期刊文献+

基于加权改进节点收缩法的供应链网络脆弱性分析 被引量:13

Vulnerability of complicated supply chain network based on weighted improved nodes contraction method
下载PDF
导出
摘要 针对现代生产模式下供应链网络结构复杂且具有明显脆弱性等问题,提出一种针对供应链网络拓扑结构的脆弱性分析方案。明确了脆弱性和供应链脆弱性的概念及相关表达,设计了供应链脆弱性加权分析模型。分析了基于节点收缩法的凝聚度,通过对比网络收缩前后的凝聚度变化明确供应链网络中物理结构的重要节点;分析了网络节点间的相互影响关系,设计了改进后的加权网络节点收缩方法,通过对网络节点凝聚度的加权计算量化分析了网状供应链的脆弱性问题。通过案例分析验证了所提方法的有效性。 Aiming at the problem of complexity and obvious vulnerability exist in the supply chain network structure under the modern production mode, a vulnerability analysis solution for supply chain network topology was pro- posed. The concept and related expression of supply chain vulnerability was cleared, and the supply chain vulnera- bility weighted analysis model was designed. With the condensation degree analysis based on nodes contraction method, physical structure important nodes in the supply chain network were determined through comparing con- densation degree change between before and after the network contraction. The interaction relationship of network nodes was analyzed, the nodes contraction method of weighted network was improved and the problem of net supply chain vulnerability was quantitative analyzed through the network nodes condensation degree weighted. The feasibil- ity and effectiveness of this method were verified by experimental analysis.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2014年第4期963-970,共8页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金资助项目(71071173) 富士康科技集团擢才创研计划资助项目(11F812100006) 教育部人文社会科学研究西部和边疆地区资助项目(11XJC630014) 重庆市科委自然科学基金资助项目(cstcjjA90014)~~
关键词 供应链 网络 拓扑结构 脆弱性 supply chains network topology structure vulnerability
  • 相关文献

参考文献13

  • 1NOF S Y,MOREL G,MONOSTORI L,et al.From plant and logistics control to multi-enterprise collaboration[J].Annual Reviews in Control,2006,30(1):55-68.
  • 2CHRISTOPHER M.Logistics and supply chain management:strategies for reducing costs and improving services[M].London,UK:Pitman Publishing,1992.
  • 3杜志平,胡贵彦,刘永胜.基于复杂性供应链脆弱性研究[J].中国流通经济,2011,25(6):49-54. 被引量:17
  • 4王玥,蔡皖东,段琪.基于遗传算法的网络脆弱性计算方法[J].系统仿真学报,2009,21(6):1628-1632. 被引量:11
  • 5姜洪权,高建民,陈富民,高智勇.基于网络特性的分布式复杂机电系统脆弱性分析[J].计算机集成制造系统,2009,15(4):791-796. 被引量:24
  • 6赵刚,况晓辉,李津,郑纬民.一种基于权值的大规模分布式系统结构脆弱性分析算法[J].计算机研究与发展,2011,48(5):906-912. 被引量:8
  • 7BARTHELEMY M.Betweenness centrality in large complex net--works[J].European Physical Journal B,2004,38 (2):163-168.
  • 8BUDANITSKY A,HIRST G.Evaluating word Net-based measures of lexical semantic distance[J].Computational Linguistics,2006,32(1):13-47.
  • 9THUN J H,HOENIG D.An empirical analysis of supply chain risk management in the German automotive industry[J].International Journal of Production Economics,2011,131(1):242-249.
  • 10CHRISTOPHER M.Managing risk in the supply chain[M]//Logistics&Supply Chain Management.Upper Saddle River,N.J.,USA:Prentice-Hall,2005:231-58.

二级参考文献77

共引文献342

同被引文献94

引证文献13

二级引证文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部