Prioritization of Risks in Bicycle Supply Chain using Fuzzy Analytic Hierarchy Process

DOI : 10.17577/IJERTV8IS010008

Download Full-Text PDF Cite this Publication

Text Only Version

Prioritization of Risks in Bicycle Supply Chain using Fuzzy Analytic Hierarchy Process

Prioritization of Risks in Bicycle Supply Chain using Fuzzy Analytic Hierarchy Process

S Hariharan

Research Scholar, Department of Industrial Engineering,

CEG, Anna University, Chennai

M Rajmohan

Professor

Department of Industrial Engineering, CEG, Anna University, Chennai

Abstract Recent supply chain management optimization practices, while reducing costs and leaning inventory levels, have left companies with unprecedented levels of risk exposure and very little buffer inventory with which to recover. Many companies have recognized this and are now undertaking supply chain risk management programs. This work deals with the application of Multi Criteria Decision Making (MCDM) techniques such as Fuzzy Analytic Hierarchy Process (FAHP) for prioritization of eight supply chain risks with corresponding sub-risks identified through literature and the expert opinion for a bicycle manufacturing company.

Keywords Supply chain Management; Risk Management; FAHP; Prioritization

  1. INTRODUCTION

    A supply chain is a network of facilities and distribution options that performs the functions of procurement of materials, transformation of these materials into intermediate and finished products, and the distribution of these finished products to customers. While the term "Supply Chain Management" is widely used, there is not general agreement as to the definition and scope of the SCM concept. In fact, during the last several decades, the term itself has evolved from "Distribution" to "Logistics" to "Supply Chain Management." The objective of the supply chain is to support the flow of goods and materials from the original supplier through multiple production and logistics operations to the ultimate consumer. Risk means Exposure to the chance of injury or loss, Hazard or dangerous chance, Chance of loss, Degree of probability of such a loss. The objective of this work is to identify various risks in the bicycle supply chain and rank those using Multi Criteria Decision Making (MCDM) technique called Fuzzy Analytic Hierarchy Process (FAHP)

  2. LITERATURE REVIEW

    This section deals briefly the review of literature related to risks in supply chain and Multi criteria Decision Making (MCDM) techniques which support the decision-makers (DMs) in evaluating a set of alternatives. Depending upon the situations, criteria have varying importance and there is a need to weigh them.

    Wu et al (2005) performed research in reinforce inbound supply chain risk management by proposing an integrated methodology to classify, manage and assess inbound supply risks. The contributions of this work are four-fold: (1) inbound supply risk factors are identied through both an extensive

    academic literature review on supply risk literature review as well as a series of industry interviews; (2) from these factors, a hierarchical risk factor classication structure is created; (3) an analytical hierarchy processing (AHP) method with enhanced consistency to rank risk factor for suppliers is created; and (4) a prototype computer implementation system is developed and tested on an industry example.

    Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set of risks. Moeinzadeh et al (2010) reinforced SC risk management by proposing an integrated approach. SC risks are identified and a risk index classification structure is created. Then they developed a SC risk assessment approach based on the Analytic Network Process (ANP) and the VIKOR methods under the fuzzy environment where the vagueness and subjectivity are handled with linguistic terms parameterized by triangular fuzzy numbers. By using FANP, risks weights are calculated and then inserted to the FVIKOR to rank the SC members and find the most risky partner.

    Singhal et al (2011) provided the insights on the linkages of risks and their key drivers by devising a combined regression and neural network model by unifying their significant aspects. The major risk issues are identified at operational level in the form of supply disruptions, demand volatility and infrastructural obsolescence. For an uninterrupted functioning of the firm, identification of key risks and their potential drivers is an extremely important managerial task.

    Krisnawati et al., (2018) analyzed the pattern of five supply chain flow models and its 21 risks, in which 11 of them were mitigated. They also implemented ISO 31000:2009 to mitigate the risks. Jiang et al., (2017) use Matlab to simulate the transmission model in which relation between supply chain enterprises was determined. It also suggested that credit risk of core enterprise need to be paid attention. Tunc et al., (2017) revealed the key risk management strategies responsible for increased company sales. They also provided a comprehensive understanding of supply chain risk management using quantifying data mining approach. Kraude et al., (2018) explored the relationship between environmental and location or cultural factors in three countries by conducting a survey. In this process, they showed that Japan has a higher level of perceived SCR and lower application of risk mitigation strategies than two western culture countries, the USA and Australia. Kotula et al., (2018) found that risk

    management has not been adopted fully across industries and countries from a strategic sourcing perspective in Germany and the United Kingdom. They also present several significant insights for managing risks in strategic sourcing.

