Computational analysis of the Logistics Supply Chain from a global trade perspective

Torky Althaqafi

Article ID: 9517
Vol 8, Issue 12, 2024

VIEWS - 662 (Abstract)

Abstract


Global trade is based on coordinated factors, that means labor and products are moved from their point of origin to the point of use. Strategies have a significant impact on global trade because they enable the effective development of goods across international borders. The decision making is an important task for the development of Logistics Supply Chain (LSC) infrastructure and process. Decisions on supplier selection, production schedule, transportation routes, inventory levels, pricing strategies, and other issues need to be made. These decisions may have a big influence on customer service, profitability, operational efficiency, and overall competitiveness. The Artificial Intelligence (AI) approach of Fuzzy Preference Ranking Organization Method for Enrichment Evaluation (Fuzzy-Promethee-2) is used to assess the priority selection of the factors associated with the LSC and evaluate the importance in global trade. The role of AI is very useful compare to statistical analysis in terms of decision making. The computational analysis placed promotion of exports as the most important priority out of five selected attributes in LSC, with infrastructure development. The result suggests that LSC depends heavily on export promotion as the most significant attribute. Infrastructural development also appeared another factor influencing LSC. The foreign investment was ranked the lowest. The evaluated results are useful for the policy makers, supply chain managers and the logistics professionals associated with the supply chain management.


Keywords


supply chain management; global trade; artificial intelligence; Fuzzy-Promethee-2; LSC; logistics; trade practices

Full Text:

