ANovel Intelligent Method for Predicting the Penetration Rate of the Tunnel Boring Machine in Rocks

Guangxi Key Laboratory of New Energy and Building Energy Saving, College of Civil and Architecture Engineering, Guilin University of Technology, Guilin 541004, China Guangxi Key Laboratory of Disaster Prevention and Engineering Safety, College of Civil Engineering and Architecture, Guangxi University, Nanning 530004, China State Key Laboratory of Hydraulics and Mountain River Engineering, College of Water Resource and Hydropower, Sichuan University, Chengdu 610065, China Water Authority of Zizhong County, Neijiang 641200, Sichuan, China


Introduction
As a consequence of sustained interest in the development of underground space, tunnels play a more and more important role in human production activities and life. For example, there are many tunnels under construction in hydraulic engineering (e.g., transportation tunnels, drainage tunnels, and grouting tunnels [1][2][3]) and in traffic engineering (road tunnels). us, considerable scientific efforts have been made to develop advanced methods, techniques, and theories for improving the safety and efficiency of tunnel constructions [4][5][6][7][8][9][10][11]. In the recent decades, the tunnel boring machine (TBM) has been widely applied to tunnel constructions, in general, and long tunnels in particular, due to its many superior performances over the traditional new Austrian tunnelling method (NATM) and drilling-blasting methods, such as less pollution to the surrounding environment and higher safety, efficiency, and quality. e penetration rate of the TBM affects not only the construction schedule and the amount of capital cost but also the stability of surrounding rock mass during tunnelling. Hence, it is significant to accurately predict the penetration rate for improving construction efficiencies and reducing construction risks.
Researchers have never ceased to develop empirical and theoretical models for evaluating the penetration rate/performance of the TBM since it was invented. Some typical models are the Q TBM model [12], the Field Penetration Index (FPI) model [13], the Specific Rock Mass Boreability Index (SRMBI) model [14], the Colorado School of Mines (CSM) model [15], and the Norwegian University of Science and Technology (NTNU) model [16]. Among them, the CSM and NTNU are the most famous models and are widely used. e CSM model is established on the basis of laboratory test results and by analyzing the rock-breaking mechanism of the TBM. is model has the advantage that it can take into account the influence of the strength and brittleness of rock on the penetration rate. However, the original CSM model has not considered the effect of joint cracks in rock masses, which can significantly affect the TBM performance. For this reason, much research attention has been paid to replacing the compressive strength of rock with that of the rock mass, in order to consider the effect of joint cracks. Even still, the modified CSM mode, however, cannot meet the accuracy requirement for many complicated rock structures. In addition, there are only a few engineering factors considered in the derivation process of the CSM model, restricting the ability of the model to solve complex engineering problems. e NTNU model not only considers the properties of the TBM but also involves the interaction between hobs and rock mass. Moreover, all empirical parameters involved in this model are obtained from practical tunnel engineering by using back analysis; thus, the NTNU model has received a certain degree of engineering application. Nevertheless, the experiments to determine the rock drillability and the friction coefficient between rock mass and hobs are not commonly conducted in the rock mechanics community; the acquisition of these parameters limits the application of the model somewhat.
In the recent years, with the rapid development of artificial intelligence (AI) technology, many intelligent models, such as the artificial neural network (ANN) [17,18], support vector machine (SVM) [19,20], group method of data handling (GMDH) [21], and adaptive neurofuzzy inference system (ANFIS) [22], have been applied to predicting the penetration rate. For example, there are a number of intelligent prediction models based on the dataset from the Queens Water Tunnel #3 (New York City, USA) (see Table 1), which is also used in this study to assess the proposed method. ese models have a typical advantage that they can establish the complicated nonlinear relationship between the penetration rate and various influencing factors with no need to consider too many indeterminate mechanical mechanisms, which simplifies the problem of estimating the penetration rate. However, they also have some deficiencies. For example, it is difficult for the ANN to determine an appropriate network topology and reasonable hyperparameter values. As for the SVM, its parameters are always obtained by manual trials, which often contain a certain degree of subjectivity and blindness. To circumvent these issues, many researchers prefer using the optimization methods/algorithms, i.e., particle swarm optimization (PSO), cuckoo search (CS), and genetic programming (GP), to search the optimal hyperparameters for the prediction models [33]. en, some hybrid models have been developed by combining the optimization methods with the intelligent models, including the PSO-ANN [34], PSO-SVM [35], and GP-ANN [36]. Although these hybrid models can solve the problem of parameter determination, they still have limitations, such as relatively low accuracy of ANN-based models and comparatively high computational cost/time of SVM-based models. Until now, a well-recognized model that can overcome all the problems mentioned above has not emerged. For the penetration rate prediction, it is, thus, necessary to explore a high-efficiency and accurate-enough model that can not only solve the parameter determination problem but also obtain better prediction results.
To address this issue, a useful method is developed in this study for predicting the TBM penetration rate by integrating the PSO optimization algorithm into the relevance vector machine (RVM) method. In the proposed method, the RVM contributes to establishing a nonlinear mapping relationship between the penetration rate and its various influencing factors, and PSO helps to optimize the parameter of the RVM. ere is only one parameter (i.e., the basis function width) needed to determine during the use of the RVM, for which fewer parameters are required than the ANN and SVM. Compared with the ANN, the RVM has a higher prediction precision, and moreover, it utilizes fewer basis functions and requires lower computational cost than the SVM. Besides, the RVM has many additional advantages, such as a small number of samples required and non-"Mercer" kernels [37]. Moreover, PSO is an excellent stochastic search optimization method with the characteristics of simple computation and rapid convergence capability, and it is widely applied to various complicated optimization problems [38]. us, the RVM-PSO method makes full use of the merits of both PSO and the RVM and possesses a better prediction performance for the TBM penetration rate.