    Yiyi Fan and Mark Stevenson (2018) done a detailed review of 354 articles on supply chain risk management, in which they emphasized organizational responses to supply chain risks and made only limited use of theory. Baryannis et al., (2018) conducted an investigation on the various definitions and classifications of supply chain risk and related notions such as uncertainty and applied Artificial Intelligence (AI) techniques in SCRM. This study gives directions for future research at the confluence of SCRM and AI. Hariharan and Rajmohan (2015) applied MCDM techniques such as AHP, FAHP and TOPSIS in prioritizing the supply chain risks in a bicycle manufacturing company. From there study they found that supply risk has a major impact in the supply chain. Joshua Kiptum and Barack Okello (2018) examine the influence of purchasing risk management on supply chain performance of manufacturing firms in Nakuru County, Kenya. Supply assurance from the suppliers and improper supplier selection were the key terms to be addressed to ensure improvement in supply chain performance. Jeroen et al., (2018) focused on the relationship between a service provider and a customer that acted on behalf of other users in the defense sector. The service providers performance attributability appeared to have a strong impact on its willingness to take PBC-induced risks. The service providers willingness to accept PBC-induced risks was also affected by its ability to make accurate forecasts, the applied growth path and the length of the contract.

    Azadeh et al (2010) presented a robust decision-making methodology based on FAHP for evaluating and selecting the appropriate simulation software package. The robust decision method aggregates the experts judgments for the criteria weights and the suitability of simulation software alternatives. The FAHP is used to prioritize and evaluate existing alternatives based on the proposed criteria fr choosing the proper simulation software.

  3. METHODOLOGY

    This section explains the methodology followed in this work to identify the critical risks in the bicycle supply chain. In MCDM, a problem is affected by several conflicting factors in selection, for which a manager must analyze the tradeoff among the several criteria. The Fuzzy Analytic Hierarchy Process (FAHP) is a structured technique for dealing with complex decisions. AHP helps decision makers to find one that best suits their goal and their understanding of the problem.

    The fuzzy AHP technique can be viewed as an advanced analytical method developed from the traditional AHP. Despite the convenience of AHP in handling both quantitative and qualitative criteria of multi-criteria decision making problems based on decision makers judgments, fuzziness and vagueness existing in many decision-making problems may contribute to the imprecise judgments of decision makers in conventional AHP approaches. So, many researchers who have studied the fuzzy AHP which is the extension of Saatys theory, have provided evidence that fuzzy AHP shows

    relatively more sufficient description of these kind of decision making processes compared to the traditional AHP methods.

    Fig. 1. Schematic Diagram for Prioritizing the Supply Chain Risk

  4. CASE STUDY

    The developed model is applied to a bicycle manufacturing company located in southern part of India. A supply chain of particular brand is selected for implementation of the methodology shows in fig 1. In this case, eight risks in the supply chain are considered and prioritized with corresponding sub risks. This section provides the steps needed to calculate the priority value to rank the supply chain risk using FAHP for the case study considered. Eight risks namely Supplier, Storage, Process, Demand, Information, Transportation, Finance and Environment were identified as the relevant risks for this case through literature and expert opinion. The definition of each risk is given below.

    1. Supply Risk (SU) – All issues with the movement of materials into an organization, including sources, supplymarket conditions, constraints, limited availability, supplier reliability, lead times, material costs, delays, etc.,

    2. Storage Risk (ST) – Lack of care in maintaining quality, space lacking for storage.

    3. Process Risk (PR) – Risks from product features, product mix, range, volumes, materials used and standardization.

    Demand Risk (DE) – All aspects of customer demand, such as level of demand, variability, alternative products, competition and patterns of change.

    1. Information Risk (IN) – Includes the availability of data, data transfer, accuracy, reliability, security of systems.

    2. Transportation Risk (TR) – Movements of materials, including risks to the infrastructure, vehicles, facilities and loads.

    3. Finance Risk (FI) – all money transactions, including payments, prices, costs, sources of funds, profit and general financial performance.

    4. Environment Risk (EN) – Risks that are external to the supply chain.

    n m

    1 1 1 1

    M j

    , ,

    (6)

    gi n

    n n

    i1

    j1

    ui

    i1

    mi

    i1

    li

    i1

    Fig. 2. Hierarchy Structure for Prioritizing Supply Chain Risks

    Fig 2 shows the Hierarchical model of AHP where various risks in supply chain were categorized to the eight main risk factors.

