用户名: 密码: 验证码:
生产型供应链脆弱性若干关键问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着经济全球化的发展和社会分工的不断精细,制造业在获得众多发展机会的同时也面临着来自各个方面的压力与挑战。在激烈的竞争环境中,不少企业联合起来,以供应链的方式组织生产并参与竞争,实践表明,这种生产及竞争方式有利于生产专业化的发展以及更广范围合作的兴起,因此,有关供应链的研究内容一直受到企业界和学术界的重视。
     然而,随着合作的地域范围及合作领域的不断拓展,供应链系统的规模也逐渐扩大,这在一定程度上增加了供应链受到来自内部、外部等众多因素影响的概率,也给供应链正常的运作带来严重的影响,使得供应链呈现出了一定的脆弱性。随着供应链内外部各种状况的不断出现,围绕供应链脆弱性的话题随即引起了企业界和学术界的广泛关注。
     论文在分析生产型供应链实际情况及相关领域研究现状的基础上,针对生产型供应链的脆弱性问题,从不同角度建立具有针对性的分析模型,设计可量化的分析方法,为供应链脆弱性的研究提出了新的研究思路。论文的主要研究内容如下:
     ①分析总结国内外不同学者及科研机构对供应链及脆弱性展开的研究,明确供应链、系统脆弱性以及生产型供应链脆弱性等相关概念,在此基础上对生产型供应链的影响因素展开分析,明确生产型供应链脆弱性的产生环境及其影响因素,为生产型供应链脆弱性研究内容的设计与展开打下基础。
     ②在对生产型供应链脆弱性各相关概念、特点,以及环境、要素等内容展开详细分析基础上,确定论文的研究定位,并提出生产型供应链脆弱性分析的关键问题,明确论文的研究内容,之后设计详细的技术方案,以量化的分析方法解决脆弱性研究中的具体问题,最后搭建论文研究的总体框架,针对论文提出的供应链脆弱性问题从拓扑结构、供应商质量以及生产协同效率三个方面展开研究,为生产型供应链的脆弱性研究提出研究思路及具体研究方法,并指导论文后续研究的开展。
     ③研究生产型供应链网络组织的拓扑特性,构建针对生产型供应链拓扑结构的节点重要度计算加权分析模型。模型中用节点收缩法分析供应链拓扑网络节点的网络结构重要度,通过分析各个节点在收缩前后供应链拓扑网络凝聚度的变化,以此量化某一节点的结构重要度;为使计算结果接近客观实际,模型中提出一种用于分析各供应单元间相互影响的计算方法,并将此权重转化为该节点对周围环境的影响重要度。最后,通过实例验证了研究方法的有效性。
     ④研究生产型供应链中供应商质量评价模型。首先,分析供应商特点及供应商质量的影响因素,设计供应商质量评价的初步指标集;其次,针对指标评价标准及指标性质不同,提出一种混合量化方法;之后,基于小波神经网络(WNN)构建了供应商质量评价的基本网络模型,并利用蚁群算法模型(ACO)对其中的网络参数进行同步优化。最后,通过实例验证了该评价模型的可行性与实用性。
     ⑤研究生产型供应链中生产主体及生产客体作用关系,构建供应链生产协同效率分析模型。在分析和研究供应链协同问题的基础上,总结生产型供应链协同的组织结构特征及参与主体特征,然后构建了多层次结构的组织模型;进一步细化研究供应链生产中的主体间互动作用及生产客体的复杂性,并分别提出主体间互动作用的度量方法和生产客体复杂度的计算方法,在此基础上,构建了生产型供应链协同效率的分析模型,并设计一种改进免疫克隆算法进行求解。
With the development of economic globalization and constantly fine of socialdivision of labor, manufacturing was facing pressures and challenges from variousaspects, as it won many development opportunities at the same time. In the fiercecompetitive environment, many enterprises united with each other to organize theproduction and participate in the competition in the form of supply chain. Practice hadproved, this way of production and competition was conducive to the development ofthe specialization of production and the rise of a wider range of cooperation. Therefore,the research content about the supply chain had been brought to the attention of thebusiness community and academia.
     However, with the expanding of geographical scope and field of cooperation, thesize of the supply chain system was also gradually expanding, which increased theprobability that the supply chain was influenced by internal, external, and many otherfactors to a certain extent, bring serious impacts to normal production of supply chain,and made the supply chain reveal a certain vulnerability. With the appearance of allsorts of surprises of supply chain, the issues of vulnerability in supply chain causedextensive concern of the business community and academia.
     On the basis of the analysis of the actual situation and related research field statusquo of manufacturing supply chain, this paper put forward the different analysis angelsof the vulnerability in supply chain, established a targeted analysis model, and designedthe quantifiable analysis methods, which put forward a new research idea for researchof the vulnerability in supply chain. The main research content of this paper is asfollows:
     ①Through the analysis and summarization of supply chain and its vulnerability inwhich both different scholars and research institutions at home and abroad study, therelated concept of supply chain, system vulnerability and the vulnerability inmanufacturing supply chain were cleared firstly. On this basis, the influence factors ofmanufacturing supply were analyzed, and the manufacturing supply chain riskenvironment and risk structure were specified, which laid foundation for the analysis ofthe vulnerability manufacturing supply chain's influence factors.