Methodology
e two main parts (i.e., RVM and PSO) of the RVM-PSO method developed in this study will be introduced herein.

e RVM Model.
e RVM model is firstly proposed by Tipping [39] on the basis of the Sparse Bayesian Learning theory, which is a probabilistic model to remedy the defects of the SVM. e principle of the RVM is as follows.
It is well known that many problems involving machine learning would meet the supervised learning, in which a set of learning examples (number: N) is given as x n , t n N n�1 , where x n denotes an input vector and t n represents a scalar output or target. en, the relationship between x n and t n is described as where y(x n , ω) is expressed as equation (2), and it has a linear relationship with basis functions ϕ(x n ). ω is the weight matrix. ξ n is the Gaussian noise obeying the normal distribution with a mean of 0 and a variance of σ 2 . Hence, the expression p(t n | x) � N(t n | y(x n ), σ 2 ) belongs to a Gaussian distribution determined by t n , y(x n ) and σ 2 .
where ϕ(x n ) is often identified with the Gaussian radial basis function parameterized by training vectors, as shown in the following equation: where r is the width of radial basis function, which is an important parameter affecting the accuracy of prediction results. With the assumption of independence to t n , the complete probability expression for the sample dataset can be written as where t � (t 1 t 2 , . . . , t N ) T and ω � ( matrix. e maximum-likelihood estimations of ω and σ 2 can lead to overfitting for training because many parameters of learning samples are used. us, some additional constraints are generally exerted to solve this problem. e Bayesian perspective is usually adopted for the RVM to constrain the parameters by defining a simpler function of ω, which is shown as follows: where α is a vector with N + 1 hyperparameters. en, there are individual distributed parameters for every weight. us, the complexity of the prior distribution can be greatly reduced. In order to match the final function, a noise variance σ 2 is added for α. ese quantities belong to the scale parameters, for which the priors are the Gamma distribution: where β � σ 2 and In equation (7), Γ(a) � ∞ 0 t a− 1 e − t dt is the Gamma function. To ensure that these parameters have no prior information, it is better to set them to small values. If they are fixed to a � b � c � d � 0, more uniform hyperparameters can be obtained, and therefore, most of the related literature adopt this parameter setting strategy. To help to understand the general idea of this introduction, a visual implementation process is shown in Figure 1.
On the basis of the prior, the probabilistic distribution of the posterior is given as equation (8) by following Bayes' rule.
By assuming that there is a new prediction sample (x * , * ), the predictive distribution can be written as p t * | t � p t * ω, α, σ 2 p ω, α, σ 2 | t dwdαdσ 2 , (9) where p(ω, α, σ 2 | t) cannot be directly computed, so it is decomposed as follows: p ω, α, σ 2 | t � p ω t, α, σ 2 p α, σ 2 | t .  Based on the abovementioned introduction, the posterior distribution of ω is given by where the posterior mean μ and covariance are given in equations (12) and (13), respectively: where When the hyperparameters are updated to learn, many of ω i (i � 1, 2, . . ., N) tend to be zero, so that only a few basis functions (relevance vectors) can work on the results. us, the goal of sparseness is achieved.
By training the learning samples x n , t n N n�1 , the prediction could proceed on the basis of the posterior distribution over the weights. After maximizing the hyperparameters, the optimal parameters α MP and σ 2 MP can be found. e predictive distribution can be computed by equation (9). For a new prediction sample (x * , * ), the predictive probability is given by Both of the two integrands on the right-hand side of equation (14) are Gaussian distributions, so * also belongs to a Gaussian distribution, which is computed by en, the mean y * and the covariance σ 2 * are, respectively, given as