    To apply the process depending on this hierarchy, according to the method of Changs (1992) extent analysis, each criterion is taken and extent analysis for each criterion, gi is performed on, respectively. Therefore, m extent analysis values for each criterion can be obtained by using following notation.

    Mgi1, Mgi2, Mgi3, Mgi4, .. Mgim ,where gi is the goal set (i = 1, 2, 3, 4, 5, ……..n) and all the jgM (j = 1, 2, 3, 4, 5,…….., m) are Triangular Fuzzy Numbers (TFNs). The steps of Changs analysis can be given as in the following:

    Step 1: Fuzzy synthetic extent value (Si)

    S1 = SUij / SUM

    =((1+1.5+0.65+1.5+0.65+1.5+1.5+1.5+3.5),

    (1+2+1+2+1+2+2+4),

    (1+2.5+1.5+2.5+1.5+2.5+2.5+4.5))

    / (54.33, 69.61, 93. 99)

    = (11.83, 14, 18.5)/ (54.33, 69.61, 93.99)

    = (0.13, 0.2, 0.34)

    Similarly for S2,.., S8. Table 2 shows the fuzzy synthetic extent value for the main criteria.

    Table 2 Fuzzy Synthetic extent value.

    l

    m

    u

    S1

    0.13

    0.2

    0.34

    S2

    0.05

    0.1

    0.18

    S3

    0.07

    0.13

    0.22

    S4

    0.08

    0.14

    0.24

    S5

    0.05

    0.1

    0.18

    S6

    0.07

    0.12

    0.2

    S7

    0.06

    0.11

    0.19

    S8

    0.06

    0.1

    0.19

    Step 2: The degree of possibility

    The degree of possibility of

    The fuzzy synthetic extent value (Si) with respect to the i th criterion is defined as equation (1).

    M 2 l2 , m2 , u2 M 1 l1 , m1 , u1

    equation (7)

    is defined as

    m

    M

    j

    Si gi

    n

    1

    j

    m

    M gi

    (1)

    V M 2

    M1

    M1

    supmin(

    y x

    M

    (x),

    2

    ( y))

    (7)

    j 1

    i1

    m j

    j 1

    and x and y are the values on the axis of membership function of each criterion. This expression can be equivalently

    To obtain Equation j 1 M gi

    (2)

    written as given in equation (8) below:

    Perform the fuzzy addition operation of m extent

    analysis values for a particular matrix given in equation (3) below, at the end step of calculation, new (l, m, u) set is

    1, if m

    m

    obtained and used for the next:

    V (M

    M )

    2 1

    , if l u

    m j m m m

    2 1 0 1 2

    M gi l j , mj , u j

    (3)

    l1 u2

    j 1

    j 1

    j 1

    j 1

    m2

    • u2

      m1

    • l1

    , otherwise

    Where l is the lower limit value, m is the most promising

    value and u is the upper limit value. Table 1 shows the pairwise matrix for main criteria. To obtain equation (4);

    (8)

    Where d is the highest intersection point µM1 and µM2.

    perform the fuzzy addition operation of

    M

    gi

    j (j = 1, 2, 3, 4,

    5, …….., m) values give as equation (5): and then compute the inverse of the vector in the equation (5) equation (6) is then obtained such that

    1

    n ,m

    gi

    M j

    (4)

    i`

    j 1

    n m j m n n

    M

    li , mi , ui

    (5)

    i1

    j 1

    gi i1

    i1

    i1

    Table 1 Pairwise Comparison matrix for FAHP

    Criteria

    SU

    ST

    PR

    DE

    IN

    TR

    FI

    EN

    SU

    1,1,1

    1.5,2,2.5

    0.67,1,1.5

    1.5,2,2.5

    0.67,1,1.5

    1.5,2,2.5

    1.5,2,2.5

    3.5,4,4.5

    ST

    0.4,0.5,0.67

    1,1,1

    0.67,1,1.5

    .29,.33,.43

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    PR

    0.67,1,1.5

    0.67,1,1.5

    1,1,1

    1,1,1

    1.5,2,2.5

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    DE

    0.33

    2.5,3,3.5

    1,1,1

    1,1,1

    0.67,1,1.5

    1,1,1

    0.67,1,1.5

    0.67,1,1.5

    IN

    0.67,1,1.5

    0.67,1,1.5

    0.25

    0.67,1,1.5

    1,1,1

    0.4,0.5,0.67

    0.67,1,1.5

    0.67,1,1.5

    TR

    0.4,0.5,0.67

    0.67,1,1.5

    0.67,1,1.5

    1,1,1

    1.5,2,2.5

    1,1,1

    1,1,1

    0.67,1,1.5

    FI

    0.4,0.5,0.67

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    1,1,1

    1,1,1

    0.67,1,1.5

    EN

    0.22,0.25,0.29

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    0.67,1,1.5

    1,1,1

    SUM= (54.33, 69.61, 93.99)

    To compare M1 and M2; we need both the values of V(M2M1) and V(M1M2);

    Check the condition by comparing 2 values S1 and S2, and for all combination using equation (7) and (8).

