A manufacturing systems network model for the evaluation of complex manufacturing systems

Author(s):  
Till Becker ◽  
Mirja Meyer ◽  
Katja Windt

Purpose – The topology of manufacturing systems is specified during the design phase and can afterwards only be adjusted at high expense. The purpose of this paper is to exploit the availability of large-scale data sets in manufacturing by applying measures from complex network theory and from classical performance evaluation to investigate the relation between structure and performance. Design/methodology/approach – The paper develops a manufacturing system network model that is composed of measures from complex network theory. The analysis is based on six company data sets containing up to half a million operation records. The paper uses the network model as a straightforward approach to assess the manufacturing systems and to evaluate the impact of topological measures on fundamental performance figures, e.g., work in process or lateness. Findings – The paper able to show that the manufacturing systems network model is a low-effort approach to quickly assess a manufacturing system. Additionally, the paper demonstrates that manufacturing networks display distinct, non-random network characteristics on a network-wide scale and that the relations between topological and performance key figures are non-linear. Research limitations/implications – The sample consists of six data sets from Germany-based manufacturing companies. As the model is universal, it can easily be applied to further data sets from any industry. Practical implications – The model can be utilized to quickly analyze large data sets without employing classical methods (e.g. simulation studies) which require time-intensive modeling and execution. Originality/value – This paper explores for the first time the application of network figures in manufacturing systems in relation to performance figures by using real data from manufacturing companies.

2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Jinli Zhao ◽  
Hongshan Zhou ◽  
Bo Chen ◽  
Peng Li

Reasonable and strong structure is an important foundation for the smart transmission grid. For vigorously promoting construction of the smart grid, it is of great significance to have a thorough understanding of the complex structural characteristics of the power grid. The structural characteristics of several actual large-scale power grids of China are studied in this paper based on the complex network theory. Firstly, the topology-based network model of power grid is recalled for analyzing the statistical characteristic parameters. The result demonstrated that although some statistical characteristic parameters could reflect the topological characteristics of power grid from different ways, they have certain limitation in representing the electrical characteristics of power grid. Subsequently, the network model based on the electrical distance is established considering the limitation of topology-based model, which reflects that current and voltage distribution in the power grid are subject to Ohm's Law and Kirchhoff's Law. Comparing with the topology-based model, the electrical distance-based model performs better in reflecting the natural electrical characteristic structure of power grid, especially intuitive and effective in analyzing clustering characteristics and agglomeration characteristics of power grid. These two models could complement each other.


2020 ◽  
Vol 2 (1) ◽  
pp. 35-52
Author(s):  
Huiru Zhang ◽  
Limin Jia ◽  
Li Wang ◽  
Yong Qin

Purpose Based on complex network theory, a method for critical elements identification of China Railway High-speed 2 (CRH2) train system is introduced in this paper. Design/methodology/approach First, two methods, reliability theory and complex theory, are introduced, and the advantages and disadvantages for their application in identifying critical elements of high-speed train system are summarized. Second, a multi-layer multi-granularity network model including virtual and actual nodes is proposed, and the corresponding fusion rules for the same nodes in different layers are given. Findings Finally, taking CRH2 train system as an example, the critical elements are identified by using complex network theory, which provides a reference for train operation and maintenance. Originality/value A method of identifying key elements of CRH2 train system based on integrated importance indices is introduced, which is a meaningful extension of the application of complex network theory to identify key components.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Xue-rui Li ◽  
Sui-huai Yu ◽  
Jian-jie Chu ◽  
Deng-kai Chen ◽  
Lin-jian Wu

Reasonable application of design knowledge can help improve the efficiency and quality of product design. Based on complex network theory, this study proposes a double push strategy of knowledge for product design. The proposal introduces the concept of attribute similarity and triangular fuzzy number and uses the theory and method of complex network to build the knowledge network model for product design that contains creative knowledge subnetwork and engineering knowledge subnetwork. This paper is to understand the structure and dynamics of the knowledge network model and to identify and predict knowledge nodes and knowledge groups strongly related to design intent in view of the scale-free network topology analysis theory. We develop a double push strategy of product design knowledge to implement the effective auxiliary function for product design process. Finally, a design case of antalgic pump is presented to demonstrate the practicability and validity of the strategy.


2019 ◽  
Vol 12 (4) ◽  
pp. 1079-1096 ◽  
Author(s):  
Aimin Wang

Purpose The purpose of this paper is to propose a framework for assessing the vulnerability of projects to crises. The study seeks to clarify the cascade effects of disruptions leading to project crises and to improve project robustness against crises from a systems perspective. Design/methodology/approach A framework for assessing project vulnerability to crises is developed using complex network theory. The framework includes network representation of project systems, analyzing project network topology, simulating the cascade of unexpected disruptions and assessing project vulnerability. Use of the framework is then illustrated by applying it to a case study of a construction project. Findings Project network topology plays a critical role in resisting crises. By increasing the resilience of the critical tasks and adjusting the structure of a project, the complexity and vulnerability of the project can be reduced, which in turn decreases the occurrence of crises. Research limitations/implications The proposed framework is used in a case study. Further studies of its application to projects in diverse industries would be beneficial to enhance the robustness of the results. Practical implications Project crises can threaten the survival of a project and endanger the organization’s security. The proposed framework helps prevent and mitigate project crises by protecting critical tasks and blocking the diffusion path from a systems perspective. Originality/value This paper presents a novel framework based on complex network theory to assess project vulnerability, which provides a systemic understanding of the cascade of disruptions that lead to project crises.


