International Journal of Fuzzy Logic and Intelligent Systems 2024; 24(4): 343-359
Published online December 25, 2024
https://doi.org/10.5391/IJFIS.2024.24.4.343
© The Korean Institute of Intelligent Systems
Torky Althaqafi
College of Business, University of Jeddah, Jeddah, Saudi Arabia
Correspondence to :
Torky Althaqafi (tmalthaqafi@uj.edu.sa)
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Supply chain management (SCM) requires risk analysis for the sustainable development of organizations such as retail, healthcare, information technology, and media. SCM has set ambitious goals and requirements for organizations to increase their share of productivity. However, considering the various criteria and factors involved in the process, selecting and deciding on the optimal SCM source can be challenging for organizations. In addressing this challenge, selection priority and risk analysis factors in SCM and alternatives are important. This challenge was resolved using the hesitant fuzzy-analytic hierarchy process (HF-AHP) and hesitant fuzzy-technique for order preference by similarity to ideal solution (HF-TOPSIS). The proposed approach considers numerous criteria, assigning weights using the HF-AHP method. Natural disasters are assigned the highest weight and geopolitical uncertainty the lowest weight. Within these groups, among subfactors, hurricane has the highest weight and economic conditions the lowest weight. HF-TOPSIS ranks the SCM alternatives, whereby systematic SCM has the highest priority and mitigation strategy the lowest priority. The proposed strategy can maintain the dynamics of choosing the ideal SCM, providing significant knowledge to policymakers and SCM partners.
Keywords: Supply chain, Risk analysis, Hesitant fuzzy, AHP, TOPSIS
Supply chain management (SCM) is a fundamental system that combines many aspects of creation and circulation to increase production intensity [1]. SCM has its roots in operation and logistics management. The main concerns during the early stages of SCM are planning procedures for transporting items from one location to another. The concept of SCM has evolved over the past few decades to include advanced technologies and globalization, moving away from an individual company focus toward integrated supply chains [2]. To ensure that items are manufactured and delivered effectively to meet client needs, all processes from procurement to delivery are coordinated, to reduce costs and enhance service delivery. SCM entails the effective integration of manufacturers, suppliers, and warehouses [3]. Sophisticated supply chains are defined by complex interdependencies among enterprises that demand cooperative partnerships to facilitate effective information exchange and decision-making [4]. The SCM process is relevant to a range of industries, including pharmaceuticals, where machine learning models optimize shipping processes [5], and retail, where flexibility is crucial for controlling product availability and customer expectations [6].
SCM offers many benefits but also has drawbacks, particularly with regard to readily adjusting to market changes. In this ever-changing world, supply chain partners must continuously innovate and be strategically aligned. The SCM losses stemming from risk are presented in Table 1.
Networks and corporations are also trying to withstand the effects of rare catastrophic events, whereby scientists, legislators, and businesses continue to grapple with the immediate and long-term effects of environmental changes in SCM [7]. The Amazon rainforest fires are an excellent example of such disasters. The source of these hellfires and complex web of interwoven sociopolitical aftermath that follows are of human origin [8, 9]. Artificial intelligence, process automation, supplier relationship management, supply chain development, and full-on-demand access to all the data facilitate, assess, and enhance individual supply chains [10, 11]. Procurement solutions may also be used to provide a closed environment that stops fraud and unlawful spending by one-time vendors who may not follow the law or the high standards of their firms [12]. The construction and application of business intelligence data are meaningless without analysis and application to planning, strategy or decision-making. Transparency in the supply chain is the first step. Data gathered from supplier performance, expenditure statistics, and process improvement activities may assist in strategically fine-tuning the supply chain [13, 14]. The less critical commodities are products, services, costs, vital items, capacity, and backup providers. Strategic redundancies are utilized when required to support contingencies for events such as trade disputes, political instability, and natural calamities.
SCM protocols promote optimal flexibility, responsiveness, enhanced connections with essential suppliers, optimal pricing, and conditions, as well as an optional inventory system of potential sellers capable of meeting demands during emergencies [15]. Noncompliant vendors are identified and removed from the supply chain before they jeopardize company earnings, production, or reputation [16, 17]. Data breaches, denial-of-service attacks, and industrial space can result in irreversible losses such as loss of trust, litigation, and competitive advantage, in addition to financial costs [3, 18]. Every supply chain network involves risks, from the smallest local market to the international supply networks of multinational companies. By recognizing the possible threats to one’s supply chain and creating supply chain risk management plans, the risks can be mitigated, and the success of a business can be ensured both locally and globally. The hesitant fuzzy-technique for order preference by similarity to ideal solution (HF-TOPSIS) approach is used to rate SCM solutions based on overall appropriateness. The proposed method is applied to select the SCM factors and alternatives from a dataset formed by expert opinion and synthetic data vault [19].
To summarize and incorporate previous research on SCM, an overview of the primary ideas, patterns, and gaps in the literature is provided below. Operations that turn raw materials into completed commodities and control the flow of goods and services are included in SCM. Every step of the production process is covered by SCM, from obtaining raw materials to shipping the finished product to the client. The three main goals of SCM are to ensure customer loyalty, reduce expenses, and advance expertise [20, 21]. Supply chain incorporation emphasizes the importance of the different parts of the supply chain functioning together. Considerable amount of research has been conducted on the impact of integration on performance, flexibility, and customer satisfaction.
Pan et al. [22] mentioned that a technique that promotes fresh advancement and restricts scope mining for networks can quickly degenerate into an environment-attacking plague with sufficient contemporary usage. The lack of natural resources is especially acute for pharmaceutical companies, as they rely on 80,000 different plant species to supply more than 25% of today’s pharmacological plant-based medicines [23]. Thus, a systematic SCM is required in the healthcare industry.
Carr [24] mentioned that production and transportation expenses may increase when regions known to have vital resources are destroyed because substitutes need to be found and investigated from locations that are more remote and difficult to reach. Businesses with few competitive advantages may discover that they have lost their advantages as labor and supplies become more expensive, thereby increasing expenses [25]. Chiu et al. [26] defined finance and used mean fluctuation strategy to control risk. Over the past few years, this crucial concept has been increasingly used to address the stochastic store network problem. A well-known technique for risk analysis in stochastic operational models of supply networks is the mean-variance theory. Park et al. [27] mentioned that SCM has been examined from several angles although the importance of the global supply chain has not been sufficiently examined as a tactic to overcome major interruptions to the supply network. The responses of contemporary Japanese initiatives to recent earthquakes, tsunamis, and atomic accidents were the primary focus of this study. Using case studies of Japanese manufacturing enterprises, the study investigated how supply networks are restored following significant natural disasters and humanitarian crises. It also examined the lessons that supply chains can teach us about disaster preparedness and recovery. Dispersion, mobility, and the fundamental qualities of supply chain information design have also been discussed [28].