e PSO Algorithm.
Particle swarm optimization is an evolutionary computation technology based on the swarm intelligence method, which was proposed by Kennedy and Eberhart [40] and first intended for simulating social behavior. PSO is similar to the genetic algorithm (GA); both of them are optimization tools based on population information. However, unlike GA, PSO does not need crossover and mutation, and it finds the best solution by tracking the optimum particles. Compared with GA, PSO has the merits of a simpler implementation process and a better intelligent background, and it is not only used in scientific research but also applied to engineering practices in the industry [41].
To solve the optimization problem, PSO is initialized with a generation of random particles first (the number of particles is denoted as NP) and, then, searches for the optimum by updating generations. In PSO, the potential solutions, i.e., particles, fly through the problem space by following the current optimum particles. Each particle keeps track of its coordinates (in the problem space), which are associated with the best solution that the current-generation particles have achieved so far.
is value is called pbest. Another "best" value tracked by the particle swarm optimizer is the best value obtained so far by all particles; this value is a global best called gbest. After finding the two best values, the particles update their velocities and positions according to the following equation: (17) where v i d is the velocity vector. x id is the position vector. p id represents the best position in the current stage of particle I, and the corresponding fitness is pbest. p gd denotes the global best position in the process of particle iteration on the dth dimension, and its fitness is gbest. e parameters r 1 and r 2 are two random values uniformly distributed in [0, 1] [42]. c 1 and c 2 are acceleration constants, which can guide the particle on how to follow the pbest and the gbest. Small values of c 1 and c 2 may cause the particle to vibrate out of the target region; conversely, the large values can make the particle fly rapidly towards the target region and even surpass the target region. c 1 and c 2 usually have the same value between 1.8 and 2.0. e parameter w represents the inertia weight, which controls the influence of the previous velocity on the new velocity. When w is large, the algorithm has a strong ability of global search, while a small w value can make the algorithm have a strong ability of local search. e inertia weight w can be determined by the following equation: where t is the current iteration step, t max is the maximum iteration step, w max is the maximum inertia weight, and w min is the minimum inertia weight. In general, w max � 0.9 and w min � 0.4 [43]. A schematic diagram is given in Figure 2 to show how PSO solves the global optimization problem. In Figure 2, a two-dimensional problem is assumed. e red point represents p gd. e velocity of particle i is updated by three parts, denoted as v 1 , v 2 , and v 3 . v 1 � c 1 r 1 (p i d − x i d ) is the velocity of particle i caused by p id ; v 2 � wv i d is the velocity resulted from the initial velocity; and v 3 � c 2 r 2 (p g d − x i d ) is the velocity induced by p gd. en, the particle i is updated to a new position. By following the same way, the location of t … … x 1 particle i continues to be updated and gradually approaches the global optimal solution.

