fixed or mobile, and short range or long range; RFID technology is applied in many disciplines. Tags could be produced as flexible small printed circuits even with adhesive backing; this could increase their practical use and reliability for many applications. The RFID system is being used to track inventory, products, assets, baggage, cargo, etc., by fixing an RFID tag on the object to be tracked.

Moreover, the RFID is used in many other application, such as access control, travel control, contactless payment, toll collection, transportation control, locating and identification, etc. Several industries, e.g., manufacturing, transportation, agriculture, as well as the construction industry proposes that the use of RFID technology in mobile supply chain management could reduce tracking time and control cost (Ngai and Riggins, 2008; Wang et al.,

2006).

26

RFID technology has been widely applied in many areas in the construction industry; several applications have utilized the RFID systems to provide the with information to empower operation (Jaselskis and

Tarek, 2003; Song et al., 2006). The tracking of equipment and material is improved with tagging objects with RFID tags and using proper frequencies to track them. For instance, underground utilities locating and tracking was examined using proper RFID systems.

In general, RFID increases the certainties and information availability which may mitigate risks; this makes RFID an attractive technology to be used in risk management. The following section presents several studies related to risk management application of RFID system.

2.2.4.1.2 RFID Technology Use in Risk Management

2.2.4.1.2.1 Proximity Warning Systems

Several studies investigate the proactive alerting when safety risk is presented due to worker’s proximity to the construction equipment. Ruff (2004a) evaluated several technologies applied for proximity detection and warning solutions; the study evaluated the detection range, precision, indoor and outdoor adequacy, calibration ability, feasibility, identification ability, etc. (Ruff, 2001; Ruff,

2004a; Ruff, 2004b). The applied technologies include Global Positioning System,

27

Radio Detection and Ranging, Ultra-wideband, Laser, Sonar, Camera Vision

Detection. Ruff found several benefits for the use of each technology; however, several limitations were found for each of the technologies used for proximity sensing systems. GPS was found to function at the outdoor sites but could not function indoors. Moreover, Global Positioning System was found to be not suitable for short range proximity detection. Laser and Radio Detection and

Ranging technologies had the limitation of not being able to distinguish on-foot worker from other objects and the limitation of only being able to detect object for short ranges. Although the Vision Detection technologies can identify on-foot workers from other ground objects, it had poor visibility in dark and dusty sites as well as it required high data process time. Some technologies were found to be infeasible or/and impractical to be applied for proximity warning at construction sites, such as: Ultra-wideband, Sonar, and Laser.

Marks and Teizer (2012) evaluated the effectiveness of the use of the radio frequency remote sensing technology to promote safety in construction. The approach was based on providing real-time detection and alert when on-foot workers are in proximity to the construction equipment. Experimental testing were designed and performed to evaluate the effectiveness of the proposed solution, experimental arrangements were set to represent interactions between workers and several construction equipment, e.g., drum roller, dump truck, excavator, etc., at short, medium, and long range.

28

The proximity sensing was tested in two scenarios, first, when the Radio

Frequency receiver device is held with the mobile ground worker approaching a static construction equipment, the second scenario is when the device was fixed on the mobile construction equipment approach a static worker. The radio frequency proximity detection system was successful in most trials for the detection of equipment within certain proximity and activating an audible alert that sufficient for the construction environment. The distance between the equipment and worker was measured in both scenarios; consistent measures were observed.

The system proved its ability to sense successfully and alert the worker in real-time when the construction equipment is in proximity within certain celebrated ranges. Thus, the tested radio frequency based solution has the potential to improve workers safety at construction sites with equipping workers with mobile solutions. Nevertheless, many parameters may potentially influence the system and limit its use. One of the major limitations of this study is the need for evaluating the calibration of the optimum proximity alert distances considering the operator and worker reaction time, equipment speed, equipment braking distances, etc.

Sensitivity analysis may be performed using a prototype of the radio frequency solution in order to come up with recommended calibrations of alert distances.

Furthermore, several factors may have an effect on the effectiveness of the system and needs to be further evaluated, such as: ambient temperature and climate, complex environments and situations at construction sites, radio frequency system mounting position and orientation, combinations of several types of risks, workers

29 acceptance to use the detection solution and shortcomings of the use of the radio frequency solution. Ultimately, in order to elaborate a detection solution, performance evaluation may require the collection of multiple observations for the solution in real life construction practice at different environments while recording

shortcoming, slips, errors, and limitations.

Teizer et al. (2010) stated that the Radio Frequency (RF) technology could

promote construction safety through decreasing struck by risk by providing real- time proximity sensing alerts for equipment operators, the RF tool could act as an

additional protection tool that is capable of performing in construction

environments. However, Teizeir found several limitations to the Radio Frequency

system, such as: power source required at all times to power the system, the

receiver must be installed at the receiving end, construction environment and

equipment conditions may have an impact on the system effectiveness, and

calibration of the alert distance must consider equipment type, reaction times and

brake distances.

2.2.4.1.2.2 Construction Site Objects Tracking

The RFID systems are used for construction applications to achieve cost,

time, space, and waste reductions through better managing construction site

aspects, e.g., inventory, logistics, tracking, inspections. Inventory tracking is one

of the widest RFID applications in the construction industry; inventory tracking

30 could be applied to equipment, tool, materials, etc (Duke et al., 2005; Paithankar,

2011).

Auto-ID Labs introduced the concept of smart shelves that is being used by several companies, such as Walmart, to track every item from cradle to grave in

their system; this reduces the out of stock times and provides better control of theft

and miss-managements. For instance, the smart shelves concept could be linked

to intelligent systems alert management to indicate the need for restocking when

certain products are low in stock (Fleisch et al., 2012). In the same manner, RFID

system is used to provide information on the quantity of materials and equipment

delivered. By tagging all materials by RFID tags and controlling the delivery routes

with RFID reader gates, all materials being delivered to the construction site could

be detected by the RFID receivers. Furthermore, RFID tracking systems were

examined for construction fabrication and manufacturing plants, Ergen et al. (2007)

used RFID and GPS for the tracking and locating components in a precast storage

yard with minimal workers input. The field tests using prototype system showed

the feasibility and practicality of the system for tracking precast parts in the storage

areas.

Yu-Cheng Lin (2008) examined enhancing construction facility

management using RFID and web technology. The case study indicates that the

RFID technology integrated with wireless devices could be useful tools for

empowering the construction inspections and maintenance process. The system

facilitated acquisition, tracking, and sharing location data and information while

31 overcoming time and space constraints; furthermore, the systems provides a base to estimate the progress of the facility maintenance.

Yen-Pei Chen et. al. (2013) studied the application of mobile RFID system

for safety inspection management at construction site. Using RFID-enabled mobile

smartphones system, RFID scanner plugged into smartphones could read safety

information at the checkpoint locations distributed at several site locations at

construction site, it was proven that RFID system is effective for improving the

attainment of safety inspections data records and real-time inspection reporting.

Ultimately, the use of RFID system increased the spread and speed of spread of safety information for further risk monitoring and control. The experimental results validated that RFID technology have potential to enhance jobsite safety.

2.2.4.2 Real-time Risk Detection Method Design

2.2.4.2.1 Introduction

The method for real-time risk detection using RFID will follow the process

defined in Figure 2.2: Inspected Risk Prioritization, Risk Detection, Risk

Evaluation, and Risk Control. The method design would technically explain the

components of the solution and the practical method for the effective use of the

solution while explaining the role of the participants in order to ultimately deliver

the real-time risk detection, and thus control the risks.

32

There are three essential prerequisites that should be present for the

solution to deliver the risk detection values as intended:

1) Pre-site preparation of the intelligent system and database to properly

receive and interpret predefined risk values of the RFID tags.

2) Site safety engineer inspecting and prioritizing the risk using the

predefined unique RFID tags.

3) The worker on site appropriately wearing the solution’s assembly with an

activated risk detection intelligent system.

2.2.4.2.2 Risk Prioritization

2.2.4.2.2.1 Inspected Risk Prioritization by RFID Tags Method

Risk identification and prioritization is the most critical links in the chain of

risk detection process. Risk identification and prioritization should be consistent

and correct so that the succeeding steps can be concluded based on correct information. In order to prepare for the real-time risk detection solution, the construction safety inspection effort shall be performed by safety engineers for identifying and prioritizing individual triggering risk events presented on site, it is noted that this study only includes the basic triggering risks knowing that there are

33 other crucial basic risks and conditional risks. The risk prioritization process by

RFID tags is proposed as a consistent process in order to deal with the subjective risk values of the individual risk inspections. For this research’s method, risk prioritization is established by the safety engineer tagging each individual of risk events with a unique RFID tag that represents the subjective risk value of each of the identified individual risks. This section discusses the method for risk identification and prioritization held by safety inspectors prior to using the solution by construction workers.

Inspected Risk Prioritization is the stage where the safety engineer could place the unique RFID tags on the physical source of the risk and defines the RFID tags in the intelligent system’s database; the following step of risk detection occurs when the RFID tag could identify and prioritize the risk to the system solution when the RFID reader is within a certain range. The safety engineer conducting risk identification and prioritization should be competent, qualified and possess the appropriate knowledge about the construction site activities being inspected. The following subsections attempt to clarify how can the safety inspector identify and prioritize the risk values of the RFID tag.

2.2.4.2.2.2 Risk Identification Inspection

In order to follow a consistent and systematic approach to identifying the

inspected risk events, safety engineer/inspector can refer to the triggering risk

34 events as systemized in Chapter 3. The eleven basic risk events are thought to assist the inspector as a systematic checklist to identify risk events on site.

Inspections for basic triggering risks should consider the risks input of this

research solution considering that each risk driver event is being evaluated

independently from any other risk event. It is important to note that this research

does not specify or limit the inspection techniques, specifications, legal

requirements, etc. Considering that the risk events evaluation by inspectors is in

subjective values, the identification of the individual risk events could be performed

by multiple techniques. In order to enhance the ability for locating the risk sources,

some inspectors might implement a breakdown of worksite by activities, work zones, subcontractors, etc. However, some risks might be associated with multiple tasks, thus inspectors should assure that duplicates were removed. Inspectors can

ask themselves questions as: How could risk come into existence? Which sources of risks, i.e., hazards, could lead to an injury?