Odulaja et al. [29] thoroughly examined how contemporary supply networks adjust and prosper in an unpredictable and volatile environment. This study defines supply chain resilience, investigates strategies for safeguarding supply chains from geopolitical shocks, and thoroughly examines the impact of these disruptions on supply chain dynamics. A multifaceted view of supply chain volatility is simpler with this method because it uses historical perspectives, presents patterns, and provides insights into the future [30]. MacDonald and Corsi [31] mentioned that disruptions tend to occur despite the management’s best efforts, usually resulting in lost sales and large financial losses, with a negative impact on shareholder value and operating performance. However, the management of a break from the site of identification to full recovery has received little attention. Notably, the entire process is not well-understood, making it important to acquire a deeper understanding of the elements that impact the recovery process, the ways in which these factors interact to influence management decision-making, and a company’s real capacity for recovery [32]. The results of this investigation illuminate the connections and interplay between different elements, providing support for a series of hypotheses that can serve as a foundation for further investigations in the following areas: the reason for the disruption, its origin, and effectiveness of the recovery procedure.
A summary of the major trends and a list of important facilitators and obstacles in supply management were provided by Storey et al. [33] who explained that supply management is still in its infancy, both theoretically and practically. This study raises several questions regarding how supply strategy and supply chain management are currently considered. This highlights the enormous gaps that exist between theory and reality. Certain developments may lead to improved prospects for SCM. Fuzzy sets have been extended to include intuitionistic and hesitant fuzzy sets [34], which are commonly used to address decision-making issues. Each of these additions provides a more detailed description of the membership values and parameter functions. A recently developed hesitant fuzzy-analytic hierarchy process (HF-AHP) approach was used for multi-criteria supplier selection. A company’s success may be greatly impacted by strategic moves such as mergers, acquisitions, and joint ventures [35]. Businesses that wish to prosper in fiercely competitive situations must make wise and prompt strategic decisions. Furthermore, the numerical assessment of these properties is usually difficult and inaccurate. The goal of this study is to develop a multi-role dynamic model that considers the complexity and ambiguity of important decisions. Based on the weights assigned to the components by the interval type-2 fuzzy AHP, HF-TOPSIS determines the optimal approach [4, 36, 37]. The next section explains the dependent factors and supply chain alternatives. The applied methodology is explained using a mathematical model.
Numerous variables influence the efficacy, robustness, and efficiency of SCM. These factors are linked and play a crucial role in how the overall supply chain is presented [12, 15] (Figure 1). An overview of crucial characteristics and possible decisions that enhance SCM is provided below.
Multi-criteria decision-making (MCDM) in SCM can be of help in several real-world issues, to arrive at the best judgment [22]. The AHP is a structured approach, suitable for MCDM activity [3]. The present study proposes a successful approach that employs AHP for decision requirement analysis and TOPSIS for function identification to address the problem of identifying the most advantageous aspects of SCM [4, 62]. To obtain more accurate results, this study used hesitant and hesitant fuzzy approaches [63]. TOPSIS is simple in computation, whereas MCDM provides more intricate methods [20, 64]. The following metrics were compiled to ascertain the value of the sub-techniques or approaches, as listed in Figure 2. The process is outlined below.
Step 1: Create a tree structure for the multi-level problem.
Step 2: Match the correlation lattices used to address semantic improvements [62].
Step 3: Convert the assessments using reluctant fuzzy wrapping [16] and
where
The primary and secondary weights must then be established for each property using
The second type of weights (
With the support of
Step 4: Using
Step 5: Defuzzification is performed using
The consistency ratio (CR) [20] is estimated using
Step 6: The geometric mean is calculated as follows [65]:
Step 7: The assumed weights are then evaluated using
Step 8: Furthermore, clear defuzzification of the HF figures is performed using
Step 9: The weights are then normalized as follows [27]:
Selecting the optimal solution using HF-TOPSIS is the next step. One popular MCDM technique [67] that experts use to select the optimal answer for practical issues is TOPSIS [68]. The answer closest to both the ideal negative and positive scenarios can be obtained using TOPSIS [69, 70]. In this study, properties defining the mechanism were ranked using the HF-TOPSIS approach [66]. This technique is based on measuring distances in the middle of
Step 10: The preliminary stages for this process are as follows:
Select the following concern by taking
The specialists are stated using
The scale for the HF-TOPSIS methodology is as follows:
Let Scale = {Nothing, Extremely Bad, Poor, Moderate, Excellent, Very Excellent, Perfect} be the language that generates its relative linguistic words without regard to context, and let the CH represent an expressed or linguistic term set. Similarly, the rankings of the two experts, e1 and e2 are calculated for the two characteristics, R1 and R2.
The hesitant fuzzy coating for the related comparable phonetic articulation is the next coating to appear [4].
Step 11: The following phase combines the specific calculations of practitioners (
Step 12: Let
Additionally,
Step 13: Using
Step 14: Using
Step 15: Possibilities are ordered according to their relative proximity ratings. The next phase uses HF-AHP-TOPSIS to analyze the data and produce outcomes.
In the process of evaluating the priority of the selected SCM risk models, some of the features were used to classify these models. In order of priority, the models at the top of hierarchies A1–A4 were ranked and run through specific AHP phases. To facilitate understanding, the hierarchy covered in the preceding section of the study illustrates the placement of certain technologies, together with the inherited sub-layered traits that correspond to them. Using a hierarchy based on the literature and adopting the described AHP approach, the effects of SCM risk analysis models were measured on expert data records, using the synthetic data vault (SDV) library [19, 71]. The pairwise comparison matrices are presented in Table 2.
Verbal ideas were converted into quantitative values by aggregating the triangular fuzzy numeric (TFN) values via
A random index of less than 0.1 was used for the pairwise comparison matrix representation. Tables 2
The acquired weights were then subjected to a sensitivity analysis. Fifteen elements were collected to assess the responsiveness of the tests. The level of satisfaction (CC-i) in each preliminary was determined by varying the merits of the issues while retaining those of various components via both the HF-AHP-TOPSIS method and reluctant fuzzy AHP-TOPSIS technique. The expected outcomes are presented in Table 6 and Figure 4. Alternative option one (C1) provided an exceptional level of satisfaction based on the real performance (CC-i).
Throughout this investigation, the researchers evaluated the validity of the findings and symmetricity in several ways. Fuzzy possibilistic C-meansHF-AHP-TOPSIS and normal AHP-TOPSIS are similar in terms of information collection and estimation approaches. Performing preliminary fuzzy AHP-TOPSIS fuzzification and defuzzification was allowed. The differences between the standard AHP-TOPSIS and HF results are shown in Figure 5. Although the conclusions of these studies differ, they are essentially the same. The Pearson connection method was used to investigate the relationships among the outcomes of the experimental analyses. The results are comparable, as shown by the 0.89176 Pearson correlation between the classical AHP and hesitant fuzzy AHP results. Table 7 presents all the data, which demonstrate a strong correlation between the hesitant fuzzy and classical AHP results. Studies using the same dataset but with other SCM criteria corroborate these results.
