scholarly journals A multi-objective fuzzy mathematical approach for sustainable reverse supply chain configuration

Author(s):  
Jyoti D. Darbari ◽  
Vernika Agarwal ◽  
Venkata S.S. Yadavalli ◽  
Diego Galar ◽  
Prakash C. Jha

Background: Designing and implementation of reverse logistics (RL) network which meets the sustainability targets have been a matter of emerging concern for the electronics companies in India.Objectives: The present study developed a two-phase model for configuration of sustainable RL network design for an Indian manufacturing company to manage its end-of-life and endof-use electronic products. The notable feature of the model was the evaluation of facilities under financial, environmental and social considerations and integration of the facility selection decisions with the network design.Method: In the first phase, an integrated Analytical Hierarchical Process Complex Proportional Assessment methodology was used for the evaluation of the alternative locations in terms of their degree of utility, which in turn was based on the three dimensions of sustainability. In the second phase, the RL network was configured as a bi-objective programming problem, and fuzzy optimisation approach was utilised for obtaining a properly efficient solution to the problem.Results: The compromised solution attained by the proposed fuzzy model demonstrated that the cost differential for choosing recovery facilities with better environmental and social performance was not significant; therefore, Indian manufacturers must not compromise on the sustainability aspects for facility location decisions.Conclusion: The results reaffirmed that the bi-objective fuzzy decision-making model can serve as a decision tool for the Indian manufacturers in designing a sustainable RL network. The multi-objective optimisation model captured a reasonable trade-off between the fuzzy goals of minimising the cost of the RL network and maximising the sustainable performance of the facilities chosen.

Author(s):  
Yiguang Gong ◽  
Yunping Liu ◽  
Chuanyang Yin

AbstractEdge computing extends traditional cloud services to the edge of the network, closer to users, and is suitable for network services with low latency requirements. With the rise of edge computing, its security issues have also received increasing attention. In this paper, a novel two-phase cycle algorithm is proposed for effective cyber intrusion detection in edge computing based on a multi-objective genetic algorithm (MOGA) and modified back-propagation neural network (MBPNN), namely TPC-MOGA-MBPNN. In the first phase, the MOGA is employed to build a multi-objective optimization model that tries to find the Pareto optimal parameter set for MBPNN. The Pareto optimal parameter set is applied for simultaneous minimization of the average false positive rate (Avg FPR), mean squared error (MSE) and negative average true positive rate (Avg TPR) in the dataset. In the second phase, some MBPNNs are created based on the parameter set obtained by MOGA and are trained to search for a more optimal parameter set locally. The parameter set obtained in the second phase is used as the input of the first phase, and the training process is repeated until the termination criteria are reached. A benchmark dataset, KDD cup 1999, is used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover a pool of MBPNN-based solutions. Combining these MBPNN solutions can significantly improve detection performance, and a GA is used to find the optimal MBPNN combination. The results show that the proposed approach achieves an accuracy of 98.81% and a detection rate of 98.23% and outperform most systems of previous works found in the literature. In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting objectives.


2019 ◽  
Vol 11 (9) ◽  
pp. 2619 ◽  
Author(s):  
Wei He ◽  
Guozhu Jia ◽  
Hengshan Zong ◽  
Jili Kong

Service management in cloud manufacturing (CMfg), especially the service selection and scheduling (SSS) problem has aroused general attention due to its broad industrial application prospects. Due to the diversity of CMfg services, SSS usually need to take into account multiple objectives in terms of time, cost, quality, and environment. As one of the keys to solving multi-objective problems, the preference information of decision maker (DM) is less considered in current research. In this paper, linguistic preference is considered, and a novel two-phase model based on a desirable satisfying degree is proposed for solving the multi-objective SSS problem with linguistic preference. In the first phase, the maximum comprehensive satisfying degree is calculated. In the second phase, the satisfying solution is obtained by repeatedly solving the model and interaction with DM. Compared with the traditional model, the two-phase is more effective, which is verified in the calculation experiment. The proposed method could offer useful insights which help DM balance multiple objectives with linguistic preference and promote sustainable development of CMfg.


