Научная статья на тему 'The Study of Resilience of Transport and Logistics Systems'

The Study of Resilience of Transport and Logistics Systems Текст научной статьи по специальности «Строительство и архитектура»

CC BY
92
21
i Надоели баннеры? Вы всегда можете отключить рекламу.

Аннотация научной статьи по строительству и архитектуре, автор научной работы — Alexander N. Pavlov, Dmitry A. Pavlov, Valentin N. Vorotyagin

Analysis of modern methods of evaluation of resilience of transport and logistics systems (TLS) in the management of their configuration and reconfiguration under conditions of destructive effects has shown that in the design and creation of TLS it is necessary to develop conceptually new methodological approach to the detection of disruption scenarios, recovery paths in TLS and carry out analysis of such important property of TLS as structural resilience of their configuration. The outcomes of this research constitute a useful decision-making support tool that allows detecting disruption scenarios at different risk-aversion levels based on the quantification of the structural robustness with the use of the genome method and observing the scope of disruption propagation. Our results can be of value for decision-makers to compare different TLS structural designs regarding the robustness and to identify disruption scenarios that interrupt the TLS operations to different extents.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «The Study of Resilience of Transport and Logistics Systems»

The Study of Resilience of Transport and Logistics Systems

Alexander N. Pavlov Mozhaisky Military Aerospace Academy St. Petersburg, Russia pavlov62@list.ru

Dmitry A. Pavlov Mozhaisky Military Aerospace Academy St. Petersburg, Russia dpavlov239@mail.ru

Valentin N. Vorotyagin Mozhaisky Military Aerospace Academy St. Petersburg, Russia vorotyagin@rambler.ru

Abstract

Analysis of modern methods of evaluation of resilience of transport and logistics systems (TLS) in the management of their configuration and reconfiguration under conditions of destructive effects has shown that in the design and creation of TLS it is necessary to develop conceptually new methodological approach to the detection of disruption scenarios, recovery paths in TLS and carry out analysis of such important property of TLS as structural resilience of their configuration. The outcomes of this research constitute a useful decision-making support tool that allows detecting disruption scenarios at different risk-aversion levels based on the quantification of the structural robustness with the use of the genome method and observing the scope of disruption propagation. Our results can be of value for decision-makers to compare different TLS structural designs regarding the robustness and to identify disruption scenarios that interrupt the TLS operations to different extents.

1 Introduction

The structural TLS design may change due to disruptions, defined as "events that interrupt the regular flow of goods or services within a system" [Bla11]. Modern TLSs have grown in scale and complexity, increasingly exposing firms to various and scattered disruptive events [Hos16, Mis16, Iva18, Dub19]. The creation of effective TLS is possible by ensuring their reliability and resilience both in nominal conditions of operation and in the event of predictable and unpredictable disruptions. TLS resilience has become one of the main research categories over the past decade [Gun15]. Moreover, the resilience is understood as the

Copyright c by the paper's authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). In: A. Khomonenko, B. Sokolov, K. Ivanova (eds.): Selected Papers of the Models and Methods of Information Systems Research Workshop, St. Petersburg, Russia, 4-5 Dec. 2019, published at http://ceur-ws.org

property of the system to preserve and restore its characteristics (vector quality indicator of the functioning of the TLS) under the influence of a catastrophic environment on the production and logistics process. To assess the resilience of a TLS taking into account the risks of failures in the event of design abnormal situations or "normal" operating conditions, as a rule, a deterministic approach is used, methods of reliability theory and simulation modeling [Fox00, Rob02), Iva13, Mun15, Das15, Iva16, Kim15, Sim14, Xu14, Sny16]. The imitation of TLS production and logistics processes is performed. The imitation of TLS elements, key nodes and connections failures is also produced. The failure of every aforementioned part leads to loss of the TLS resilience, which depends on the modelled level of reliability. For each time point of imitation, a functional check of the TLS functional elements is performed. The random time of forced breaks in the work of one or another TLS node, the values of the target indicators are estimated in case of failure. The calculation is terminated in case of failure of the TLS elements, in which further operation is impossible (the occurrence of critical failures). Such calculations are performed for different levels of reliability of computational emergency situations. At each level, a predetermined number of statistical tests or an amount that provides the specified simulation accuracy is produced. The calculated data are displayed on the radar chart (Kiviat diagram). To determine the TLS resilience index, the area of the figure in the chart is compared with the areas of the figures reflecting the assumed and admissible limit values of the target indicators. If at least one of the targets is less than the admissible limit value, then it corresponds to the loss of the TLS resilience, which requires a decision on the nature of its further functioning.