     ②On the basis of the research status and practical problems of the vulnerability inmanufacturing supply chain, the author put forward the clear thesis topic, then designed the detailed research thinking and guided the paper to launch a series of studies. Then,the overall framework of this paper was set up, which designed the research contents ofthe vulnerability in manufacturing supply chain based on three different perspective, putforward the topology network analysis to improve the weighted network nodecontraction method, R-A-WNN supplier quality evaluation and the analysis of thesupplier collaborative efficiency based on the immune clone algorithm. In the light ofthe characteristics of each specific question,these three methods considered theimportant influence part on calculation of the production,in order to make the resultmore accord with objective reality.
     ③The topology of network organization in manufacturing supply chain wasresearched, and a weighted analysis model about the node importance was builtaccording to topology of the manufacturing supply chain. In the model, the importancedegree of network structure of the supply chain topology nodes was analyzed by nodecontraction method. Then, through the analysis of the change degree of supply chainnetwork topology condensation before and after the node contraction, the structuralimportance of a node could be quantified. In order to make the calculation result accordwith objective reality, a calculation method for the analysis of the interaction betweenthe supply units was proposed in the model, which transformed the weighting of nodesinto the impact on the surrounding environment of the node. Finally, an example wasused to verify the validity of the research methods.
     ④Supplier quality evaluation model of manufacturing supply chain wereresearched. Firstly, the influence factors of suppliers and their quality were analyzed,and preliminary evaluation index set of supplier quality was designed; Secondly, aimedat the difference of index evaluation's standard and index's character, a hybridquantitative method was put forward; And then, the basic network model of the supplierquality evaluation based on wavelet neural network (WNN) was built, whose networkparameters were also synchronously optimized by the use of ant colony algorithmmodel(ACO); Finally, the feasibility and practicality of this evaluation model wereverified through an application example.
     ⑤Supply chain vulnerability analysis model based on collaborative efficiency inmanufacturing supply chain were researched. Based on the analysis and research ofsupply chain collaborative problem, organization structure characteristics andparticipation subject characteristics of manufacturing supply chain collaboration weresummarized, and then the organization model of multi-layer structure was constructed; What's more, interaction effect between subject and object and complexity ofproduction object in the supply chain manufacturing process were further detailingresearched, and measures of interaction effect between subject and object, calculation ofproduction object's complexity were given. On this basis, analysis model ofcollaborative efficiency in manufacturing supply chain was built, and in order to solve it,an improved immune clone algorithm was designed.
引文
[1]盛义军.敏捷供应链构建关键技术研究及实现[D].博士学位论文,西北工业大学,2007.
    [2]董天胜.基于复杂适应系统的供应链协同研究[D].博士学位论文,北京工商大学,2009.
    [3] Lee,H.L.The triple-a supply chain.Harvard Business Review[J].2004,82(10),102-112.
    [4] Childerhouse, Hermiz P.,&Mason-Jones. Information flow in automotive supplychains-present industrial practice. Industrial Management&Data Systems[J].2003.103(3).137-149.
    [5] Svensson, G.A conceptual freamwork for the analysis of vulnerability in supplychains.International journal of physical distribution&logitics management[J].2000,30(9),731-749.
    [6] Berry, J.Supply chain risk in an uncertain global supply chain environment.InternationalJournal of Physical Distribution&Logistics Management[J].2004,34(9),695-697.
    [7]张存禄,王子萍.基于风险控制的供应链结构优化问题[J].上海交通大学学报,2005,39(3):468-478.
    [8] Tang,C.Robust strategy for supply chain disruption.International Journal of Logistics Researchand Applications[J].2006,9(1),33-45.
    [9] M.Christopher Logistics and Supply chain Management:Strategies for Reducing Costs a11dImproving Services[M].London:Pitman Publishing.1992.
    [10] D.M.Lambert,S.J.Garcia-Dastugue and K.L.Croxton.An Evaluation of Process-orientedSupply Chain Management Frameworks[J].Journal of Business Logistics,2002,6(1):25-51.
    [11] CSCMP.Supply Chain Management and Logistics Management Definitions. http://cscmp.org/AboutCSCMP/Defimtions/Definitions.Asp.
    [12] B.Christian and J.Jayaram AStrategic Perspective, Supply Chain Management[J].TheInternational Journal of Logistics Management,1997,8(1):15-34.
    [13]刘丽文.供应链管理思想及其理论和方法的发展过程[J].管理科学学报.2003(4):81-88.
    [14] Fu Y H, Piplani R.Supply-side collaboration and its value in supply chains[J].EuropeanJournal of Operational Research,2004,152:281-288.
    [15] Zimmer k Supply chain coordination With uncertain just-in-time delivery[J].ProductionEconomics,2002,77:l-l5.
    [16] Supply Chain Collaboration FAQ [Z].http://mere.memaster.ca.
