The Journal of Supercomputing

, Volume 73, Issue 8, pp 3586–3602 | Cite as

Implementing fuzzy rank function model for a new supply chain risk management

  • Ali Mostafaeipour
  • Mojtaba Qolipour
  • Hamidreza Eslami
Article
  • 299 Downloads

Abstract

Intensive business competition has encouraged enterprises to focus more on their core activities to outsource the management of supply chain. Issues such as political crises, demand fluctuations, strategy variations, financial instability and natural disasters are the factors that can contribute to emergence of uncertainty and risk in the supply chain. Effective management of such risks is essential for reducing the vulnerability of the supply chain. Supply risk management is the most basic concept of the supply chain risk management; therefore, this study examines this subject by developing a mathematical model consisting of a set of equations to quantify typical risk such as delayed delivery, substandard quality, natural disasters and financial risk of the supplier. This model is designed to select and allocate orders to suppliers to minimize the supply risk imposed by the mentioned risk factors. A fuzzy-order function is implemented to turn this crisp model into a fuzzy supply chain risk assessment model. The defuzzified solutions of the fuzzy model show significant improvements over the result of crisp model. Uncertainty in supply chain and intense competitiveness between organizations and managers create different challenges. To effectively manage these challenges, new management approaches are used to strengthen and improve the effectiveness of organizations. The results show that the fuzzy model yields better results compared to the deterministic model. Moreover, it is demonstrated that the ability of the model for activities risk control is improved. The work presented addresses the same challenging problems that others have tried to address, but the methodology presented in this paper is more efficient in terms of execution performance and accuracy.