But at present such dependencies are obtained only as a result of the exploitation of existing TLS. It's a problem with the mentioned approach. But for new TLS design the existing networks statistics is usually used. It is normal if the new network is similar in structure and composition with the previous TLS. But, if the developed TLS differs significantly from the previously created ones, this approach is not always acceptable. In addition to the predictable disruptions, there are unpredictable, such that no one can foresee in advance, and therefore it is impossible to prepare for them in advance. And not least in real conditions of operation, these unpredictable disruptions occur, if not more often, then, at least, in frequency, they appear commensurate with the calculated ones. Under these conditions, models and

methods used in the theory of reliability, simulation modelling are not applicable to ensure the TLS resilience, which requires the development of a conceptually new approach to ensuring the TLS resilience.

2 The Traditional Approach to the Assessment of the Structural TLS Resilience in the Conditions of Destructive Influences

Within the framework of studies devoted to the development of methodological foundations for ensuring the TLS resilience, it is necessary to analyze such an important feature as the TLS configuration structural resilience. In a broad sense, the structural TLS resilience is understood to be such an ability of the object in question, which allows it to maintain, within certain limits, the quality of its target functioning (or restore such ability) by changing (forming) the corresponding structures (configurations). The change in the structural states of the TLS is associated both with the proliferation and restoration of malfunctions in the elements of the structure of the TLS, and in the process of fulfilling orders. We will consider the failure (inoperable) the TLS functional element, which is not able to perform all the production and technological operations assigned to it. A functional element will be considered partially efficient if it can perform at least one of the assigned production and technological operations. It is obvious that the values of the particular indicators of the quality of functioning of the TLS in each state depend on: many failed, workable or partially workable functional elements; distribution of production and technological operations; reallocation of these operations between workable or partially workable functional elements. An important and indispensable condition for studying the capabilities of the TLS is the analysis and evaluation of the architecture of its structural states, reflecting both the functional and production-technological features of the TLS control.

Structural models of the functioning of most complex technical systems can be correctly described [Rya76, Kop10, Pav18] by block diagrams, fault and event trees, connectivity graphs, multi-terminal networks, etc. However, these structural models can describe the functioning of only monotonic systems. In monotonous models, it is impossible to take into account the logically complex and contradictory relationships and relationships between functional elements, for example, which in some structural states of the system increase, and in others, decrease the indicator of the effectiveness of its functioning. Also, monotonous models do not represent systems in which elements simultaneously operate, some of which provide an increase, for example, reliability or resilience, and another part causes failures or accidents, i.e. has the opposite, detrimental effect on the security of the system as a whole.

In the study of the TLS resilience, the structure of which is described by graphical models (monotone system [Pav18a], the TLS is considered "destroyed" if, in the case of deleting vertices or edges, the graph will satisfy one or several of the following conditions: the graph consists of at least two connected components; there are no directed paths for

certain sets of vertices; the number of vertices in the largest component of the graph is less than some predetermined number; the shortest path exceeds a given value. Accordingly, the TLS is considered to be tenacious if these conditions are not met.

To analyze the properties of the structural resilience of the TLS under these conditions, as well as to synthesize a system with the required property of structural resilience, it is necessary to introduce a quantitative assessment that adequately depicts the property in question. When studying the TLS structural resilience according to the approach proposed in that study [Pav18], introduces the

notion of generalized failure of the 1 multiplicity, which considers the structural states of the TLS formed upon the sequential refusal of various combinations (C'n) of the

entire set of functional elements structures for i different functional elements (i £ n where n is the number of functional elements of the TLS structure considered). Among the set of structural states for a given generalized failure is determined by the set of working states, the power

of which we denote R, or the set of unworkable states, the

power of which we denote

N (N + r = cn).

For comparison of various structures, the relative function of the TLS structural resilience is determined Y(

R N

(Y (i) = G. =-*r = 1 - A), its linear

Cn Cn

interpolation is performed by a piecewise linear function Y(x), x e [0,1] and the integral indicator of the

structural resilience of the the TLS is introduced as the

i

following functional Fg =

JY(x)dx.

0

We assume that the TLS is in an inoperable structural state if, in a generalized refusal, all elements that are included at least in at least one of the minimal failure sections of the TLS structure are removed.

In the most general case, the TLS structure is characterized by k minimal failure sections, each of which consists of mj ( j = 1,..., k) elements. Moreover, the failure sections have common elements.