    [17] Letson R.协同供应链的启示[J].风荷译.信息化管理,2002:35.
    [18] THOMAS D J, GRIFFIN P M, Coordinated Supply Chain Management[J].European Journalof Operational Research,1996(1):1-15.
    [19] STANK T P, DAUGHERTY P J.The Impact of Operating Environment on the Formation ofCooperative Logistics Relationships[J].Transportation Research Part E:Logistics andTransportation Review,1997,33(1):53-65.
    [20] Timmerman P. Vulnerability, resilience and the collapse ofsociety: a review of models andpossible climatic applications [M].Toronto, Canada: Institute for Environmental Studies,University ofToronto,1981.
    [21]牛文元.生态环境脆弱带Ecotone的基础判定[J].生态学报,1989,9(2):97-105.
    [22]周丙娟,蔡海生,陈美球.鄱阳湖区生态环境脆弱性评价及对策分析[J].生态经济,2009(4):37-41,54.
    [23]刘金萍,李为科,郭跃.重庆三峡库区脆弱生态区生态农业可持续发展模式与机制研究初探[J].生态经济,2007(6):61-64,77.
    [24]吐热尼古丽·阿木提,阿尔斯朗·马木提,木巴热克·阿尤普.塔里木河流域胡杨生态系统脆弱性及其对策[J].干旱区资源与环境,2008,22(10):96-101.
    [25]周亮进.闽江河口湿地生态脆弱性评价[J].亚热带资源与环境学报,2008,3(3):25-31.
    [26]费维扬,赵兴雷,周文戟.全球气候变暖:人类面临的世纪挑战[J].生态经济,2009(4):24-29.
    [27]於俐,曹明奎,陶波等.基于潜在植被的中国陆地生态系统对气候变化的脆弱性定量评价[J].植物生态学报,2008,32(3):521-530.
    [28] Matt Bishop, David Bailey:A Critical Analysis of Vulnerability Taxonomies[M].CSE-96-11,1996
    [29] Chen-Ching Liu, Vital, et al. The Strategic Power Infrastructure Defense System[J]. IE EEControlS ystemsM agazine,2003,13(8):40-52
    [30]刘燕华,李秀彬.脆弱性生态环境与可持续发展[M].北京:商务印书馆,2001:15-26.
    [31] Svensson.A Conceptual Framework for the Analysis of the Vulnerability in SupplyChain[J].International Journal0f Physical Distribution&Logistics Management,2000,30:731-749.
    [32] Helen Peck. Rivers of Supply Chain Vulnerability:An Integrated Framework[J].InternationalJournal of Physical Distribution&Logistics Management,2005,35:210-232.
    [33]刘彦平.供应链脆弱性和风险管理策略研究[J].现代管理科学,2009(11):104-106.
    [34]宁钟.供应链脆弱性的影响因素及其管理原则[J].中国流通经济,2004(4):13-16.
    [35] Charles J. Corbett, Xavier de Groot. A Supplier's Optimal Quantity Discount PolicyunderAsymmetric Information. Management Science,2000(3):444-450.
    [36] Neely A, Gregory M, Platts K. Performance measurement system design: a literature reviewandresearch agenda[J].International Journal of Operations&Production Management,1995,15(4):105-116
    [37] Blickstein, Edaward. H. The Language of Logistics: A Supply Chain and Logistics[M].Glossary, Year2000.
    [38] Dirk Helbing. Information and material flows in complex networks[J]. Physica A,2006(1),363.
    [39] Ganeshan, R., T. P. Harrison, An Introduction to Supply Chain Management[M].WorkingPaper,1997.
    [40] Ronald H. Ballou, Stephen M.Gilbert, Ashok Mukherjee. New Managerial ChallengesfromSupply Chain Opportunities[J]. IEEE Engineering Management Review,2000(3):7-16.
    [41] Steuer RE. Multiple Criteria Optimization:Theory, Computation and Application.JohnWiley&Sons[M].Inc.1986.
    [42] Christian Kuhnert, Dirk Helbing, Geoffrey B. West.Scaling laws in urban networks[J].PhysicaA,2006,363(1):96-103.
    [43] Marco Laumanns and Erjen Lefeber. Robust optimal control of material flows indemand-driven supply networks[J].Physica A,2006,363(1):24-31.
    [44] Krapivsky PL, Redner S, Leyvraz F. Connectivity of growing random networks[J]. PhysiealReview Letters,2000,85(21):4629-4632.
    [45] Shi D, Liu L, Zhu X, Zhou H. Degree distribution of evolving networks. Europhysics letters,2006,76:731-737.
    [46] Krapivsky PL, Rodgers G J, Redner S.Degree distributions of growing networks[J]. PhysicalReview Letters,2001,86(23):5401-5404.
    [47] Dorogovtsev SN, Mendes JFF, Samukhin A N. Structure of growing networks withPreferential linking. Physieal Review Letters[J].2000,85(21):4633-4636.
    [48] Dorogovtsev SN, Mendes J.F.F. effect of the accelerating growth of communications networkson their strueture. Physical Review E[J].2001,63(2):25-101.
