2024
DOI: 10.31181/sems1120241a
|View full text |Cite
|
Sign up to set email alerts
|

Green Supplier Selection using MCDM: A Comprehensive Review of Recent Studies

Sushil Kumar Sahoo,
Shankha Shubhra Goswami

Abstract: This study provides an extensive analysis of current research on the crucial topic of choosing environmentally friendly suppliers by using multi-criteria decision-making (MCDM) methods. The assessment and choice of environmentally conscious suppliers have become essential in modern business operations due to the growing worries about the environment throughout the world and the necessity of sustainable supply chain management. This study provides an in-depth analysis of a wide range of MCDM techniques used in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 19 publications
(19 reference statements)
0
1
0
Order By: Relevance
“…Büyüközkan and Göçer [32] utilized the CODAS method under Pythagorean fuzzy in selection of the right 3D printing technology. Sahoo and Goswami [33] examined current studies by reviewing the literature on selecting environmentally friendly suppliers. Amiri et.…”
Section: Figurementioning
confidence: 99%
“…Büyüközkan and Göçer [32] utilized the CODAS method under Pythagorean fuzzy in selection of the right 3D printing technology. Sahoo and Goswami [33] examined current studies by reviewing the literature on selecting environmentally friendly suppliers. Amiri et.…”
Section: Figurementioning
confidence: 99%
“…• APTs: APTs represent highly sophisticated and targeted cyber-attacks orchestrated by well-resourced adversaries, including nation-state actors and organized cybercrime groups [12,13]. APTs are characterized by stealthy infiltration, prolonged reconnaissance, and persistent exploitation of vulnerabilities to exfiltrate sensitive data or sabotage critical infrastructure.…”
Section: Figure 1 Road Map Of This Study 2 Evolution Of Cyber Threatsmentioning
confidence: 99%
“…• Deep learning-based detection: Deep learning-based detection represents the cutting-edge of AI-powered threat detection, leveraging neural networks with multiple layers of interconnected nodes to analyze complex data and extract meaningful features [18,19]. Deep learning algorithms, such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs), excel at identifying subtle patterns and anomalies in large datasets, making them well-suited for detecting sophisticated cyber threats, including advanced malware, phishing attacks, and insider threats [13,14]. While deep learning-based detection requires substantial computational resources and labeled training data, it offers unparalleled accuracy and adaptability in detecting and mitigating cyber threats.…”
Section: Ai-powered Threat Detection Mechanismsmentioning
confidence: 99%
See 2 more Smart Citations