Abstract

Efficient and reasonable supply chain management helps enterprises improve their efficiency, reduce costs, shorten cash flow times, and reduce enterprise risks. Risk prevention and control is a safety symbol for supply chains. To explore different influence degrees of multirisk factors and multilinks on enterprises, we propose a supply chain risk prevention and control model based on a fuzzy influence diagram and Hopfield neural network. Using the model that both calculates the risk size and occurrence probability of the supply chain and allows identifying various risk prevention and control levels, the supply chain risk is evaluated both objectively and fairly. We analyzed the theoretical and practical properties of supply chain risk prevention and control models and used it in the H company to illustrate this model.

1. Introduction

A supply chain connects logistics, capital flow, and information flow from suppliers to customers and companies to generate revenue through value-added links such as processing, packaging, and transportation [1]. Affected by market globalization, an unstable supply and demand, shortened life cycle of products and technology, turbulent external environment of enterprises, complex cooperation networks, and other factors causes the relationship of a supply chain to become increasingly complex, which has some negative characteristics. As a result, the internal and external risks of a supply chain are increasing [24]. Most research studies on supply chain risks have focused on the classification of trigger events, which are usually called supply chain risk and are understood as the starting point for risk identification [5, 6]. Therefore, in supply chain risk management, risk is characterized by the probability of events and loss to the enterprise. This article postulates that supply chain risks are affected by various factors (such as the subject, object, and environment) that cause the development of a certain event to deviate from the expected activity goal. This poses a potential threat of damage and loss to upstream and downstream enterprises and even the entire supply chain [79].

Supply chain risks include those caused by the lack of communication and trust between enterprises and those resulting in the failure or increased loss of the entire supply chain. This involves many links, such as transportation, distribution, warehousing, loading and unloading, handling, packaging, circulation processing, information processing, and others. Deviation activities and risk events in any link cause supply disruptions and lead to the normal operation of enterprises, which causes significant losses. An effective and proper risk management approach requires appropriate and systematic methodology, knowledge, and experience [10]. Research on supply chain risk has gradually become the focus of common concern in academia and business circles and is a new research direction in supply chain management. In related studies, some researchers noted that supply chain risk is determined by its fragility. This includes environmental, institutional, supply, demand, operational process, and failure risks of preventive measures [11]. Some scholars believe that uncertainty and supply disruption caused by external factors are vital to supply chain risks, which should be included in supply chain security-management systems [12, 13]. Some researchers such as Harland et al. [14], Muntaka et al. [15], Seipp et al. [16], Hezla et al. [17], Collier and Sarkis [18], and Nazifa and Ramachandran [19] studied supply chain risk from different perspectives. Jiang and Liu [20] considered supply chain scheduling optimization as a multiobjective optimization problem from the perspective of supply chain optimization to analyze the problem of risk prevention and control. This approach combines the fuzzy correlation entropy (FCE) and particle swarm optimization into an FCE-based multiobjective optimization approach. Most of the related literatures focus on a certain stage of supply chain risk management, such as risk identification and assessment, or propose prevention and control measures for certain types of specific risks. However, there is a lack of more systematic research systems on supply chain risk. In addition, supply chain risk prevention and control includes the quantitative analysis and verification research based on the model algorithm, which has been enough and needs to be further improved and explored. Based on the existing research study, this paper further discusses supply chain risk prevention and control and takes fuzzy logic and a neural network as the theoretical support [21]. We propose a supply chain risk prevention and control model based on a fuzzy influence diagram and Hopfield neural network and apply the model to specific examples. In the application process of the model, the risk sources are first analyzed, and the risk evaluation index system is established. The risk level and occurrence probability are then studied based on risk identification and attribution. Finally, the risk prevention and control level are effectively identified, and specific prevention and control strategies are postulated for the critical points of risk prevention and control. The model solves risk problems caused by “uncertainty” and “fuzziness” in the supply chain risk assessment, provides concepts and methods to identify different risk prevention and control levels, and is beneficial for enterprises to formulate supply chain risk prevention and control strategies, which has specific theoretical and practical significance.