    [49] Vazque A. Disordered networks generated by reeursive searehes. Euro Physics Letters[J].2001,54(4):430-435.
    [50] Kleinberg J, Kumar R, Raghavan P, et al. The Web as a Graph: Measurements, Models, andMethods. Proceedings of the international conferenee on combinatorics and computing[M].Berlin: SPringer,1999.
    [51] Chung F, Lu LY, Dewey TG, et al. Duplication models for biological networks[J]. Joumal ofComputational Biology,2003,10(5):677-657.
    [52]田青.离散制造企业物流网络设计方法研究[D].天津:天津大学,2005.
    [53]王圣广,马士华,供应链拓扑结构模型研究[J].物流技术,1999(1):23-25.
    [54]凌大荣,刘素,李道志.集成供应链管理系统的研究发展趋势[J].物流技术,2004(2):23-24.
    [55]栗东生,张翠华,黄小原.供应链网结构特性及其模型[J].合成纤维工业,2000(2):31.
    [56] WuL, Zhu5.Scale-free networks by super-linear preferential attachment rule. Physica AStatistical Mechanics and its Applications[J].2008,387(14):3789-3795.
    [57] Liu Z H, Lai Y C, Ye N, et al. Connectivity distribution and attack tolerance ofgeneralnetworks with both Preferential and random attachments[J]. Physics Letters A,2002,303(5-6):337-344.
    [58]郭进利.供应链网络中双幂律分布模型[J].物理学报,2006,55(8):3916-3920.
    [59]雷敏.马氏链在复杂网络拓扑结构中的应用[D].中南大学.2011.
    [60] Poulin R, Boily M-C, Masse B R.Dynamical systems to define centrality in social networks[J].Social Networks,2000,(22):187-220.
    [61] Bonacich P.Factoring and weighting approaches to status scores and clique identification[J].Journal of Mathematical Sociology,1972,(2):113-120.
    [62] Bonacich P.Power and centrality:a family of measures[J].Joumal of Sociology,1987,(92):1170-1182
    [63] Stephenson K, M.Zelen.Rethinking centrality:methods and applications[J].Social Networks,1989,1-37.
    [64] Wasserman S, F. Katherine. Social network analysis:methods and applications[M].Cambridge:Cambridge University Press,1994.
    [65] Bonacich P.Technique for analyzing oyerlapping memberships[M].S.an Francisco:l972.
    [66] Altmann M.Reinterpreting network measure for models of disease transmission[J].SocialNetworks,1993,15(1):l-17.
    [67] Callaway DS, Newman MEJ, Storgatez SH, et a1.Network robustness and fragility:Percolation on random graphs[J].Phys Rev Lett,2000,85(25):5468-5471.
    [68] Sabidussi G.The centrality index of a graph[J].Psychometrika,1966,(31):581-603.
    [69] Freeman L.A set of measure of centrality based upon betweenness[J].Sociometry,1977,(40):35-41.
    [70] Corley H W, Sha DY.Most vital links and nodes in weighted networks[J].Oper Res Lett,1982,(1):157-160.
    [71] Nardelli E,Proierri G,Widmayer P.Finding the most vital node of a shortest path[J].TheoreticalComputer Sience,2001,296(1):167-177.
    [72] Hsu L H, Jan R H, Lee YC.Finding the most vital edge with respect to minimum spanning treein werghted graghs[J].Info.Proc.Letters,1991,(39):277-28l.
    [73] Hong S.Finding the k Most Vital Edges with Respect to Minimum Spanning Tree[J].IEEE,1997,255-262.
    [74] Chen Y, Hu A Q, Hu J, et a1.A method for finding the most vital node in communicationnetworks[J].High Technol Lett,2004,(1):573-575.
    [75] Dickson G. W. An analysis of Vender Selection System and Decisions[J]. Journal ofPurchasing,1966,2(1):5-17.
    [76] Weber C. A., Current J. R., Benton W. C. Vendor selection criteria and methods[J]. EuropeanJournal of Operational Research,1991(50):2-18.
    [77] Yahya S., Kingsman B. Modeling a multi-objective allocation problem in a governmentsponsored entrepreneur development programmer[J]. European Journal of OperationalResearch,2002,136:430-448.
    [78] Bharadwaj N. Investigating the decision criteria used in electronic components procurement[J].Industrial Marketing Management,2004:317-323.
    [79] Patton W E, Use of human judgment models in industrial buyers-vendor selection decisions,Industrial Marketing Management,1996(25)135-149.
    [80]林勇,马士华,供应链管理环境下供应商的综合评价选择研究[J].物流技术,159:364-378.
    [81]彭本红.第三方物流合作伙伴关系的竞争协调模型和治理模式探讨[J].商业研究,2006,(21):114-117.
    [82]张炳轩,都龙沫,忠诚.动态供应链合作伙伴’的评价体系及其模糊评价方法[J].天津师范大学学报(自然科学版),2001(3):19-23.
    [83]陈畴铺,陆锦洪.基于数据挖掘方法的供应链合作伙伴选择[J].数量经济技术经济研究,2002(12)79-84.
