Seda Turk
A simulated annealing approach to supplier selection aware inventory planning
Turk, Seda; Miller, Simon; �zcan, Ender; John, Robert
Authors
Simon Miller
Professor Ender Ozcan ender.ozcan@nottingham.ac.uk
PROFESSOR OF COMPUTER SCIENCE AND OPERATIONAL RESEARCH
Robert John
Abstract
Selection of an appropriate supplier is a crucial and challenging task in the effective management of a supply chain. Also, appropriate inventory management is critical to the success of a supply chain operation. In recent years, there has been a growing interest in the area of selection of an appropriate vendor and creating good inventory planning using supplier selection information. In this paper, we consider both of these tasks in a two-stage approach employing Interval Type-2 Fuzzy Sets (IT2FS) and Simulated Annealing (SA). In the first stage, the supplier selection problem is solved by using IT2FS for ranking the suppliers. We present an inventory model incorporating information from the first stage that captures the influence of supplier risk on the total cost of supply chain operation. In the second stage, SA is used for solving the inventory planning problem based on this model improving on both supply chain operation cost and supplier risk. In this study, we evaluated our approach using different scenarios and scalarisation techniques for SA to handle two objectives, simultaneously.
Citation
Turk, S., Miller, S., Özcan, E., & John, R. A simulated annealing approach to supplier selection aware inventory planning. Presented at 2015 IEEE Congress on Evolutionary Computation (CEC2015)
Conference Name | 2015 IEEE Congress on Evolutionary Computation (CEC2015) |
---|---|
End Date | May 28, 2015 |
Acceptance Date | May 25, 2015 |
Publication Date | May 25, 2015 |
Deposit Date | Jun 13, 2016 |
Publicly Available Date | Jun 13, 2016 |
Peer Reviewed | Peer Reviewed |
Book Title | 2015 IEEE Congress on Evolutionary Computation (CEC) |
DOI | https://doi.org/10.1109/CEC.2015.7257105 |
Public URL | https://nottingham-repository.worktribe.com/output/751439 |
Publisher URL | http://dx.doi.org/10.1109/CEC.2015.7257105 |
Additional Information | Published in: 2015 IEEE Congress on Evolutionary Computation (CEC) proceedings, 25-28 May 2015, Sendai, Japan. IEEE, 2015, ISBN 9781479974924, pp. 1799-1806. doi:10.1109/CEC.2015.7257105 © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Contract Date | Jun 13, 2016 |
Files
SA_supplychain.pdf
(287 Kb)
PDF
Copyright Statement
Copyright information regarding this work can be found at the following address: http://creativecommons.org/licenses/by-nc-nd/4.0
You might also like
Modelling cyber-security experts' decision making processes using aggregation operators
(2016)
Journal Article
From Interval-Valued Data to General Type-2 Fuzzy Sets
(2014)
Journal Article
Towards a more systematic approach to secure systems design and analysis
(2013)
Journal Article
Interval type-2 fuzzy modelling and stochastic search for real-world inventory management
(2012)
Journal Article
CUDA-based parallel local search for the set-union knapsack problem
(2024)
Journal Article
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search