The safety inspector analyzes the observed data according to knowledge, experience, and project specifications and regulations which lead to the identification of the risk, thus prioritization of the risk. The inspector may identify basic risk from hazards information. The inspector should keep in mind that a hazards could be source, situation or act, or a combination having the potential to harm construction workers. Inspecting the basic risk sources could be performed by collecting information from the construction site environment: materials, tools, equipment, tools, scaffolding, electricity, chemicals, etc.; as well as any aspects of

35 work interactions, conditions, and root causes that may lead to safety risks. Along

with the inspectors expertise for safety inspections and monitoring on regular

bases, variety of sources may provide information used in risk identification

process, some of which are listed as following: safety specifications and legislated

requirements, codes and standards, industry’s safety practices, organizational

procedures and policies, project specific safety and traffic plans, interviews and

surveys with construction site participants, near misses and safety accidents

history and records, lessons learned database, materials and products safety

manufacturer information and safety data sheets, tool’s operating and instructions

manuals, safety specific test results, previous risk identification and assessment

documents, expert opinions, etc.

Range of foreseeable conditions might change along the stages in

construction process. Moreover, the risks are not only related to routine activities

at the construction site. Risk identification is an ongoing process; therefore, safety

inspections for basic risk identification should be performed regularly and

systematically whenever new information becomes available about risks or change

in risk. For instance, safety inspection can be useful at the start, progressing, and

finish of activities, tasks, phases, work zones, use of tools and equipment,

subcontractors work, etc. Furthermore, inspection could be needed after unusual

events such as extreme weather event, system failures, safety incidents and

accidents, etc.

36

2.2.4.2.2.3 Inspected Risk Prioritization

2.2.4.2.2.3.1 Introduction

The individual risk events evaluation values are very important input for the risk evaluation process. After identifying the risk events, the safety inspector can evaluate the individual basic risk in order to define the RFID tag in the intelligent system’s database. Assigning values to the risk events is a ranking approach to prioritizing risks in a way to set their impact on the general safety risk.

Subjective linguistic judgment values are the approach adopted in this research method to determine the level of risks by the inspector. Safety inspectors can define subjective linguistic risk evaluation values through analyzing available information from several related sources as discussed in the previous section of individual risk identification. However, the inspector could analyze the risk sources to determine several factors related to the risk evaluation, such as: the level of compliance/incompliance to the regulations and legislative requirements, or even the certainty of the predicted conditions and their relevance to the identified risk.

Further sections of this research elaborate fuzzy sets solution to accommodate the subjective nature of the site safety risk evaluation values set by inspectors. A series of linguistic evaluation truth values for basic events are represented by the rotational model fuzzy set truth values membership functions.

37

The inspector could select the individual risk evaluation values from the truth values having predefined fuzzy sets as described in this study.

2.2.4.2.2.3.2 Basic Risk Prioritization

In an attempt to evaluate the seriousness of the individual basic risks, inspectors can look for answers of questions to evaluate the likelihood and severity of the risks. Questions to evaluate the likelihood of risk could be: How frequent is the risk presented? How frequent does the workers interact with the risk? How

does the frequency of the risk the affects the harm it may cause? Did the risk ever

cause safety incident or accident? Likewise, question to evaluate the severity of

risk could be as: What is the severity of the harm that could result because of the

risk? What type of harm could the risk cause? What type of body could the risk effect? What variables and factors could influence the severity of harm that may occur, e.g., height, distance, etc.? Could the risk be harmful in causing other

systems to fail? (Victoria, 2007; , 2011; Phoya, 2012)

The basic risk events evaluation values, ultimately, depend on the likelihood

that harm from a potential source will be realized taking into account the severity

of harm. Some studies have suggested risk evaluation scales based on likelihood

and severity (Pinto, 2012; Kirchsteiger, 1999; Esmaeili, 2012; Campbell, 2008).

For the purposes of this research, the following suggests an approach for risk

prioritization by a series of truth values as in Table 2.1.

38

Severity Likelihood of Harm of Harm Rare Unlikely Possible Likely Certain Very Extremely Absolutely Absolutely Fatal Risky Risky Risky Risky Risky Very Extremely Absolutely Serious Risky Risky Risky Risky Risky Extremely Moderate Fairly Risky Risky Risky Very Risky Risky Slightly Fairly Minor Risky Risky Very Risky Risky Risky Absolutely Slightly Fairly Trivial Risky Risky Not Risky Risky Risky

Table 2.1 Basic Risk Values According to Severity and Likelihood of Harm

This study suggests that the risk evaluation values, shown in Table 2.1 could be estimated from the severity of harm and likelihood of harm values.

Several studies have elaborated qualitative and quantitative scales to estimate the likelihood and severity of harm values. This study suggests sets of subjective scales to be considered for estimating the likelihood and severity values. Workmed method have proposed a quantitative measure of risk based on numerical scale of frequency, severity, exposure, deficiency, and other factors. Workmed method had the advantage of being adaptable to perform risk evaluation for different occupations including construction. Workmed method have used qualitative description corresponding to each of the numerical ratings of risk factors.

Considering the use of fuzzy logic in this study, fuzzy set truth values could be subjectively described (Campbell, 2008; Pinto, 2012; Rameezdeen et al, 2013).

39

Likelihood factors estimate the occurrence likelihood of accident by using relevant priority factors. These factors could be estimated on site according to the inspector’s judgment of the most likely accident mode. The subjective value takes into account the workers exposure and the potential for construction site injury or illness. Table 2.2 represents subjective description of risk likelihood values.

Likelihood Description of Harm

Certain Certainly occur frequently

Likely Most probably occur expectedly

Possible Might occur occasionally

Unlikely Possibly occur unexpectedly

Rare Most probably never occur

Table 2.2 Subjective Description of Risk Likelihood Values

The subjective judgment of level of severity may require knowledge of

relevant information such as: body location of injury, nature of the harm, accident

mode, construction site environment and conditions, and features of work activity

performed. The safety inspector may project the accident’s harm severity by

analyzing several factors, e.g. speed, height, weights, related to the amount of

energy absorbed or dissipated by the worker’s body. Moreover, the human body’s

40 biomechanical limits can be used to estimate the severity of harm. Table 2.3

represents subjective description of risk severity values.

Severity Description of Harm

Fatal Death, injury or illness with permanent total disability Injury or illness with permanent partial disability, or temporary total Serious disability Injury or illness with temporary partial disability, medical or Moderate hospital treatment required Minor injury or mild illness without any disability, only first aid Minor treatment required without any medical or hospital treatment

Trivial Neither injury nor health problem

Table 2.3 Subjective Description of Risk Severity Values

2.2.4.2.2.3.3 Risk Values Fuzzification of Sets

Fuzzy logic is the logic in which the truth values are fuzzy subsets with

linguistic labels, labels such as true, very true, fairly true, false, very false, fairly

false, etc. The fuzzy set theory can be used when it is unrealistic to evaluate the

probability of occurrence of an undesired event by using a crisp value without

taking into account the uncertainties related to each of the basic events. Fuzzy set

theory proposed a logic shift from ordinary crisp sets of the binary logic of a

41 membership value of either zero or one, to a fuzzy set where each member is assigned its own membership value ranging from zero to one (Al-Humaidi and

Hadipriono, 2010; Weber, 1991).

Fuzzification is the process taking place when converting crisp values into fuzzy values with different uncertainty values. In other words, it’s the process of mapping from an input of crisp universe of discourse into the degree to which a value belongs in a fuzzy set that describes the membership of the fuzzy input variable from a fuzzy interval (0, 1) (Zadeh, L. A., 1968; Zadeh, L. A. 1999;

Zadeh,1975).

In a rotational model, a fuzzy set can be represented by a linear line or a nonlinear line, the line can be connecting one or two points often referred as rotational points. Baldwin model presents the rotational model using some specific linguistic hedges. In Baldwin’s model, all linguistic hedges are represented by the powers of membership function. For example, if the membership function is modified with the linguistic hedge ‘fairly’, then the values of the function fairly are represented by the square root of the base term function. Baldwin Model is shown in Figure 2.5.

Due to the rotational model’s compatibility and suitability to the subjective nature of the risk evaluation values, rotational model fuzzy sets will be adopted to describe the truth values of the risk evaluation. Each of the basic events, as concluded from chapter 3, could be represented by fuzzy set truth values implying subjective linguistic values that can be expected from the inspector. Ultimately, the

42 unique product identifier for the RFID tags can refer to a specific fuzzy set and a

specific basic risk event. The following shows a series of subjective linguistic

evaluation values represented by fuzzy set truth value membership functions, this

process is known as the fuzzification of values.

As only the true values of Baldwin model are adopted for this study. Fuzzy

sets membership functions of truth values for the basic risk events evaluation

values are shown in an equation function form in Table 2.4 and graphical function

form in Figure 2.6.

Basic Risk Linguistic Fuzzy Truth Value Membership Function Evaluation Value

Absolutely Risky X = 1 {0 ≤ Y ≤ 1}

Very Risky Y = X2 {0 ≤ X ≤ 1}

Risky Y = X {0 ≤ X ≤ 1}

Fairly Risky Y = X1/2 {0 ≤ X ≤ 1}

Absolutely Not Risky X = 0 {0 ≤ Y ≤ 1}

Table 2.4 Fuzzy Sets Truth Values Membership Functions for Basic Risk

43

Graphical Baldwin Approach to Fuzzy Truth Values 1.0

0.9

0.8

0.7

0.6

0.5

0.4

0.3

0.2 Fuzzy Fuzzy (Y) Set Membership Value

0.1

0.0 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 Fuzzy Set Element (X)

ABSOLUTELY TRUE VERY TRUE TRUE FAIRLY TRUE FAIRLY FALSE FALSE VERY FLASE ABSOLUTELY FLASE

Figure 2.5 Baldwin Model Approach for Truth Values

44

Fuzzy Sets Truth Values for Basic Risk Events 1.0

0.8

0.6

0.4

0.2 Fuzzy Fuzzy Set Membership Value

0.0 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0

-0.2 Fuzzy Set Element

ABSOLUTELY RISKY VERY RISKY RISKY FAIRLY RISKY ABSOLUTELY NOT RISKY

Figure 2.6 Fuzzy Sets Truth Values Graphs for Basic Risk Values

45

2.2.4.2.3 Risk Detection

The construction worker can wear the risk detection solution which constitutes of the RFID reader with the real-time risk detection intelligent system.

The solution is suggested to be attached to the helmet of the construction worker.

The solution attached to the workers on site is interactive; the RFID reader interrogates the tags to detect risk information from the RFID tags through their unique product identifier. When the RFID tags are in the worker’s RFID reading range, the RFID reader could detect the unique ID of the tags and transmit the ID to the intelligent system in order to interpret the unique ID to the risk information related to the RFID tag. Figure 2.7 and Figure 2.8 shows the transmission of information between the RFID tags to RFID reader when there is a risk event in the range of the host of the RFID reader devise.

