scholarly journals Managing uncertainty in potential supplier identification

Author(s):  
Yun Ye ◽  
Marija Jankovic ◽  
Gül E. Kremer ◽  
Jean-Claude Bocquet

AbstractAs a benefit of modularization of complex systems, original equipment manufacturers (OEMs) can choose suppliers in a less constricted way when faced with new or evolving requirements. However, new suppliers usually add uncertainties to the system development. Because suppliers are tightly integrated into the design process in modular design and therefore greatly influence the outcome of the OEM's products, the uncertainty along with requirements satisfaction of the suppliers and their modules should be controlled starting from potential supplier identification. In addition, to better satisfy new requirements, the potential supplier identification should be combined with architecture generation to enable the new technology integration. In this paper, we propose the Architecture & Supplier Identification Tool, which generates all possible architectures and corresponding suppliers based on new requirements through matrix mapping and propagation. Using the Architecture & Supplier Identification Tool, the overall uncertainty and requirements satisfaction of generated architectures can be estimated and controlled. The proposed method aims at providing decision support for early design of complex systems, thereby helping OEMs have an integrated view of suppliers and system architectures in requirements satisfaction and overall uncertainty.

Author(s):  
Yun Ye ◽  
Marija Jankovic ◽  
Gül E. Kremer

The Architecture & Supplier Identification Tool (ASIT) is a design support tool enabling generation of system architectures in early design with consideration of supplier identification and evaluation. Several types of uncertainties have been considered in ASIT in order to estimate the overall uncertainty of the architectures. However, the subjective uncertainty caused by expert estimation had not been taken into account. Due to new technology integration and lack of information in early design, expert estimation is commonly used, which is also the case in the ASIT. As a considerable source of uncertainty, the consideration of subjective uncertainty may significantly influence the ASIT results, thus impacting the reliability of ASIT. This paper aims at understanding the sensitivity of the ASIT when subjective uncertainties are taken into account. The type-1 fuzzy sets and the 2-tuple fuzzy linguistic representation are selected to represent subjective uncertainties. A powertrain case study has been used to compare the results and test the sensitivity of ASIT. The comparison shows that the subjective uncertainty does not considerably influence ASIT results, and the ASIT is robust.


2019 ◽  
Vol 5 (2) ◽  
pp. 25-39
Author(s):  
Luluk Suryani ◽  
Raditya Faisal Waliulu ◽  
Ery Murniyasih

Usaha Kecil Menengah (UKM) adalah salah satu penggerak perekonomian suatu daerah, termasuk Kota Sorong. UKM di Kota Sorong belum berkembang secara optimal. Ada beberapa penyebab diantaranya adalah mengenai finansial, lokasi, bahan baku dan lain-lain. Untuk menyelesaikan permasalah tersebut peneliti terdorong untuk melakukan pengembangan Aplikasi yang dapat membantu menentukan prioritas UKM yang sesuai dengan kondisi pelaku usaha. Pada penelitian ini akan digunakan metode Analitycal Hierarchy Process (AHP), untuk pengambilan keputusannya. Metode AHP dipilih karena mampu menyeleksi dan menentukan alternatif terbaik dari sejumlah alternatif yang tersedia. Dalam hal ini alternatif yang dimaksudkan yaitu UKM terbaik yang dapat dipilih oleh pelaku usaha sesuai dengan kriteria yang telah ditentukan. Penelitian dilakukan dengan mencari nilai bobot untuk setiap atribut, kemudian dilakukan proses perankingan yang akan menentukan alternatif yang optimal, yaitu UKM. Aplikasi Sistem Pendukung Keputusan yang dikembangkan berbasis Android, dimana pengguna akan mudah menggunakannya sewaktu-waktu jika terjadi perubahan bobot pada kriteria atau intensitas.  Hasil akhir menunjukkan bahwa metode AHP berhasil diterapkan pada Aplikasi Penentuan Prioritas Pengembangan UKM.


2021 ◽  
Vol 1 ◽  
pp. 2027-2036
Author(s):  
Aschot Kharatyan ◽  
Julian Tekaat ◽  
Sergej Japs ◽  
Harald Anacker ◽  
Roman Dumitrescu

AbstractAs digitization progresses, the integration of information and communication technologies in technical systems is constantly increasing. Fascinating value potentials are emerging (e.g. autonomous driving), but also challenges in the system development. The constantly increasing product complexity and degree of networking require a systemic development, which is fulfilled by established approaches of Model-Based Systems Engineering (MBSE). To ensure the reliability of tomorrow's systems, an integrative and early consideration of security and safety is additionally required. In order to show the possibility and consequences of failures and attacks, the paper develops a modeling language that links established and partly isolated security and safety approaches within a consistent metamodel. The developer is enabled to synthesize system architectures transparently on an interdisciplinary level and to analyze attack and failure propagation integratively. The approach uncovers synergetic and especially contrasting goals and effects of architectural designs in terms of safety and security in order to make adequate architectural decisions based on trade-off analyses.


Author(s):  
Jens Alfredson ◽  
Ulrika Ohlander

Research on decision support systems for fighter aircraft has to regard future manned and unmanned cooperating aircraft. This paper highlights system characteristics and contextual constraints to guide research as well as system development. Long term trends have been identified for the domain that has to be coped with, including the transformation of the fighter pilot from pilot to tactical decision maker. Automation strategies have to be developed to support manned and unmanned aircraft in a joint cognitive system. For instance, for intelligent fighter pilot support, for distributed unmanned and manned decision making, function allocation has to be concerned. For function allocation it is important not only to regard which agent is best at performing a task but also to regard the risk/cost of performing a task in this kind of potentially hazardous context.


2012 ◽  
pp. 553-564
Author(s):  
Wei-Shuo Lo ◽  
Tzung-Pei Hong

The fashion industry is experiencing rapid changes in many areas, including the supply chain. Typical quick response (QR) systems have been broadly used in the fashion industry to enable agile supply chain management (SCM). However, the original functions of QR systems cannot completely address the challenge of issuing early warnings to prevent customer loss. This article merges the typical MIS system development procedure with that of an e-SCM multiple-agent decision support system to confront this problem. The system has three levels: data mining, ontology, and decision support. These levels are interlinked in handling different databases. Different agents execute different tasks at each level to achieve integration and communication in a supply chain with less human intervention. The proposed framework emphasizes transparent connections among businesses and assists in information sharing, thereby preventing customer loss.


Author(s):  
Alaa Hussein Al-Hamami ◽  
Ghossoon M. Waleed Al-Saadoon

The techniques and tools available for the attackers and protectors are decisive and the main cause for deciding the leading and winning side. This chapter discusses the main concepts, developments, and future trends of security. There are three main reasons for security development and its innovation. The first reason is: Perfect security does not exist; this will lead the researcher to develop more and more methods to defend against new attacks and to support the existence security systems. The second reason is: New technology always brings new threats, which means new countermeasures against those threats is always a necessity. The third reason is: There is no single countermeasure that can be used to ensure security for our systems, and there are many new threats and attacks need to be defeated. For these reasons, security is very active subject and needs more financial support for research and system development, thoughts, technologies, tools, and skilled people to ensure and maintain security for our systems.


Sign in / Sign up

Export Citation Format

Share Document