1 Introduction

With the expansion and complexity of engineering problems in recent years, the use of optimization methods has faced significant successes. Optimization problems in the real engineering world are becoming increasingly complicated. Therefore, many researchers are using soft computing as a powerful alternative tool in solving these problems [1,2,3,4,5,6]. The risk assessment of civil and industrial projects is one of the most attractive and practical engineering problems and is inherently uncertain and complex [7,8,9,10,11,12,13,14]. Some researches were conducted on the tunneling projects’ risk using different methods such as Fault Tree, Even Tree and Monte Carlo Simulation [15,16,17,18,19]. Nezarat et al. [20] investigated and ranked geological risks in mechanized tunneling by using fuzzy analytical hierarchy process (FAHP). Golab tunnel was considered as a case study in the research work. They found out that squeezing and face tunnel instability had highest level and gas emissions and clogging of clay had the lowest level of risks in this tunnel [20]. The risk assessment of tunneling projects has always faced uncertainty in data analysis due to the geological complexities and nonlinear nature of the projects. Various methods are used for the risk assessment of tunneling projects. In a research, the risk of underground projects in the construction phase (oil depot) was assessed by Wang et al. [21] using the fuzzy comprehensive evaluation method. They used geological properties as the risk assessment criteria in order to study the risk. Finally, a proper match was obtained between the risk analysis using the fuzzy logic and the visual results obtained from this underground depot, indicating the suitability of soft methods in the risk assessment of underground projects [21].

Li et al. [22] assessed the geological hazards in the engineering of underground projects using a new quantitative method called Attribute Interval Evaluation Theory. They proposed prioritization for geological hazards using this method. The method proposed in this research is not only capable of risk assessment and prioritization, but it can also assess the validity of results. In this method, the acceptable correlation coefficient is 80%. Finally, after implementing assessments, this method was introduced as a proper numerical method for the risk assessment [22]. The risk assessment of geological hazards in the excavation route of the Ardabil–Miane railway tunnel, kilometer 378 + 021 was conducted by Mikaeil et al. [23] using the harmony search algorithm. Their results showed that harmony search algorithm can assess and predict geological risks in tunneling projects [23]. Haghshenas et al. [24] conducted the geological risk assessment of the Ghomrud tunnel. They determined three effective parameters in the design and excavation of tunnels, namely, overburden (H), internal friction angle (φ), and cohesion (C), and used them in the clustering of geological units in the tunnel route. Their results were validated with the drilling rate index (DRI), which indicated the high ability of the fuzzy c-means (FCM) algorithm in the clustering of geological units in tunneling projects and the appropriate provision of the condition of the region for evaluating the risk management in the project [24]. Esmailzadeh et al. [25] carried out technical analysis of collapse in tunnel excavation. Based on their results, they made some recommendations in order to stabilize of tunnel crown [25]. Haghshenas et al. evaluated tunneling projects risks using the fuzzy analytical hierarchy process. In this research, 11 risks and 3 criteria were selected for investigation and ranking of Toyserkan Doolayi tunnel’s risks. The results showed that the risk of swelling of rock had the highest rank [26]. Sun et al. [27] investigated tunnel collapse risk using multistate fuzzy Bayesian networks. The results showed that this method was very suitable for evaluating of the collapse probability of the Yu Liao Tunnel [27]. Xiong et al. [28] proposed a method for 3D multi-scale geology modeling for tunnel engineering risk assessment. Based on their results, they made some recommendations for a case study, railway tunnel engineering of the Yuelongmen tunnel in China [28]. A risk assessment model is proposed by Xia et al. [29]. They used fuzzy logic and similarity measure theory. The results clearly showed the capability of the proposed model for evaluating of risk this case study [29]. Li and Yang [30] used improved attribute mathematical theory to propose risk assessment model of tunnel water inrush. Finally, based on their results, the proposed model was reliable [30]. Mikaeil et al. [31] evaluated the risks of tunneling project using two soft computing techniques. Based on their results, they made some recommendations for risk assessment based upon applications of intelligent approaches [31]. A non-parametric bayesian network have been developed to evaluate tunneling risk analysis by Wang et al. [32]. Their results indicated that the new developed model is a reliable model for evaluating of tunneling risk analysis [32]. In another study, risks of Beijing subway tunnel construction investigated by Xu et al. [33]. They used the new Austrian tunneling method to investigate and, they found out that this approach can be applied as a powerful tool for evaluating of Beijing subway tunnel excavation [33]. Bakhtavar and Yousefi [34] analyzed ground vibration risks on the infrastructures located inside a mining area using a developed hybrid approach based on fuzzy failure mode and effects analysis (FMEA) and a fuzzy slack-based measure model [34].