    [84]李松.基于AHP的制造企业供应链合作伙伴的选择方法研究[J].组合机床与自动化加工技术,2005(11):105-107.
    [85]杨波,莫灿林,李仁旺.基于灰色关联度的供应商评价体系研究[J].计算机应用研究,2005,10:20-22.
    [86]朱建军,刘士新.供应商选择及定购计划的分析[J].东北大学学报(自然科学版),2003,24(10):956-958.
    [87]霍佳震,马秀波,朱琳婕.集成化供应链绩效评价体系及应用北京:清华大学出版社,2005.163-164.
    [88]周新意.供应链管理中供应商的评价与选择分析[J].价值工程,2002,(3):16-19.
    [89]王勇.基于模糊数学的供应商质量评价指标体系研究[J].发展战略,2011,11:5-6.
    [90] Y. Crama, R. Pascual J, A. Tomes. Optimal procurement decisions in the presence totalquantitydiscounts and alternative product recipes[J]. European Journal of OperationalResearch,2004.120-135.
    [91]任郑杰.供应商优选的多目标混合整数规划模型[J].管理学报,2005,6:671-675.
    [92] Liu Jian, Ding Fong Yuan, Lall Vinod. Using Data Envelopment Analysis to CompareSuppliers for Supplier Selection and Performance[J]. Supply Chain Management,2000,3:08-317.
    [93]孙朝苑,彭其渊.利用多维灰评估进行供应商的选择与评价[J].西南交通大学报,2004,39(3):277-280.
    [94]王振,徐晋.供应商竞争力分析及其灰色关联模型[J].系统工程与电子技术,2004,26(9):1212-1216.
    [95] Manthou V, V lachopoulou M, Folinas D. Virtual e-Chain(VeC) model for supply chaincollaboration[J]. Int. J. Production Economics,2004,87:241-250.
    [96] QuinnF. Collaboration: more than just technology [J]. ASCET,2001,6(3). http://www. ascet.com.
    [97] Akintoye A, McIntosh G, Fitzgerald E. A survey of supply chain collaboration andmanagement in the UK construction industry[J]. European Journal of Purchasing&SupplyManagement,2000,(6):159-168.
    [98] Akkermans H, Bogerd P, Doremalen J. Travail, transparency and trust:a case study ofcomputer-supported collaborative supply chain planning in high-techelectronics[J].EuropeanJournal of Operational research,2004,153:445-456.
    [99] Ito T, Salleh MR. A blackboard-based negotiation for collaborative supply chain system[J].Journal of Materials Processing Technology,2000,107:398-403.
    [100]于海斌,朱云龙.协同制造[M].北京:清华大学出版社,2004.
    [101] ARC Advisory Group. Collaborative manufacturing management strategies[J]. ARC Strategies,2002. http: www. arcweb. com.
    [102] Lin J, Lin T. Object-oriented conceptual modeling for commitment based collaborationmanagement in virtual enterprises[J]. Information and Soft2ware Technology,2004,46:209-217.
    [103] Zimmer K. Supply chain coordination with uncertain just-in-time delivery[J]. ProductionEco2nomics,2002,77:1-15.
    [104] Sabri E H, Beamon B M. A multi-objective approach to simultaneous strategic and operationalplanning in supply chain design[J]. International Journal of Management Science,2000,28(6):581-598.
    [105]董进,柴跃廷,任守榘,张大巍.基于多代理协调企业敏捷供应链管理模型[J].计算机集成制造系统—CIMS,2000,6(1):40-44.
    [106]徐琪,徐福缘.供需网的一个节点:供应链协同管理与决策[J].系统工程理论与实践,2003,(8):31-35.
    [107]徐浩鸣,康姝丽,徐建中.面向客户的中国企业供应链纵向协同研究[J].工业技术经济,2003,127(3):67-72.
    [108] Chen F, Drezner Z, Ryan J K, Simchi2Levi D. Quantifying the bullwhip effect in a simplesupply chain: the impact of forecasting, lead times, and information[J]. Management Science,2000,46(3):436-443.
    [109] Helo P T. Dynamic modeling of surge effect and capacity limitation in supply chains[J]. INT. J.PROD. RES.,2000,38(17):4521-4533.
    [110] Oracle Demanding Planning11i[Z]. http://www. oracle. com.
    [111]但斌,张旭梅.面向供应链的合作计划、预测与补给[J].工业工程,2000,3(1):35-37.
    [112] Fu YH, Piplani R. Supply-side collaboration and its value in supply chains[J]. EuropeanJournal of Operational Research,2004,152:281-288.
    [113]易东波.面向随机需求的两级库存协同控制建模分析[J].南昌水专学报,2003,4:34-37.
    [114] Chandra P, Fisher ML. Corrdination of production and distribution planning[J]. Journal ofOperational Research,1994,72:503-517.
    [115]周金宏,汪定伟.分布式多工厂、多分销商的供应链生产计划模型[J].信息与控制,2001,30(2):169-172.