2. Materials and Methods

2.1. Fuzzy Influence Diagram

An influence diagram is an excellent decision-making modeling tool established by Hu et al. It has the advantages of intuition and flexibility [22] and can transmit evaluation information as given by decision-makers. This helps understand and construct the relationship between the structure and variables of complex decision-making problems in uncertain environments and obtain answers through uncertain reasoning [23]. However, actual decision-making problems are often in complex and uncertain environments and coupled with the fuzziness of human thinking. This makes it difficult for decision-makers to give accurate probability values of events. Therefore, the combination of an influence diagram and fuzzy set theory is used to build a fuzzy influence diagram (FID) to provide an improved concept and method for risk decision-making research [24].

Shachter [25, 26] introduced influence diagrams and common probability calculation methods. From a graph theory perspective, a direct graph is composed of a node set and a direct arc set. The net is a graph with conditional data in the node and arc, and the influence graph is a net composed of a direct graph without a cycle.

It is assumed that the data graph with is a direct acyclic graph; is a random node variable; : is the node number of G; arc with ; and the preorder influence diagram of is a data diagram , which has (m−1) conditions and is independent of ( for ). Here, and . If is a set of nodes and there is no direct graph from to in , then where is the direct compact prenode of .

When solving the influence diagram, the most challenging step is to establish the edge probability of each node and the conditional probability between nodes. A probability distribution is often based on empirical speculation or subjective estimation, indicating it cannot easily obtain an accurate probability of variables or conditional probability between them. In addition, solving subjective probability estimations may violate probability theory. According to fuzzy set theory, a fuzzy influence diagram can overlap fuzzy sets, which solves the above problems.

The fuzzy relationship between fuzzy subsets A and B is as follows: , where and with being the domain. The sum of the fuzzy relationship R and S is . The eigenvalue is , and the eigenvalue of the intersection of R and S is . It is necessary to quantify the linguistic variables to describe the relationship between nodes in the influence graph with fuzzy set theory, suggesting that two types of fuzzy sets should be defined. One is used to describe the event and event frequency of each independent node, and the other is used to express the fuzzy relationship between preorder and postorder nodes.

In the influence diagram (as shown in Figure 1), X is an independent node of the frequency matrix, and the vector of X is , where are the fuzzy event sets defined by the linguistic variables.

It is assumed that the frequency vector of the independent node X is as follows:where are frequency fuzzy sets that correspond to each possible state in the frequency vector of node X.

The frequency matrix of the independent node X is as follows:

If the preorder nodes of z are m random nodes , let denote the union of all preorder node frequency matrices of Z. Then,

Let denote the fuzzy relationship from node to node Z. Then,where and .

The fuzzy relation from node to node Z is as follows:

The union of the fuzzy relationship is as follows:

The frequency matrix of node Z is as follows:

A row is selected from the frequency matrix of the value node. If the sum of the membership values multiplied by its frequency is the largest in all rows, it is the membership of random results. Then, the probability function of each random result is as follows:

2.2. Hopfield Neural Network

The discrete Hopfield neural network (DHNN) and its learning algorithm were first proposed by American physicist Hopfield in 1982 [27]. The HNN uses the parallel propagation method to process data simultaneously; however, the amount of computation does not change with time. This avoids the “combinatorial explosion” problem and is superior to graph theory and programming algorithms. A fully connected neural network can simulate the memory mechanism of a biological neural network using binary neurons. Discrete values of −1 and 1 represent the neural network’s output, which describes a neuron in the state of activation or inhibition. When the neuron is stimulated beyond its threshold, its state is 1; otherwise, it is −1. The Hopfield network provides a model to simulate human memory.

2.2.1. Network Structure

The DHNN is a feedback network with a single-layer and binary output. The output of each neuron is connected to the input of the other neurons, and each node is without self-feedback. The 0th layer is used as the network input, and the first layer is the neuron, which performs the cumulative sum of the input information multiplied by the weight coefficient to produce the output information after processing by the nonlinear function f.

The input information is simplified to two extreme values through the threshold function f (sigmoid function). If the output information of the neuron is greater than the threshold , the neuron’s input takes the value 1; if less, its output is −1. The threshold function is .