The identification and assessment of geological hazards are two of the most important parts of risk management because they involve the clustering of geological units [35]. This paper aims to develop a new model for the risk assessment of the second part of the Emamzade Hashem tunnel project. It is worth mentioning that ABC algorithm has not been used in previous studies for investigating of risk assessment. There are always complex and unpredicted conditions in evaluating of tunneling projects’ risk, hence in order to investigate these conditions, ABC algorithm as a stochastic algorithm can be more useful in comparison with classic modelling. Different parameters and criteria affect the geological structures in this project, including the geotechnical and hydrological properties of the tunnel implementation scope, such as uniaxial compressive strength (UCS), rock mass rating (RMR), tunneling index Q, and density and underground water condition. Therefore, these criteria and parameters are determined for data analysis and geological units’ clustering through laboratory methods or using previous studies for collecting influential parameters in the behavior of the geological structures in the seven sections of the tunnel route. Then, the results obtained from these sections are analyzed and classified using the artificial bee colony (ABC) algorithm as one of the meta-heuristic algorithms. Finally, after validation, the results are classified into two groups of high-risk and low-risk sections.

2 Case study

The mechanized tunneling projects are one of the most important constructional infrastructures in which the ranking and assessment of risk are used as one of most important and influential parameters in designing and implementation of such projects [36, 37]. Hence, one of the most strategic tunneling projects in north of Iran is considered for risk assessment. The second part of the Emamzade Hashem tunnel is one of the most important and strategic tunneling projects in Iran. The total length of the tunnel is approximately 5.6 (km), which includes the second part (approximately 3200 m). This tunnel is located in the northeast of Tehran and at the boundary of Mazandaran in an entirely rocky environment and is a part of the mountainous region of the Alborz mountain range. The maximum and minimum overburden thicknesses of the tunnel crest are 450 m and 50 m, respectively. The lithologies of the region under study and the project implementation include the Durood Formation (H-3), the Mobarak Formation (H-16), the Ruteh Formation (H-16), the Shear Tuff and Lava Eocene (H-4), the Dacite tuff of Eocene (H-1), the Elika Formation (H-11), and the Baroot Formation (H-15). Figure 1 shows the tunnel implementation route from the beginning of excavation to the end of the route in different formations [35, 38].

Fig. 1
figure 1

The route of Tunnel in different formations [35]

Table 1 shows that the geotechnical properties are the criteria for the data analysis and clustering of the geological units of the sections under study [35, 38].

Table 1 The results obtained from field and laboratory studies on the second part of Emamzade Hashem Tunnel

3 Methodology

In order to assess uncertain problems, soft computing techniques can be applied with a satisfactory performance for modeling some problems involved in engineering [39,40,41,42,43,44,45,46]. The ABC algorithm is one of the most widely used evolutionary methods in the area of soft computing. In fact, the algorithm’s performance is inspired by the honey bee colony [47, 48]. This algorithm was first introduced by Karaboga who used it for the optimization of different problems in the industry, transportation systems, and traffic.

