2008
DOI: 10.1504/ijram.2008.021377
|View full text |Cite
|
Sign up to set email alerts
|

A conceptual fuzzy-genetic algorithm framework for assessing the potential risks in supply chain management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Selim and Ozkarahan (2008) employ a simple feedback loop to modify coefficient values until an acceptable solution is reached. Tang, Lau, and Ho (2008) propose a two-phase knowledge framework for risk assessment, with experts formulating the initial input to genetic algorithms. Micheli, Mogre, and Perego (2014) propose a decision support system that involves the decision maker throughout the SCRM process, from the identification of risks and corresponding mitigation measures and budget to the definition of risk profiles in terms of likelihood and impact.…”
Section: Fuzzy Programmingmentioning
confidence: 99%
See 1 more Smart Citation
“…Selim and Ozkarahan (2008) employ a simple feedback loop to modify coefficient values until an acceptable solution is reached. Tang, Lau, and Ho (2008) propose a two-phase knowledge framework for risk assessment, with experts formulating the initial input to genetic algorithms. Micheli, Mogre, and Perego (2014) propose a decision support system that involves the decision maker throughout the SCRM process, from the identification of risks and corresponding mitigation measures and budget to the definition of risk profiles in terms of likelihood and impact.…”
Section: Fuzzy Programmingmentioning
confidence: 99%
“…Micheli, Mogre, and Perego (2014) propose a decision support system that involves the decision maker throughout the SCRM process, from the identification of risks and corresponding mitigation measures and budget to the definition of risk profiles in terms of likelihood and impact. It should also be noted that the work of Tang, Lau, and Ho (2008) is the only fuzzy programming study that focuses on risk assessment, rather than risk mitigation, as is the case for all others. Table B5 in Appendix 2 includes all reviewed studies that fall under the fuzzy programming category.…”
Section: Fuzzy Programmingmentioning
confidence: 99%
“…Tang et al applied a fuzzy genetic algorithm approach to evaluate logistics strategies to lower supply chain risks. 32 As mentioned in the cases section, Hewlett-Packard applies regression models as the basis of forecasting, and optimization models to select how much to purchase from each available source. 33 Bogataj and Bogataj used parametric linear programming based on net present value to estimate supply chain vulnerability.…”
Section: Models Appliedmentioning
confidence: 99%
“…They used a greedy heuristic, which constructs a schedule by sequentially selecting shifts, from a very large set of pre-generated legal potential shifts, to cover the remaining work. Tang et al 33 proposed using a fuzzygenetic algorithm (GA) intelligent framework embedded with performance measurement. A fuzzy-GA approach was developed to include fuzzy rule sets with the associated membership functions in one chromosome.…”
Section: Genetic Algorithmmentioning
confidence: 99%
“…For our example, 3-jobs × 2-machines, the following operations will take place in order in the rows and columns of the table. Operations: 11,12,13,21,22,23,31,32,33; in this series, the term 11 is the first work's first operation, 12 is the first work's second operation, and similarly 33 is the third work's third operation. Write the percent deviation values of each operation to the related row and column of the table considering the second operation series or chromosome.…”
Section: Examplementioning
confidence: 99%