46

Figure 2.7 Interaction Process between Objects with RFID Tag and Reader

Data Tag Reader Reader Excites Tag Processed by Transfers Receives Intellegent when in Range Data Risk Value System

Figure 2.8 Process of Interaction between the System Components

47

2.2.4.2.4 Risk Evaluation

As the Risk Detection takes place, the RFID reader could transmit the risk values, i.e., unique product identifier, to the system’s intelligent system as detected from the RFID tag. The intelligent system can process the detected risk input by matching the unique product identifier of the RFID tags with the subjective linguistic risk level values as predefined in the database.

Risk evaluation is the step were the fuzzy risk output referred as unique product identifier is being defuzzified in order to declare the meaningful risk value as in Table 2.6.

Inspected Risk Risk Detection Fuzzy Risk Risk Subjective Value Fuzzification Process Output Defuzzification

Figure 2.9 Fuzzy Logic Role for the Computation of Risk Values

Figure 2.9 shows the fuzzy logic role for the computation of risk detection values. Defuzzification of the results could be also performed according to the

Baldwin’s rotational model initially used for the fuzzification process in the step of

“Inspected Risk Prioritizing”. Each of the fuzzy subsets can be identified by area under a curve or integration within domain limits as identified in Table 2.4.

48

Table 2.5 shows each of the truth values linked with the integration value range limits represented by the area under a curve.

Area Under a Curve Resulting Risk Range Difference Defuzzification Range Linguistic Value

0.00 – 0.083 0.083 Absolutely Risky

0.083 – 0.42 0.34 Very Risky

0.42 – 0.58 0.16 Risky

0.58 – 0.917 0.34 Fairly Risky

0.917 – 1.00 0.083 Absolutely Not Risky

Table 2.5 Area Under a Curve Range Limits Linked with Truth Values

2.2.4.2.5 Risk Control

As the intelligent system generates the linguistic risk evaluation value as

shown in Table 2.6; thus, risk control could be introduced. The individual risk level

evaluation could be declared in real-time to the worker, i.e., the host of the solution,

as a sound message in order to alert the worker about the site safety condition. A

49 complementary risk control sound message may follow the risk level value to recommend the best practice respond that is adequate to the risk level value.

No. Resulting Basic Risk Linguistic Evaluation Value

1 Absolutely Risky

3 Very Risky

4 Risky

6 Fairly Risky

7 Absolutely Not Risky

Table 2.6 Defuzzified Risk Linguistic Values Declared from Intelligent System

The construction site safety risk detection alerts on-foot worker about

potential basic triggering risk events that are present or could occur. As a part of

the risk management plan, safety statements could be beneficial for controlling and

preventing the identified safety risks during this process. The resulting defuzzified

linguistic value, Table 2.6, could be accompanied with a risk control action

message to manage the presented level of risk.

50

2.2.4.2.6 Detection Method Summary

Figure 2.10 and Figure 2.11 shows the overall interactions process between

the different components of the system. It is noted that Figure 2.11 shows an arrow

representing internal links between “the solution” components and a waveshape

representing the wave link between tags and reader.

RFID Tags Intellegent Evaluation & RFID Reader Defined for Risk System Control Values Risk Detection Prioritization Computations Declared

Figure 2.10 Process of the Interaction between Different System Components

Figure 2.11 Process of Interaction of RFID Tag and Solution Elements

51

3 Chapter Three: Systemization of Construction Safety Triggering Risks

3.1 Introduction

Occupational accident can be defined as any event which interrupts the

normal work process caused by human factors, situational and environmental factors, or any combination of these factors which may result in personal injury or

death. Safety risks associated with activities, processes, or projects derive from

several causes related to work site conditions, materials, equipment, labor, safety

conditions, and many other factors. However, the workers diverse and multiple risk

exposure at site contribution to the overall safety. In order to build risk evaluation

model for the occurrence of risk events, the way in which these events come into

existence must be studied. This implies the need for identification of factors that

cause these events and the way they interact with each other (Rahim et al., 2008;

Hu et al., 2011). Any effective risk management program must include four phase

process which are: identification, evaluation, responding, and monitoring of risks.

This chapter provides a general identification and systemization of the construction

safety triggering risks related to on-foot construction workers. Outcomes of this

chapter can be used for building risk identification structure for the risk detection.

52

Although many construction safety risk causation models depend on historical accidents recodes, academic sources or even expert opinions (McClay,

1989a; McClay, 1989b; Hinze, J., & Russell, 1995); these sources may bias the

results by considering only certain events and conditions. The selection of accident

causation models should be mainly based on the intended usage. Khanzode et.

al. (2012) states that interfaces between risk assessment techniques and accident

causation theories would be helpful in prognostic risk evaluation approaches. This

interfacing could assist in examining the domino effect leading to accident event.

Construction site safety risk assessment drivers used for risk analysis can be

reliably derived from a comprehensive accident causality model such as the

domino theory.

Domino Theory model fits the construction safety field as it suggests that

the occupational fatality is not just a simple fault of the deceased worker; instead,

it is the combination of causes related to triggering work environments, enabling

human actions, and lack of safety controls and precautions. Therefore, a

fundamental accident causation model is essential for safety risk analysis process

in order to highlight the main types of risk causal events and factors. However, the

domino theory is highlighted in this study to demonstrate the triggering risk aspects

of the accident causality. The domino theory as a whole is not adopted as a base

for this study, but the Modified Domino Theory could be the basis for the future

work of real time risk assessment research that takes into consideration the

combined effect of the various multiple risks.

53

3.2 Domino theory

The domino accident causation model is one of the earliest theories for risk analysis. Heinrich (1959) observed a series of interrelated factors that include: causes of unsafe acts and conditions, workers safety when interacting with equipment, safety management and controls, impact of safety specifications and regulations, and costs of accidents. The nucleus of the domino theory started with the two factor model; it stated that uncontrolled risk exposure and unsafe worker actions are both the immediate causal factors that must be present together for an accident occurrence.

Furthermore, Heinrich et al. (1980) investigated the conditions and circumstances that cause industrial occupational accidents. The accident causality model proposes that the occurrence of any accident injury results from a

completed sequence of factors of which the last is the accident itself.

The domino model includes five factors in a sequence ending with an injury

as shown in Figure 3.1. The first domino indicates that the social environment and

ancestry may reflect negative character traits, e.g., stubbornness, recklessness;

these traits along with lack of knowledge and skill may lead workers to occupational safety faults. Fault of person is the second Domino in the sequence,

e.g., human faults, misjudgments, and safety precautions incompliance. The

second Domino factors can be a direct predecessor for unsafe act or condition

54 representing the third domino. Thus, the accidents are invariably driven directly by the unsafe acts, e.g., worker running on loose scaffolding.

Ultimately, Heinrich’s theory mainly conveys that injuries of accidents are caused by certain preceding factors and causes driven by people’s behavior. The theory proposes that the highest safety payoff comes from breaking the domino effect by rectifying the worker’s behavior and eliminating unsafe conditions.

Environment Human Unsafe Event Accident Injury & Ancestry Fault or Condition

Figure 3.1 : Heinrich’s Domino Theory

The modified Heinrich’s domino theory, which could be adopted for the

future research, elaborated a modified domino sequence for accident causality.

Several modern safety researchers have modified Heinrich’s domino theory to account for the importance of accident control aspects in accident causation and prevention. Heinrich et al. (1980) modified domino sequence is shown in

Figure 3.2; the modified sequence considered the lack of safety controls as a

conditional cause of safety accidents. The incorporation of the event of “lack of

control” reflects the role of safety management and control system in the sequence

of accident causation. The modified Heinrich’s domino theory suggests that basic

55 cause, i.e., personal and job factors, could be in play only if sufficient safety controls were missing. Moreover, the causality sequence makes the immediate causes as the direct predecessor of accidents.

Basic Immediate Lack of Control Accident Injury Causes Causes

Figure 3.2: Modified Heinrich’s Domino Theory

3.3 Systemization of Construction Safety Risks

3.3.1 Introduction

Occupational safety risks of any unique construction site are related to human behavior, site conditions and environment, and poor safety controls; while the symptoms of these safety risks are reflected in the unsafe work methods and procedures, and failure to use safe tools and equipment. It is well known that any

construction project has a unique and dynamic nature; however, most of the

construction sites share the same basic causes of safety risks leading to accidents.

Supported by several literature studies, scholars, codes, and statistical evidence,

56 this chapter presents classifications for the reasonable and possible risk triggering

basic safety risk events which can be used for the detection system solution.

Risk identification requires the proactive determination of all possible

sources, situations, or acts that might exist at construction site. A long list of safety

risk related to physical, chemical, biological, psychological, etc., factors could yield

from risk identification. Therefore, in order to better manage the identified risks,

there should be a framework for risk structuring. Structuring the information

provides an effective presentation and organization of the outcome of risk

identification. In this study, risk will be structured based on the Risk Breakdown

Structure (RBS) technique. RBS is a common and very practical tool that groups the identified risk events into different levels following a bottom-up approach.

As the modified domino causation theory suggests that there are multiple causes of accidents; the potential safety risk causes are classified in this research as basic and conditioning risk causes. Basic causes are the primary failures leading to accident occurrence; basic causes could occur either alone or in combination with conditioning causes. Basic events can be categorized under either enabling events or triggering events. While, conditioning causes are related to the safety controls on site.

Enabling events include all the causes that are directly related to the worker’s internal safety risk sourced from attitude, health, and skill level of worker.

While, triggering causes include all the external, i.e. work environment and conditions related, safety risk that can affect the worker’s safety and health.

57

Triggering causes are resulting from conditions other than the enabling causes; triggering causes are related to external causes that precipitate the accident, such as overloading on the roof or scaffolding, strong wind impact, inadequate strength, slippery conditions due to rain, snow, etc. Support related causes is suggested in

literature studies as a separate basic causal accident category; however, because

this study is safety risk detection oriented, the triggering events group will include

all causes which are support related (Chi et al, 2012; Hadipriono, 1992a;

Hadipriono, 1992b; Hadipriono et al., 1995a; Cheng et al, 2012).

In this research, it is important to note that the basic and conditional event

categories are meant to be mutually exclusive independent events in terms of

definition and root causes. For example, fall from elevation risk event category

should not be used to represent a risk rooting from safety measures on site or even

lack of experience and training, because the fall from elevation risk event is

attributed under the triggering events classification of falls, slips, and trips risks as

explained in further sections.