In this situation, the number of inoperable structural states with a generalized failure of the i multiplicity takes the following form [Pav18a]:

N = - mK :mmj-j=i k k

-' ' d(i - m - m + m )C

¿—¡¿—¡^ Jl J2 JlJl> n-mji -mj2 + mj

Jl =1 J2 > Jl

+V' ' d(i-m. -m. -m. + m... )• , (1)

/—i /—i /—i v Ji J2 J3 J1J2J3'

Ji=1 J2 > Ji J3 > J2

Ci-mJ1 -mJ2 -mJ3 + mJ1J2J3 n-mJ1 -mJ2 -mJ3 +mJ1J2 J \k-1

...(-1)-d(i - mJ1 - mJ2 - ... - mJ

Ci-mJ1- mJ

m

J1J2 ■■■Jk

) ^

¡1, x > 0

where d(x) = i is a discrete form of the

[0, x < 0

Heaviside step function.

In formula (1), the values m represent the total

Jl Jl... Jk

number of common elements in the minimum sections of

failures with numbers jx, j2,..., jk .

Using formulas (1), it is possible to calculate the relative function of the TLS structural resilience with a monotonic structure, and accordingly determine the integral index of

1

the structural resilience of the system Fg = JY(x)dx .

0

To calculate the structural vitality, a set of minimum failure sections is needed, as well as the definition of common functional elements in these sections. In general, finding the minimum failure rates is NP difficult. In this case, the calculation of the index of structural resilience using the generalized formula (1) is a super-complex combinatorial problem. At the same time, it should be noted that not all monotonic structures can be described using graphical models.

3 The Genome Concept to the Assessment of the TLS Structural and Functional Resilience in Conditions of Destructive Influences

To overcome the above features of estimating the TLS structural resilience, the following approach is proposed based on the concept of the genome structure [Kop10]. As a rule, the structural analysis of the functioning of a complex object begins with the construction of its functional integrity scheme (FIS) [Kop10], Pav18]. The functional integrity scheme is a logically universal graphical tool for the structural representation of the studied properties of system objects. The functional integrity schemes allow to correctly represent both all traditional types of structural schemes (flowcharts, failure trees, event trees, graphs of connectedness with cycles) and a fundamentally new class of non-monotonic (non-coherent) structural models of various properties of the systems under study. The development of the TLS functional integrity schemes means, first of all, a graphical representation of the

logical conditions for the implementation of its own functions by the elements and subsystems of the TLS. The second important aspect of building and further using the functional integrity scheme is an indication of the specific purpose of the simulation — the logical conditions for the realization of the system property being investigated, for example, reliability or failure of the TLS, etc. It is known that the genome structure

X = Up CC Cn) [Pav18aL which is a

concentrated representation of the structural state of the object, contains and allows to determine the following information in the process of structural study of complex objects: first, information about the topological properties of the structure of a monotone system; secondly, information on the belonging of the object under study to the class of monotone or non-monotonic systems; thirdly, to assess the indicators of the structural and functional resilience of the system.

For the formal description and analysis of the process of degradation (restoration) of the TLS, we will consider the operation of removing (restoring) critical elements

{P ,P ,...,P } = P from the functional integrity scheme

1 Jl 12 JN'

as factors for changing the structure. In the general case, all TLS functional elements can be considered as critical elements.

In the process of removing (restoring) elements, the TLS structure can be in one of its intermediate states Sa. According to the concept of the genome structure, structural states Sa (initial, final, intermediate) are characterized by

their genomes ca ( Ca by this material we mean the dual

analogue of the genome), while the indicators of the TLS structural and functional resilience, consisting of homogeneous, non-uniform functional elements, depend on the reliability of their functions, can be calculated by the following formulas [Pav18a]:

1 1 1

Fhom ) Ca ' C1, - , _ , , )

2 3 n +1

1 1

1

Fhet {-Xa ) Xa ' (1, n )

(2

F

possib A- a

2 2

(Za) = suP miniZa- (!>MiM2,...,^ f, g(M)

M0.1]

We assume that the structural state Sa characterized by the genome ca is directly related to the structural state S described by the genome c , if there is a functional element ($ Pj e P), the failure (restoration) of which ( Pj = 0 or Pj = 1) takes the system from state S to state Sa (from state Sa to state S ).

Let us designate this variation of the structural state of the

! P- !

PLS as follows: —J-—>ca. The set of all structural states directly associated with the state c is denoted by

x (c).