2.2.2. Network Working Mode

The Hopfield network operates dynamically, with a working process that includes the evolution of the neuron state. That is, it evolves from the initial state in the decreasing direction of “energy” (Lyapunov function) until reaching a steady-state, which is the network output.

Here, it is assumed that the operation of the Hopfield neural network is serial (asynchronous). That is, at any time t, only one neuron changes, while the state of other neurons remains unchanged. The network operational steps are as follows:Step 1.Initialize the networkStep 2.Randomly select a neuron i from the networkStep 3.Calculate the input of neuron iStep 4.Calculate the output of neuron i, while the outputs of other neurons remain unchangedStep 5.If the network reaches the stable state or satisfies the given conditions, end the evolution; otherwise, go to step 2 and continue

A network’s stable state is described as unchanging from a specific time, which is called a stable network.

2.2.3. Network Stability

In a dynamic system, the steady-state can be understood as the convergence of the energy function to its minimum after decreasing continuously over the system’s evolution. Thus, the sufficient conditions of the Hopfield network stability are as follows:

When the weight coefficient matrix W is symmetric and the diagonal elements are 0, the network is stable. Here, the orthogonalization method is selected to design the weight coefficient matrix. The weight correction method used by the newhop() function in the MATLAB neural network toolbox is the orthogonalization method, and the associated algorithm is given as follows. (Algorithm 1)

Step 1. Design N input modes and parameters and
 Step 2. Calculate
 Step 3. Calculate the singular value decomposition and rank of A
 Step 4. Calculate and with and
 Step 5. Calculate and
 Step 6. Calculate
 Step 7. Calculate , where and

3. Model Application

This paper takes the H company as an example, uses the risk prevention and control model to study the supply chain risk and influencing factors, and introduces risk prevention and control strategies.

3.1. Establishment of Supply Chain Risk Structure

From May 2018 to April 2019, the H company implemented 12 projects involving hundreds of product parts. There were between 25 and 68 suppliers, for electrical components, sheet metal plastic parts, and other connectors.

According to the data and information of the H company’s supply chain issues and future development strategy, this paper sorts out all the influencing factors of their supply chain risk to the influence diagram which is drawn based on the interactions between risk factors. Each risk factor is an independent node and is the prenode of the risk event. The front node is released once the back nodes’ frequency matrix is obtained in the calculation process. The topological structure of the model influence diagram for the supply chain risk influencing factors is shown in Figure 2.

3.2. Risk Analysis Process of Supply Chain
3.2.1. Defining Fuzzy Sets

The domain of probability is defined as . Then, the frequency fuzzy set and membership degree are determined as follows:

The fuzzy set for the state and membership degree is defined as follows:

Fuzzy sets do not easily describe the states of some independent nodes, or the states are deterministic values and can be fuzzed as follows:

The fuzzy relationship between nodes is determined based on expert suggestions. First, the random events and frequency estimates of independent nodes are described, as shown in Table 1. Second, the fuzzy relationship between nodes is described, as shown in Table 2.

3.2.2. Calculation of Frequency Matrices of Independent Nodes

We calculate the probability distribution of nodes using the following steps: (1) independent node frequency matrix; (2) nonindependent node frequency matrix; (3) fuzzy relationship between nodes; (4) frequency matrix with compact front nodes; and (5) frequency matrix of value node.

According to equation (2), the frequency matrices of independent nodes are calculated and the nodes are released. The frequency matrices of F(1)_F(16) are as follows:

3.2.3. Calculation of Frequency Matrices for Nonindependent Nodes

To calculate the frequency matrices of nonindependent nodes, it is necessary to calculate their union and fuzzy relationship union for the prenodes. The joint frequency matrices of F(17), F(18), F(19), F(20), F(21), and F(22) are calculated from equation (3). ; ; ; ; ; and .