    [116] Johnson M E. Product design collaboration[J]. Ascet.,2002,6(4). http://www. ascet. com.
    [117]曹健,张审生.协同产品开发中的的协商方法研究[J].计算机集成制造系统,2001,7(6):30-34.
    [118] Ellinger A E. Improving marketing/logistics cross-functional collaboration in the supply chain[J]. Industrial Marketing Management,2000,29:85-96.
    [119] Hennet J-C, Yasemin Arda Y. Supply chain coordination: A game-approach[J]. EngineeringApplication of Artificial of Interlligence,2008,(21):399-405.
    [120] Zou H X, Yu T. The Research on Decision Model of Supply Chain CollaborationManagement[A].2008International Conference on Wireless Communication, Networkingand Mobile Comptuing[C].Crete,2008.
    [121] Chiu M, Lin G. Collaborative Supply Chain Planning Using the Artificial Neural NetworkApproach[J]. Journal of Manufacturing Technology Management,2004,15(8):787-796.
    [122] Minegishi S, Daniel T. System Dynamics and Simulation of a Particular Food Supply Chain[J].Simulation Practice and Theory,2000,(8):321:339.
    [123]黄晓伟,基于自组织理论的供应链资源协同研究[D],哈尔滨:哈尔滨工业大学博士学位论文,2009.
    [124]吴国斌,张凯,多主体应急协同效率影响因素实证研究——以湖北省高速公路为例[J].工程研究-跨学科视野中的工程,2011,(2)104-108.
    [125]樊博,G2G电子政务协同效率改进的支撑框架研究[J].图书与情报,2010,(5):65-68.
    [126]李作奎,基于企业网络化下协同效率的经济性分析[J].科技与管理,2009,(5):80-88.
    [127]汪延明,基于市场董事的产业链协同效率研究[J].中国流通经济,2011,(8):121-131.
    [128]崔晓玲,钟田丽,基于DEA的信用担保运行效率求解方法[J].运筹与管理,2010,(6):201-207.
    [129] Houlihan John B. International supply chain management [J]. International Journal ofPhysicalDistribution and Materials Management.1985,120-125.
    [130]迈克尔波特,陈小悦译.竞争优势[M].北京:华夏出版社,1997.
    [131] Womack J P, Jones D T. Lean Thinking: Banish Waste and Create Wealth inYour Corporation,Simon and Schuster[M].London, UK,1996.
    [132] Martin J C. Logistics and Supply Chain, Management Financial Time[M].Pitman Publish,1994.
    [133](美)詹姆斯P沃麦克,(英)丹尼尔T琼斯,精益思想——消灭浪费,创造财富(沈希瑾,张文杰等译)[M].北京:商务印书馆,2005
    [134] Coase, R.H.The Nature of the Firm[J].Economica,1937,(4):386-405.
    [135]威廉姆森.治理机制[M].北京:中国社会科学出版社,1996.
    [136]周立群,李清泉.新组织形态:企业与市场之超越[J].经济学家,1998,(4):9l-96.
    [137] Daniel V, Guide V D R, Lud N. Wassenove V. Closed-loop supply chain: practice andpotential[J]. Interfaces,2003,33(6):1-2.
    [138]湛述勇,陈荣秋.论JIT环境下制造商与供应商之间的关系[J].管理工程学报,1998,(3):46-52.
    [139]徐家旺,朱云龙等.闭环供应链管理问题的研究进展[J].系统工程,2008,26(8):1-10.
    [140] Canan Savaskan R, et al. Closed-loop supply chain models with product remanufacturing[J].Management Science,2004,50(2):239-252.
    [141]杜娟.闭环供应链运作模式分析[J].上海管理科学,2006,(3):54-56.
    [142]柴跃廷,刘义.敏捷性供应链管理—现代集成制造系统(CIMS)系列[M].北京:清华大学出版社,2001.
    [143]查敦林.供应链绩效评价系统研究[D].南京航空航天大学博士论文,2003.
    [144]马士华,谭勇,龚凤美.工业企业物流能力与供应链绩效关系的实证研究[J].管理学报,2007,4(4):493-499.
    [145]中国物流与采购联合会.中国制造业供应链报告.2004.
    [146] IPCC. Climate Change2001: Impacts, Adaptation, and Vulnerability, Cambridge, UnitedKingdom and New York[C], USA: Press CU,2001.
    [147] Minsky H..The Financial Instability Hypothesis: Capitalist Process and the Behavior of theEconomy, in Financial Crisis: Theory, History and Policy[D]. Cambridge: CambridgeUniversity Press,1982.
    [148]王丽.金融脆弱性:微观机制与治理路径[D].天津:南开大学,博士学位论文,2009.
    [149]郭迟.基于复杂网络的Internet脆弱性研究[D].武汉:武汉大学,博士学位论文,2010.
    [150] Andersson G, Donalek P, Farmer R, et al. Causes of the2003major grid blackouts in northAmerica and Europe, and recommended means to improve System Dynamic Performance[J].Ieee Transactions on Power Systems.2005,20(4):1922-1928.