2018 ◽  
Vol 29 (5) ◽  
pp. 746-767 ◽  
Author(s):  
Jorge A. Vivares ◽  
William Sarache ◽  
Jorge E. Hurtado

PurposeAssessment of manufacturing systems provides a baseline for manufacturing strategy (MS) formulation. The purpose of this paper is to develop and propose a maturity assessment model for manufacturing systems (MAMMS). The MAMMS provides a maturity index, in order to establish manufacturing system performance on five possible levels: preinfantile, infantile, industry average, adult, and world class manufacturing.Design/methodology/approachThree main steps were taken: MAMMS design; maturity-level assessment in two companies; and MAMMS validation. Based on an action-research process, several research tools, such as surveys, expert panels, and immersion in two manufacturing companies, were used.FindingsBy integrating 79 variables into a maturity index, the maturity level for two manufacturing companies was obtained. Considering three main components (competitive priorities, manufacturing levers, and manufacturing’s strategic role), the analyzed companies showed a performance at the average industry level. According to participants, the MAMMS is a valuable tool to support decision making in MS.Practical implicationsEmpirical evidence supports the relevance of the proposed MAMMS and its practical usefulness. In particular, the maturity index identifies strengths and weaknesses in the manufacturing system, providing a baseline from which to deploy MS.Originality/valueThe literature review shows a lack of contributions regarding maturity models, particularly, the non-existence of maturity assessment models for manufacturing systems. The proposed MAMMS is a valuable tool to support decision making in MS. Also, this paper contributes to understanding the action-research paradigm, for further research in operations management.


2016 ◽  
Author(s):  
M. Zanin ◽  
D. Papo ◽  
P. A. Sousa ◽  
E. Menasalvas ◽  
A. Nicchi ◽  
...  

AbstractThe increasing power of computer technology does not dispense with the need to extract meaningful in-formation out of data sets of ever growing size, and indeed typically exacerbates the complexity of this task. To tackle this general problem, two methods have emerged, at chronologically different times, that are now commonly used in the scientific community: data mining and complex network theory. Not only do complex network analysis and data mining share the same general goal, that of extracting information from complex systems to ultimately create a new compact quantifiable representation, but they also often address similar problems too. In the face of that, a surprisingly low number of researchers turn out to resort to both methodologies. One may then be tempted to conclude that these two fields are either largely redundant or totally antithetic. The starting point of this review is that this state of affairs should be put down to contingent rather than conceptual differences, and that these two fields can in fact advantageously be used in a synergistic manner. An overview of both fields is first provided, some fundamental concepts of which are illustrated. A variety of contexts in which complex network theory and data mining have been used in a synergistic manner are then presented. Contexts in which the appropriate integration of complex network metrics can lead to improved classification rates with respect to classical data mining algorithms and, conversely, contexts in which data mining can be used to tackle important issues in complex network theory applications are illustrated. Finally, ways to achieve a tighter integration between complex networks and data mining, and open lines of research are discussed.


2010 ◽  
Vol 33 (2-3) ◽  
pp. 158-158 ◽  
Author(s):  
Brian D. Haig ◽  
Frances M. Vertue

AbstractCramer et al. make a good case for reconceptualizing comorbid psychopathologies in terms of complex network theory. We suggest the need for an extension of their network model to include reference to latent causes. We also draw attention to a neglected approach to theory appraisal that might usefully be incorporated into the methodology of network theory.


Kybernetes ◽  
2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Li Jin

Purpose The purpose of this paper is to analyze the network path and internal mechanism of risks’ cross-contagion between shadow banks and design strategies for preventing risk infection between shadow banks. Design/methodology/approach Using the complex network theory, analyze the mechanism of risks’ cross-contagion between shadow banks from the credit network, business relationship network (BRN) and social network (SN); the cross-contagion mechanism using the structural equation model on the basis of China’s shadow banks is tested; based on the three risk infection paths, the prevention and control strategies for risk infection using the mathematical models of epidemic diseases are designed. Findings There are three network risk contagion paths between shadow banks. One, the credit network, risks are infected crossly mainly through debt and equity relationships; two, the BRN, risks are infected crossly mainly through business network and macro policy transmission; three, investor SN, risks are infected crossly mainly through individual SN and fractal relationships. The following three strategies for preventing risk’s cross-contagion between shadow banks: one, the in advance preventing strategy is more effective than the ex post control strategy; two, increasing the risk management coefficient; three, reducing the number of risk-infected submarkets. Originality/value The research of this study, especially the strategies for preventing the risks’ cross-contagion, could provide theoretical and practical guidance for regulatory authorities in formulating risk supervision measures.


Sign in / Sign up

Export Citation Format

Share Document