Our findings also demonstrated that from the perspective of influential factors, the identified variables and their relationships using an expert gamble analysis of SCM skills, were spectacular. Nadeem et al. [4] employed the entire AHP-TOPSIS approach for HF. This is because in contrast to the use of a tree structure, the AHP technique uses a hierarchical structure. Accordingly, the scientists’ decision to retain plan methods while participating in the foundational phase of the present evaluation had a positive impact on the results. System security cannot be assessed concurrently using the HF-AHP-TOPSIS approach in the context of design policy efforts.
These results illustrate the unique characteristics of SCM in the retail, healthcare, information technology, media, and information sectors. The HF-AHP and HF-TOPSIS methodologies were fully utilized in this study. This is because the HF-AHP approach differs from the previous methods in that it employs an AHP instead of a tree structure. SCM affected planning tactics as part of the momentum investigation underlying the stages, which had a significant effect on the results. Applying the SCM risk analysis approach concurrently across different economic sectors is not possible. The main goal of this study was to ascertain that the SCM risk strategy determines the supply chain, which has an effect on the different SCM techniques. This study aims to assist SCM experts, managers, and organizations in determining the SCM approach that makes the most sense for rational improvements in industries. To examine the effects of different SCM parameters, a multistandard navigation framework was combined with the hesitant HF-AHP and HF-TOPSIS approaches. The SCM procedures and elements are important for a company. Compared with the other SCM factors, A14 (hurricane)
The evaluation of SCM factors and alternatives through a hierarchical structure relates the impact of these factors with selected alternatives. It not only identifies the selection priority but also provides guidance to organizations. This study offers a thorough review of several SCM improvement strategies across various sectors. Despite its restricted application, this evaluation can be significant for businesses working in creative and goal-oriented developmental contexts. Workers in SCM frequently encounter a wide range of novel difficulties. Multi-standard navigation balancing innovations may be more reasonable for resolving multi-standard navigation concerns, even when combining the HF-AHP and HF-TOPSIS methodologies for assessing the influence of SCM innovation on diverse industries. The reaction and analysis study focused on outcomes that would serve as future references.
The basis for this priority evaluation analysis is to select the SCM approach for the different areas of an organization. The combined HF-AHP approach statistically evaluates and weighs several SCM-dependent elements, with hurricanes having the highest weight and economic situations having the lowest. The results of this study may be helpful to experts who choose the SCM approach. Specialists can use these results to enhance SCM priorities and provide recommendations. However, understanding the specific limitations of this study is important because they need to be considered in future evaluations. A disadvantage of SCM is its capacity to collect data. Although fully understanding and evaluating these massive volumes of data may be challenging due to their complexity, advancements depend on them. Despite these drawbacks, the conclusions of this study are still relevant and have the potential to improve SCM risk assessment. Future investigations can solve this issue by focusing on certain data subsets that are most pertinent to the study’s goals and using more efficient data-gathering techniques, or analytical procedures. By recognizing and overcoming these constraints, future research can expand existing findings and offer further insights into the evolution of the SCM framework. Improved criteria for this examination may be offered to experts to help them refocus on forward growth. The limitations of this assessment should be considered in future studies. The limitations of this study are as follows:
Understanding the amount of information that contributes to the outcome might be challenging. What would make a difference in the information held by professionals?
Many more controllable and useful SCM-dependent factors might have been required in the assessment.
The data studied in this article show how SCM factors impact a product’s SCM, considering the majority of SCM variables and alternatives. This study presents the most important aspects of previous SCM modeling results and offers insights into different SCM mitigation approaches and their future impact. In the future, awareness and analysis experiments should be conducted to increase the accuracy of the results.
There are no potential conflicts of interest to declare relevant to this article.
This work was funded by the University of Jeddah, Jeddah, Saudi Arabia (Grant No. UJ-23-DR-246).
The author is grateful to the University of Jeddah for technical and financial support.
There are no potential conflicts of interest to declare relevant to this article.
This work was funded by the University of Jeddah, Jeddah, Saudi Arabia (Grant No. UJ-23-DR-246).
Table 1. SCMlosses due to various associated risks around the world.
Year | Disruptions & delays | Inefficiencies | Theft & fraud | Compliance & regulation | Technological failures | Environmental costs | Total estimated losses |
---|---|---|---|---|---|---|---|
2014 | $200B | $150B | $30B | $25B | $10B | $5B | $420B |
2015 | $220B | $155B | $32B | $28B | $12B | $6B | $453B |
2016 | $250B | $160B | $35B | $30B | $15B | $7B | $497B |
2017 | $280B | $165B | $37B | $32B | $18B | $8B | $540B |
2018 | $300B | $170B | $40B | $35B | $20B | $9B | $574B |
2019 | $320B | $175B | $42B | $38B | $22B | $10B | $607B |
2020 | $1.5T (COVID-19 impact) | $180B | $45B | $40B | $25B | $12B | $1.802T |
2021 | $400B | $185B | $48B | $43B | $28B | $13B | $717B |
2022 | $420B | $190B | $50B | $45B | $30B | $14B | $749B |
2023 | $450B | $195B | $53B | $48B | $32B | $15B | $793B |
Table 2. Hesitant fuzzy pairwise comparison matrix (HPCM) at level 1.
A1 | A2 | A3 | A4 | Defuzzified local weights | |
---|---|---|---|---|---|
A1 | 1.0000, 1.0000, 1.0000, 1.0000 | 1.0000, 1.0000, 3.0000, 5.0000 | 0.3000, 1.0000, 1.1000, 3.0000 | 1.000, 1.200, 3.000, 5.000 | 0.050, 0.160, 0.280, 1.014 |
A2 | 0.200, 0.300, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.200, 0.330, 1.000, 1.000 | 0.330, 1.000, 1.000, 3.000 | 0.035, 0.166, 0.225, 0.625 |
A3 | 0.330, 1.000, 1.000, 3.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.330, 1.000, 1.000, 3.000 | 0.050, 0.200, 0.348, 1.263 |
A4 | 0.200, 0.330, 1.000, 1.000 | 0.330, 1.000, 1.000, 3.000 | 0.200, 0.300, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.050, 0.133, 0.280, 0.940 |
Table 3. At level 1, combined hesitant fuzzy possibilistic C-means (FPCM) criteria.