    V(S1S2) =1, V(S1S3) = 1, V(S1S4) = 1, V(S1S5) = 1, V(S1S6) = 1, V(S1S7) = 1, V(S1S8) = 1, V(S2S1)

    =0.33, V(S2S3) =0.77, V(S2S4) =0.71, V(S2S5) = 0.98,

    V(S2S6) =0.77, V(S2S7) =0.92, V(S2S8) =0.95,

    V(S3S1) =0.57, V(S3S2) =1, V(S3S4) =0.95, V(S3S5)

    =1, V(S3S6) =1, V(S3S7) =1, V(S3S8)=1, V(S4S1)

    =0.64 , V(S4S2) = 1, V(S4S3) = 1, V(S4S5) = 1, V(S4S6) = 1, V(S4S7) = 1, V(S4S8) = 1, V(S5S1)

    =0.35, V(S5S2) =1, V(S5S3) =0.79, V(S5S4) = 0.73,

    V(S5S6) =0.83, V(S5S7) =0.94, V(S5S8) =0.97,

    V(S6S1) = 0.47, V(S6S2) = 1, V(S6S3) = 0.95, V(S6S4) = 0.89, V(S6S5) = 1, V(S6S7) = 1, V(S6S8) = 1, V(S7S1) =0.4, V(S7S2) =1, V(S7S3) =0.84, V(S7S4)

    = 0.78, V(S7S5) =1, V(S7S6) =0.89, V(S7S8) =1,

    V(S8S1) =0.4, V(S8S2) =1, V(S8S3) =0.82, V(S8S4)

    =0.77, V(S8S5) =1, V(S8S6) =0.87, V(S8S7) =0.97.

    Step 3: The degree possibility for a convex fuzzy number The degree possibility for a convex fuzzy number to be

    greater than k convex fuzzy number Mi(i= 1,2,3,4, .,k) can be defined by

    V(MM1,M2,M3,..,Mk)=minV(MMi),i=1,2,3,,k.

    Assume that equation (9) is d(Ai) = min V(Si Sk) (9)

    For k=1,2,3,., n;ki. Then the weight vector is given by equation (10);

    W = (d(A1 ),d(A2 ),.., d(An ))T (10)

    Where Ai(i=1,2,3,..,n) are n elements.

    Calculate the minimum of (S1 with Si) using equation (9), Min V(S1>=Si) =1

    Similarly for S2,., S8. Min V(S2Si) =0.33

    Min V(S3Si) =0.57

    Min V(S4Si) =0.64Min V(S5Si) =0.35 Min V(S6Si) =0.47

    Min V(S7Si) =0.4

    Min V(S8Si) =0.4

    W = [1, 0.33, 0.57, 0.64, 0.35, 0.47, 0.4, 0.4]

    Step 4: Normalization

    Via normalization, the normalized weight vector are given in equation (11);

    W = (d(A1 ),d(A2 ),.., d(An ))T (11)

    Where W is non fuzzy nujmbers.

    W (Normalized) = [ 0.24,0.08,0.14,0.15,0.08,0.11,0.1,0.1 ]

    Weights of Main Criteria:

    MAIN CRITERIA LOCAL WEIGHT SUPPLIER 0.24

    PROCESS 0.14

    TRANSPORTATION 0.11

    DEMAND 0.15

    FINANCE 0.1

    ENVIRONMENT 0.1

    INFORMATION 0.11

    STORAGE 0.08

    Similarly by following the same procedure as main risk, weights of sub criteria also be calculated. By multiplying the local weights of each sub risks with corresponding main risks, the global weight of each risk will be obtained as shown below.