e RVM-PSO Method.
Since the RVM contributes to establishing a nonlinear mapping relationship between the output/target and input vectors and PSO helps significantly to optimize the parameter (i.e., the basis function width) of the RVM, the RVM-PSO method is developed by integrating PSO into the RVM. e implementation steps of the RVM-PSO method are as follows. First, one should analyze and process the collected data to get the input and output datasets for the RVM-PSO model. For example, the output parameter is the penetration rate in this study, and the input parameters are the influencing factors. Given that the input parameters are usually not in the same order of magnitude and this fact will affect the learning result, the data should be normalized. e principles for normalization are expressed as where a i and b i are the normalized values, x i denotes an idimensional input vector, y i represents the output of the ith sample, y is the mean of all y i values, and s is determined using the following equation: Subsequently, the normalized values of input and output data are employed to establish training sets, which can be used for training and fitting to find the nonlinear relation between the input and output data.
In the next step, PSO program should be started to generate the particles, which are treated as the widths of the basis function to be involved in the RVM model. e RVM model should be optimized automatically by updating the particles in PSO to reduce the error between the predicted results and the expected results until the prediction corresponding to a certain hyperparameter meets the accuracy requirement. A flow chart of the detailed implementation process of the RVM-PSO method is shown in Figure 3.

Application of the Prediction Methods to an Engineering Practice
To check the validity of the developed RVM-PSO method on the TBM penetration rate prediction, the method will be applied to estimate the penetration rate data collected from the Queens Water Tunnel #3 (New York City, USA) [25,44], and then, the predicted values will be compared with the actual values. Moreover, the prediction performance of the RVM-PSO method will be compared with that of the backpropagation artificial neural network (BP-ANN) [25], the least-squares support vector machines (LS-SVM), and the conventional RVM methods, which have already been widely applied to nonparametric and nonlinear classification and forecasting problems. For assessing our proposed RVM-PSO method by comparing the results with those from the BP-ANN method, this study adopted the same data as those used in the BP-ANN method in reference [25], that is, the data in Table 2.

Implementation of the RVM-PSO Method.
Note that the factors affecting the TBM penetration rate are too many to consider all of them in a prediction model. For this reason, it is, thus, common to consider only the relatively significant influencing factors in the applications of the current intelligent prediction methods. In addition, since the TBM machines used during the whole tunnelling process of the Queens Water Tunnel #3 are identical, some mechanical and geometrical parameters of TMB machines, such as the hob radius, the thickness of the hob end, and the rated thrust of a single hob, are not the main factors to induce the variation of penetration rate data recorded in that tunnelling practice. Hence, these parameters are not considered in this case study. Five parameters are tentatively speculated as to the main factors affecting the TBM penetration rate of the Queens Water Tunnel #3, and they are involved in the penetration rate prediction model established here. e five main factors are the angle between the longitudinal tunnel axis and the plane of weakness (α), the uniaxial compressive strength of intact rock (UCS), the Brazilian tensile strength (BTS), the spacing between the weakness planes (SWP) [45,46], and the peak slope index (PSI, i.e., the ratio of the maximum force to the corresponding displacement in the impact test [47][48][49][50][51][52][53][54]). Table 2 lists the penetration rate data corresponding to different values of the main influencing factors. Fifteen groups of the data are randomly selected as learning samples (denoted Mathematical Problems in Engineering 5 as L1 to L15), and the remaining ten groups are assigned as test samples (represented as T1 to T10). In the RVM-PSO model established here, the penetration rate and the main influencing factors are the output and input parameters, respectively. PSO is employed for the optimization of the Gaussian kernel width. e termination condition is set to f < 0.03 (where f is the mean relative error), and the maximum number of iterations is specified as 1000. Parameter settings in PSO are d � 1, NP � 10, c 1 � c 2 � 2, and V max � 1. After establishing the nonlinear relationship between the penetration rate and the influencing factors by training the learning samples, the prediction can be made by inputting some values of the key influencing factors that are measured from the tunnel. In this study, PSO finds the best value of the Gaussian kernel width through the search of three-generation particles. e detailed search process of the particles is shown in Figure 4, which indicates that the particles of a newer generation are closer to the termination condition, and the mean relative error corresponding to one of the thirdgeneration particles is only 0.028, achieving the required accuracy.