One of the possible trajectories of the reconfiguration of the TLS structure during the occurrence of failures (recovery) can be described by the following chain of transitions

! P

c -——

/La

->...

Where

C a0 C0 ' C aN C f '

the

set

{P-,P ,...,P } = P, i.e. the set of failed (restored)

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Wr J2 J N1

element TLS in the transition chain is a permutation of the elements of the set P .

The structural changes occurring in the intermediate state

Ca on the reconfiguration trajectory will be evaluated by

one of the indicators of the structural and functional resilience of the TLS (2) included in the considered set:

Ffailure (Ca ) ^ {Fhot (X a ) , Fhet (Ca )' Fpossib (X a )} . In

addition, in each intermediate structural state %a, the TLS is characterized by a certain set of structural and topological constraints (ca) £ 0, l = 1,2,...,L, formally defined

and quantified using (Pavlov et al. (2018)) relevant indicators of structural vitality, flexibility, reachability, structural complexity, etc. In other words, these restrictions define the range of allowable variations, which will be denoted in the following X .

Then the task of building an optimistic (pessimistic) PLS reconfiguration scenario can be represented as the following optimization problems (3).

S Ffalure (Xa, ) ® maX (min)

j=0 Xa, îX(Xaj-1)

(3)

Cao X0 ' CajN Xf , Y, (Xa, )£0,1 =1,2,...,L

In the work [Pav18a], a combined method of random directional search for solutions to the problem is substantiated and an algorithm is developed that implements the above method. The combined method and the corresponding algorithm allows you to search for both optimistic and pessimistic trajectories, as well as intermediate trajectories chosen randomly. Then, as a generalized indicator of the TLS structural and functional resilience, in the process of its structural

reconfiguration according to the scenario ^

(k )

relationship can be proposed jk = '

fSk

Here

n-i F ( y(k+ F ( Y(kM

failure a, ' failure a}+i' :

-ik ^T^1 " failure^/*a \ = ^

J=o

2

it is equal to the TLS

It should be noted that the maximum value of the generalized index of structural and functional resilience

Jmax = max{Jk} will be achieved in the optimistic

k

scenario of reconfiguration of the TLS, and the minimum value Jmin = min{ Jk } - in the pessimistic one. We will

k

conduct M experiment,

•> A a ' Aa2 •> ••••> A aN— >

simulation experiments. a sequence is

)

= C0, XaN = if) corresponding to reconfiguration trajectory. For the constructed trajectory, the value of the generalized index of structural and

Vf = [la

On each k constructed (where

the TLS

functional resilience Jk =

sk

is calculated. Next, we

find the average value of the structural resilience of all tests

1 M

j0 = _ V jk. Then it can be argued that the real values of

Mtx

the generalized index of the TLS structural andfunctional resilience JSG are in the interval [ J™n, J™3* ] and the most

expected value is J 0. In this case, the predicted values of the indicator J SG can be set with a fuzzy triangular number

(a, a, b), where a = J0, a = J0 - Jmin,

b = J max - J0.

In addition, the calculation of the values of the structural and functional resilience index

Ffailure (ca ) G {Fhota ) , Fhet a X Fpossib (Ca ) } can

be made on the assumption that the TLS structure consists only of elements that are homogeneous in the reliability of their functions, only elements that are not uniform in the reliability of their functions, and finally there are potential failures to perform their functions. For each of these three cases, by calculating the indicator values JSG, we obtain, respectively, three fuzzy triangular results: (a0 ,a0 ),( an,an,pn),(ab,ab,pb). Then, as the value of the generalized indicator of the TLS structural andfunctional resilience JSG, we will assume the average value of the results obtained

jsg ~

(a ° , b )+(a " , b )+(ab a, b )

total structural and functional resilience functioning in the

process of reconfiguration within the scenario /) , and

Sk = max {FMlure(z'a.))}*N is proportional to the

j=0,1,...,N J J

TLS total structural and functional resilience functioning along the trajectory if the possible maximum resilience of the function is maintained during the development of the considered scenario.

Thus, the task of calculating the value of the generalized indicator of the structural andfunctional resilience of the TLS has been reduced to the analysis of optimistic, pessimistic or random (arbitrary) trajectories of the structural and functional reconfiguration of the object, caused by failures (restoration) of the TLS functional elements.