A11 | A12 | A13 | Defuzzified local weights | |||
A11 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.200, 0.330, 1.000, 1.000 | 0.033, 0.120, 0.212, 0.781 | |
A12 | 0.330, 1.000, 1.000, 3.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.064, 0.240, 0.426, 1.214 | |
A13 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.035, 0.097, 0.198, 0.514 | |
A14 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.032, 0.079, 0.122, 0.392 | |
A21 | A22 | A23 | Defuzzified local weights | |||
A21 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 3.0000, 5.0000 | 0.0540, 0.1330, 0.2810, 0.9480 | ||
A22 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 0.0330, 0.0860, 0.1810, 0.4980 | ||
A23 | 0.2000, 0.3300, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.0480, 0.1570, 0.2710, 1.0250 | ||
A31 | A32 | A33 | A34 | Defuzzified local weights | ||
A31 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.2000, 0.3300, 1.0000, 1.0000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.052, 0.159, 0.290, 1.030 | |
A32 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.200, 0.330, 1.000, 1.000 | 0.020, 0.073, 0.113, 0.500 | |
A33 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.064, 0.240, 0.426, 1.214 | |
A34 | 1.000, 1.000, 3.000, 5.000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.149, 0.276, 0.723, 1.509 | |
A41 | A42 | A43 | Defuzzified local weights | |||
A41 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.2000, 0.3300, 1.0000, 1.0000 | 0.330, 1.000, 1.000, 3.000 | 0.033, 0.129, 0.212, 0.782 | ||
A42 | 000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.064, 0.240, 0.426, 1.214 | ||
A43 | 0.200, 0.330, 1.000, 1.000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.053, 0.159, 0.298, 1.026 |
Table 4. Overall weights.
First level attributes | Local weights | Second level attributes | Local weights | Global weights | Ranks |
---|---|---|---|---|---|
A1 | 0.050, 0.160, 0.280, 1.014 | A11 | 0.033, 0.120, 0.212, 0.781 | 0.080, 0.040, 0.164, 1.353 | 10 |
A12 | 0.064, 0.240, 0.426, 1.214 | 0.004, 0.022, 0.105, 0.710 | 2 | ||
A13 | 0.035, 0.097, 0.198, 0.514 | 0.004, 0.022, 0.105, 0.711 | 7 | ||
A14 | 0.032, 0.079, 0.122, 0.392 | 0.006, 0.040, 0.157, 1.462 | 1 | ||
A2 | 0.035, 0.166, 0.225, 0.625 | A21 | 0.054, 0.133, 0.281, 0.948 | 0.006, 0.040, 0.157, 1.462 | 13 |
A22 | 0.033, 0.086, 0.181, 0.498 | 0.006, 0.030, 0.164, 1.353 | 14 | ||
A23 | 0.048, 0.157, 0.271, 1.025 | 0.004, 0.022, 0.105, 0.711 | 12 | ||
A3 | 0.050, 0.200, 0.348, 1.263 | A31 | 0.052, 0.159, 0.290, 1.030 | 0.006, 0.040, 0.157, 1.462 | 9 |
A32 | 0.020, 0.073, 0.113, 0.500 | 0.004, 0.033, 0.123, 1.114 | 6 | ||
A33 | 0.030, 0.078, 0.121, 0.391 | 0.008, 0.062, 0.248, 1.732 | 11 | ||
A34 | 0.149, 0.276, 0.723, 1.509 | 0.006, 0.030, 0.164, 1.353 | 3 | ||
A4 | 0.048, 0.157, 0.271, 1.030 | A41 | 0.033, 0.129, 0.212, 0.782 | 0.004, 0.033, 0.123, 1.114 | 8 |
A42 | 0.064, 0.240, 0.426, 1.214 | 0.008, 0.062, 0.248, 1.732 | 5 | ||
A43 | 0.053, 0.159, 0.298, 1.026 | 0.006, 0.041, 0.173, 1.462 | 4 |
Table 5. Closeness coefficients of numerous alternatives.
Alternatives | Gap degree | Satisfaction degree | ||
---|---|---|---|---|
Systematic SCM [C1] | 0.05 | 0.03 | 0.379 | 0.632 |
Risk identification model [C2] | 0.04 | 0.04 | 0.499 | 0.527 |
Predicted outcome model [C3] | 0.04 | 0.04 | 0.537 | 0.464 |
Develop response strategy [C4] | 0.04 | 0.03 | 0.433 | 0.571 |
Regularize decision making [C5] | 0.04 | 0.05 | 0.55 | 0.465 |
Mitigation strategy [C6] | 0.03 | 0.05 | 0.625 | 0.405 |
Table 6. Sensitivity examination.
C1 | C2 | C3 | C4 | C5 | C6 | |
---|---|---|---|---|---|---|
Original weights | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.405 |
A11 | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.406 |
A12 | 0.633 | 0.527 | 0.466 | 0.589 | 0.479 | 0.397 |
A13 | 0.633 | 0.527 | 0.464 | 0.571 | 0.466 | 0.406 |
A14 | 0.637 | 0.527 | 0.47 | 0.571 | 0.465 | 0.415 |
A21 | 0.632 | 0.525 | 0.464 | 0.577 | 0.466 | 0.415 |
A22 | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.424 |
A23 | 0.645 | 0.536 | 0.463 | 0.572 | 0.465 | 0.405 |
A31 | 0.632 | 0.527 | 0.464 | 0.572 | 0.465 | 0.406 |
A32 | 0.632 | 0.527 | 0.479 | 0.589 | 0.479 | 0.39 |
A33 | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.424 |
A34 | 0.632 | 0.527 | 0.464 | 0.572 | 0.465 | 0.406 |
A41 | 0.632 | 0.525 | 0.464 | 0.577 | 0.466 | 0.415 |
A42 | 0.633 | 0.527 | 0.464 | 0.571 | 0.466 | 0.406 |
A43 | 0.646 | 0.536 | 0.478 | 0.586 | 0.479 | 0.415 |
Table 7. Comparative analysis.
Approaches | C1 | C2 | C3 | C4 | C5 | C6 |
---|---|---|---|---|---|---|
HF-AHP-TOPSIS | 0.6320 | 0.5270 | 0.4640 | 0.5710 | 0.4650 | 0.4050 |
AHP-TOPSIS | 0.6370 | 0.5270 | 0.4500 | 0.5710 | 0.4650 | 0.3890 |
Fuzzy AHP-TOPSIS | 0.6120 | 0.5140 | 0.4510 | 0.5720 | 0.4650 | 0.3980 |
International Journal of Fuzzy Logic and Intelligent Systems 2024; 24(4): 343-359
Published online December 25, 2024 https://doi.org/10.5391/IJFIS.2024.24.4.343
Copyright © The Korean Institute of Intelligent Systems.