The honey bee colony is generally composed of three sections, namely, food sources, worker bees, and non-worker bees. Non-worker bees are further divided into two sections: onlooker and scout bees. Honey bees use a complex communication system. The relationship among bees is established through a dance language. The dance language includes a set of continuous motions performed by bees. This dance, called waggle dance, contains information on the quality of source, location, and position of bees. First, a set of food sources is randomly selected. Worker bees move toward the sources and compute the amount of honey. Then, these bees return to the hive and share their information with onlooker bees. In the second step, after the exchange of information, each worker bee moves toward the source and may select a new source near the previous one based on the information in its mind. Scout bees search the surrounding environment for new food sources. When the food source runs dry or bees leave and move toward a new source, the fitness of the new source (solution) is first investigated based on the previous sources (solutions). If the fitness of the new source is better than those of the previous sources, the new source (solution) is maintained in the memory of the bee; otherwise, the fitness of the new food source is added as another criterion for assessing the least and best sources. This process continues until all the requirements are satisfied by finding the most optimal solution. Equation (1) represents the process of finding a new location for each bee [49].

$$\begin{aligned} & \nu _{{ij}} = x_{{ij}} + \phi _{{ij}} (x_{{ij}} - x_{{kj}} ) \\ & k \in \{ 1,2, \ldots ,BN\} ,\quad i \ne k,\;j \in \{ 1,2, \ldots ,D\} \\ \end{aligned}$$
(1)

where \(\upsilon_{ij}\) is the position of the initial bee, and \(x_{ij}\) and \(x_{kj}\) are the positions of the initial and the other bees (neighbor bees), respectively. The lower the value of \(x_{ij} - x_{kj}\) is, the lesser the deviation from \(x_{ij}\) will be. Values k and j are randomly selected, and BN is the number of worker bees, which is equal to food source number (SN). In addition, variable k is different from variable i. \(\phi_{ij}\) is a random number between interval [− 1, 1], and this variable controls the production of food sources around \(x_{ij}\). Equation (1) attempts to move the initial position toward or against the value of index \(\phi_{ij}\) in the next movements [47, 48]. After the search operations, the observers assess and study the data obtained from the worker bees, and considering the data obtained about the food sources with possibilities, a food resource is selected based on Eq. (2) [50].

$$p_{i} = \frac{{fit_{i} }}{{\sum\nolimits_{n = 1}^{SN} {fit_{n} } }}$$
(2)

where Pi indicates the proper probability for the food source. SN is the number food sources (the number of existing solutions). fiti is the fitness function of food sources, which corresponds to the ith bee. If a food source runs dry and or lacks proper quality, worker bees leave and turn into scout bees [51]. This means that if in the fitness model a point is not improved after several iterations, the local optimal point should be abandoned and a new random point selected. Behaviour of honeybee foraging for nectar is indicated in Fig. 2.

Fig. 2
figure 2

Behaviour of honeybee foraging for nectar [52]

It is worth mentioning that artificial bee colony can be a powerful tool for identifying and assessing variety of the real world problems under uncertain conditions, and unlike some evolutionary algorithms, the advantage of this algorithm is that less control parameters are required. In this study, given that risk in tunneling projects is uncertain and unpredictable, the ABC algorithm, which is one of the most widely used soft computing methods in the rock mechanics, geotechniques, and mining fields, is used for solving complex problems of risk for its high ability and random techniques [53].

4 Modeling and discussion

To study and evaluate the field and laboratory results obtained in this study, one of the most important applications of the ABC algorithm optimization in data clustering is used. In the first step of modeling, after preparing the pseudo-code of the algorithm in MATLAB software, the control parameters of the algorithm are adjusted based on the previous studies and the opinions of skilled experts in Table 2 [54,55,56]. Then, the data in Table 1 are normalized based on Table 3 to be introduced into the algorithm.

Table 2 The control parameters for artificial bee colony algorithm
Table 3 The normalized value of geotechnical and hydrological properties

After the implementation of the algorithm and the optimization process, the output data are analyzed. Table 4 shows the results of data analysis of the minimum error. In addition, Figs. 3 and 4 illustrates the process of determining the best cost value in each replication and the distance of each criterion from the class under study, respectively.