    Weights of Sub Criteria :

    SUB CRITERIA G.WEIGHT

    Monopoly 0.096

    Equipment reliability 0.0504

    Delivery reliability 0.0858

    Demand variability 0.39

    Process quality 0.0504

    Capacity flexibility 0.0392

    Exchange 0.003

    Out sourcing 0.0672

    Overhead cost 0.043

    Service flexibility 0.0242

    Legal 0.022

    Bullwhip effects 0.0552

    Natural disaster 0.02

    Insurance 0.035

    Storage conditions 0.0496

    Product lifecycle 0.048

    Visibility 0

    Maintenance 0.0008

    Political 0.02

    Social 0.02

    Supplier outage 0.0768

    Competitors 0.0165

    Vehicle capacity 0

    Unavailability of components 0

    IT infrastructure 0.0248

    Labor 0.018

    Capital investment 0.02

    Space 0.0296

    Supply risk is identified as the most primary risk followed by process risk and the storage risk is ranked as the least important risk among the eight risk considered in this study. As for as the sub risks, Demand variability is identified as the most primary risk followed by Monopoly risk also Vehicle capacity, Unavailability of components and Visibility risks are ranked as the least important risk

  5. CONCLUSION AND FUTURE WORK

In current dynamic environment risk management became an extremely important activity in supply chain management. In this work, MCDM techniques FAHP was adopted to rank the critical supply chain risk for an bicycle manufacturing company. Eight important supply chain risks were identified as significant risk for the case considered. Supplier risk found to be the most important one and storage risk given the last priority. In future, for the same case other MCDM techniques like TOPSIS, DEMATEL, Fuzzy TOPSIS can be applied to guide decision makers.

ACKNOWLEDGMENT

Author would like to thank Anna University, Chennai for providing facilities and funding through Anna Centenary Research Fellowship.

REFERENCES

[1] Azadeh.A, Shirkouhi.N.S and Rezaie.K, A robust decision-making methodology for evaluation and selection of simulation software package, International Journal on Advanced Manufacturing Technology 47,pp.381393,2010.

[2] Baryannis, G., Validi, S., Dani, S., & Antoniou, G, Supply Chain Risk Management and Artificial Intelligence: State of the Art and Future Research Directions, International Journal of Production Research, 2018

[3] S Hariharan, M Rajmohan. Prioritization Of Risks In Bicycle Supply Chain Using Multi Criteria Decision Making. International Conference on Inter Disciplinary Research in Engineering and Technology, 2015

[4] Jeroen van Strien, Cees Johannes Gelderman, Janjaap Semeijn, "Performance-based contracting in military supply chains and the willingness to bear risks", Journal of Defense Analytics and Logistics, 2018

[5] J. Jiang, C. Liu, H. Huang and H. Zhang, "Risk communication and simulation of supply chain," 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS), Harbin, 2017, pp. 1-5.

[6] Joshua Kiptum and Barack Okello, The Influence of Purchasing Risk Management on Supply Chain Performance of Manufacturing Firms in Nakuru County, Kenya, International Journal of Business Management and Processes, Vol 4. Issue No.2, PP 01-05, 2018

[7] M. Kotula, W. Ho, S. Talluri, P. Dey and X. Ma, "Managing Risk in Strategic Sourcing: A Cross-Sectional and Multi-National Case Study," in IEEE Engineering Management Review, vol. 46, no. 2, pp. 74-86, 1

Secondquarter,june 2018.

[8] R. Kraude, S. Narayanan, S. Talluri, P. Singh and T. Kajiwara, "Cultural Challenges in Mitigating International Supply Chain Disruptions," in IEEE Engineering Management Review, vol. 46, no. 1, pp. 98-105, 1 Firstquarter,march 2018.

[9] Krisnawati, K. R. Widodo and Jumeri, "Risk Mitigation for Fresh Raw- Milk in the Rural Supply Chain," 2018 4th International Conference on Science and Tchnology (ICST), Yogyakarta, 2018, pp. 1-4.

[10] Moeinzadeh, P., and Hajfathaliha, A., A Combined Fuzzy Decision Making Approach to Supply Chain Risk Assessment, International Journal of Human and Social Sciences, Vol. 5, No. 13, 2010, pp. 859-

875.

[11] Singhal.P, Agarwal.G and Mittal.M.L, Relationship of Supply Chain Risks and Drivers for SMEs: A Combined Approach with Regression Analysis and ANN, International Conference on Advances in Supply Chain and Manufacturing Management, Kharagpur, India, pp.16 18, 2011.

[12] Teresa Wu.T, Blackhurst.T and Chidambaram.V, A model for inbound supply risk analysis, journal of Computers in Industry 57 pp. 350365, 2006.

[13] M. M. Tunc, A. Valcov, A. N. Zhang, W. Yan and R. Wen, "Association analysis of supply chain risk and company sales," 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, 2017, pp. 3268-3277.

[14] Yiyi Fan, Mark Stevenson, "A review of supply chain risk management: definition, theory, and research agenda", International Journal of Physical Distribution & Logistics Management, Vol. 48 Issue: 3, pp.205-230, 2018

Leave a Reply