Torky Althaqafi
College of Business, University of Jeddah, Jeddah, Saudi Arabia
Correspondence to:Torky Althaqafi (tmalthaqafi@uj.edu.sa)
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Supply chain management (SCM) requires risk analysis for the sustainable development of organizations such as retail, healthcare, information technology, and media. SCM has set ambitious goals and requirements for organizations to increase their share of productivity. However, considering the various criteria and factors involved in the process, selecting and deciding on the optimal SCM source can be challenging for organizations. In addressing this challenge, selection priority and risk analysis factors in SCM and alternatives are important. This challenge was resolved using the hesitant fuzzy-analytic hierarchy process (HF-AHP) and hesitant fuzzy-technique for order preference by similarity to ideal solution (HF-TOPSIS). The proposed approach considers numerous criteria, assigning weights using the HF-AHP method. Natural disasters are assigned the highest weight and geopolitical uncertainty the lowest weight. Within these groups, among subfactors, hurricane has the highest weight and economic conditions the lowest weight. HF-TOPSIS ranks the SCM alternatives, whereby systematic SCM has the highest priority and mitigation strategy the lowest priority. The proposed strategy can maintain the dynamics of choosing the ideal SCM, providing significant knowledge to policymakers and SCM partners.
Keywords: Supply chain, Risk analysis, Hesitant fuzzy, AHP, TOPSIS
Supply chain management (SCM) is a fundamental system that combines many aspects of creation and circulation to increase production intensity [1]. SCM has its roots in operation and logistics management. The main concerns during the early stages of SCM are planning procedures for transporting items from one location to another. The concept of SCM has evolved over the past few decades to include advanced technologies and globalization, moving away from an individual company focus toward integrated supply chains [2]. To ensure that items are manufactured and delivered effectively to meet client needs, all processes from procurement to delivery are coordinated, to reduce costs and enhance service delivery. SCM entails the effective integration of manufacturers, suppliers, and warehouses [3]. Sophisticated supply chains are defined by complex interdependencies among enterprises that demand cooperative partnerships to facilitate effective information exchange and decision-making [4]. The SCM process is relevant to a range of industries, including pharmaceuticals, where machine learning models optimize shipping processes [5], and retail, where flexibility is crucial for controlling product availability and customer expectations [6].
SCM offers many benefits but also has drawbacks, particularly with regard to readily adjusting to market changes. In this ever-changing world, supply chain partners must continuously innovate and be strategically aligned. The SCM losses stemming from risk are presented in Table 1.
Networks and corporations are also trying to withstand the effects of rare catastrophic events, whereby scientists, legislators, and businesses continue to grapple with the immediate and long-term effects of environmental changes in SCM [7]. The Amazon rainforest fires are an excellent example of such disasters. The source of these hellfires and complex web of interwoven sociopolitical aftermath that follows are of human origin [8, 9]. Artificial intelligence, process automation, supplier relationship management, supply chain development, and full-on-demand access to all the data facilitate, assess, and enhance individual supply chains [10, 11]. Procurement solutions may also be used to provide a closed environment that stops fraud and unlawful spending by one-time vendors who may not follow the law or the high standards of their firms [12]. The construction and application of business intelligence data are meaningless without analysis and application to planning, strategy or decision-making. Transparency in the supply chain is the first step. Data gathered from supplier performance, expenditure statistics, and process improvement activities may assist in strategically fine-tuning the supply chain [13, 14]. The less critical commodities are products, services, costs, vital items, capacity, and backup providers. Strategic redundancies are utilized when required to support contingencies for events such as trade disputes, political instability, and natural calamities.
SCM protocols promote optimal flexibility, responsiveness, enhanced connections with essential suppliers, optimal pricing, and conditions, as well as an optional inventory system of potential sellers capable of meeting demands during emergencies [15]. Noncompliant vendors are identified and removed from the supply chain before they jeopardize company earnings, production, or reputation [16, 17]. Data breaches, denial-of-service attacks, and industrial space can result in irreversible losses such as loss of trust, litigation, and competitive advantage, in addition to financial costs [3, 18]. Every supply chain network involves risks, from the smallest local market to the international supply networks of multinational companies. By recognizing the possible threats to one’s supply chain and creating supply chain risk management plans, the risks can be mitigated, and the success of a business can be ensured both locally and globally. The hesitant fuzzy-technique for order preference by similarity to ideal solution (HF-TOPSIS) approach is used to rate SCM solutions based on overall appropriateness. The proposed method is applied to select the SCM factors and alternatives from a dataset formed by expert opinion and synthetic data vault [19].
To summarize and incorporate previous research on SCM, an overview of the primary ideas, patterns, and gaps in the literature is provided below. Operations that turn raw materials into completed commodities and control the flow of goods and services are included in SCM. Every step of the production process is covered by SCM, from obtaining raw materials to shipping the finished product to the client. The three main goals of SCM are to ensure customer loyalty, reduce expenses, and advance expertise [20, 21]. Supply chain incorporation emphasizes the importance of the different parts of the supply chain functioning together. Considerable amount of research has been conducted on the impact of integration on performance, flexibility, and customer satisfaction.
Pan et al. [22] mentioned that a technique that promotes fresh advancement and restricts scope mining for networks can quickly degenerate into an environment-attacking plague with sufficient contemporary usage. The lack of natural resources is especially acute for pharmaceutical companies, as they rely on 80,000 different plant species to supply more than 25% of today’s pharmacological plant-based medicines [23]. Thus, a systematic SCM is required in the healthcare industry.
Carr [24] mentioned that production and transportation expenses may increase when regions known to have vital resources are destroyed because substitutes need to be found and investigated from locations that are more remote and difficult to reach. Businesses with few competitive advantages may discover that they have lost their advantages as labor and supplies become more expensive, thereby increasing expenses [25]. Chiu et al. [26] defined finance and used mean fluctuation strategy to control risk. Over the past few years, this crucial concept has been increasingly used to address the stochastic store network problem. A well-known technique for risk analysis in stochastic operational models of supply networks is the mean-variance theory. Park et al. [27] mentioned that SCM has been examined from several angles although the importance of the global supply chain has not been sufficiently examined as a tactic to overcome major interruptions to the supply network. The responses of contemporary Japanese initiatives to recent earthquakes, tsunamis, and atomic accidents were the primary focus of this study. Using case studies of Japanese manufacturing enterprises, the study investigated how supply networks are restored following significant natural disasters and humanitarian crises. It also examined the lessons that supply chains can teach us about disaster preparedness and recovery. Dispersion, mobility, and the fundamental qualities of supply chain information design have also been discussed [28].
Odulaja et al. [29] thoroughly examined how contemporary supply networks adjust and prosper in an unpredictable and volatile environment. This study defines supply chain resilience, investigates strategies for safeguarding supply chains from geopolitical shocks, and thoroughly examines the impact of these disruptions on supply chain dynamics. A multifaceted view of supply chain volatility is simpler with this method because it uses historical perspectives, presents patterns, and provides insights into the future [30]. MacDonald and Corsi [31] mentioned that disruptions tend to occur despite the management’s best efforts, usually resulting in lost sales and large financial losses, with a negative impact on shareholder value and operating performance. However, the management of a break from the site of identification to full recovery has received little attention. Notably, the entire process is not well-understood, making it important to acquire a deeper understanding of the elements that impact the recovery process, the ways in which these factors interact to influence management decision-making, and a company’s real capacity for recovery [32]. The results of this investigation illuminate the connections and interplay between different elements, providing support for a series of hypotheses that can serve as a foundation for further investigations in the following areas: the reason for the disruption, its origin, and effectiveness of the recovery procedure.
