计算机集成制造系统 ›› 2014, Vol. 20 ›› Issue (4): 963-.DOI: 10.13196/j.cims.2014.04.yukunpeng.0963.8.20140428

• 论文 • 上一篇    下一篇

基于加权改进节点收缩法的供应链网络脆弱性分析

于鲲鹏1,杨育1+,刘娜2,李斐1,谢建中1,3   

  1. 1.重庆大学机械传动国家重点实验室
    2.石河子大学机械电子工程学院
    3.富士康科技集团
  • 出版日期:2014-04-30 发布日期:2014-04-30
  • 基金资助:
    国家自然科学基金资助项目(71071173);富士康科技集团擢才创研计划资助项目(11F812100006) ;教育部人文社会科学研究西部和边疆地区资助项目(11XJC630014);重庆市科委自然科学基金资助项目(cstcjjA90014)。

Vulnerability of complicated supply chain network based on weighted improved nodes contraction method

  • Online:2014-04-30 Published:2014-04-30
  • Supported by:
    Project supported by the National Natural Science Foundation,China(No.71071173),the Foxconn Talent Screening and Creative Research Plan,China(No.11F812100006),the Humanities & Social Science Research Foundation for West and Border Areas,China(No.11XJC630014),and the Natural Science Foundation of CQ CSTC,China(No.cstcjjA90014).

摘要: 针对现代生产模式下供应链网络结构复杂且具有明显脆弱性等问题,提出一种针对供应链网络拓扑结构的脆弱性分析方案。明确了脆弱性和供应链脆弱性的概念及相关表达,设计了供应链脆弱性加权分析模型。分析了基于节点收缩法的凝聚度,通过对比网络收缩前后的凝聚度变化明确供应链网络中物理结构的重要节点;分析了网络节点间的相互影响关系,设计了改进后的加权网络节点收缩方法,通过对网络节点凝聚度的加权计算量化分析了网状供应链的脆弱性问题。通过案例分析验证了所提方法的有效性。

关键词: 供应链, 网络, 拓扑结构, 脆弱性

Abstract: Aiming at the problem of complexity and obvious vulnerability exist in the supply chain network structure under the modern production mode,a vulnerability analysis solution for supply chain network topology was proposed.The concept and related expression of supply chain vulnerability was cleared,and the supply chain vulnerability weighted analysis model was designed.With the condensation degree analysis based on nodes contraction method,physical structure important nodes in the supply chain network were determined through comparing condensation degree change between before and after the network contraction.The interaction relationship of network nodes was analyzed,the nodes contraction method of weighted network was improved and the problem of net supply chain vulnerability was quantitative analyzed through the network nodes condensation degree weighted.The feasibility and effectiveness of this method were verified by experimental analysis.

Key words: supply chains, network, topology structure, vulnerability

中图分类号: