Computer Science ›› 2021, Vol. 48 ›› Issue (10): 351-358.doi: 10.11896/jsjkx.200900144

• Interdiscipline & Frontier • Previous Articles    

Study on Co-evolution of Underload Failure and Overload Cascading Failure in Multi-layer Supply Chain Network

LI Shu1, YANG Hua1, SONG Bo2   

  1. 1 School of Electronic and Optical Engineering,School of Microelectronics,Nanjing University of Posts and Telecommunications,Nanjing 210046,China
    2 School of Modern Posts,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
  • Received:2020-09-20 Revised:2021-02-16 Online:2021-10-15 Published:2021-10-18
  • About author:LI Shu,born in 1996,postgraduate.Her main research interests include supply chain network analysis and so on.
    YANG Hua,born in 1982,Ph.D,asso-ciate professor.Her main research inte-rests include complex networks and chaos communications.
  • Supported by:
    National Natural Science Foundation of China(61971240,61401226) and Natural Science Foundation of Hunan Province(2019JJ60024).

Abstract: The supply chain network is closely related to our lives,and the cascading failure of the supply chain network has always been a hot research topic.This paper proposes a multi-layer supply chain network mixed failure model,which can better simulate the process of real supply chain network collapse and provide a reference for preventing supply chain network collapse.By establishing the supply chain network model of upper-level supplier network overload cascade failure and lower-level retailer network underload failure,the vulnerability of the supply chain network is studied when the upper and lower networks are attacked through different attack strategies.In the case of a certain initial attack ratio,the upper-layer supplier network is more robust than the lower-layer retailer network.Under the same attack ratio,the scale of the network crash when deliberately attacking network nodes is larger than that of random attacks.When the upper-layer supplier network node is initially attacked,the thresholdof network collapse is lower,which is more prone to collapse.This paper verifies the validity of the model and provides a new research model for preventing the collapse of the supply chain network.

Key words: Cascading failure, Multi-layer supply chain network, Overload failure, Underload failure, Vulnerability

CLC Number: 