A summary of the major trends and a list of important facilitators and obstacles in supply management were provided by Storey et al. [33] who explained that supply management is still in its infancy, both theoretically and practically. This study raises several questions regarding how supply strategy and supply chain management are currently considered. This highlights the enormous gaps that exist between theory and reality. Certain developments may lead to improved prospects for SCM. Fuzzy sets have been extended to include intuitionistic and hesitant fuzzy sets [34], which are commonly used to address decision-making issues. Each of these additions provides a more detailed description of the membership values and parameter functions. A recently developed hesitant fuzzy-analytic hierarchy process (HF-AHP) approach was used for multi-criteria supplier selection. A company’s success may be greatly impacted by strategic moves such as mergers, acquisitions, and joint ventures [35]. Businesses that wish to prosper in fiercely competitive situations must make wise and prompt strategic decisions. Furthermore, the numerical assessment of these properties is usually difficult and inaccurate. The goal of this study is to develop a multi-role dynamic model that considers the complexity and ambiguity of important decisions. Based on the weights assigned to the components by the interval type-2 fuzzy AHP, HF-TOPSIS determines the optimal approach [4, 36, 37]. The next section explains the dependent factors and supply chain alternatives. The applied methodology is explained using a mathematical model.
Numerous variables influence the efficacy, robustness, and efficiency of SCM. These factors are linked and play a crucial role in how the overall supply chain is presented [12, 15] (Figure 1). An overview of crucial characteristics and possible decisions that enhance SCM is provided below.
Multi-criteria decision-making (MCDM) in SCM can be of help in several real-world issues, to arrive at the best judgment [22]. The AHP is a structured approach, suitable for MCDM activity [3]. The present study proposes a successful approach that employs AHP for decision requirement analysis and TOPSIS for function identification to address the problem of identifying the most advantageous aspects of SCM [4, 62]. To obtain more accurate results, this study used hesitant and hesitant fuzzy approaches [63]. TOPSIS is simple in computation, whereas MCDM provides more intricate methods [20, 64]. The following metrics were compiled to ascertain the value of the sub-techniques or approaches, as listed in Figure 2. The process is outlined below.
Step 1: Create a tree structure for the multi-level problem.
Step 2: Match the correlation lattices used to address semantic improvements [62].
Step 3: Convert the assessments using reluctant fuzzy wrapping [16] and
where
The primary and secondary weights must then be established for each property using
The second type of weights (
With the support of
Step 4: Using
Step 5: Defuzzification is performed using
The consistency ratio (CR) [20] is estimated using
Step 6: The geometric mean is calculated as follows [65]:
Step 7: The assumed weights are then evaluated using
Step 8: Furthermore, clear defuzzification of the HF figures is performed using
Step 9: The weights are then normalized as follows [27]:
Selecting the optimal solution using HF-TOPSIS is the next step. One popular MCDM technique [67] that experts use to select the optimal answer for practical issues is TOPSIS [68]. The answer closest to both the ideal negative and positive scenarios can be obtained using TOPSIS [69, 70]. In this study, properties defining the mechanism were ranked using the HF-TOPSIS approach [66]. This technique is based on measuring distances in the middle of
Step 10: The preliminary stages for this process are as follows:
Select the following concern by taking
The specialists are stated using
The scale for the HF-TOPSIS methodology is as follows:
Let Scale = {Nothing, Extremely Bad, Poor, Moderate, Excellent, Very Excellent, Perfect} be the language that generates its relative linguistic words without regard to context, and let the CH represent an expressed or linguistic term set. Similarly, the rankings of the two experts, e1 and e2 are calculated for the two characteristics, R1 and R2.
The hesitant fuzzy coating for the related comparable phonetic articulation is the next coating to appear [4].
Step 11: The following phase combines the specific calculations of practitioners (
Step 12: Let
Additionally,
Step 13: Using
Step 14: Using
Step 15: Possibilities are ordered according to their relative proximity ratings. The next phase uses HF-AHP-TOPSIS to analyze the data and produce outcomes.
In the process of evaluating the priority of the selected SCM risk models, some of the features were used to classify these models. In order of priority, the models at the top of hierarchies A1–A4 were ranked and run through specific AHP phases. To facilitate understanding, the hierarchy covered in the preceding section of the study illustrates the placement of certain technologies, together with the inherited sub-layered traits that correspond to them. Using a hierarchy based on the literature and adopting the described AHP approach, the effects of SCM risk analysis models were measured on expert data records, using the synthetic data vault (SDV) library [19, 71]. The pairwise comparison matrices are presented in Table 2.
Verbal ideas were converted into quantitative values by aggregating the triangular fuzzy numeric (TFN) values via
A random index of less than 0.1 was used for the pairwise comparison matrix representation. Tables 2
The acquired weights were then subjected to a sensitivity analysis. Fifteen elements were collected to assess the responsiveness of the tests. The level of satisfaction (CC-i) in each preliminary was determined by varying the merits of the issues while retaining those of various components via both the HF-AHP-TOPSIS method and reluctant fuzzy AHP-TOPSIS technique. The expected outcomes are presented in Table 6 and Figure 4. Alternative option one (C1) provided an exceptional level of satisfaction based on the real performance (CC-i).
Throughout this investigation, the researchers evaluated the validity of the findings and symmetricity in several ways. Fuzzy possibilistic C-meansHF-AHP-TOPSIS and normal AHP-TOPSIS are similar in terms of information collection and estimation approaches. Performing preliminary fuzzy AHP-TOPSIS fuzzification and defuzzification was allowed. The differences between the standard AHP-TOPSIS and HF results are shown in Figure 5. Although the conclusions of these studies differ, they are essentially the same. The Pearson connection method was used to investigate the relationships among the outcomes of the experimental analyses. The results are comparable, as shown by the 0.89176 Pearson correlation between the classical AHP and hesitant fuzzy AHP results. Table 7 presents all the data, which demonstrate a strong correlation between the hesitant fuzzy and classical AHP results. Studies using the same dataset but with other SCM criteria corroborate these results.
Our findings also demonstrated that from the perspective of influential factors, the identified variables and their relationships using an expert gamble analysis of SCM skills, were spectacular. Nadeem et al. [4] employed the entire AHP-TOPSIS approach for HF. This is because in contrast to the use of a tree structure, the AHP technique uses a hierarchical structure. Accordingly, the scientists’ decision to retain plan methods while participating in the foundational phase of the present evaluation had a positive impact on the results. System security cannot be assessed concurrently using the HF-AHP-TOPSIS approach in the context of design policy efforts.