    [151] Vander Vleuten E, Lagendijk V. Transnational infrastructure vulnerability: The historicalshaping of the2006European "Blackout"[J]. Energy Policy.2010,38(4):2042-2052.
    [152]李洋.基于熵理论的敏捷供应链协作模式与脆弱性研究[D].哈尔滨:东北林业大学,博士学位论文,2010.
    [153]吴敏,桂卫华,何勇.现代鲁棒控制[M].长沙:中南大学出版社,2006.
    [154]谭跃进,吴俊,邓宏钟等.复杂网络抗毁性研究综述[J].系统工程.2006,24(10):1-4.
    [155]钟朕炯,徐锋.通信网络拓扑抗毁性算法[J].火力与指挥控制.2003,28(supplement):113-114.
    [156]张明科,于长军,杨强等.基于网络动力学特征信息融合系统抗毁性研究[J].系统工程与电子技术.2008,30(12):2421-2424.
    [157] Wood D, Lamberson G, Mokhatab S. Project execution risk management for addressingconstructability[J]. Hydrocarbon Processing.2008,87(12):35-39.
    [158] Svensson. A conceptual framework for the analysis of the vulnerability in supply chain[J].International Journal of Physical Distribution&Logistics Management,2000,30:731-749.
    [159] Helen Peck. rivers of supply chain vulnerability: an integrated framework[J]. InternationalJournal of Physical Distribution&Logistics Management,2005,35:210-232.
    [160] Martin Christopher et al. Supply chain vulnerability [J]. Department for Transport,2002,15-18.
    [161] Christopher M.Managing Risk in the Supply Chain [M]. Logistics&Supply ChainManagement, Prentice-Hall,2005,231-58.
    [162] Uta Juttner, Cranfield University. Supply chain risk management: Understanding the businessrequirements from a practitioner perspective[J]. International Journal of LogisticsManagement,2005, Vol.16NO.1,101-105.
    [163]尤西谢菲.柔韧:麻省理工学院供应链管理精髓[M].杨晓雯等译,上海:上海三联书店,2008.
    [164]柏晓峰.供应链风险与管理[J].合作经济与科技,2008(8),39-40.
    [165]何文炯.风险管理[J].大连:东北财经大学出版社,1999.55-57.
    [166]刘彦平.供应链脆弱性和风险管理策略研究[J].现代管理科学,2009(11):104-106.
    [167] Peck H. Reconciling Supply Chain Vulnerability, Risk and Supply Chain Management[J].International Journal of Logistics: Research and Applications,2006,9(2):127-142.
    [168]宁钟.供应链脆弱性的影响因素及其管理原则[J].中国流通经济,2004,4:13-16。
    [169] Pastor-Satorras R, Vespignani A. Immunization of complex networks[J]. Physical Review E.2002,65(3).
    [170] Newman MEJ. The structure and function of complex networks[J]. SIAM Review.2003,45(2):167-256.
    [171] Gol'dshtein V, Koganov GA, Surdutovic H. Vulnerability and hierarchy of complexnetworks[J]. Condensed Matter.2004, arXiv: cond-mat/0409298v0409291.
    [172] Nishikawa T, Motter AE, Lai YC, et al. Heterogeneity in oscillator networks: Are smallerworlds easier to synchronize[J]. Physical Review Letters.2003,(1):91-99.
    [173] WU Jun, TAN Yuejin, DENG Hongzhong.et al.Heterogeneity of Scale-free NetworkTopology[J].Systems Engineering-Theory&Practice.2007,27(5):101-105.[吴俊,谭跃进,邓宏钟等.无标度网络拓扑结构非均匀性研究[J].系统工程理论与实践.2007,27(5):101-105.].
    [174] TAN Yuejin, WU Jun. Network Structure Entropy and Its Application to Scale-freeNetworks[J].Systems Engineering-Theory&Practice.2004,24(6):1-3.[谭跃进,吴俊.网络结构熵及其在非标度网络中的应用[J].系统工程理论与实践.2004,24(6):1-3.].
    [175] Barabasi AL, Bonabeau E. Scale-free networks[J]. Scientific American.2003,288(5):60-69.
    [176] Albert R, Jeong H, Barabasi AL. Internet-Diameter of the World-Wide Web[J]. Nature.1999,401(6749):130-131.
    [177] Mossa S, Barthelemy M, Stanley HE, et al. Truncation of power law behavior in "scale-free"network models due to information filtering[J]. Physical Review Letters.2002,(13):88.
    [178] Santos FC, Pacheco JM. Scale-free networks provide a unifying framework for the emergenceof cooperation[J]. Physical Review Letters.2005,(9):95.
    [179] Holme P, Kim BJ. Growing scale-free networks with tunable clustering[J]. Physical Review E.2002,(2):65.
    [180] Newman MEJ, Watts DJ. Renormalization group analysis of the small-world networkmodel[J]. Physics Letters A.1999,263(4-6):341-346.
    [181] Opricovis S TGH. Defuzzification within a multicriteria decision model[J]. Jounral ofUncertainty, Fuzziness and Knowlege-Based Systems.2003,11(5):635-652.