Keywords

Risk management Supply chain Fuzzy Rank function 

References

  1. 1.
    Vanany I, Zailani S, Pujawan N (2009) Supply chain risk management: literature review and future research. Int J Inf Syst Supply Chain Manag 2(1):16–33CrossRefGoogle Scholar
  2. 2.
    Tang CS (2006) Perspectives in supply chain risk management. Int J Prod Econ 103(2):451–488CrossRefGoogle Scholar
  3. 3.
    Aven T (2011) On the new ISO guide on risk management terminology. Reliab Eng Syst Saf 96:719–726CrossRefGoogle Scholar
  4. 4.
    Choudhry RM, Iqbal K (2013) Identification of risk management system in construction industry in Pakistan. J Manag Eng 29:42–49CrossRefGoogle Scholar
  5. 5.
    Goh CS, Abdul-Rahaman H, Abdul Samad Z (2013) Applying risk management workshop for public construction projects: case study. J Constr Eng Manag 139:572–580CrossRefGoogle Scholar
  6. 6.
    PMI (Project Management Institute) (2004) A guide to the project management body of knowledge (PMBOK guide). Newtown Square, Delaware CountyGoogle Scholar
  7. 7.
    Wu D, Olson D, Dolgui A (2015) Decision making in enterprise risk management: a review and introduction to special issue. Omega 57:1–4CrossRefGoogle Scholar
  8. 8.
    Rohaninejad M, Bagherpour M (2013) Application of risk analysis within value management: a case study in DAM engineering. J Civ Eng Manag 19:364–374CrossRefGoogle Scholar
  9. 9.
    Hochrainer-Stigler S, Mechler R, Mochizuki J (2015) A risk management tool for tackling country-wide contingent disasters: a case study on Madagascar. Environ Model Softw 72:44–55CrossRefGoogle Scholar
  10. 10.
    Lin L, Nilsson A, Sjolin J, Abrahamsson M, Tehler H (2015) On the perceived usefulness of risk descriptions for decision-making in disaster risk management. Reliab Eng Syst Saf 142:48–55CrossRefGoogle Scholar
  11. 11.
    Svoboda M, Fuchs B, Poulsen CH, Nothwehr J (2015) The drought risk atlas: enhancing decision support for drought risk management in the United States. J Hydrol 526:274–286CrossRefGoogle Scholar
  12. 12.
    Khan F, Rathnayaka S, Ahmed S (2015) Methods and models in process safety and risk management: past, present and future. Process Saf Environ Prot 98:116–147CrossRefGoogle Scholar
  13. 13.
    Dawson D, Mayger K, Thomas M, Thompson K (2015) Fatigue risk management by volunteer fire-fighters: use of informal strategies to augment formal policy. Accid Anal Prev 84:92–98CrossRefGoogle Scholar
  14. 14.
    Lehtiranta L (2011) Relational risk management in construction projects: modeling the complexity. Leadersh Manag Eng 11:141–154CrossRefGoogle Scholar
  15. 15.
    Adam T, Fernando CH, Golubeva E (2015) Managerial overconfidence and corporate risk management. J Bank Finance 60:195–208CrossRefGoogle Scholar
  16. 16.
    Veltman L, Cphrm MD (2015) Obstetrics hospitalists: risk management implications. Obstet Gynecol Clin N Am 42(3):507–517CrossRefGoogle Scholar
  17. 17.
    Yeo K, Ren Y (2009) Risk management capability maturity model for complex product systems (CoPS) projects. J Syst Eng 12:275–294CrossRefGoogle Scholar
  18. 18.
    Lehtiranta L, Palojarvi L, Huovinen P (2010) Advancement of construction-related risk management concepts. In: Proceedings 18th CIB World Building Congress, pp 492–503Google Scholar
  19. 19.
    Ethridge SH, Bredfeldt T, Sheedy K, Shirley S, Lopez G, Honeycutt M (2015) The Barnett Shale: from problem formulation to risk management. J Unconv Oil Gas Resour 11:95–110CrossRefGoogle Scholar
  20. 20.
    Baloi P, Price A (2003) Modeling global risk factors affecting construction cost performance. Int J Proj Manag 21(4):262–269CrossRefGoogle Scholar
  21. 21.
    Wehn U, Evers J (2015) The social innovation potential of ICT-enabled citizen observations to increase e-participation in local flood risk management. Technol Soc 42:187–198CrossRefGoogle Scholar
  22. 22.
    Hadrich J, Johnson K (2015) Estimation of risk management effects on revenue and purchased feed costs on US dairy farms. J Dairy Sci 98(9):6588–6596CrossRefGoogle Scholar
  23. 23.
    Zhao X, Hwang BG, Low S (2013) Developing fuzzy enterprise risk management maturity model for construction firms. J Constr Eng Manag 139:1179–1189CrossRefGoogle Scholar
  24. 24.
    Serpell A, Ferrada X, Rubio L, Arauzo S (2015) Evaluating risk management practices in construction organizations. Proc Soc Behav Sci 194:201–210CrossRefGoogle Scholar
  25. 25.
    Huerga M, Banuls Silvera V, Turoff M (2015) A CIA–ISM scenario approach for analyzing complex cascading effects in operational risk management. Eng Appl Artif Intell 46:289–302Google Scholar
  26. 26.
    Li G, Fan H, Lee P, Cheng TCE (2015) Joint supply chain risk management: an agency and collaboration perspective. Int J Prod Econ 164:83–94CrossRefGoogle Scholar
  27. 27.
    Giannakis M, Papadopoulos T (2016) Supply chain sustainability: a risk management approach. Int J Prod Econ 171:455–470Google Scholar
  28. 28.