Brief Introduction of the BP-ANN and the LS-SVM
Methods. Since the prediction made by the RVM-PSO method will be compared with those by the BP-ANN and the LS-SVM methods, the latter two methods are briefly introduced here.  Figure 3: A flow chart of the RVM-PSO method used for predicting a target variable. e artificial neural network (ANN) is an information system proposed by abstracting, simplifying, and simulating the structure, function, and basic characteristics of the human brain neural network. e backpropagation artificial neural network (BP-ANN), originally developed by McClelland and Rumelhart [55], is a multilayer forward neural network based on the error back-propagation algorithm. As a typical learning algorithm of the ANN, the main structure of the BP-ANN is composed of an input layer, one or more hidden layers, and an output layer. Each layer is composed of a number of neurons (nodes), and the output value of each node is determined by input values, action functions, and thresholds. e BP learning algorithm is used to train multilayer networks and implement a gradient search to minimize the squared error between realized and desired outputs. e learning process of the network includes two processes: forward information propagation and backward error propagation. In the forward propagation process, the input information is transmitted from the input layer to the output layer through the hidden layer. After the action functions are operated, the output value is compared with the expected value. If there is an error, the error propagates back and returns along the original connection path. By modifying the weight of neurons layer by layer, the error can be reduced, and the loop proceeds until the output result meets the specified accuracy requirement. e output O j of neuron j on the hidden or output layer of the BP neural network is determined by the following equation: where f j is the excitation function corresponding to neuron j, θ is the threshold of neuron j, x i denotes the inputs to neuron j, and ω j represents the connection weight corresponding to the input and neuron j.

e LS-SVM Method.
In the least-squares support vector machine method proposed by SuyKens et al. [56], the least-squares linear system is used as the loss function, and the solution process is transformed into solving a set of equations, which dramatically speeds up the solution procedure. us, the LS-SVM has achieved good results on pattern recognition and nonlinear estimation. In the use of the LS-SVM, the samples of training data can be expressed as (X 1 , Y 1 ), (X 2 , Y 2 ), . . ., (X l , Y l ), where y i is the target value and x i is the input vector. e function estimation problem can be described as solving the following question: e constraint condition is as follows: where Φ(): R n ⟶R nh is the kernel function, ω (∈R nh ) is the weight vector, ξ i (∈R) is the error variable, b is the deviation value, and c an adjustable parameter. e kernel function can map the samples in the original space to a vector in a high-dimensional feature space to solve the linear indivisibility problem, and thus, the optimization problem can be solved using the Lagrangian method: where αi (i � 1, 2, . . ., l) is the Lagrange multiplier. e optimization conditions are as follows: Subsequently, using these optimization conditions, one can get where Mathematical Problems in Engineering 7 where the parameters α and b are determined from equation (26) and the kernel function K (x, xi) is an arbitrary symmetric function satisfying Mercer's condition, such as K (x, y) � exp(− (x − y)2/(2σ2)).