  • TP311
[1]LIAO Z D,ZHENG G H.Research on the evolution of supply chain considering the characteristics of different node behavior elements[J].Application Research of Computers,2020,37(6):1679-1682,1692.
[2]TANG L,JING K,HE J,et al.Robustness of assembly supply chain networks by considering risk propagation and cascading failure[J].Physica A:Statistical Mechanics and Its Applications,2016,459:129-139.
[3]ZHAO Z G,ZHOU G G,LI H X.Research on the Attack Stra-tegy and Robustness of Complex Weighted Supply Chain Network[J].Computer Science,2019,46(8):138-144.
[4]LI Z,GUO Y H,XU G A,et al.Dynamic analysis of cascade with emergency recovery mechanism in complex network[J].Acta Physica Sinica,2014,63(15):417-428.
[5]DUI H Y,MENG X Y,HUI X,et al.Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game[J].Reliability Engineering and System Safety,2020,199:106919.
[6]SUN J Y,TANG J M,FU W P,et al.Construction of a multi-echelon supply chain complex network evolution model and robustness analysis of cascading failure[J].Computers & Industrial Engineering,2020,144:106457.
[7]LIU H,ZHOU G G,FU P H.Research on Local EvolutionModel of Hierarchical Supply Chain Complex Network[J].Computer Science,2013,40(2):270-273.
[8]ZHONG J L,SANHEDRAI H,ZHANG F M,et al.Networkendurance against cascading overload failure[J].Reliability Engineering and System Safety,2020,201:106916.
[9]BELLINGERI M,CASSI D.Robutness of weighted networks[J].Physica A:Statistical Mechanics and Its Applications,2018,489:47-55.
[10]LI H L,CHEN W H.The impact of the new crown epidemic on the global manufacturing supply chain and countermeasures[J].Price Theory and Practice,2020,40(5):272-275.
[11]FENG G Z,SUN Y Y.The impact of the new crown pneumonia epidemic on the economy and society from the perspective of supply chain[J].Journal of Xi'an Jiaotong University (Social Science Edition),2020,40(4):42-49.
[12]UNCTAD.Impact of COVID-19 pandemic on global FDI andGVCs updated analysis[R].New York:UNCTAD,2020.
[13]ZHU W X,ZHANG P,LI P F,et al.The plight of small,me-dium and micro enterprises and the improvement of policy efficiency under the impact of the epidemic-Based on the analysis of two national questionnaire surveys[J].Management World,2020,36(4):13-26.
[14]LI X,CHENG G R.A local-world evolving network model[J].Physica A:Statistical Mechanics and Its Applications,2003,328(1):274-286.
[15]DUAN D L,WU J,DENG H Z,et al.A cascading failure model of complex networks based on adjustable load redistribution[J].System Engineering Theory and Practice,2013,33(1):203-208.
[16]GAO J,CHEN Y Y.Analysis of supply chain network vulnerability under cascade failure[J].Logistics Engineering and Ma-nagement,2016,38(10):80-83,42.
[17]TANG L,HE J,JING K.Research on the Cascade FailureMechanism and Robustness of Related Supply Chain Networks[J].Journal of Management Science,2016,19(11):33-44,62.
[18]WANG Y C,XIAO R B.Supply chain network cascading failure modeling based on underload failure[J].Computer Integrated Manufacturing System,2020,26(5):1355-1365.
[19]JIANG W J,LIU R R,FAN T L,et al.Overview of preventionand recovery strategies for multi-layer network cascade failure[J].Acta Physica Sinica,2020,69(8):81-91.
[20]WANG H,GU T,JIN M,et al.The complexity measurement and evolution analysis of supply chain network under disruption risks[J].Chaos,Solitons & Fractals,2018,116(11):72-78.
[21]LI G,ZHAO D Z.Study on the scale-free characteristics of supply chain networks[J].Industrial Engineering,2012,15(1):28-32.
[1] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[2] WANG Xue-guang, ZHANG Ai-xin, DOU Bing-lin. Non-linear Load Capacity Model of Complex Networks [J]. Computer Science, 2021, 48(6): 282-287.
[3] LI Ming-lei, HUANG Hui, LU Yu-liang, ZHU Kai-long. SymFuzz:Vulnerability Detection Technology Under Complex Path Conditions [J]. Computer Science, 2021, 48(5): 25-31.
[4] ZHENG Jian-yun, PANG Jian-min, ZHOU Xin, WANG Jun. Enhanced Binary Vulnerability Mining Based on Constraint Derivation [J]. Computer Science, 2021, 48(3): 320-326.
[5] LI Yi-hao, HONG Zheng, LIN Pei-hong. Fuzzing Test Case Generation Method Based on Depth-first Search [J]. Computer Science, 2021, 48(12): 85-93.
[6] TU Liang-qiong, SUN Xiao-bing, ZHANG Jia-le, CAI Jie, LI Bin, BO Li-li. Survey of Vulnerability Detection Tools for Smart Contracts [J]. Computer Science, 2021, 48(11): 79-88.
[7] HUANG Yi, SHEN Guo-wei, ZHAO Wen-bo, GUO Chun. Network Representation Learning Algorithm Based on Vulnerability Threat Schema [J]. Computer Science, 2020, 47(7): 292-298.
[8] GONG Kou-lin, ZHOU Yu, DING Li, WANG Yong-chao. Vulnerability Detection Using Bidirectional Long Short-term Memory Networks [J]. Computer Science, 2020, 47(5): 295-300.
[9] LIU Qiang,KUANG Xiao-hui,CHEN Hua,LI Xiang,LI Guang-ke. Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing [J]. Computer Science, 2019, 46(7): 126-132.
[10] LI Jia-li, CHEN Yong-le, LI Zhi, SUN Li-min. Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph [J]. Computer Science, 2018, 45(9): 171-176.
[11] WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming. Security Analysis of Heterogeneous Redundant Systems [J]. Computer Science, 2018, 45(9): 183-186.
[12] SUO Yan-feng, WANG Shao-jie, QIN Yu, LI Qiu-xiang, FENG Da-jun and LI Jing-chun. Summary of Security Technology and Application in Industrial Control System [J]. Computer Science, 2018, 45(4): 25-33.
[13] ZHANG Ya-feng, HONG Zheng, WU Li-fa, ZHOU Zhen-ji and SUN He. Protocol State Based Fuzzing Method for Industrial Control Protocols [J]. Computer Science, 2017, 44(5): 132-140.
[14] WAN Yan, ZHAO Xi and WANG Guo-lin. Android Vulnerability Detection and Assessment System Based on OVAL [J]. Computer Science, 2017, 44(4): 79-81.
[15] MIAO Xu-dong, WANG Yong-chun, CAO Xing-chen and FANG Feng. Detection Approach for Security Vulnerability Based on Pattern Matching [J]. Computer Science, 2017, 44(4): 109-113.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!