    Guadix J, Carrillo-Castrillo J, Onieva L, Lucena D (2015) Strategies for psychosocial risk management in manufacturing. J Bus Res 68(7):1475–1480CrossRefGoogle Scholar
  29. 29.
    Stornetta A, Engeli B, Zarn J, Gremaud G, Sturla SH (2015) Development of a risk management tool for prioritizing chemical hazard-food pairs and demonstration for selected my co toxins. Regul Toxicol Pharmacol 72(2):257–265CrossRefGoogle Scholar
  30. 30.
    Koenig M, Meissner J (2015) Risk management policies for dynamic capacity control. Comput Oper Res 59:104–118MathSciNetCrossRefMATHGoogle Scholar
  31. 31.
    Adjei DN, Agyemang C, Dasah JB, Kuranchie P, Amoah AGB (2015) The effect of electronic reminders on risk management among diabetic patients in low resourced settings. J Diabetes Complicat 29(6):818–821CrossRefGoogle Scholar
  32. 32.
    Lin ET, Yao IS (2003) Fuzzy critical path method based on signed-distance ranking and statistical confidence-interval estimates. J Supercomput 24:305–325CrossRefMATHGoogle Scholar
  33. 33.
    Allenotor D, Thulasiram RK (2013) A fuzzy grid-QoS framework for obtaining higher grid resources availability. J Supercomput 66:1231–1242. doi: 10.1007/s11227-011-0728-8 CrossRefGoogle Scholar
  34. 34.
    Wu CC, Lia LF, Chang YS (2012) Extending fuzzyCLIPS for parallelizing data-dependent fuzzy expert systems. J Supercomput 59:1379–1395. doi: 10.1007/s11227-010-0542-8 CrossRefGoogle Scholar
  35. 35.
    Garg R, Singh AK (2014) Multi-objective workflow grid scheduling using \(\varepsilon \)-fuzzy dominance sort based discrete particle swarm optimization. J Supercomput 68:709–732. doi: 10.1007/s11227-013-1059-8 CrossRefGoogle Scholar
  36. 36.
    Zhang J, Ji H, Ouyang C (2011) Multi target bearings-only tracking using fuzzy clustering technique and Gaussian particle filter. J Supercomput 58:4–19. doi: 10.1007/s11227-010-0528-6 CrossRefGoogle Scholar
  37. 37.
    Adabi S, Movaghar A, Rahmati AM (2014) Bi-level fuzzy based advanced reservation of Cloud workflow applications on distributed grid resources. J Supercomput 67:175–218. doi: 10.1007/s11227-013-0994-8 CrossRefGoogle Scholar
  38. 38.
    Rezaee A, Rahmani AM, Movaghar A, Teshnehlab M (2014) Formal process algebraic modeling, verification, and analysis of an abstract fuzzy inference Cloud service. J Supercomput 67:345–383. doi: 10.1007/s11227-013-1005-9 CrossRefGoogle Scholar
  39. 39.
    Jin H, Wang D, Wang H, Wang H (2007) Feedback fuzzy-DVS scheduling of control tasks. J Supercomput 41:147–162. doi: 10.1007/s11227-006-0027-y CrossRefGoogle Scholar
  40. 40.
    Cocaña-Fernández A, Ranilla J, Sánchez L (2015) Energy-efficient allocation of computing node slots in HPC clusters through parameter learning and hybrid genetic fuzzy system modeling. J Supercomput 71:1163–1174. doi: 10.1007/s11227-014-1320-9 CrossRefGoogle Scholar
  41. 41.
    Paul N, Singh A, Midya A, Roy PP, Dogra DP (2016) Moving object detection using modified temporal differencing and local fuzzy thresholding. J Supercomput. doi: 10.1007/s11227-016-1815-7 Google Scholar
  42. 42.
    Song G, Yang B, Wu Z, Chuai J, Zheng Y (2013) ROIN: reputation-oriented inverted indexing for the P2P network. J Supercomput 64:968–986. doi: 10.1007/s11227-013-0878-y CrossRefGoogle Scholar
  43. 43.
    Mehrali-Dehnavi M, Aqaei A (2013) supply risk management using by value tool encounter risk based Ferin theory. Qual Bus Res 66:161–194Google Scholar
  44. 44.
    Ravindran A, Ravi BR, Ufuk W, Vijay T, Yang T (2010) Risk adjusted multi criteria supplier selection models with applications. Int J Prod Res 48(2):405–424CrossRefGoogle Scholar
  45. 45.
    Yang T (2007) Multi objective optimization models for managing supply risk in supply chains. A thesis, Industrial Engineering and Operations ResearchGoogle Scholar
  46. 46.
    Tansel Y (2012) Development of a credit limit allocation model for banks using an integrated fuzzy TOPSIS and linear programming. J Expert Syst Appl 39:5309–5316CrossRefGoogle Scholar
  47. 47.
    Hatami A, Kazemipour H (2014) Solving fully fuzzy linear programing with symmetric trapezoidal numbers using Mehars method. J Math Comput Sci 4(2):463–470Google Scholar
  48. 48.
    Farhadinia B (2014) Sensitivity analysis in interval-valued trapezoidal fuzzy number linear programming problems. J Appl Math Model 38:50–62MathSciNetCrossRefGoogle Scholar
  49. 49.
    Stanojevi B, Stanojevi M (2015) Comment on fuzzy mathematical programming for multi objective linear fractional programming problem. J Fuzzy Sets Syst 4:1–4Google Scholar
  50. 50.
    Kumar A, Kaur J, Singh P (2011) A new method for solving fully fuzzy linear programming problems. Appl Math Model 35:817–823MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  • Ali Mostafaeipour
    • 1
  • Mojtaba Qolipour
    • 1
  • Hamidreza Eslami
    • 2
  1. 1.Industrial Engineering DepartmentYazd UniversityYazdIran
  2. 2.Desautels Faculty of ManagementMcGill UniversityMontrealCanada

Personalised recommendations