Table 4 The process of determining the minimum acceptable error
Fig. 3
figure 3

The process of determining the best cost

Fig. 4
figure 4

The distance of each criterion from each class

Based upon Fig. 4, each criterion that has the lowest distance from each class, it has the most effect on that class. For instance in comparison between two classes for C1 (UCS), it has more influence on the sections H-4, H-1, H-11, and H-15 that are placed in the first class, in comparison with the sections H-2, H-3, and H-16 that are placed in the second class. In addition, C5 (Density) has same role in both classes with equal distances. On the other hand, in comparison between criteria in each class, C4 (tunneling index Q) and C3 (Average Groundwater Table) with 0.142 and 0.722 Euclidean distances have the most effect on the first and second classes, respectively. According to Table 4, the best cost value from replication 159 reaches the minimum allowable error and is fixed until the 250th replication. This reflects the high convergence of the ABC algorithm in optimizing clustering problems.

In the final step of analysis, the optimum partition value of each section is determined to be two groups. Based on the values, sections are classified into two groups according to Table 5. This clustering clearly shows that three sections with lithologies Durood Formation, Mobarak Formation, and Ruteh Formation are placed in the group with close geological properties and four sections with lithologies Shear Tuff and Lava Eocene, Dacite tuff of Eocene, Elika Formation, and Baroot Formation are placed in the group with different properties but the same category.

Table 5 Optimization and clustering of sections by ABC algorithm

According to Table 5, sections H-4, H-1, H-11, and H-15 are placed in the first class and sections H-2, H-3, and H-16 are placed in the second class. Finally, for the validation of results, Table 6 shows the comparison of the results obtained from the conducted analyses with the results of a study conducted on the sections in the tunneling project [31, 35].

Table 6 Comparison of results of ABC algorithm with FEMA, PSO and FCM

The sections are correctly placed in two groups in terms of risk, that is, high-risk and low-risk groups. This clustering result can be used by designers and contractors in the design and implementation phases and reduce the costs of geological risks in the project. The comparison of the validation results with previous studies including the Particle Swarm Optimization (PSO), Fuzzy C-means (FCM) clustering approach and the Failure Modes and Effects Analysis (FMEA), shows the high accuracy and convergence of the bee algorithm, which can be a suitable solution for other highly complex and uncertain problems in tunnel engineering and geotechnic [35]. The results of this study provide a new attitude in tunneling projects which may lead engineers toward a more reliable design and planning for future risk mitigation.

5 Conclusions

The use of meta-heuristic algorithms in risk assessment and analysis based on uncertain and unpredicted conditions has shown significant progress. The risk analysis of underground projects has always been faced with complex and uncertain conditions. Tunneling projects are one of the most important projects that require risk analysis and investigation at the beginning of the project due to different complicated criteria. Risk assessment in tunneling projects based on the geology of the region before the design and implementation of tunneling projects is one of the most important steps of project management. Thus, a study was conducted on the second part of the Emamzade Hashem tunnel using the ABC algorithm. In this research, seven sections in the route of project with different lithologies are selected, and their geotechnical properties are assessed and tested. Then, an optimized clustering (weak and strong risk classes) of the sections is conducted. Finally, three sections Durood Formation, Mobarak Formation, and Ruteh Formation are placed in the high risk group and four sections Baroot Formation, Elika Formation, Dacite tuff of Eocene and Shear Tuff, and Lava Eocene are placed in the low risk group. It is worth mentioning that C3 (Average Groundwater Table) with Euclidean distance equal 0.722 has the most effect on three sections Durood Formation, Mobarak Formation, and Ruteh Formation in the high risk group (The second class). In addition, C4 (tunneling index Q) with Euclidean distance equal 0.142 has the most effect on four sections Baroot Formation, Elika Formation, Dacite tuff of Eocene and Shear Tuff, and Lava Eocene in the low risk group (The first class). Finally, after validation, the results indicated that there was a full compliance between the results of this analysis and previous study. Consequently, it can be concluded that this novel approach is able to tackle for risk assessment of tunneling projects. For future study, it is recommended to use other intelligent algorithms such as gray wolf, Bat and fire fly algorithms and support vector machine for risk assessment of tunneling project.