Improved Emergency Management by a Loosely Coupled Logistic System

  • Dirk Thorleuchter
  • Joachim Schulze
  • Dirk Van den Poel
Part of the Communications in Computer and Information Science book series (CCIS, volume 318)


We investigate a robust and intelligent logistic system for emergency management where existing commercial logistic systems are loosely coupled with logistic systems of emergency management organizations and armed forces. This system is used to supply the population in case of a disaster where a high impact of environmental conditions on logistics can be seen. Very important are robustness as the ability of a logistic system to remain effective under these conditions and intelligent behavior for automated ad-hoc decisions facing unforeseen events. Scenario technique, roadmapping, as well as surveys are used as qualitative methodologies to identify current weaknesses in emergency management logistics and to forecast future development of loosely coupled logistic systems. Text mining and web mining analysis as quantitative methodologies are used to improve forecasting. As a result, options are proposed for governmental organizations and companies to enable such a loosely coupled logistic system within the next 20 years.


Roadmap Scenario Logistic Emergency Management 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lee, H.L., Whang, S.: Higher supply chain security with lower cost: Lessons from total quality management. Int. J. Prod. Econ. 96(3), 289–300 (2005)CrossRefGoogle Scholar
  2. 2.
    Flotzinger, C., Hofmann-Prokopczy, H., Starkl, F.: Logistik 2030 – Zukunftsszenarien für eine nachhaltige Standortentwicklung in Österreich. FH OÖ, Steyr, Austria (2008)Google Scholar
  3. 3.
    Von der Gracht, H., Däneke, E., Micic, P., Darkow, I.L., Jahn, C.: Zukunft der Logistik-Dienstleistungsbranche in Deutschland. Media Group GmbH, Hamburg (2008)Google Scholar
  4. 4.
    Pfohl, H.C., Wimmer, T. (eds.): Robuste und sichere Logistiksysteme. DVV Media Group GmbH, Hamburg (2008)Google Scholar
  5. 5.
    Plotzki, S.: Trends im Global Supply Chain Management, p. 39. VDM Verlag Dr. Müller, Saarbrücken (2007)Google Scholar
  6. 6.
    Sheu, J.B.: Challenges of emergency logistics management. Transp. Res.: Part E: Logist. Transp. Rev. 43(6), 655–659 (2007)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Hale, T., Moberg, C.R.: Improving supply chain disaster preparedness: A decision process for secure site location. Int. J. Phys. Distrib. Logist. Manag. 35(3), 195–207 (2005)CrossRefGoogle Scholar
  8. 8.
    Geschka, H.: Die Szenariotechnik in der strategischen Unternehmensplanung. In: Hahn, D. (ed.) Strategische Unternehmensplanung, pp. 518–545. Physica, Würzburg (1999)Google Scholar
  9. 9.
    Thorleuchter, D., Van den Poel, D.: Rapid Scenario Generation with Generic Systems. In: International Conference on Management Sciences and Information Technology 2012. Lecture Notes in Information Technology. IERI, Delaware (in press, 2012)Google Scholar
  10. 10.
    Thorleuchter, D., Weck, G., Van den Poel, D.: Usability Based Modeling for Advanced IT-Security – An Electronic Engineering Approach. In: Jin, D., Lin, S. (eds.) Advances in Mechanical and Electronic Engineering. LNEE, vol. 177, pp. 615–619. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  11. 11.
    Thorleuchter, D., Weck, G., Van den Poel, D.: Granular Deleting in Multi Level Security Models – An Electronic Engineering Approach. In: Jin, D., Lin, S. (eds.) Advances in Mechanical and Electronic Engineering. LNEE, vol. 177, pp. 609–614. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  12. 12.
    Thorleuchter, D., Van den Poel, D., Prinzie, A.: Analyzing existing customers’ websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing. Expert Syst. Appl. 39(3), 2597–2605 (2012)CrossRefGoogle Scholar
  13. 13.
    Thorleuchter, D., Herberz, S., Van den Poel, D.: Mining Social Behavior Ideas of Przewalski Horses. In: Wu, Y. (ed.) Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 649–656. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  14. 14.
    Thorleuchter, D., Van den Poel, D.: Using NMF for Analyzing War Logs. In: Aschenbruck, N., et al. (eds.) Future Security 2012. CCIS, vol. 318, pp. 73–76. Springer, Heidelberg (2012)Google Scholar
  15. 15.
    Thorleuchter, D., Van den Poel, D.: Extraction of Ideas from Microsystems Technology. In: Jin, D., Lin, S. (eds.) Advances in CSIE, Vol. 1. AISC, vol. 168, pp. 563–568. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  16. 16.
    Thorleuchter, D., Van den Poel, D.: Predicting E-Commerce Company Success by Mining the Text of Its Publicly-Accessible Website. Expert Syst. Appl. (in press, 2012)Google Scholar
  17. 17.
    Thorleuchter, D., Van den Poel, D.: Using Webcrawling of Publicly-Available Websites to Assess E-Commerce Relationships. In: Annual SRII Global Conference 2012, IEEE Press, New York (in press, 2012)Google Scholar
  18. 18.
    Laube, T., Abele, T.: Technologie-Roadmap: Strategisches und taktisches Technolo-giemanagement. Ein Leitfaden. Fraunhofer IPA edition, Stuttgart (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Dirk Thorleuchter
    • 1
  • Joachim Schulze
    • 1
  • Dirk Van den Poel
    • 2
  1. 1.Fraunhofer INTEuskirchenGermany
  2. 2.Faculty of Economics and Business AdministrationGhent UniversityGentBelgium

Personalised recommendations