e-Polymers ◽  
2004 ◽  
Vol 4 (1) ◽  
Author(s):  
Ricardo Simões ◽  
António M. Cunha ◽  
Witold Brostow

Abstract Virtual polymeric materials were created and used in computer simulations to study their behavior under uniaxial loads. Both single-phase materials of amorphous chains and two-phase polymer liquid crystals (PLCs) have been simulated using the molecular dynamics method. This analysis enables a better understanding of the molecular deformation mechanisms in these materials. It was confirmed that chain uncoiling and chain slippage occur concurrently in the materials studied following predominantly a mechanism dependent on the spatial arrangement of the chains (such as their orientation). The presence of entanglements between chains constrains the mechanical response of the material. The presence of a rigid second phase dispersed in the flexible amorphous matrix influences the mechanical behavior and properties. The role of this phase in reinforcement is dependent on its concentration and spatial distribution. However, this is achieved with the cost of increased material brittleness, as crack formation and propagation is favored. Results of our simulations are visualized in five animations.


Author(s):  
Michael Stiglmayr ◽  
José Rui Figueira ◽  
Kathrin Klamroth ◽  
Luís Paquete ◽  
Britta Schulze

AbstractIn this article we introduce robustness measures in the context of multi-objective integer linear programming problems. The proposed measures are in line with the concept of decision robustness, which considers the uncertainty with respect to the implementation of a specific solution. An efficient solution is considered to be decision robust if many solutions in its neighborhood are efficient as well. This rather new area of research differs from robustness concepts dealing with imperfect knowledge of data parameters. Our approach implies a two-phase procedure, where in the first phase the set of all efficient solutions is computed, and in the second phase the neighborhood of each one of the solutions is determined. The indicators we propose are based on the knowledge of these neighborhoods. We discuss consistency properties for the indicators, present some numerical evaluations for specific problem classes and show potential fields of application.


Author(s):  
Ricardo C. Silva ◽  
Edilson F. Arruda ◽  
Fabrício O. Ourique

This work presents a novel framework to address the long term operation of a class of multi-objective programming problems. The proposed approach considers a stochastic operation and evaluates the long term average operating costs/profits. To illustrate the approach, a two-phase method is proposed which solves a prescribed number of K mono-objective problems to identify a set of K points in the Pareto-optimal region. In the second phase, one searches for a set of non-dominated probability distributions that define the probability that the system operates at each point selected in the first phase, at any given operation period. Each probability distribution generates a vector of average long-term objectives and one solves for the Pareto-optimal set with respect to the average objectives. The proposed approach can generate virtual operating points with average objectives that need not have a feasible solution with an equal vector of objectives. A few numerical examples are presented to illustrate the proposed method.


2014 ◽  
Vol 56 (1) ◽  
pp. 50-65 ◽  
Author(s):  
Khadijah Isa

Purpose – This paper aims to examine areas of tax difficulties encountered by corporate taxpayers in complying with tax obligations under the self-assessment system. Design/methodology/approach – A two-phase exploratory mixed methods approach was employed. The first phase involves eight focus group interviews with 60 tax auditors from the Inland Revenue Board of Malaysia (IRBM) and the second phase adopts a mixed-mode survey among selected Malaysian corporate taxpayers. Thematic analysis and descriptive and inferential analysis were used to examine the qualitative and quantitative data in achieving the objective. Findings – Three dimensions of tax complexity encountered by corporate taxpayers were tax computations, record keeping and tax ambiguity. The first two complexity dimensions were faced largely by smaller companies. On the other hand, the least difficult tax-related areas were dealing with tax agents, submitting tax returns within the given time and dealing with the tax authority. Practical implications – In a tax policy context, this study enables international tax authorities in general, and Malaysian tax authority in particular, to have greater confidence in developing and administering tax laws and policies to maintain and/or increase the overall level of corporate tax compliance. Originality/value – Unlike prior studies that mainly used individual taxpayers or students as research participants, this study employed corporate tax auditors from the tax authority and corporate tax officers. Tax auditors and corporate taxpayers provide invaluable insights into the possible determinants of compliance variables. These insights are based on their practical experience in handling corporate tax audits and managing corporate tax matters, respectively.