These results illustrate the unique characteristics of SCM in the retail, healthcare, information technology, media, and information sectors. The HF-AHP and HF-TOPSIS methodologies were fully utilized in this study. This is because the HF-AHP approach differs from the previous methods in that it employs an AHP instead of a tree structure. SCM affected planning tactics as part of the momentum investigation underlying the stages, which had a significant effect on the results. Applying the SCM risk analysis approach concurrently across different economic sectors is not possible. The main goal of this study was to ascertain that the SCM risk strategy determines the supply chain, which has an effect on the different SCM techniques. This study aims to assist SCM experts, managers, and organizations in determining the SCM approach that makes the most sense for rational improvements in industries. To examine the effects of different SCM parameters, a multistandard navigation framework was combined with the hesitant HF-AHP and HF-TOPSIS approaches. The SCM procedures and elements are important for a company. Compared with the other SCM factors, A14 (hurricane)
The evaluation of SCM factors and alternatives through a hierarchical structure relates the impact of these factors with selected alternatives. It not only identifies the selection priority but also provides guidance to organizations. This study offers a thorough review of several SCM improvement strategies across various sectors. Despite its restricted application, this evaluation can be significant for businesses working in creative and goal-oriented developmental contexts. Workers in SCM frequently encounter a wide range of novel difficulties. Multi-standard navigation balancing innovations may be more reasonable for resolving multi-standard navigation concerns, even when combining the HF-AHP and HF-TOPSIS methodologies for assessing the influence of SCM innovation on diverse industries. The reaction and analysis study focused on outcomes that would serve as future references.
The basis for this priority evaluation analysis is to select the SCM approach for the different areas of an organization. The combined HF-AHP approach statistically evaluates and weighs several SCM-dependent elements, with hurricanes having the highest weight and economic situations having the lowest. The results of this study may be helpful to experts who choose the SCM approach. Specialists can use these results to enhance SCM priorities and provide recommendations. However, understanding the specific limitations of this study is important because they need to be considered in future evaluations. A disadvantage of SCM is its capacity to collect data. Although fully understanding and evaluating these massive volumes of data may be challenging due to their complexity, advancements depend on them. Despite these drawbacks, the conclusions of this study are still relevant and have the potential to improve SCM risk assessment. Future investigations can solve this issue by focusing on certain data subsets that are most pertinent to the study’s goals and using more efficient data-gathering techniques, or analytical procedures. By recognizing and overcoming these constraints, future research can expand existing findings and offer further insights into the evolution of the SCM framework. Improved criteria for this examination may be offered to experts to help them refocus on forward growth. The limitations of this assessment should be considered in future studies. The limitations of this study are as follows:
Understanding the amount of information that contributes to the outcome might be challenging. What would make a difference in the information held by professionals?
Many more controllable and useful SCM-dependent factors might have been required in the assessment.
The data studied in this article show how SCM factors impact a product’s SCM, considering the majority of SCM variables and alternatives. This study presents the most important aspects of previous SCM modeling results and offers insights into different SCM mitigation approaches and their future impact. In the future, awareness and analysis experiments should be conducted to increase the accuracy of the results.
There are no potential conflicts of interest to declare relevant to this article.
This work was funded by the University of Jeddah, Jeddah, Saudi Arabia (Grant No. UJ-23-DR-246).
The author is grateful to the University of Jeddah for technical and financial support.
Hierarchy diagram of the SCM.
Process diagram of HF-AHP and HF-TOPSIS.
Schematic illustration of the level of satisfaction.
Schematic illustration of the sensitivity examination.
Schematic illustration of different outcomes.
Table 1 . SCMlosses due to various associated risks around the world.
Year | Disruptions & delays | Inefficiencies | Theft & fraud | Compliance & regulation | Technological failures | Environmental costs | Total estimated losses |
---|---|---|---|---|---|---|---|
2014 | $200B | $150B | $30B | $25B | $10B | $5B | $420B |
2015 | $220B | $155B | $32B | $28B | $12B | $6B | $453B |
2016 | $250B | $160B | $35B | $30B | $15B | $7B | $497B |
2017 | $280B | $165B | $37B | $32B | $18B | $8B | $540B |
2018 | $300B | $170B | $40B | $35B | $20B | $9B | $574B |
2019 | $320B | $175B | $42B | $38B | $22B | $10B | $607B |
2020 | $1.5T (COVID-19 impact) | $180B | $45B | $40B | $25B | $12B | $1.802T |
2021 | $400B | $185B | $48B | $43B | $28B | $13B | $717B |
2022 | $420B | $190B | $50B | $45B | $30B | $14B | $749B |
2023 | $450B | $195B | $53B | $48B | $32B | $15B | $793B |
Table 2 . Hesitant fuzzy pairwise comparison matrix (HPCM) at level 1.
A1 | A2 | A3 | A4 | Defuzzified local weights | |
---|---|---|---|---|---|
A1 | 1.0000, 1.0000, 1.0000, 1.0000 | 1.0000, 1.0000, 3.0000, 5.0000 | 0.3000, 1.0000, 1.1000, 3.0000 | 1.000, 1.200, 3.000, 5.000 | 0.050, 0.160, 0.280, 1.014 |
A2 | 0.200, 0.300, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.200, 0.330, 1.000, 1.000 | 0.330, 1.000, 1.000, 3.000 | 0.035, 0.166, 0.225, 0.625 |
A3 | 0.330, 1.000, 1.000, 3.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.330, 1.000, 1.000, 3.000 | 0.050, 0.200, 0.348, 1.263 |
A4 | 0.200, 0.330, 1.000, 1.000 | 0.330, 1.000, 1.000, 3.000 | 0.200, 0.300, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.050, 0.133, 0.280, 0.940 |
Table 3 . At level 1, combined hesitant fuzzy possibilistic C-means (FPCM) criteria.