    [182]王国胤.姚-豫.于洪.粗糙集理论与应用研究综述[J].计算机学报.2009.32(7):1229-1246.
    [183]张文修.吴伟志.梁吉业.等.粗糙集理论与方法[M].北京:科学出版社.2001.
    [184] Mou S S. Gao H J.James L.et al. A new criterion of delay-dependent asymptotic stability forhopfield neural networks with time delay[J]. IEEE Transactions on Neural Networks,2008,19(3):532-535.
    [185]杨洁.杨育.王伟立.等.基于预处理小波神经网络模型的协同创新客户评价与应用研究[J].计算机集成制造系统,2008,14(5):882-890.
    [186] Dorigo M.Maniezzo V.Colorni A. The ant system:Optimization by a colony of cooperationagent[J]. IEEE transaction on System,1996.26(1):1-26.
    [187]陈峻,沈洁,秦玲.蚁群算法进行连续参数优化的新途径[J].系统工程理论与实践,2003,23(3):48-53.
    [188] Microsoft, Chain Collaboration. http://www. webdataaccess.com.2002/10/25.
    [189] Microsoft, Supply Chain Collaboration. http://www.microsofl.com/office/showcase/supply-chain/default.mspx.2008/12/25.
    [190] Pam Westaway, Supply Chain Collaboration. http://www.citi.org.za,2003/4/11
    [191]邹辉霞.供应链协同管理.理论与方法[M].北京:北京大学出版社.2007.
    [192]蔡淑琴,粱静.供应链协同与信息共享的关联研究[J].管理学报.2007(3):157.179.
    [193]张翠华,任金玉,于海斌.供应链协同管理的研究发展[J].系统工程,2005(4):1-6.
    [194] Manthou V, V lachopoulou M, Folinas D. Virtual e-Chain(VeC) model for supply chaincollaboration[J]. Int. J. Production Economics,2004,87:241-250.
    [195] Supply Chain Collaboration FAQ[Z]. http://merc.mcmaster.ca/mclaren/sccfaq.html.
    [196]王浩.供应链协同发展为客户创造更大价值[J].http://www.erpwofld.net.2002/11/1l
    [197] Mark S. Daskin. Introduction to Supply Chain Management. http://users.ires.northwestern.edu/spring.2002:456-472.
    [198] Heather Harreld. Supply-Chain Collaboration. http://www.infowofld.com.200l/12/19.
    [199]展舸.建立协同采购.http://www.amteam.org/k/SCM/2002.11440507.html.2008/12/25.
    [200]于海斌,朱云龙.协同制造[M].北京:清华大学出版社.2004.
    [201]陈国华,刘学林,贾利梅.供应链协同动因研究[J].机械管理开发,2010,(2):70-77.
    [202]金乐琴.企业社会责任与可持续发展:理论与对策[J].绿色中国,2004(2):50-52.
    [203]陈飞翔.市场竞争与企业技术创新[J].上海经济研究,1998(1):23-27.
    [204] Hakansson H., AndSnehota I., Developing Relationships In Business Networks[M].Routledge,London,1995.
    [205]王迎军.供应链管理实用建模方法及数据挖掘著[M].北京:清华大学出版社,2001.9.
    [206]单汨源,彭忆,高阳.-种协同生产管理实现模式[J].中国机械工程,2000,(07):61-64+5-6.
    [207]万杰,陈洪建,李敏强.供应链组织结构与牛鞭效应[J].经济经纬,2004,(5).
    [208]倪明,.供应链组织模式的拓展——供需网组织模式[J].统计与决策,2008,(15).
    [209]黄媛媛.供应链协同管理的研究[D].武汉大学:武汉大学,2006.
    [210]王小磊,杨育,杨洁,梁学栋,曾强.协同产品创新设计中客户知识的识别与应用[J].重庆大学学报(自然科学版),2010,33(2):51-56.
    [211] Grabisch M, Roubens M. An axiomatic approach to the concept of interaction among playersin cooperative games [J]. International Journal of Game Theory,1999,28(4):547-565.
    [212] MIHM J, LOCH C, HUCH ZERMEIER A. Problem Solving Oscillations inComplex Engineering Projects [J]. Management Science,2003,46(3):733-755.
    [213] SURESH S, SUJIT P B, RAO A K. Particle swarm optimization approach for multi-objectivecomposite box-beam design [J]. Composite Structures,2007,81(4):598-605.
    [214] ACHARJEE P, GOSWAMI S K. Expert algorithm based on adaptive particle swarmoptimization for power flow analysis [J]. Expert Systems with Applications,2009,36(3):5151-5156.
    [215] De Castro. L.N, Von Zuben. F.J. The colonel selection algorithm with engineering applications.In: Proceedings of GEECCO, workshop on Artificial Immune Systems and TheApplications[C], San Francisco: Morgan Kaufmann Publishers,2000:36-37.
    [216]刘晓冰,吕强.免疫克隆选择算法求解柔性生产调度问题[J].控制与决策,2008,23(7):781-785.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700