It should be noted that the failure (recovery) of an element leads to the failure (recovery) of the remaining TLS functional elements logically associated with it. Therefore, in addition to the introduced generalized indicator of the

TLS structural and functional resilience JSG, it is possible

k

i P- P- P- }=P ' ,1' J2'---' JN1

to introduce an absolute index of the TLS structural and functional resilience. Each trajectory of the reconfiguration of the TLS structure is characterized by the number of degradation levels JD, the last of which corresponds to the

transfer of the TLS to an inoperable state. So for a pessimistic trajectory the number of levels is minimal and equal JD^, for an optimistic trajectory it is maximal -

J™ax. The values of the absolute indicator of the TLS

structural and functional resilience JAG will lie in the

interval [ jmin, ST ], and you can also calculate the most

expected value equal J. In this case, the values of the indicator JAG are similar, as well as JSG, can be set with a fuzzy triangular number (^ ,aA, pA), where aA = J

D>

a - Ju _ Jm]

ua~ d d

n _ rmax t0

Pa~jd ~jd ■

4 Numerical example

We explain the major determinants of the proposed method using an example. Consider an TLS given in Figure 1.

© © ©

represents the TLS (i.e., the graph G= (V, E)) as a network of non-disrupted and disrupted elements. Since the structural genome represents the TLS design, each structural stateSacan be described by a genome

Therefore, the total robustness or total failure of a path in the TLS structure dynamics can be computed using Eqs. (2).

a)

b)

Figure 1: TLS structure

c)

Figure 2: Structural robustness and disruption scenarios a) pessimistic scenario, b) optimistic scenario, c) arbitrary scenario

The simplified TLS in Figure 1 comprises fourteen nodes, i.e., the TLS elements (nodes Si and S2 are sources, i.e., suppliers; node N1 - Main Warehouse which receives the products from the suppliers; nodes N2 - N5 - Regional Warehouses who receives the products from the main Warehouses; node C1 - Customers region which is served by the main warehouses; nodes C2 - C6 - Customers regions which are served by the regional warehouses) and thirteen arcs.

The computational example for the TLS design given in Figure 1 is considered. Based on the genome method, the edges 1, 2, and 3 have been shown to be critical in the TLS considered. In Figure 2, the corresponding robustness assessments and disruption scenarios are presented according to different structural degradation levels. In Figure 2, the structure dynamics scenarios are depicted.

S denotes the structural states where disrupted

11'12'..'1k 1

operations (edges) in the TLS from Figure 1 are described by indexes ix,i2,...,ik on the abscissa scale. The state transitions are disruption-driven. In this context, a state

In the example in Figure 2, different degradation levels are shown. The degradation level 1 reflects the states with a failure in a single element that does not result in any other consequently disrupted TLS elements. The advantage of using the robustness computation by the genome method is that this allows both disruption scenario identification and the corresponding path of the ripple effect. As such, the results of this structural analysis can be used further to optimize the network reconfiguration paths with consideration of the operational TLS parameters such as capacities, processing intensities, and inventory storage. However, even in the structural analysis without a parametric optimization, the method proposed allows the critical TLS elements, the disruption of which would result in a non-fulfillment state, to be identified.

5 Conclusions

The aim of this research was to establish an explicit interrelation between the disruption scenario recognition and the optimization of the TLS reconfiguration paths - a distinctive and substantial contribution made by our study.

Our study explicitly includes the risk aversion of decisionmakers both in the disruption scenario detection and reconfiguration path optimization. Such a combination is unique in the literature and mimics the complexity of business reality affording for more realistic applications to TLS design and sourcing planning. A distinctive feature and novelty of the proposed approach is that on a single methodological basis (the original concept of the genome of the structural construction of structurally complex objects) it is possible to carry out a study of structural and functional properties and carry out an operational calculation of interval, optimistic and pessimistic estimates of structural vitality indicators as monotonic, non-monotonic, and homogeneous, heterogeneous TLS structures. The proposed indicators of the functional structural resilience, in the case of predictable, and especially unpredictable disruptions, will allow to analyze and evaluate the resilience of a particular TLS configuration.

Acknowledgments

Research carried out on this topic was carried out with partial financial support from RFBR grants (No. 17-29-07073-ofi-m, 18-07-01272, 19-08-00989), under the budget theme 0004.

References

[Bla11] Blackhurst, J., Dunn, K.S., &Craighead, C.W. (2011). An empirically derived framework of global supply resiliency. Journal of Business Logistics, 32(4), 374-391. [Dub19] Dubey R., Gunasekaran A., Childe, S. J. Wamba S.F., Roubaud D., Foropon C. (2019). Empirical Investigation of Data Analytics Capability and Organizational Flexibility as Complements to Supply Chain Resilience. International Journal of Production Research, DOI:

10.1080/00207543.2019.1582820 [Hos16] Hosseini, S., Barker, K. (2016). A Bayesian network model for resilience-based supplier selection. International Journal of Production Economics, 180, 68-87. [Col87] Colbourn, CJ (1987). The combinatorics of network reliability. New York: Oxford University Press.