A11 | A12 | A13 | Defuzzified local weights | |||
A11 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.200, 0.330, 1.000, 1.000 | 0.033, 0.120, 0.212, 0.781 | |
A12 | 0.330, 1.000, 1.000, 3.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.064, 0.240, 0.426, 1.214 | |
A13 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.035, 0.097, 0.198, 0.514 | |
A14 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.032, 0.079, 0.122, 0.392 | |
A21 | A22 | A23 | Defuzzified local weights | |||
A21 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 3.0000, 5.0000 | 0.0540, 0.1330, 0.2810, 0.9480 | ||
A22 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 0.0330, 0.0860, 0.1810, 0.4980 | ||
A23 | 0.2000, 0.3300, 1.0000, 1.0000 | 0.3300, 1.0000, 1.0000, 3.0000 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.0480, 0.1570, 0.2710, 1.0250 | ||
A31 | A32 | A33 | A34 | Defuzzified local weights | ||
A31 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.2000, 0.3300, 1.0000, 1.0000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.052, 0.159, 0.290, 1.030 | |
A32 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.200, 0.330, 1.000, 1.000 | 0.020, 0.073, 0.113, 0.500 | |
A33 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.064, 0.240, 0.426, 1.214 | |
A34 | 1.000, 1.000, 3.000, 5.000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 0.149, 0.276, 0.723, 1.509 | |
A41 | A42 | A43 | Defuzzified local weights | |||
A41 | 1.0000, 1.0000, 1.0000, 1.0000 | 0.2000, 0.3300, 1.0000, 1.0000 | 0.330, 1.000, 1.000, 3.000 | 0.033, 0.129, 0.212, 0.782 | ||
A42 | 000, 1.000, 3.000, 5.000 | 1.000, 1.000, 1.000, 1.000 | 1.000, 1.000, 3.000, 5.000 | 0.064, 0.240, 0.426, 1.214 | ||
A43 | 0.200, 0.330, 1.000, 1.000 | 0.200, 0.330, 1.000, 1.000 | 1.000, 1.000, 1.000, 1.000 | 0.053, 0.159, 0.298, 1.026 |
Table 4 . Overall weights.
First level attributes | Local weights | Second level attributes | Local weights | Global weights | Ranks |
---|---|---|---|---|---|
A1 | 0.050, 0.160, 0.280, 1.014 | A11 | 0.033, 0.120, 0.212, 0.781 | 0.080, 0.040, 0.164, 1.353 | 10 |
A12 | 0.064, 0.240, 0.426, 1.214 | 0.004, 0.022, 0.105, 0.710 | 2 | ||
A13 | 0.035, 0.097, 0.198, 0.514 | 0.004, 0.022, 0.105, 0.711 | 7 | ||
A14 | 0.032, 0.079, 0.122, 0.392 | 0.006, 0.040, 0.157, 1.462 | 1 | ||
A2 | 0.035, 0.166, 0.225, 0.625 | A21 | 0.054, 0.133, 0.281, 0.948 | 0.006, 0.040, 0.157, 1.462 | 13 |
A22 | 0.033, 0.086, 0.181, 0.498 | 0.006, 0.030, 0.164, 1.353 | 14 | ||
A23 | 0.048, 0.157, 0.271, 1.025 | 0.004, 0.022, 0.105, 0.711 | 12 | ||
A3 | 0.050, 0.200, 0.348, 1.263 | A31 | 0.052, 0.159, 0.290, 1.030 | 0.006, 0.040, 0.157, 1.462 | 9 |
A32 | 0.020, 0.073, 0.113, 0.500 | 0.004, 0.033, 0.123, 1.114 | 6 | ||
A33 | 0.030, 0.078, 0.121, 0.391 | 0.008, 0.062, 0.248, 1.732 | 11 | ||
A34 | 0.149, 0.276, 0.723, 1.509 | 0.006, 0.030, 0.164, 1.353 | 3 | ||
A4 | 0.048, 0.157, 0.271, 1.030 | A41 | 0.033, 0.129, 0.212, 0.782 | 0.004, 0.033, 0.123, 1.114 | 8 |
A42 | 0.064, 0.240, 0.426, 1.214 | 0.008, 0.062, 0.248, 1.732 | 5 | ||
A43 | 0.053, 0.159, 0.298, 1.026 | 0.006, 0.041, 0.173, 1.462 | 4 |
Table 5 . Closeness coefficients of numerous alternatives.
Alternatives | Gap degree | Satisfaction degree | ||
---|---|---|---|---|
Systematic SCM [C1] | 0.05 | 0.03 | 0.379 | 0.632 |
Risk identification model [C2] | 0.04 | 0.04 | 0.499 | 0.527 |
Predicted outcome model [C3] | 0.04 | 0.04 | 0.537 | 0.464 |
Develop response strategy [C4] | 0.04 | 0.03 | 0.433 | 0.571 |
Regularize decision making [C5] | 0.04 | 0.05 | 0.55 | 0.465 |
Mitigation strategy [C6] | 0.03 | 0.05 | 0.625 | 0.405 |
Table 6 . Sensitivity examination.
C1 | C2 | C3 | C4 | C5 | C6 | |
---|---|---|---|---|---|---|
Original weights | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.405 |
A11 | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.406 |
A12 | 0.633 | 0.527 | 0.466 | 0.589 | 0.479 | 0.397 |
A13 | 0.633 | 0.527 | 0.464 | 0.571 | 0.466 | 0.406 |
A14 | 0.637 | 0.527 | 0.47 | 0.571 | 0.465 | 0.415 |
A21 | 0.632 | 0.525 | 0.464 | 0.577 | 0.466 | 0.415 |
A22 | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.424 |
A23 | 0.645 | 0.536 | 0.463 | 0.572 | 0.465 | 0.405 |
A31 | 0.632 | 0.527 | 0.464 | 0.572 | 0.465 | 0.406 |
A32 | 0.632 | 0.527 | 0.479 | 0.589 | 0.479 | 0.39 |
A33 | 0.632 | 0.527 | 0.464 | 0.571 | 0.465 | 0.424 |
A34 | 0.632 | 0.527 | 0.464 | 0.572 | 0.465 | 0.406 |
A41 | 0.632 | 0.525 | 0.464 | 0.577 | 0.466 | 0.415 |
A42 | 0.633 | 0.527 | 0.464 | 0.571 | 0.466 | 0.406 |
A43 | 0.646 | 0.536 | 0.478 | 0.586 | 0.479 | 0.415 |
Table 7 . Comparative analysis.
Approaches | C1 | C2 | C3 | C4 | C5 | C6 |
---|---|---|---|---|---|---|
HF-AHP-TOPSIS | 0.6320 | 0.5270 | 0.4640 | 0.5710 | 0.4650 | 0.4050 |
AHP-TOPSIS | 0.6370 | 0.5270 | 0.4500 | 0.5710 | 0.4650 | 0.3890 |
Fuzzy AHP-TOPSIS | 0.6120 | 0.5140 | 0.4510 | 0.5720 | 0.4650 | 0.3980 |
Trupti Bhosale and Hemant Umap
International Journal of Fuzzy Logic and Intelligent Systems 2024; 24(1): 19-29 https://doi.org/10.5391/IJFIS.2024.24.1.19Amany Mohamed Elhosiny, Haitham El-Ghareeb, Bahaa T. Shabana, and Ahmed AbouElfetouh
International Journal of Fuzzy Logic and Intelligent Systems 2021; 21(1): 12-28 https://doi.org/10.5391/IJFIS.2021.21.1.12Hierarchy diagram of the SCM.
|@|~(^,^)~|@|Process diagram of HF-AHP and HF-TOPSIS.
|@|~(^,^)~|@|Schematic illustration of the level of satisfaction.
|@|~(^,^)~|@|Schematic illustration of the sensitivity examination.
|@|~(^,^)~|@|Schematic illustration of different outcomes.