3.3.2 Basic Triggering Construction Risk Events

3.3.2.1 Basic Triggering Risk Events Classification

Several studies viewed safety risks as technical or human error (Chi et al.,

2005; Murie, 2007). In this study, triggering risk are the type of risks resulting from

58 conditions other than the internal human causes; triggering causes include the

possible construction site environment risks.

Construction sites have a long list of significant and different types of

triggering risks that the workers are exposed to. Several previous studies have

elaborated different safety risk classification system based on statistical, historical,

and expertise. Some researchers have classified health and safety risks into two

categories: physical safety risks and the ill health risks (HSE, 1998).

Since the Occupational Safety and Health Administration (OSHA) has been

established in 1971, fatalities in accident cases are generally reported to OSHA

within 8 hours of the occurrence. Databases for workplace risks have been

developed, which yielded widely publicized data and studies on the primary causes

of construction fatalities. OSHA states that in 2014 private industry, about 900 of

4,385 occupational worker fatalities were in construction; this attributes more than

20% of worker deaths to construction. OSHA has indicated that fall is the leading

cause of fatal injuries in construction with about 6,900 fatalities between 1992 and

2010. Moreover, OSHA attributes the construction deaths to specific leading

causes referred to as fatal four for being responsible for more than half of the

construction worker deaths in 2014. Fatal four causes are sorted in descending

order starting from the most leading cause with the highest deaths percentage:

falls 40%, electrocution 8%, struck by object 8%, and caught in/between 4%. (BLS,

2014a; BLS, 2014b; BLS, 2014c; BLS, 1992-2014; OSHA, 2013a; The Center for

Construction Research & Training, 2013)

59

Huang and Hinze (2003) analyzed the Integrated Management Information

System database of OSHA for about 7,500 accidents that occurred in the U.S. construction industry from 1990 to 2001. Fall accidents were the leading cause of accidents with the percentage of the total falls being 36%. Huang and Hinze (2003) five primary causes of accidents are sorted in descending order starting from the most leading cause with the highest deaths percentage: falls 36%, struck by 24%, others 15%, electrocution 13%, and caught in/between 12%.

Most construction site accident researchers have agreed that falling from

heights accident mode has the most likelihood and severity to cause health and

safety consequences for construction workers (Huang & Hinze 2003). Poon et al.

(2002) suggested that accidents attributed to falling from heights and struck by

objects constitute more than half of the total accidents at construction sites.

However, OSHA developed Occupational Injury and Illness Classification System

(OIICS) using a consistent method for classifying occupational injuries and

illnesses statistics in a hierarchical structure.

Classification of the basic causes of the construction safety risk can be

elaborated using the OIICS of OSHA. The OIICS is a comprehensive coding

system that can be referred to for multiple purposes such as characteristics coding

of injuries and fatalities. OIICS is adopted in this research as a tool necessary for

developing the classification for basic triggering causes of construction site risks.

The OIICS manual issued by OSHA in 2012 indices four code structures

used to classify the occupational injury or illness circumstances as following:

60 nature of injury or illness, source and second source of injury or illness, part of body affected illness, and event or exposure. Each of the code structures is

hierarchically categorized into subdivisions and groups. Event or exposure

structures follow the manner in which the accident or safety risk occurs, while the

source of injury or illness and secondary source structure identifies the

substances, equipment, or any factors that may precipitate the event. In contrast,

part of body affected and nature of injury structures demonstrate the affected body

system and symptoms of the injury or illness respectively which could better fit in

a diagnostic context (Bureau of Labor Statistics, 2012).

Considering that this research is elaborating a prognostic approach for risk

evaluation; therefore, event and source of injury OIICS structures can be most

harmonic with this research to represent the triggering basic causes. The following basic triggering events classification for this research is elaborated from adjusting the event structure in OIICS version 2.01 and using Hinze et al. (1998) construction specific accident classification system classification in order to best fit the definition of the triggering causes for the purposes of this study. This chapter provides the breakdown structure and definitions for basic triggering risks.

3.3.2.1.1 Falls, Slips, Trips Risks

Several research studies performed in different countries, e.g., USA, China,

Taiwan, New Zealand, have concluded that falls from heights are the leading risk

61 events on construction sites (Bentley et. al. 2006, Yung 2009). Fall accident statistics usually have the highest rate for seriously hospitalized injuries which makes the fall accidents one of the most costly among all other accident modes

(Gavious et al., 2009).

Huang and Hinze (2003) listed several physical factors leading to construction site falls, the study found that falls from roof is the leading cause of falls having about 28% of the total falls, the following shows Huang and Hinze

(2003) breakdown structure of fall accidents with its percentage from the total falls.

• Falls from roof, 28%.

• Falls from ladder, 11%.

• Falls from scaffold or staging, 13%.

• Falls from structure, 19%.

• Falls into opening, 78%.

• Falls from aerial lift, 3%.

• Falls from platform catwalk, 2%.

• Fall from vehicle or construction equipment, 2%.

Moreover, Huang and Hinze (2003) provides percentage breakdown of fall

accidents with respect to fall height intervals as following:

• Fall from 0 to 10 feet, 23%.

• Fall from 10 to 20 feet, 28%.

• Fall from 20 to 30 feet, 22%.

• Fall from 30 to 40 feet, 8%. 62

Due to the high risk of fall, the roofing workers are three times more likely to have fatal injuries than any other workers in the construction industry (BLS,

1992-2014; NIOSH 2004). Although falls might have several direct or complex

reasons; in many cases, falls are the result of slips or trips. Slips and trips can be

the initiating cause of other types of fall accidents namely, fall from heights.

Szymusiak and Ryan (1982) defined the slips as the cause of the reduction or loss

of friction between the worker and supporting surface; slips results in a temporary

loss of balance in a sliding motion. Many construction site surface materials could

be the cause to slips such as water, oils, gravel, and pipes. In the contrast, trips

are caused by a sudden high friction or obstruction between the worker and

supporting surface resulting in the loss of the worker’s balance. Many construction

site hazards could cause trips, such as tools, equipment, cables, conduits, holes,

openings, bumps. Slips and trips are considered as one of the most common

construction site risks. According to Lipscomb et. al. (2008) slips and trips

constitute about 20% of all injury accidents in USA workplaces. Although slips and

trips could occur because of inappropriate footwear of worker, the inappropriate

footwear would not be under this category, but rather it would be included within

the conditional events considering that the basic and conditional events categories

are meant to be mutually exclusive

Although the major reference for the triggering events risks is the OIICS,

however, this classification would arrange the event structure in a harmonic way

to fit the path of this research. In this research, falls, slips, trips risks category

63 includes four subgroups of major triggering risk events in construction: fall from

elevation, fall from scaffolding or staging, fall from ladder, and cave-in.

3.3.2.1.1.1 Fall from Elevation

Fall from elevation risk includes falls, slips, and trips on the same level and falls to lower levels. The OIICS defines fall to lower level as the instances in which the risk is produced by the impact between the worker and another surface of lower elevation when gravity generates the worker's impact motion. Fall on same level

applies to risk events when a worker has a loss in equilibrium from falls, slips, and

trips generated by gravity at the same level. It is clear that this event category

includes fall on same level and fall to lower level where the two cases could

encounter different risk values; risk values system adopted in this research is

explained in other chapters.

This risk event category includes any event that applies to the spirit of its

definition and excludes any fall event that is categorized under any of the other

falls, slips, and trips risks event categories, i.e., fall from scaffolding or staging, fall

from ladder, and cave-in. For example, this category excludes falls from any

surface that can be described as scaffolding or staging; nevertheless, this category

includes falls from structures such as roofs, elevator shafts, and openings.

64

3.3.2.1.1.2 Fall from Scaffolding or Staging

Fall from scaffolding or staging risk events are related to the scaffolding or

staging component, e.g., limited area scaffolding; that could cause a worker to fall,

slip, or trip for a reason other than the failure of structural components. The aforementioned exclusion of this category is covered under the cave-in events.

3.3.2.1.1.3 Fall from Ladder

Fall from ladder risk events are related to worker on ladder falling, slipping, or tripping from ladder for a reason other than conditional or enabling causes.

Improper placement of ladder, unstable or uneven ground under the ladder are examples of risks related to this category; however, a worker not maintaining three contact points with the ladder at all times is considered to be an enabling cause, thus does not fit in this category.

3.3.2.1.1.4 Cave-in

A worker may also fall due to failures related to support or component of support that is being platform for the worker. This failure may cause the total collapse of the entire support structure or some of its supporting components in which the support cannot perform its intended function, leading the worker to lose

65 of stability and fall, slip, or trip from the support. An example of causes leading to cave-in risk is loss of stability due to missing connections of the support. External causes could also lead to the failure of the supporting platform, such as the impact

of construction equipment to the supporting structure or even strong winds. In

general, , excavations, and tunnels have tendency for cave-in risk when

they are not fully supported (Hinze et al., 1998). However, this risk event category

does not include the risk of the worker being struck by falling objects; rather it

includes the risk of the workers to fall due to support related failure only. Moreover, the collapse of a temporary or existent site structure could cause the cave-in fall

of worker.

3.3.2.1.2 Struck by/Caught in Falling Objects Risks

Struck by accident mode is one of the fatal four and is considered the

second highest cause of construction related deaths in the US. Struck by

construction accidents have different modes, i.e., struck by falling objects and struck by moving objects. Nevertheless, most of struck by fatalities involve . Most of the struck by and caught in injuries and fatalities result from being struck by moving heavy equipment or machine, struck by falling objects, e.g., , boom, load, etc., and struck by cave-in (Hinze et al., 2005; Hinze et al.,1998).

66

Different construction activities might expose workers to different struck by risks. For instance, working at an excavation zone could increase the risk of being struck by moving heavy excavation equipment, swinging backhoes, backing equipment, overturned vehicles, etc. In contrast, when a worker is below a crane or scaffold, the risk of being struck by falling objects increases. Thus, in order to clearly differentiate between the different struck by risks, two struck by categories have been considered: Struck by/caught in falling objects risks and struck by/caught in moving objects risks. This section includes the breakdown of the struck by falling objects risks into struck by falling equipment and struck by falling material. This category includes the caught in risk of being squeezed, crushed, or compressed between two or more objects when the forcible impact with the falling or moving object would be accompanied by another object, e.g., ground, in which the worker is caught in between.

3.3.2.1.2.1 Struck by Falling Equipment

Struck by falling equipment during construction activities applies to risks constituted when the falling motion of construction equipment may produce forcible impact with worker. This category includes risk constituted from falling equipment by gravity, energized, and operated equipment. Struck by falling equipment can happen on construction sites in many ways, such as dropping, thrown, discharged, falling, slipping, collapsing, etc. Falling equipment at construction site can be heavy

67 equipment, such as cranes, or even light equipment such as screwdriver.