The associated frequency matrix union is as follows:

3.2.4. Calculation of Fuzzy Relationship

The corresponding fuzzy relationship between nodes is calculated from equation (5) and the relationship nodes in Table 2. The union of fuzzy relationship matrices for prenodes is as follows:

3.2.5. Calculation of Node Frequency Matrices with Prenodes

The frequency matrices of nodes with prenodes are as follows:

3.2.6. Calculation of Value Node Frequency Matrices

Finally, the frequency matrix of value node 22 is calculated. First, the union of the frequency matrices and the fuzzy relationship for all its prenodes is calculated. Then, the frequency matrix F(22) of the supply chain risk prevention and control nodes is as follows:

In the matrix F(22), the sum of membership degrees for each row is calculated and then multiplied by the corresponding frequency to determine the maximum value. The membership degree is determined from equation (8), and the probability distribution and cumulative probability are calculated, as shown in Table 3.

From Table 3, the probability of supply chain risk between −10-5% is 30.72%, that between 10 and 20% is 24.10%, and that between 30 and 50% is 45.18%. Therefore, the supply chain risk is high, and the associated probability of the value node is shown in Figure 3.

3.3. Supply Chain Risk Prevention and Control
3.3.1. Hopfield Neural Network Equilibrium Point and Index Coding

(1)  Equilibrium Point of Hopfield Neural Network. The calculation results in Section 3.2 indicate that the risk probability of the supply chain is concentrated in the high-risk stage of 30–50%. The risk impact level can be determined from the risk impact diagram shown in Figure 4. Five levels of supply chain risk prevention and control are designed based on the frequency fuzzy sets and membership degree of the influencing factors, and the equilibrium points of the HNN are established.(2)  Index Coding Rules. The associative ability of a DHNN can encode risk indicators and map them to neuron states. The coding rule is that the neuron state of a DHNN has two cases of 1 and −1. When it is greater than or equal to the index value of a certain level, the corresponding neuron state is set to 1; otherwise, it is −1.

3.3.2. Simulation Results and Risk-Control Strategy Analysis

The DHNN is established using the MATLAB simulation platform. Based on the five levels of risk prevention and control indicators and coding, the H company’s 12-month supply chain data in 2020 are coded as the input of the Hopfield neural network. The simulation results are obtained after the training. Finally, the results are compared with the equilibrium level to further verify the model rationality shown in Figures 5 and 6.

The risk factors with levels greater than or equal to 3 are set as the critical areas of risk prevention and control for the H company. Therefore, the simulation results indicate that the risk prevention and control of the H company should focus on financial budget risk (Class 3), cost control risk (Class 3), customer financial risk (Class 3), procurement bidding risk (Class 5), material loss risk (Class 4), human capital risk (Class 3), information management risk (Class 5), market demand fluctuation risk (Class 5), and customer loss risk (Class 3). The risk factors of Class 5 are set as level-I priority prevention and control, those of Class 4 are set as level-II, and those of Class 3 are set as level-III. The priority order is I > II > III. The H company supply chain risk-control strategy is shown in Table 4.

4. Conclusions

Supply chain risk management is essential to research modern supply chain management, which is concerned primarily with constructing a quantified supply chain risk assessment as well as a prevention and control model. This paper proposes a supply chain risk prevention and control model based on a fuzzy influence diagram and the DHNN. The model effectively evaluates the supply chain risk, judges the risk level, and identifies the critical risk points. Finally, this paper takes the H company as an example to analyze the key points and priority sequence of risk control using the prevention and control model and proposes supply chain risk-control strategies and specific measures suitable for the H company. This provides a quantitative analysis for supply chain risk prevention and control.

The advantage of the proposed research method is that the information is complete, including probability estimation, alternatives, and decision-maker preference. This avoids the limitations of simple qualitative and quantitative methods while solving the difficulties of qualitative and quantitative nonsystem combinations. This provides theoretical support to accurately position key risk factors in the supply chain and has certain theoretical significance. The practical significance is to guide enterprises to clarify the key points and priority sequence of supply chain risk prevention and control, establish targeted risk prevention and control strategies, and reduce the costs of risk prevention and control. The methods employed in the paper also have some limitations. The calculation scale increases linearly with the number of risk factors. Thus, a large number of probability and utility values are required, making it difficult to model complex problems.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by funding from the Education Department of Guangxi Government Foundation under contract no. 2020KY05040, the National Key R&D Program of China Function under contract no. 2020YFF0305300, and National Natural Science Foundation of China under contract no. 72104122.