Comparison of the Prediction Results Obtained from the Methods
After learning the training samples, the prediction sample set was predicted. e prediction results for the ten prediction samples are summarized in Table 3, in which the prediction results based on other methods were also listed for comparison. e maximum relative error of the BP-ANN method is up to 17.24%, and that of the LS-SVM and the RVM methods are as high as − 14.7% and − 14.27%, respectively. However, the RVM-PSO method has the minimum value of the maximum relative error, which is only 12.7%. To compare the prediction performances of the four methods (i.e., RVM-PSO, BP-ANN, LS-SVM, and RVM) in an intuitive manner, the predicted penetration rates and the actual values for all the test samples are drawn in Figure 5. It can be seen that the BP-ANN method provides terrible estimates for the penetration rates in samples T1, T2, T4, and T6. As for the LS-SVM method, the predictions on samples T7 and T9 significantly deviate from the measured values. When the conventional RVM method is used, there are also relatively significant differences between the predicted and actual penetration rates for samples T7 and T9. As with the RVM-PSO method, the prediction results seem close to the actual penetration rates, except for sample T9. ese observations indicate that the capabilities of those four methods to predict the penetration rate are not the same, and moreover, if the test samples are sorted by the accuracies of their corresponding prediction results, the sequences are not consistent for all of those methods. Most importantly, it appears that the RVM-PSO method overall yields the best prediction. However, it is still difficult to sufficiently distinguish the capacities of those four methods to estimate the TBM penetration rate (for example, Figure 5 shows that the predictions by the LS-SVM and the conventional RVM methods are quite close for a given test sample). Hence, more reasonable and in-depth analysis is required to assess the four methods further. For this reason, some performance indices, including the mean absolute error (MAE), maximum absolute error (MXAE), mean relative error (MRE), root mean square error (RMSE), and eil's inequality coefficient (TIC) [57], are calculated here for evaluating and comparing the prediction performances of those methods. e formulas for determining these parameters are as follows: where n denotes the total number of samples; y i and y i represent the measured value and the predicted value, respectively. e terms MAE, MXAE, MRE, and RMSE can reflect the prediction accuracy of the methods. e index TIC represents the level of agreement between the prediction and the real penetration rate. e calculated values of these five parameters are delineated in Figure 6. As can be seen from Figure 6(a), there are some differences between the mean absolute errors of the predictions using the BP-ANN, LS-SVM, RVM, and RVM-PSO methods. e mean absolute error of the RVM-PSO method is only about 0.05 m/h, significantly lower than those of the other three methods. In addition, the BP-ANN method yields the highest mean absolute error, and the MAE value corresponding to the RVM method is lower than that generated by the LS-SVM method. Figure 6(b) shows that the RVM-PSO and LS-SVM methods give the smallest and largest values of the maximum absolute error, respectively, and the BP-ANN method produces a slightly lower MXAE than the LS-SVM method. Figure 6(c) depicts that the mean relative error (MRE) of the prediction results of the BP-ANN method is 6.53%, and that of both the LS-SVM and the RVM methods is 6.4%, while the MRE value of the RVM-PSO method is only 2.8%, even less than half of those of the former three methods. As for the remained two indices, the RVM-PSO method still generates much lower RMSE and TIC values than the other three methods, for which both the RMSE and TIC values decline from the BP-ANN to LS-SVM to RVM. Overall, it can be found from Figure 6 that the distinctions between the prediction performances of the BP-ANN, LS-SVM, and RVM methods are not very significant. More specifically, the RVM method is slightly better than the LS-SVM method, which can modify the prediction a little compared with the BP-ANN method. Most importantly, Figure 6 indicates that no matter from which index the viewpoint is, the prediction using the RVM-PSO method is always more satisfactory than that using the other three methods. erefore, the proposed RVM-PSO method proves valid and superior for the TBM penetration rate prediction.