[Das15] Das, K., R.S. Lashkari (2015). Risk readiness and resiliency planning for a supply chain. International Journal of Production Research, 53(22), pp. 6752-6771. [Gun15] Gunasekaran, A., N. Subramanian, S. Rahman (2015). Supply chain resilience: role of complexities and strategies. International Journal of Production Research, 53(22), pp. 6809-6819. [Iva18] Ivanov, D. (2018). Structural Dynamics and Resilience in Supply Chain Risk Management. Spring-er, New York. [Iva13] Ivanov, D., B. Sokolov (2013). Control and system-theoretic identification of the supply chain dynamics domain for planning, analysis, and adaptation of performance under uncertainty.

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

European Journal of Operational Research, 224(2), pp. 313-323.

[Iva13a] Ivanov, D., B. Sokolov, A. Pavlov (2013a). Dual problem formulation and its application to optimal redesign of an integrated production-distribution network with structure dynamics and ripple effect considerations. International Journal of Production Research, 51(18), pp. 5386-5403.

[Fox00] Fox, M.S., Barbuceanu, M., and Teigen, R. (2000). Agent-Oriented Supply Chain Management System. International Journal of Flexible Manufacturing Systems, No12, pp.165-188.

[Rab02] Rabelo, R.J, Klen, A.A.P, and Klen, E.R. (2002). Multi-Agent System for Smart Coordination of Dynamic Supply Chains. Proceedings of the 3rd International conference on Virtual Enter-prises PR0-VE'2002, pp. 379-387.

[Iva16] Ivanov, D., B. Sokolov, A. Pavlov, A. Dolgui, D. Pavlov (2016). Disruption-driven supply chain (re)planning and performance impact assessment with consideration of proactive and recovery policies. Transportation Research: Part E, 90, pp. 7-24.

[Iva16a] Ivanov, D., B. Sokolov, A. Pavlov (2016a). Exact and heuristic methods for integrated supply chain design reliability analysis. International Journal of Integrated Supply Management, 10(2), pp. 206224.

[Mis16] Mishra, D., Sharma, R. R. K., Kumar, S., & Dubey, R. (2016). Bridging and buffering: Strategies for mitigating supply risk and improving supply chain performance. International Journal of Production Economics, 180, 183-197.

[Pav18] Pavlov, A., D. Ivanov, A. Dolgui, B. Sokolov (2018). Hybrid Fuzzy-Probabilistic Approach to Supply Chain Resilience Assessment. IEEE Transactions on Engineering Management, 65(2), pp. 303-315.

[Kop10] Kopytov, E.A., A.N. Pavlov, V.A. Zelentsov (2010) New methods of calculating the Genome of structure and the failure criticality of the complex objects' elements. Transport and Telecommunication, 11(4), pp. 4-13.

[Mun15] Munoz, A., M. Dunbar (2015). On the quantification of operational supply chain resilience. International Journal of Production Research, 53(22), pp. 6736-6751.

[Rya76] Ryabinin I.A. (1976). Reliability of Engineering Systems. Principles and Analysis, Mir, Moscow.

[Sim14] Simchi-Levi D., W. Schmidt, Y. Wei (2014). From superstorms to factory fires: Managing unpredictable supply chain disruptions. Havard Business Review, February.

[Sny16] Snyder, L.V., A. Zümbül, P. Peng, R. Ying, A. J. Schmitt, B. Sinsoysal (2016). OR/MS Models for Supply Chain Disruptions: A Review. IIE Transactions, 48(2), pp. 89-109.

[Xu14] Xu, M., X. Wang, L. Zhao (2014) Predicted supply chain resilience based on structural evolution against random supply disruptions. International

Journal of Systems Science: Operations & Logistics, 1(2), pp. 105-117. [Pav18a] Pavlov, A.N., E.N. Aleshin, S.V. Zinov'ev, E.V. Kopkin, S.A. Osipenko, B.V. Sokolov (2018a). System analysis of organizational and technical systems for space application. SPb.: VKA named after A. F. Mozhaisky, P. 357.

i Надоели баннеры? Вы всегда можете отключить рекламу.