Therefore, the risk value assigned to a certain risk should take into account all

related triggering factoring, such as the height of the fall, weight, etc.

3.3.2.1.2.2 Struck by Falling Material

Struck by falling material category is mostly introduced to differentiate the materials risk from the equipment risk. Struck by falling material during construction activities applies to risks constituted when the falling motion of construction materials may produce a forcible impact with worker. This category includes risk constituted from falling material by gravity or energized by any means.

Struck by falling materials can happen on construction sites in many ways, such as dropping, thrown, discharged, falling, slipping, collapsing, etc., which includes the risk of being struck by collapsing or falling materials due to cave-ins. The falling material at construction site could include steel, concrete, glass, windows, etc.

3.3.2.1.3 Struck by/Caught in Moving Objects Risks

3.3.2.1.3.1 Struck by Moving Equipment

As mentioned earlier, many of struck by, caught in, crushed by risks at construction sites involve heavy equipment and machinery (Haslam et al., 2005),

especially reversing and overturning machinery hitting or crashing on-foot workers 68 at close proximity. McCann (2006) found that struck by incidents were related to construction heavy equipment and vehicles, such as: backhoes, loaders, bulldozers, rollers, trucks, forklifts, private vehicles, etc.

Struck by moving equipment during construction activity applies to risks formed when horizontal motion, such as moving, rolling, sliding, shifting, or slipping, of equipment may produce a forcible impact or contact with a worker. This event category includes struck by due to loss of control, sudden starts and stops, or collision involving powered or non-powered transportation or non-transportation equipment. This category involves events when the motion producing the contact or collision is that of the worker or equipment. In general, the motion produced by a worker could be in the form of bumping into equipment, kicking equipment, or pushed or towards equipment. However, this category does not include struck by risks rooting from worker’s enabling causes, such as lack of skill or even suicidal actions.

This category includes the caught in risk of being squeezed, crushed, or compressed between two or more objects from which construction equipment being involved. Clearly, the caught in accident mode is different than struck by, however, the key factor in distinguishing between struck by events and caught in events is whether the forcible impact with the equipment alone would cause the injury. Moreover, the event should considered to be caught in when the injury may be created as result of crushing between objects, from which one being equipment.

69

3.3.2.1.3.2 Struck by Moving Material

Struck by moving material category is mostly introduced to differentiate the materials risk from the equipment risk. Although most of moving material risk at construction site is due to gravity force, such as rolling barrels on an inclined plane,

this category include the risk of moving material due to any force either operated

or non-operated. Struck by moving material during construction activities applies to risks formed when moving, rolling, sliding, shifting, or slipping material in

horizontal motion may produce forcible impact or contact with worker. This category involves events when the motion producing the contact or collision is that of worker or material. This category includes the caught in risk of being squeezed,

crushed, or compressed between two or more objects from which construction

material being involved. The moving material in construction site could include barrels, boxes, glass, sheets, etc.

3.3.2.1.4 Exposure to Harmful Substances or Environments Risks

Exposure or contact with harmful substances or environments risks include

exposure to fire or explosions or extreme temperatures, contact with electric

current, and contact with chemical substances. Electrical shocks or contact with

electric current is the most common basic event under the subgroup of exposure

to harmful substances or environments.

70

3.3.2.1.4.1 Exposure to Fire/Explosions

Fires and explosions exposure risks are the second most common basic event under this subgroup after contact with electric current risks. This category concerns the risk potential sources of fire or explosions. There are several sources of the fire and explosions risk at construction site. Pressurized, energized, electrified, flammable, temperature or pressure sensitive sources when affected by certain circumstances may lead to fire or explosion, e.g., explosion of fuel tank or the rupture of utility gas lines. This category applies to unintentional explosions or fires that are source related and unrelated to worker enabling causes.

Contact with temperature extremes applies under this event category.

Temperature extreme exposure may come from several sources, such as:

temperature from the environment, and contact with hot or cold objects, e.g.,

torches, welding, stoves, furnaces, freezers, liquid nitrogen, etc.

3.3.2.1.4.2 Contact with Electric Current

Electricity as a power source is widely used on construction sites, however,

it has the potential to be fatal. Construction workers may face many events of electrical risks on hourly basis. Contact with overhead electric power lines constitute one of the most common sources of electric shock injuries because of high voltage that can cause electrocution (Hinze et al.,1998).

71

Workers contact with electricity may be direct from the power source, e.g., contact with live wire, contact with electric fence; or contact may also happen indirectly, e.g., contact with conductive material or tool touching live electricity

source, contact with crane touching power line, or contact with wet surface transmitting electricity. Thus, both of the electric power system and construction tools may also be the source leading to the exposure to electric current. Although power tools can be source of the risk under this category, however, the risk of misusing electrical equipment is not included under this category as it is considered to be under enabling causes.

A reliable risk assessment system should take into consideration the instances when a worker is affected by two or more risks. This is considered one of the limitations of this study considering individual triggering events only. For example, when an electric shock initiates a chain of events leading to the fall of the worker, then both risks of electrocution and fall from elevation should be taken into consideration to come up with a general risk assessment value.

3.3.2.1.4.3 Contact with Chemical Substances

Construction site could contain several different chemicals which may constitute risks to the health and safety of workers. Exposure or contact with hazardous or toxic chemical substances, such as silica dust, , sewer gas, solvents, pesticides, natural gas, carbon monoxide, or any gas causing the

72 depletion of oxygen in space, etc., could cause very serious illnesses such as

Asphyxiation (Hinze et al., 1998). The exposure to chemical substances could be through inhalation, absorption, skin contact, ingestion, or injection.

Dust is one of the common sources of chemical exposure risk at

construction sites. The dust’s toxicological properties depend on its type: physical,

chemical or mineralogical. However, the exposure risk value could also be

determined by the dose whether from concentrated or diluted exposure. In the case of dust that is released into a space or atmosphere, the risky exposure mode

could be inhalation. Chemicals exposure may cause different range of illness, e.g.,

headaches, dizziness, faintness, deafness, respiratory diseases, skin problems,

etc. (Murie, 2007). In general, the short-term effects of chemicals could affect judgment and rationality of workers; nevertheless, the chemical exposure may lead to long-term illnesses and diseases such as damages to the central nervous system, liver, kidneys, etc.

73

4 Chapter Four: Simulation of Risk Detection Method

4.1 Introduction

This chapter presents a programmed model for real-time risk detection. The model is intended to show the process of interaction between different system components at different stages of performance. Real-time risk detection system can be simulated with the method’s specific steps: risk prioritization, risk detection, risk evaluation, and risk control.

The sections of this chapter demonstrates process, algorithm, and cases of the simulation program.

4.2 Detection Method Simulation Program

4.2.1 Simulation Program Process

The process of the simulation program is intended to reflect the detection methodology process as explained in previous chapter. As this study is limited to the triggering risk events, the process starts when the inspector performs the risk

74 prioritization by defining RFID tags with unique product identifiers specifying risk level values and types, as shown in Figure 4.1. When the RFID tag is within the

detection range, the unique product identifier is selected in the intelligent system

that can properly receive the risk values to be analyzed. The intelligent system of

the detection solution is demonstrated to be the brain of the system - that receives,

analyzes, and delivers the risk evaluation and control information in real time. For

this study, the risk evaluation information represents the individual triggering risk

types and levels. Ultimately, the subjective linguistic risk evaluation values would

be declared to the worker. Moreover, the simulation program can simulate the risk

evaluation levels by their rotational fuzzy set membership functions.

RFID Tags Intellegent Evaluation & RFID Reader Defined for Risk System Control Values Risk Detection Prioritization Computations Declared

Figure 4.1 Process of Interaction between Different System Components

4.2.2 Simulation Program Algorithm

This section presents a flow chart shown in Figure 4.2 demonstrating the

real-time risk detection programed method algorithm. The flow chart includes three

75 phases divided by role. Site setup by safety inspectors, real-time detection by worker, and real-time evaluation by intelligent system are the three algorithm phases referred to as phase one, phase two, and phase three respectively. Shapes of each junction box shown in Figure 4.2 represents either process, decision, or

data junction. Rectangular shape represents process junctions, diamond shape

represents decision junction, and the parallelogram represents data item junction.

The algorithm of this program starts with process of inspector at site, as

shown in Figure 4.2, implying the inspector intention for risk prioritization as shown

in Figure 4.1 illustrating the method’s process. If all the risk is prioritized then the

algorithm decision junction leads to the second phase of the program which is real- time detection by worker, otherwise, the inspector would go through the following steps until all the predictable risk is prioritized: search RFID tag values, fetch RFID tag from database, and define RFID tag. Define RFID tag includes printing the

RFID tag with the fetched RFID tag values and placing it at the risk location. Phase two starts with the process of the worker being at site. Select risk process represents risk detection, it is triggered when the decision of risk in range is activated considering the RFID reading range. If there is no other risk in range then phase three will be triggered, otherwise, the other risk in range will go through the process of select risk. The role of the intelligent system is initiated when the unique product identifier input from the detected RFID tag is sent to the data item in order to fetch risk value from database. In turn, the intelligent system will compute the

risk evaluation value by comparing the unique product identifier against the defined

76

RFID values by safety inspector in phase one. The last step in phase three is to

declare risk evaluation values as computed from the previous process. However,

the loop will go back to activating the decision junction if any other risk is in range

which will trigger the select risk process and thus phase three. It is noted that the

inspector at site can initiate the site setup phase for risk prioritization at any instant

of time while the worker at site can initiate the real-time detection phase for risk

detection at any point of space.

77

Real-Time Risk Detection Method Program Flow Chart Site Setup Real-Time Detection Real-Time Evaluation [By Safety Inspector] [By Worker] [By Intelligent System]

Unique Product Inspector at Site Worker at Site Identifier Input Yes

No Fet ch Risk All Risks Risk in Range? Value from Prioritized? Database

No Yes

Search RFID Compute Risk Select Risk Tag Values Evaluation Value

Fetch RFID Yes No Tag from Other Risk Declare Risk Database in Range? Evaulation Value

Define RFID Tag

Figure 4.2 Programed Method Algorithm Flow Chart

78

4.2.3 Simulation Program Cases

The program was developed using C Sharp (C#) programming language and Visual Studio as the Integrated Development Environment (IDE). The program was developed and designed to model the real-time method process and algorithm

as discussed in previous sections.