2009 ◽  
Vol 28 (1) ◽  
pp. 64-84
Author(s):  
Lieschen Venter ◽  
Stephan Visagie

In this paper the assignment of cross-trained and temporary workers to tasks on an assembly line is investigated. Cross-trained workers are skilled to perform more than one task on the assembly line in the production process. Temporary workers are viewed as either trained or untrained and may be hired or laid off as required. The solution procedure may be divided into three parts. During the first part a model is formulated to determine an optimal assignment of the workers to the production tasks. During the second part the model is extended to determine the effect of the assignment of both trained and untrained temporary workers to the tasks on the assembly line. During the final part of the model an optimal sequence of tasks in the assembly line is determined that minimises the resulting execution times of these tasks. During the first part the objective is to maximise the total production utility. This is achieved by implementing a two-phase model. The first phase maximises the utility of pro-duction by minimising labour shortage in the assembly line. During the second phase the improvement of the workers’ levels of skill is maximised while the effect of the learning and forgetting of skills is taken into consideration. A learn-forget-curve model (LFCM) is implemented to model the effect of this human characteristic on the master model. This approach ensures that the advantageous cross-trained nature of the workers is maintained and optimized, without a large deviation from the solution determined by the first phase. The objective of the second part is to minimise the labour cost of production by determin-ing the best type of workers for a certain task as well as the manner in which they should be hired or laid off. A worker is classified as either permanently or temporarily employed. Tem-porarily employed workers are further classified as either untrained or cross-trained workers. The assignment of workers to tasks on the assembly line is achieved by means of a Master Production Scheduling (MPS) model. The MPS has as its objective the minimisation of the total labour cost of performing all the tasks. The labour cost is defined as the sum of the temporary workers’ daily wages, the overtime cost of permanent workers, the overtime cost of temporary workers and the cost of employing and laying off temporary workers. Finally, during the third part an optimal sequence of tasks is determined in the production process in order to minimise the total production time. This is achieved by means of a two-phase dynamic assembly line balancing model, which is adjusted to incorporate the critical path method. During the first phase, an optimal task sequence is determined, while during the second phase, an optimal assignment of tasks to workstations and the timing thereof, is determined. The practical applicability of the model is demonstrated by means of a real life case study. The production of various styles of shoes in a leatherworks factory is considered. The production of each style requires a different set of tasks and each task requires a different level of skill. The factory under consideration employs both cross-trained and temporary workers and data sets were obtained empirically by observation, interviews and questionnaires. Upon execution of the first phase of the assignment model, an optimal utility is found and the second phase is able to maximise the increase of the workers’ skill level without deviation from this optimum. Upon execution of the employment model, it is found that labour costs are minimized by increasing the use of temporary workers and by assigning the maximum allowable number of overtime hours to them. Upon application of the scheduling model, an improved time is obtained compared to the standard execution time of each style. The results obtained from the case study indicate that the application of the model presented in this paper shows a substantial improvement in production, while reducing the cost of labour as well as improving the overall level of workers’ skills. A multi-objective model is thus developed which successfully maximises production utility, maximises skill development of workers, minimises labour costs and the occurrence of idle workers as well as minimises total execution time. 