Comparison of the Effects of the Main Influencing Factors
As mentioned above, it is basically impractical to obtain the data of all the factors affecting the TBM penetration rate, and thus, it is quite interesting and useful to identify the difference in the importance of the various influencing factors for the TBM penetration rate prediction of a tunnel because this work may help researchers/engineers to ascertain or pay attention to the parameters that are significant for the penetration rate of a tunnel. In the abovementioned application example of the RVM-PSO method, five parameters are considered as the main influencing factors of the TBM penetration rate. eir importance would be evaluated and compared in this section. To this end, five new prediction models without considering each of the five influencing factors, respectively (i.e., the prediction models correspond to different combinations of just four of the five influencing factors), are established on the basis of the RVM-PSO method to predict the penetration rate. e reason for selecting the proposed RVM-PSO method is that it is already manifested to be capable of the TBM penetration rate prediction. Note that similar to the settings used in the previous section, the first fifteen groups of data listed in Table 2 are deemed as learning samples for the five new prediction models, and the remaining ten groups work as test samples. Moreover, the structures and parameters (e.g., the Gaussian kernel width and the number of iterations) of each model are consistent with those used in the previous model, in which all the five influencing factors are taken into account. en, the five four-factor models can be applied to estimate the penetration rates in the test samples, and the importance of the five influencing factors on the penetration rate can be determined by comparing the prediction accuracies of the four-factor models with that of the previous five-factor model. By following the implementation steps described in the previous sections, the four-factor models established in this section can also make predictions of the penetration rates in the test samples. e predicted penetration rates are tabulated in Table 4.
Since the difference in the importance of the influencing factors can be reflected by the different prediction performances of the four-factor models, it is useful to compare the values of the statistic indices yielded by the models. To facilitate the comparison, the following five parameters are defined: where  larger than that obtained from the one without considering UCS.
To make the Tij (i, j � 1, 2, . . ., 5) values yielded by the five new models easy to compare, they are delineated in Figure 7, and the detailed Tij results are listed in Table 5. As can be seen from Figure 7 and Table 5, the values of Tij are basically larger than 1 (except for T 22 ). is means that the prediction results of the four-factor models are basically inferior to those of the previous five-factor model, indicating that each of the five main influencing factors indeed affects the prediction results and the five main influencing factors selected in the previous sections are reasonable. Moreover, for a given value of i, the values of Tij are usually not the same when j varies, suggesting that the importance of the five influencing factors is different for the TBM penetration rate prediction of the Queens Water Tunnel #3. It is observed that T i1 and T i4 are always larger than T i2 , T i3 , and T i5 , and the difference between T i1 and T i4 is not very conspicuous for any value of i; therefore, the angle between the longitudinal tunnel axis and the plane of weakness (i.e., α) and the spacing between the weakness planes (SWP) have significant effects.
Moreover, for a fixed value of i, T i3 and T i5 are basically equal; hence, the importance of the Brazilian tensile strength  (BTS) and that of the peak slope index are nearly the same for this tunnel practice. In addition, Figure 7 clearly shows that the model without considering the UCS has the closest prediction performance to the previous five-factor model, and the mean relative error yielded by the former is only 3.71%. ese observations imply that the UCS has a smaller influence on the TBM penetration rate prediction of the Queens Water Tunnel #3 than the other four factors, while α and SWP are quite important for the prediction. erefore, in the penetration rate prediction of that tunnel, data of UCS might be able to leave out for the purpose of reducing workload, but the acquisition of α and SWP should be paid more attention.
In practical engineering, it is quite difficult to acquire the detailed data of all the factors affecting the TBM penetration rate, and even the data of some important factors might not be collected. Hence, it is meaningful to assess the predictive ability of the proposed RVM-PSO model under the working condition that not the data of all the main influencing factors are available. For comparison, both the RVM-PSO and the conventional RVM methods are employed to estimate the penetration rates in the test samples listed in Table 2, under the assumption that the values of α or SWP are not known. In other words, both the RVM-PSO and RVM models  compared here belong to the four-parameter model without considering α or SWP. e reason for selecting the RVM method (instead of the BP-ANN and LS-SVM methods) to be compared with the RVM-PSO method here is that the RVM is already proved to be more accurate than the BP-ANN and LS-SVM for TBM penetration rate prediction, as shown in the previous section. Figure 8 presents the relative errors of the penetration rates predicted by the RVM-PSO and the conventional RVM methods when α or SWP is not taken into account in the predictions. It can be found that the RVM-PSO method always generates smaller errors in the prediction than the RVM for each of the test samples, no matter for the absence of α or SWP. us, the RVM-PSO method is superior to the RVM method. Moreover, even when one of the two most important influencing factors identified for the TBM penetration rate prediction of the Queens Water Tunnel #3 is not considered, the mean relative error yielded by the RVM-PSO method is about 8%, less than 10%. erefore, the RVM-PSO method is useful to estimate the TBM penetration rate in rock tunnels, and it has a relatively good tolerance for missing or lacking the data of a few influencing factors.

Conclusions
Accurate prediction of the TBM penetration rate is of great significance to tunnel constructions, for purposes of optimizing design schemes, saving economic costs, and evaluating the feasibility of engineering constructions. us, a useful intelligent method, RVM-PSO, is developed to estimate the penetration rate of the TBM. To check the validity of the developed method, it was applied to the prediction of the TBM penetration rate in the Queens Water Tunnel #3. en, the prediction performance of the RVM-PSO method was compared with that of the BP-ANN, LS-SVM, and conventional RVM methods.
e main conclusions are drawn as follows: (1) e penetration rate of the TBM is affected by various factors, and there are complex nonlinear relationships between the penetration rate and its influencing factors. e RVM-PSO method developed in this study can effectively establish a nonlinear correlation between the penetration rate and its main influencing factors and can achieve a relatively good prediction of the TBM penetration rate.
(2) e RVM-PSO method proves able to provide much better prediction than the BP-ANN, LS-SVM, and RVM. In addition, the BP-ANN and the LS-SVM methods have close prediction performances, and they are inferior to the RVM. Moreover, even if there is a lack of data on an important factor affecting the penetration rate, the prediction yielded by the RVM-PSO method is still more accurate than that using the RVM. (3) e RVM-PSO method is useful in identifying the difference in the importance of the various factors affecting the TBM penetration rate prediction. It can help researchers/engineers to pay attention to the parameters that are significant for the penetration rate prediction and to leave out the data acquisition of the nonsignificant influencing factors in order to reduce workload.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare no conflicts of interest.