This section shows the simulation program cases run as designed on the

Integrated Development Environment. Figure 4.3 shows the first step in risk

prioritization, when RFID tag defining starts by the identification of risk subgroup

using the drop down menu. Figure 4.4 shows selecting the risk type by inspector

for the identification of basic triggering risk event. Figure 4.5 shows the selection

of risk value by inspector for the RFID tag to be defined. Figure 4.6 shows the step

after risk parameters are set, the inspector would fetch from database to search if

the values where previously defined. Figure 4.7 shows the inspector pushing the

define button if the tag was not defined previously, the real-time detection method

requires the inspector to print and attach the defined tag to the risk location.

Figure 4.8 shows the start of phase two algorithm process when the RFID

tag is in the worker's range. The RFID tag is selected and information is received

by the detection intelligent system on right side. The RFID tag information

appearing on the right side of the screen implies that the role of the intelligent

system was initiated when the unique product identifier input from the detected

RFID tag was sent for fetching risk values from database. In turn, the intelligent

79 system computes the risk evaluation value by comparing the unique product identifier against the defined RFID values in phase one. Thus the risk evaluation values are declared as computed from the previous process. Figure 4.9 shows the detection intelligent system keeping a record of all risks detected by worker during the day. Figure 4.10 to Figure 4.15 shows some of the risk values detected

illustrated in the rotation fuzzy set model form. Figure 4.10, Figure 4.11, and

Figure 4.12 shows the risk event fall from elevation of the falls, slips, and trips risks

subgroup, the figures shows three different risk values of fall from elevation risk

that the worker encountered at different instances of time and different points of

space. Figure 4.13 shows the rotational fuzzy model of the risk event of fall from

scaffolding or staging with a risk value of very risky. Figure 4.14 shows the

rotational fuzzy model of the risk event of cave-in with a risk value of risky.

Figure 4.15 shows the rotational fuzzy model of the risk event of fall from ladder

with a risk value of fairly risky.

80

First Step in Risk Prioritization by Inspector, RFID Tag Defining starts with identification of Risk Subgroup Risk of identification with starts Defining Tag RFID Inspector, by Prioritization Risk in Step First

3 . 4 Figure Figure 81

g Riskg Event Selecting the Risk type by Inspector for the Identification of Basic Triggerin Basic of Identification for the Inspector by type Risk the Selecting

4 . 4 Figure Figure

82

Selecting Risk Value by Inspector for the RFID Tag to be defined be to Tag RFID the for Inspector by Value Risk Selecting

5 . 4 Figure Figure

83

Define RFID Tag

Fetch from Database to from Database Fetch ould ould As Risk Parameters are Set, the Inspector w Inspector the Set, are Parameters Risk As

6 . 4 Figure Figure

84

Inspector would Push the Define Button if the Fetch Database Indicated the Tag was Not Defined Defined Not was Tag the Indicated Database Fetch the if Button Define the Push would Inspector

7 . 4 Figure Figure

85

eceived by Detection Intelligent System on Right Side on Right System Intelligent Detection by eceived R RFID Tag is in worker range, Information is is Information range, worker in is Tag RFID

8 . 4 Figure Figure

86

The Detection Intelligent System keeps a record of all Risks Detected by Worker during the Day the Worker during by Detected Risks all of a record keeps System Intelligent Detection The

9 . 4 Figure Figure

87

Figure 4.10 One of the Risk Values Detected shown as Rotation Fuzzy Set

88

Figure 4.11 One of the Risk Values Detected Shown as Rotation Fuzzy Set

89

Figure 4.12 One of the Risk Values Detected Shown as Rotation Fuzzy Set

90

Figure 4.13 One of the Risk Values Detected Shown as Rotation Fuzzy Set

91

Figure 4.14 One of the Risk Values Detected Shown as Rotation Fuzzy Set

92

Figure 4.15 One of the Risk Values Detected Shown as Rotation Fuzzy Set

93

5 Chapter Five: Conclusion

5.1 Summary and Conclusion

Considering the damages caused by construction accidents, there is need for advancing safety measure and evaluation systems towards safety risks control to protect health and safety of on-foot workers. It is more effective to proactively combat safety risks at source rather than dealing with accident problems after they occur. The lack of real-time visibility, indication, and information about the site risks types and levels may put construction workers in dangerous situations.

This study has achieved the concept of real-time safety risk detection by proposing an integrated structured method for evaluating risk events at building construction site for on-foot worker. The achievements of RFID applications promote it to be applicable for construction risk management. The detection method adopted the RFID technology for being proven to be consistent, uniform, and reliable identification solution due to RFID unique features and performance at construction site environment, such as: the non-contact automatic identification, the ability to access and track multiples of RFID tagged objects, and the ability to operate without having a direct line of sight. This solution design goes beyond the

94 state-of-the-art by systemizing the identification, prioritization, detection, evaluation, and control of safety risks. It adds to the state-of-the-art by developing

an intelligent system that communicates in real-time risk identities, types, and

levels at different stages and phases of construction. This study exceeds the

current detection solution which can only detect the proximity of objects which

excludes providing individual risk-specific information. The use of fuzzy logic is complementary with the triggering basic risk structure for enhancing the consistency and comprehensiveness of risk evaluation subjective values delivered in real-time. Furthermore, the use of subjective evaluation values could bridge the

risk management gap constituted from misinterpreting qualitative risk values,

safety regulations and measures.

The simulation of the real-time detection system was implemented in a model with the intelligent system being the brain of the system that receives, interprets, and delivers the risk evaluation and control information in real time. This could make safety risks more recognizable and measureable at the time of risk exposure which can assist in establishing proactive decisions for risk control, accident prevention, and health protection. Real-time prognostic risk detection is among the strategies that could be adopted to effectively mitigate safety risks at early time or even before exposure.

As shown in the detection method simulation chapter, the detection

Intelligent System keeps a record of all risks detected by worker during the day.

Thus, the system could have diagnostic uses along with its prognostic primary use.

95

The system could be utilized to track and monitor the risk types and levels affecting workers to employ, manage, and calibrate health and safety programs at construction sites. Moreover, monitoring the risk detection record could give indication about progress and effectiveness of risk control programs by detecting risks at different instances of time and points in space. Furthermore, risk record might be helpful for accident and near miss incident investigations. Detection system record could help to identify weak zones or less protected areas at site.

Thus, having a reliable risk detection tool will support decision makers to take suitable and proactive provisions to control risks and prevent accidents.

The elaborated detection system can indicate that the system design was

based upon some guidelines: validity, significance, simplicity, representation,

reliability and consistency, and feasibility. The system design shows that it could

be reasonable to use such system at the construction site environment while

accommodating on-foot building construction worker activities and mobility. At least, the system could not constitute a hazard to any of the workers or restrain their movement. The simulation of the detection method indicates that the system could be representative by allowing engineers to add and modify input information in order to assure accurate representation of the site risks. Furthermore, the simulation indicates reliability and consistency for the system’s intelligent system accuracy in processing inputs and delivering risk values at proper events;

consistency of the system is maintained, when the exact same steps are repeated

the system gives the same results.

96

5.2 Recommendations

Although, the design of the prognostic risk detection system is projected to be a significant strategy for its added value, however, experimental setup is

recommended to examine and validate the system’s validity, significance,

simplicity, representation, reliability and consistency. An experimental setup is also

recommended to conclude the optimum risk alerting range for on-foot workers.

Surveys could be conducted within the construction industry to determine the social acceptance of the use of such risk detection solutions. A feasibility study could assist the elaboration of a business plan for the real-time risk detection solution.

5.3 Future Work

Future work could include experimental setup to validate the design guidelines and to determine the optimum alerting range for the on-foot worker. The future work risk analysis approach could overcome the limitations of this study of the detection of triggering risk events only. Evaluation of safety risks should not be limited to triggering risks. The on-foot worker may be concurrently affected by several risks. In the current construction industry, the combined effect of the several concurrent risks at a construction site is unrecognized or underestimated. The future work could achieve a real-time safety risk assessment

97 system for the evaluation of the combined value of comprehensive risk drivers concurrently being exposed to on-foot construction workers. This could reflect the

domino theory principle of construction accident being the result of a combination

of causes and effects of different factors.

The future work could design and examine holistic approach for real-time

risk assessment system that integrates the methodology of real-time interactive

risk detection with prognostic analytical risk assessment intelligent system model

based on fuzzy fault tree analysis. The fuzzy fault tree analysis, valued as a

uniform method for structuring workplace risks, could be an adequate tool for

elaborating the intelligent system accounting for the combined effect of the

different concurrent risk events, i.e., triggering, enabling, and conditional risk

events. The risk drivers could be systemized into a fuzzy fault tree model to

constitute a holistic prognostic approach for real-time risk assessment intelligent

system. The real-time assessment solution approach could be a reliable and

consistent system for computing combined degree of health and safety risk

exposure which makes site safety conditions realistically recognized and

measured for construction workers.

98

6 References

Abdelhamid, T. S., & Everett, J. G. (2000). Identifying root causes of construction accidents. and Management, 126(1), 52-60.

Albert, A., & Hallowell, M. R. (2012). Hazard recognition methods in the construction industry. In Construction Research Congress (pp. 407-416).

Ale, B. J. M., Baksteen, H., Bellamy, L. J., Bloemhof, A., Goossens, L., Hale, A., & Whiston, J. Y. (2008). Quantifying occupational risk: The development of an occupational risk model. Safety Science, 46(2), 176-185.

Alhajeri, M. (2011). Health and Safety in the Construction Industry: Challenges and Solutions in the UAE (Doctoral dissertation, Coventry University).

Al-Humaidi, H. M., & Hadipriono Tan, F. (2010). A fuzzy logic approach to model delays in construction projects using rotational fuzzy fault tree models. Civil Engineering and Environmental Systems, 27(4), 329-351.

Andersson, L. (1986). A new method based on the theory of fuzzy sets for obtaining an indication of risk. Civil Engineering Systems, 3(3), 164-174.

Australia, S. W. (2011). How to manage work health and safety risks: Code of practice. Safe Work Australia.

Ayyub, B. M. (2014). Risk Analysis in Engineering and Economics. Second Edition. CRC Press.

Baradan, S., & Usmen, M. A. (2006). Comparative injury and fatality risk analysis of building trades. Construction Engineering and Management, 132(5), 533-539.

Bentley, T. A., Hide, S., Tappin, D., Moore, D., Legg, S., Ashby, L., & Parker, R. (2006). Investigating risk factors for slips, trips and falls in New Zealand residential construction using incident-centred and incident-independent methods. Ergonomics, 49(1), 62-77.