Materials ◽  
2020 ◽  
Vol 13 (12) ◽  
pp. 2748
Author(s):  
Ryszard Piasecki ◽  
Wiesław Olchawa ◽  
Daniel Frączek ◽  
Agnieszka Bartecka

The main goal of our research is to develop an effective method with a wide range of applications for the statistical reconstruction of heterogeneous microstructures with compact inclusions of any shape, such as highly irregular grains. The devised approach uses multi-scale extended entropic descriptors (ED) that quantify the degree of spatial non-uniformity of configurations of finite-sized objects. This technique is an innovative development of previously elaborated entropy methods for statistical reconstruction. Here, we discuss the two-dimensional case, but this method can be generalized into three dimensions. At the first stage, the developed procedure creates a set of black synthetic clusters that serve as surrogate inclusions. The clusters have the same individual areas and interfaces as their target counterparts, but random shapes. Then, from a given number of easy-to-generate synthetic cluster configurations, we choose the one with the lowest value of the cost function defined by us using extended ED. At the second stage, we make a significant change in the standard technique of simulated annealing (SA). Instead of swapping pixels of different phases, we randomly move each of the selected synthetic clusters. To demonstrate the accuracy of the method, we reconstruct and analyze two-phase microstructures with irregular inclusions of silica in rubber matrix as well as stones in cement paste. The results show that the two-stage reconstruction (TSR) method provides convincing realizations for these complex microstructures. The advantages of TSR include the ease of obtaining synthetic microstructures, very low computational costs, and satisfactory mapping in the statistical context of inclusion shapes. Finally, its simplicity should greatly facilitate independent applications.


2020 ◽  
Author(s):  
Yiguang Gong ◽  
Yunping Liu ◽  
Chuanyang Yin

Abstract Edge computing extends traditional cloud services to the edge of the network, closer to users, and is suitable for network services with low latency requirements. With the rise of edge computing, its security issues have also received more and more attention. In this paper, a novel two-phase cycle algorithm is proposed for effective cyber intrusion detection in edge computing based on multi-objective genetic algorithm (MOGA) and modified back propagation neural network (MBPNN), namely TPC-MOGA-MBPNN. In the first phase, the MOGA is employed to build multi-objective optimization model that tries to find Pareto optimal parameter set for MBPNN. The Pareto optimal parameter set is applied for simultaneous minimization of average false positive rate (Avg FPR), mean squared error (MSE), and negative average true positive rate (Avg TPR) in the dataset. In the second phase some MBPNNs are created based on the parameter set obtained by MOGA and are trained to search for more optimal parameter set locally. The parameter set obtained in the second phase is used as the input of the first phase, and the training process is repeated until the termination criteria are reached. Benchmark dataset namely KDD cup 1999 is used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover a pool of MBPNN based solutions. Combining these MBPNN can significantly improve prediction performance, and a GA is used to find the optimal MBPNN combination. The result shows that the proposed approach could reach an accuracy of 98.81% and a detection rate of 98.23%, which outperform most systems of previous works found in the literature. In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting objectives.


Cloud computing has been widely studied over the recent years. Researchers have developed different algorithms for improving the performance and minimizing the cost. This paper proposes a new algorithm to improve and enhance the PBMM algorithm (Priority Based on Min-Min Algorithm). The proposed algorithm works with the aid of one of the Cloud of Things (CoT) services; this service is Sensing and Actuation as a Service (SAaaS). The proposed Algorithm works on third-party broker. However, it has two-phase: the first phase is Sensing: in this phase, the sensor observes the throughput for all tasks and compares it with the link capacity. The Second phase is Actuation: depending on the comparison in the first phase, the priority of all the takes will change depending on the link capacity, all tasks will have the same priority if the throughput is low (Green throughput). All tasks will have two priority levels (high, low) if the throughput medium (Yellow throughput), and finally, if the throughput is high (red throughput) all tasks will have a default priority which assigned to them when they are created. However, the efficiency and performance of the IPBMM algorithm depend on the capacity of the link. If capacity is high (traffic in the network is high), the performance is very good and the costly, but if the capacity is medium (traffic in the network is medium), the performance is good as well as the cost. While if the capacity is low (traffic in the network is low), the performance is good and the cost is free. Therefore, the outcomes of the proposed algorithm experiment given 30% better results than the PBMM algorithm and other state-of-the-art algorithms


Sign in / Sign up

Export Citation Format

Share Document