Supply Chain Risk Evaluation Based on D-S Evidence Theory

被引:0
|
作者
Pei, Xin-Tong [1 ]
Zhang, Zhen-Jiang [2 ]
Li, Chao [3 ]
Wang, Jia-Wei [4 ]
Mi, Kun [5 ]
机构
[1] School of Electronic and Information Engineering, Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing, China
[2] School of Software Engineering, Beijing Jiaotong University, Beijing, China
[3] School of Electronic and Information Engineering, Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing, China
[4] School of Electronic and Information Engineering, Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing, China
[5] Beijing Thunisoft Information Technology Corporation Limited, Beijing, China
关键词
Supply chain management - Risk assessment;
D O I
10.3966/199115992019123006026
中图分类号
学科分类号
摘要
Nowadays, the unexpected consequences of supply chain risk may cause enterprises to suffer huge losses. Reliability and effectiveness of supply chain are limited to the risks due to the fragility of the supply chain system. As such, supply chain risk evaluation is an emerging key subject in supply chain management. This paper proposes a supply chain risk evaluation model based on D-S evidence theory, which is called the D-S evidence discount fusion (D-SDF). By using Shafer discount rule and Dempster combination rule, this evaluation model is able to combine the evaluation results of multiple experts to assess the supply chain risks. In this paper, the feasibility and effectiveness of D-SDF is estimated by simulation. Compared with SAW, it can be concluded that D-SDF can evaluate supply chain risk more steadily and accurately.. © 2019 Computer Society of the Republic of China. All rights reserved.
引用
收藏
页码:311 / 322
相关论文
共 50 条
  • [1] Evaluation and reliability analysis of network security risk factors based on D-S evidence theory
    Yu, Jingjie
    Hu, Min
    Wang, Peng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (02) : 861 - 869
  • [2] A method of QoS trustworthiness evaluation based on D-S evidence theory
    Long, J. (jlong@csu.edu.cn), 1600, Harbin Institute of Technology (45):
  • [3] An Approach to Testability Evaluation Based on Improved D-S Evidence Theory
    Wang Xuan
    Di Peng
    Ni Zichun
    IMMS 2019: 2019 2ND INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND MANAGEMENT SCIENCES, 2018, : 155 - 159
  • [4] Research on the evaluation of enterprises knowledge chain performance based on D-S theory
    Yong, Ding
    Chang-Yong, Liang
    Cui-Qing, Jiang
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2007, : 482 - 486
  • [5] A Risk Evaluation Algorithm of C2C Translation Based on D-S Evidence Theory
    Chen Mingjing
    Yao Jianrong
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 11 - 17
  • [6] An approach of vessel collision risk assessment based on the D-S evidence theory
    Li, Bo
    Pang, Fu-Wen
    OCEAN ENGINEERING, 2013, 74 : 16 - 21
  • [7] Security Risk Assessment Model Based on AHP/D-S Evidence Theory
    Lu Simei
    Zhang Jianlin
    Sun Hao
    Luo Liming
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 530 - 534
  • [8] Condition Evaluation of Storage Equipment Based on Improved D-S Evidence Theory
    Zhang Xiao-yu
    He Hua-feng
    2016 THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND MECHANICAL ENGINEERING (ICMME 2016), 2017, 95
  • [9] D-S Evidence Theory based Digital Image Trustworthiness Evaluation model
    Hu, Donghui
    Wang, Lina
    Zhou, Yu
    Zhou, Yang
    Jiang, Xiaqiu
    Ma, Longfei
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 85 - +
  • [10] Reliability evaluation of weighted voting system based on D-S evidence theory
    Liu, Qiang
    Zhang, Hailin
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2022, 217