Bhuptani, M., & Moradpour, S. (2005). RFID field guide: deploying radio frequency identification systems. Prentice Hall PTR. 99

Bureau of Labor Statistics (1992-2014). Census of fatal occupational injuries (CFOI) - current and revised data. U.S. Department of Labor, on the internet at [http://www.bls.gov/iif/oshcfoi1.htm#charts] (visited 06.26.2016).

Bureau of Labor Statistics (2012). Occupational injury and illness classification manual. U.S. Department of Labor, Washington DC.

Bureau of Labor Statistics (2014a). Census of fatal occupational injuries summary. U.S. Department of Labor, USDL-15-1789, on the internet at [http://www.bls.gov/news.release/cfoi.nr0.htm] (visited 06.26.2016).

Bureau of Labor Statistics (2014b). Table A-1: Fatal occupational injuries by industry and event or exposure. Census of Fatal Occupational Injuries, U.S. Department of Labor, on the internet at [http://www.bls.gov/iif/oshwc/cfoi/cftb0286.pdf] (visited 07.10.2016).

Bureau of Labor Statistics (2014c). Fatal occupational injuries by selected characteristics 2003-2014. Census of Fatal Occupational Injuries, U.S. Department of Labor, on the internet at [http://www.bls.gov/iif/oshwc/cfoi/all_worker.pdf] (visited 07.10.2016).

Campbell, J. M. (2008). Safety Hazard and Risk Identification and Management In Infrastructure Management (Dissertation). The University of Edinburgh.

Chapman, C., & Ward, S. (2004). Why risk efficiency is a key aspect of best practice projects. International Journal of Project Management, 22(8), 619-632.

Cheng, C. W., Leu, S. S., Cheng, Y. M., Wu, T. C., & Lin, C. C. (2012). Applying data mining techniques to explore factors contributing to occupational injuries in Taiwan's construction industry. Accident Analysis & Prevention, 48, 214-222.

Chi, C. F., Chang, T. C., & Ting, H. I. (2005). Accident patterns and prevention measures for fatal occupational falls in the construction industry. Applied Ergonomics, 36(4), 391-400.

Chi, S., Han, S., & Kim, D. Y. (2012). Relationship between unsafe working conditions and workers’ behavior and impact of working conditions on injury severity in US construction industry. Construction Engineering and Management, 139(7), 826-838.

Condea, C., Thiesse, F., & Fleisch, E. (2012). RFID-enabled shelf replenishment with backroom monitoring in retail stores. Decision Support Systems, 52(4), 839- 849.

100

Dumrak, J., Mostafa, S., Kamardeen, I., & Rameezdeen, R. (2013). Factors associated with the severity of construction accidents: The case of South Australia. Australasian Journal of Construction Economics and Building, 3(4), 32.

Ergen, E., Akinci, B., & Sacks, R. (2007). Tracking and locating components in a precast storage yard utilizing radio frequency identification technology and GPS. Automation in Construction, 16(3), 354-367.

Esmaeili, B. (2012). Identifying and quantifying construction safety risks at the attribute level (Doctoral Dissertation), University Of Colorado, Boulder.

Faber, M.H. and Stewart, M.G. (2003). Risk Assessment for Civil Engineering Facilities: Critical Overview and Discussion. Reliability Engineering and System Safety, 80(2) 173-184.

Frank, T., Brooks, S., Creekmore, R., Hasselbalch, B., Murray, K., Obeng, K., Reich, S. and Sanchez, E., (2008), Quality Risk Management Principles and Industry Case Studies, pp. 1-9.

Furlani, K. M., & Stone, W. C. (1999). Architecture for discrete construction component tracking. The 16th IAARC/IFAC/IEEE International Symposium on Automation and Robotics in Construction, 289-294.

Gambatese, J. A., Behm, M. and Rajendran, S. (2008). Design’s role in construction accident causality and prevention: Perspectives from an expert panel. Safety Science, 46, 675-691.

Gavious, A., Mizrahi, S., Shani, Y. & Minchuk, Y. (2009). The costs of industrial accidents for the organization: Developing methods and tools for evaluation and cost-benefit analysis of investment in safety. Loss Prevention in the Process Industries, 22, 434-438.

Güdemann, M. (2011). Qualitative and quantitative formal model-based safety analysis: push the safety button (Doctoral dissertation). Magdeburg University.

Gürcanli, G. E., & Müngen, U. (2009). An occupational safety risk analysis method at construction sites using fuzzy sets. International Journal of Industrial Ergonomics, 39(2), 371-387.

Hadipriono F.C., Vargas C.A., and Yoo W.H. (1995a). Safety first: a fault tree expert system for construction falls. Volume I: the knowledge acquisition. Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health (NIOSH).

101

Hadipriono F.C., Vargas C.A., and Yoo W.H. (1995b). Safety first: a fault tree expert system for construction falls. Volume II: the knowledge structure. Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health (NIOSH).

Hadipriono F.C., Vargas C.A., and Yoo W.H. (1995c). Safety first: a fault tree expert system for construction falls. Volume III: The Knowledge Base. Centers for Disease Control and Prevention, National Institute for Occupational Safety and Health (NIOSH).

Hadipriono, F. C. (1992a). Expert system for construction safety. I: Fault-tree models. Performance of Constructed Facilities, 6(4), 246-260.

Hadipriono, F. C. (1992b). Expert system for construction safety. II: knowledge base. Performance of Constructed Facilities, 6(4), 261-274.

Hadipriono, F. C., & Ross, T. J. (1991). A rule-based fuzzy logic deduction technique for damage assessment of protective structures. Fuzzy Sets and Systems, 44(3), 459-468.

Hadipriono, F. C., & Toh, H. S. (1989). Modified fault tree analysis for structural safety. Civil Engineering Systems, 6(4), 190-199.

Hallowell, M.R. ( 2008). A Formal Model for Construction Safety and Health Risk Management. Doctorial Thesis; Oregon State University, Oregon.

Haslam, R. A., Hide, S. A., Gibb, A. G., Gyi, D. E., Pavitt, T., Atkinson, S., & Duff, A. R. (2005). Contributing factors in construction accidents. Applied Ergonomics, 36(4), 401-415.

Hatipkarasulu, Y. (2010). Project level analysis of special trade contractor fatalities using accident investigation reports. Safety Research, 41(5), 451-457.

Health and Safety Executive (HSE). (1998). Managing Health and Safety: Five Steps to Success. Health and Safety Executive, London, UK.

Heinrich, H. W. (1959). Industrial Accident Prevention. A Scientific Approach. New York, McGraw-Hill.

Heinrich, H. W., Petersen, D. C., Roos, N. R., & Hazlett, S. (1980). Industrial accident prevention: A safety management approach 5th edition. McGraw-Hill Companies, New York.

Hinze, J. W., & Teizer, J. (2011). Visibility-related fatalities related to construction equipment. Safety Science, 49(5), 709-718.

102

Hinze, J., & Russell, D. B. (1995). Analysis of fatalities recorded by OSHA. Construction Engineering and Management, 121(2), 209-214.

Hinze, J., and Godfrey, R. (2003). An evaluation of safety performance measures for construction projects. Construction Research, 4(01), 5-15.

Hinze, J., and Wiegand, F. (1992). Role of designers in construction worker safety. Engineering and Management, 118(4), 677–684.

Hinze, J., Huang, X., & Terry, L. (2005). The nature of struck-by accidents. Construction Engineering and Management, 131(2), 262-268.

Hinze, J., Pedersen, C., and Fredley, J. (1998). Identifying root causes of construction injuries. Construction Engineering and Management,124(1), 67-71.

Hinze, Jimmie and Appelgate, Lisa (1991). Costs of construction injuries. Construction Engineering and Management, 117:3(537), 537-550.

Hollnagel, E. (2008). Risk+ barriers= safety?. Safety science, 46(2), 221-229.

Hu, K., Rahmandad, H., Smith‐Jackson, T., & Winchester, W. (2011). Factors influencing the risk of falls in the construction industry: a review of the evidence. Construction Management and Economics, 29(4), 397-416.

Huang, D., Chen, T., & Wang, M. J. J. (2001). A fuzzy set approach for event tree analysis. Fuzzy sets and systems, 118(1), 153-165.

Huang, X., and Hinze, J. (2003). Analysis of Construction Worker Fall Accidents. Construction Engineering and Management, 129:262-271.

Hunt, V. D., Puglia, A., & Puglia, M. (2007). RFID: a guide to radio frequency identification. Wiley-interscience, John Wiley & Sons.

International Labour Organization (2005). World day for safety and health at work 2005: A Background Paper. International Labour Office, Geneva.

Jannadi, O. A. and Almishari, S. (2003). Risk assessment in construction. Construction Engineering and Management, 129(5): 492-500.

Jannadi, O. A., & Almishari, S. (2003). Risk assessment in construction. Construction Engineering and Management, 129(5), 492-500.

Jaselskis, E. J. and El Misalami, T. (2003). Implementing radio frequency identification in the construction process. Construction Engineering and Management, 129(6), 680-688.

103

Jaselskis, E. J. and El-Misalami, Tarek (2003). Implementing Radio Frequency Identification in the construction process. Construction Engineering and Management,129(6), 680-688.

Jason, A. (2008). Organizing informal workers in the urban economy: The case of the construction industry in Dar es Salaam. Habitat International, (32) 292-202, Tanzania.

KarimiAzari, A., Mousavi, N., Mousavi, S. F., & Hosseini, S. (2011). Risk assessment model selection in construction industry. Expert Systems with Applications, 38(8), 9105-9111.

Kaufmann, A., & Gupta, M. M. (1988). Fuzzy mathematical models in engineering and management science. Elsevier Science Inc.

Khan, F. I., & Abbasi, S. A. (1998). Techniques and methodologies for risk analysis in chemical process industries. Journal of Loss Prevention in the Process Industries, 11(4), 261-277.

Khanzode, V. V., Maiti, J., & Ray, P. K. (2012). Occupational injury and accident research: A comprehensive review. Safety Science, 50(5), 1355-1367.

Kirchsteiger, C. (1999). On the use of probabilistic and deterministic methods in risk analysis. Loss Prevention in the Process Industries, 12(5), 399–419.

Kuchta, D. (2001). Use of fuzzy numbers in project risk (criticality) assessment. International Journal of Project Management, 19(5), 305-310.

Levitt, R. E. (1987). HOWSAFE: a microcomputer-based expert system to evaluate the safety of a construction firm. In Expert Systems in Civil Engineering (pp. 55-66). ASCE.

Liao, C. W., & Perng, Y. H. (2008). Data mining for occupational injuries in the Taiwan construction industry. Safety Science, 46(7), 1091-1102.

Lin, Y. C. (2008). Enhancing facility management using RFID and web technology in construction. INTECH Open Access Publisher.

Lingard, H., & Holmes, N. (2001). Understandings of occupational health and safety risk control in small business construction firms: barriers to implementing technological controls. Construction Management & Economics, 19(2), 217-226.

Lipscomb, H. J., Dale, A. M., Kaskutas, V., Sherman‐Voellinger, R., & Evanoff, B. (2008). Challenges in residential fall prevention: insight from apprentice carpenters. American Journal of Industrial Medicine, 51(1), 60-68.

104

Lipscomb, Hester J., Glazner, J., Bondy, J., Guarini, K. and Lezotte, D. (2006). Injuries from slips and trips in construction. Applied Ergonomics, 37, 267-274.

Liu, J., Yang, J., Wang, J., Sii, H. and Wang, Y. (2004). Fuzzy Rule-Based Evidential Reasoning Approach for Safety Analysis. International Journal of General Systems, 33(2–3), 183–204.

Lubega, H., Kiggundu, B. M., & Tindiwensi, D. (2000, November). An investigation into the causes of accidents in the construction industry in Uganda. 2nd International Conference on Construction in Developing Countries.

Maglaras, G. (1995). Experimental Comparison of Probabilistic Methods and Fuzzy Sets for Designing under Uncertainty. Virginia Polytechnic Institute and State University, Blacksburg, Virginia. Doctorate.

Markowski, A. S., Mannan, M. S., & Bigoszewska, A. (2009). Fuzzy logic for process safety analysis. Loss Prevention in the Process Industries, 22(6), 695- 702.

Marks, E., and Teizer, J. (2012). Proximity sensing and warning technology for heavy construction equipment operation. Construction Research Congress, 981- 990, West Lafayette, Indiana.

Mattila, M., Hyttinen, M., & Rantanen, E. (1994). Effective supervisory behaviour and safety at the building site. International Journal of Industrial Ergonomics, 13(2), 85-93.

McAndrew, S. T., Anumba, C. J., Hassan, T. M., & Duke, A. K. (2005). Potential use of real-time data capture and job-tracking technology in the field. Facilities, 23(1/2), 31-46.

McCann, M. (2006). Heavy equipment and truck-related deaths on excavation work sites. Safety Research, 37(5), 511-517.

McClay, R. E. (1989a). Toward a more universal model of loss incident causation-Part I. Professional Safety, 35(1), 15-20.

McClay, R. E. (1989b). Toward a more universal model of loss incident causation-Part II. Professional Safety, 35(2), 34-39.

Morata, T. C., Themann, C. L., Randolph, R. F., Verbsky, B. L., Byrne, D. C., & Reeves, E. R. (2005). Working in noise with a hearing loss: perceptions from workers, supervisors, and hearing conservation program managers. Ear and hearing, 26(6), 529-545.

105

Murie, F. (2007). Building safety—An international perspective. International Journal of Occupational and Environmental Health, 13(1), 5-11.

Murie, F. (2007). Building safety—An international perspective. International Journal of Occupational and Environmental Health, 13(1), 5-11.

National Institute for Occupational Safety and Health (2004). Worker Health Chartbook 2004. U.S. Department of Health and Human Service, DHHS (NIOSH) Publication No. 2004-146, Cincinnati, Ohio.

Ngai, E., & Riggins, F. (2008). RFID: Technology, applications, and impact on business operations. International Journal of Production Economics, 112(2), 507- 509.

Nilsen & Aven (2003). Models and Model Uncertainty in the Context of Risk Analysis. Reliability Engineering and System Safety, 79.309-317.

Nunes, I. L. (2005). Fuzzy multicriteria model for ergonomic workplace analysis and risk analysis. In Information Technology, Knowledge Management and Engineering for Enterprise Productivity and Quality of Working Life (International Conference: Computer-Aided Ergonomics and Safety-CAES'05, pp. 25-28.

Occupational Safety and Health Administration (2013a). Commonly Used Statistics. U.S. Department of Labor, on the internet at [https://www.osha.gov/oshstats/commonstats.html] (visited 07.17.2016).

Occupational Safety and Health Administration (2013b). OSHA's Fall Prevention Campaign. U.S. Department of Labor, on the internet at [https://www.osha.gov/stopfalls] (visited 07.17.2016).

Occupational Safety and Health Administration (2013c). Top 10 Most Frequently Cited Standards. U.S. Department of Labor, on the internet at [https://www.osha.gov/Top_Ten_Standards.html] (visited 07.17.2016).

Occupational Safety and Health Administration (OSHA). (1990). Analysis of construction fatalities - The OSHA data base 1985–1989. U.S. Department of Labor, Washington, D.C.

Occupational Safety and Health Administration (OSHA). (2014). OSHA Construction eTools. U.S. Department of Labor, on the internet at [https://www.osha.gov/dts/osta/oshasoft] (visited 08.14.2016).

Paithankar, A. (2011). Hazard identification and risk analysis in mining industry (Doctoral Dissertation), National Institute of Technology Rourkela.

106

Phoya, S. (2012). Health and Safety Risk Management On Building Construction Sites In Tanzania: The Practice of Risk Assessment, Communication and Control, Chalmers University Of Technology.

Pinto, A. F. D. N. (2012). Development of a fuzzy qualitative risk assessment model applied to construction industry.

Pipitsupaphol, T., & Watanabe, T. (2000). Identification of root causes of labor accidents in the Thai construction industry. 4th Asia Pacific and Construction Conference (APSEC 2000), 13-15.

Rahim A., Hamid, A., Zaimi M., Majid,A. and Singh, B (2008) Causes of Accidents at Construction Sites. Malaysian Journal of Civil Engineering, 20(2), 242-259.

Raz, T., Shenhar, A. J., Dvir, D. (2002). Risk management, project success, and technological uncertainty. R&D Management, 32, 101–109.

Ridley, J., & Channing, J. (Eds.). (2008). Safety at work-Seventh Edition. Routledge.

Ringdahl, L. H. (2001). Safety Analysis Principles and Practice in Occupational Safety. Second edition, Taylor & Francis, London.

Rozenfeld, O., Sacks, R., Rosenfeld, Y. And Baum, H., (2010). Construction Job Safety Analysis. Safety Science, 48 (4), 491–498.

Ruff, T. M. (2004a). Evaluation of devices to prevent construction equipment backing incidents. SAE Commercial Vehicle Engineering Congress and Exhibition, 2004-01-2725, Chicago, Illinois.

Ruff, T. M. (2004b). Advances in proximity detection technologies for surface mining equipment. 34th AIMHSR.

Ruff, Todd M. (2001). Monitoring blind spots: a major concern for haul trucks. Engineering and Mining, 202(12), 17–26.

Sandip, L. (2005). RFID sourcebook. Prentice Hall PTR, Massachusetts.

Sawacha, E., Naoum, S., & Fong, D. (1999). Factors affecting safety performance on construction sites. International Journal of Project Management, 17(5), 309-315.

Song, J., Haas, C. T. and Caldas, C. (2006). Tracking the location of materials on construction job sites. Journal of Construction Engineering and Management, 132(9), 680-688. 107

Szymusiak, S. M., & Ryan, J. P. (1982). Prevention of slip and fall injuries: part II. Professional Safety, The American Society of Safety Engineers, 27(7), 30-35.

Teizer, J., Allread, B. S., Fullerton, C. E., & Hinze, J. (2010). Autonomous pro- active real-time construction worker and equipment operator proximity safety alert system. Automation in Construction, 19(5), 630-640.

The Center for Construction Research and Training (2013). The Construction Chart Book - The U.S. Construction Industry and its Workers. Fifth Edition, Silver Springs, MD.

Toole, T. (2002). Construction site safety roles. Construction Engineering and Management, 128(3), 203–210.

Toole, T. M., Gambatese, J. A., & Abowitz, D. A. (2016). Owners’ Role in Facilitating Prevention through Design. Journal of Professional Issues in Engineering Education and Practice, 04016012.

Vargas, C. A. (1998). Investigating construction falls using fault tree analysis and developing a prototype tool to reduce falls using expert system and computer assisted instruction methods. Ohio State University.

Victoria, W. (2007). Controlling OHS hazards and risks: a handbook for workplaces. In Controlling OHS hazards and risks: a handbook for workplaces. Worksafe.

Wang, L. C., Lin, Y. C., & Lin, P. H. (2007). Dynamic mobile RFID-based supply chain control and management system in construction. Advanced Engineering Informatics, 21(4), 377-390.

Wang, Y., Zhang, Y., Poon, S. W., & Huang, H. (2002). A study of construction site accident statistics. Triennial Conference CIB W099: Implementation of Safety and Health on Construction Sites, pp. 223-227.

Ward, R. B. (2012). Revisiting Heinrich's law. Chemeca 2012: Quality of life through chemical engineering, 23-26, New Zealand, 1179.

Weber, S. (1991). Uncertainty measures, decomposability and admissibility. Fuzzy Sets and Systems, 40(2), 395-405.

White, D. (1995). Application of systems thinking to risk management: a review of the literature. Management Decision, 33(10), 35-45.

World Health Organization. (2009). Basic Documents, Forty-seventh Edition.

108

Wu, W., Gibb, A.F. and Li, Q., (2010). Accident Precursors and Near Misses on Construction Sites: an Investigative Tool to Derive Information from Accident Databases. Safety Science, 48 (7), 845–858.

Yen-Pei Chen et. al. (2013). Application of Mobile RFID-Based Safety Inspection Management at Construction Jobsite. INTECH Open Access Publisher.

Yu, H. (2009). A knowledge based system for construction health and safety competence assessment. University of Wolverhampton.

Yung, P. (2009). Institutional arrangements and construction safety in China: an empirical examination. Construction Management and Economics, 27(5), 439- 450.

Zadeh, L. A. (1965). Fuzzy sets. Information and control, 8(3), 338-353.

Zadeh, L. A. (1968). Probability measures of fuzzy events. Mathematical Analysis and Applications, 23(2), 421-427.

Zadeh, L. A. (1971). Quantitative fuzzy semantics. Information sciences,3(2), 159-176.

Zadeh, L. A. (1975). The concept of a linguistic variable and its application to approximate reasoning—I. Information sciences, 8(3), 199-249.

Zadeh, L. A. (1983). The role of fuzzy logic in the management of uncertainty in expert systems. Fuzzy sets and systems, 11(1), 199-227.

Zadeh, L. A. (1999). Fuzzy sets as a basis for a theory of possibility. Fuzzy sets and systems, 100, 9-34.

109