PDF


References

  1. A. Agrawal et al., “Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective,” Symmetry 2020, Vol. 12, Page 598, vol. 12, no. 4, p. 598, Apr. 2020, doi: 10.3390/SYM12040598
  2. A. Alharbi et al., “Selection of data analytic techniques by using fuzzy AHP TOPSIS from a healthcare perspective,” BMC Med. Inform. Decis. Mak., vol. 24, no. 1, p. 240, 2024, doi: 10.1186/s12911-024-02651-8
  3. B. Ramdani, P. Kawalek, and O. Lorenzo, “Predicting SMEs’ adoption of enterprise systems,” J. Enterp. Inf. Manag., vol. 22, pp. 10–24, Feb. 2009, doi: 10.1108/17410390910922796
  4. B. Shepherd and T. Sriklay, “Extending and understanding: an application of machine learning to the World Bank’s logistics performance index,” Int. J. Phys. Distrib. Logist. Manag., vol. 53, no. 9, pp. 985–1014, Jan. 2023, doi: 10.1108/IJPDLM-06-2022-0180
  5. D. Yuan, Y. Yang, X. Liu, and J. Chen, “On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems,” J. Parallel Distrib. Comput., vol. 71, no. 2, pp. 316–332, Feb. 2011, doi: 10.1016/J.JPDC.2010.09.003
  6. E. Gu Ho, “Impact of the Ukrainian War on South Korea’s diplomacy in Central Asia,” J. Eurasian Stud., vol. 13, no. 2, pp. 172–179, Aug. 2022, doi: 10.1177/18793665221124814
  7. F. A. Alzahrani, M. Ahmad, M. Nadeem, R. Kumar, and R. A. Khan, “Integrity Assessment of Medical Devices for Improving Hospital Services,” Comput. Mater. Contin., vol. 67, no. 3, 2021, doi: 10.32604/cmc.2021.014869
  8. F. Kirmani, B. J. Lane, and J. R. Rose, “Exploring Machine Learning Techniques to Improve Peptide Identification,” in 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), 2019, pp. 66–71, doi: 10.1109/BIBE.2019.00021
  9. G. C. Stevens and M. Johnson, “Integrating the Supply Chain … 25 years on,” Int. J. Phys. Distrib. Logist. Manag., vol. 46, no. 1, pp. 19–42, Jan. 2016, doi: 10.1108/IJPDLM-07-2015-0175
  10. I. Ozturk and A. Acaravci, “The long-run and causal analysis of energy, growth, openness and financial development on carbon emissions in Turkey,” Energy Econ, vol. 36, pp. 262–267, Mar. 2013, doi: 10.1016/j.eneco.2012.08.025
  11. J. J. Buckley, “Fuzzy hierarchical analysis,” Fuzzy Sets Syst., vol. 17, no. 3, pp. 233–247, Dec. 1985, doi: 10.1016/0165-0114(85)90090-9
  12. J. Storey, C. Emberson, J. Godsell, and A. Harrison, “Supply chain management: theory, practice and future challenges,” Int. J. Oper. Prod. Manag., vol. 26, no. 7, pp. 754–774, Jan. 2006, doi: 10.1108/01443570610672220
  13. M. Alenezi, M. Nadeem, A. Agrawal, R. Kumar, and R. A. Khan, “Fuzzy multi criteria decision analysis method for assessing security design tactics for web applications,” Int. J. Intell. Eng. Syst., vol. 13, no. 5, 2020, doi: 10.22266/ijies2020.1031.17
  14. M. Çemberci, M. E. Civelek, and N. Canbolat, “The Moderator Effect of Global Competitiveness Index on Dimensions of Logistics Performance Index,” Procedia - Soc. Behav. Sci., vol. 195, pp. 1514–1524, 2015, doi: https://doi.org/10.1016/j.sbspro.2015.06.453
  15. M. Çolak, İ. Kaya, B. Özkan, A. Budak, and A. Karaşan, “A multi-criteria evaluation model based on hesitant fuzzy sets for blockchain technology in supply chain management,” J. Intell. Fuzzy Syst., vol. 38, pp. 935–946, 2020, doi: 10.3233/JIFS-179460
  16. M. Ghobakhloo, D. Arias-Aranda, and J. Benitez-Amado, “Adoption of e-commerce applications in SMEs,” Ind. Manag. Data Syst., vol. 111, no. 8, pp. 1238–1269, 2011, doi: 10.1108/02635571111170785
  17. M. Nadeem et al., “Multi-level hesitant fuzzy based model for usable-security assessment,” Intell. Autom. Soft Comput., vol. 31, no. 1, 2022, doi: 10.32604/IASC.2022.019624
  18. M. Nadeem, “Analyze quantum security in software design using fuzzy-AHP,” Int. J. Inf. Technol., 2024, doi: 10.1007/s41870-024-02002-w
  19. M. Waller, S. F.-J. of B. Logistics, and undefined 2013, “Data science, predictive analytics, and big data: a revolution that will transform supply chain design and management,” Wiley Online Libr., vol. 34, no. 2, pp. 77–84, 2013, doi: 10.1111/jbl.12010
  20. M. Yazdani and F. R. Graeml, “VIKOR and its Applications,” Int. J. Strateg. Decis. Sci., vol. 5, no. 2, pp. 56–83, Sep. 2014, doi: 10.4018/IJSDS.2014040105
  21. N. Patki, “The synthetic data vault: generative modeling for relational databases,” Massachusetts Institute of Technology, 2016.
  22. N. Patki, R. Wedge, and K. Veeramachaneni, “The Synthetic Data Vault,” in 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), 2016, pp. 399–410, doi: 10.1109/DSAA.2016.49
  23. P. C. Pathak, M. Nadeem, and S. A. Ansar, “Security assessment of operating system by using decision making algorithms,” Int. J. Inf. Technol., 2024, doi: 10.1007/s41870-023-01706-9
  24. P. S. Kumar, “A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems,” Int. J. Fuzzy Log. Intell. Syst., vol. 16, no. 4, pp. 225–237, Dec. 2016, doi: 10.5391/IJFIS.2016.16.4.225
  25. R. Carey, C. G. Coleman, and T. M. White, “The Impact of Blockchain on Logistics and Supply Chain Management: A Review,” J. Procure. Supply Chain Manag., vol. 3, no. 1, pp. 1–11, 2024, [Online]. Available: https://gprjournals.org/journals/index.php/JPSCM/article/view/235
  26. R. G. Richey Jr., S. Chowdhury, B. Davis-Sramek, M. Giannakis, and Y. K. Dwivedi, “Artificial intelligence in logistics and supply chain management: A primer and roadmap for research,” J. Bus. Logist., vol. 44, no. 4, pp. 532–549, 2023, doi: https://doi.org/10.1111/jbl.12364
  27. R. J. Kuo, Y. C. Wang, and F. C. Tien, “Integration of artificial neural network and MADA methods for green supplier selection,” J. Clean. Prod., vol. 18, no. 12, pp. 1161–1170, Aug. 2010, doi: 10.1016/J.JCLEPRO.2010.03.020
  28. R. Klein, “Assimilation of Internet-based purchasing applications within medical practices,” Inf. Manag., vol. 49, no. 3–4, pp. 135–141, May 2012, doi: 10.1016/J.IM.2012.02.001
  29. R. R. Lummus, D. W. Krumwiede, and R. J. Vokurka, “The relationship of logistics to supply chain management: developing a common industry definition,” Ind. Manag. Data Syst., vol. 101, no. 8, pp. 426–432, Jan. 2001, doi: 10.1108/02635570110406730
  30. S. A. Khan, M. Nadeem, A. Agrawal, R. A. Khan, and R. Kumar, “Quantitative analysis of software security through fuzzy promethee-ii methodology: A design perspective,” Int. J. Mod. Educ. Comput. Sci., vol. 13, no. 6, 2021, doi: 10.5815/ijmecs.2021.06.04
  31. S. H. Almotiri, M. Nadeem, M. A. Al Ghamdi, and R. A. Khan, “Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques,” Int. J. Fuzzy Log. Intell. Syst., vol. 23, no. 3, pp. 336–352, Sep. 2023, doi: 10.5391/IJFIS.2023.23.3.336
  32. S. Kirmani and M. Shankar, “Generating keywords by associative context with input words.” Google Patents, 2022.
  33. S. Kirmani, H. Sun, and P. Raghavan, “A Scalability and Sensitivity Study of Parallel Geometric Algorithms for Graph Partitioning,” in 2018 30th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), 2018, pp. 420–427, doi: 10.1109/CAHPC.2018.8645916
  34. S. Vinodh and R. Jeya Girubha, “PROMETHEE based sustainable concept selection,” Appl. Math. Model., vol. 36, no. 11, pp. 5301–5308, Nov. 2012, doi: 10.1016/J.APM.2011.12.030
  35. T. Alqudsi-ghabra, T. Al-Bannai, M. A.-B.-I. J. of, and undefined 2011, “The Internet in the Arab Gulf Cooperation Council (AGCC): Vehicle of Change.,” ijis.net, vol. 6, no. 1, pp. 44–67, 2011, Accessed: Apr. 24, 2023. [Online]. Available: https://www.ijis.net/ijis6_1/ijis6_1_alqudsi-ghabra_et_al.pdf
  36. T. Althaqafi, “Cultivating Sustainable Supply Chain Practises in Electric Vehicle Manufacturing: A MCDM Approach to Assessing GSCM Performance,” World Electr. Veh. J., vol. 14, no. 10, 2023, doi: 10.3390/wevj14100290
  37. T. Althaqafi, “Effect of inventory management on financial performance: Evidence from the Saudi manufacturing company—Case study,” Eur. J. Accounting, Audit. Financ. Res., vol. 8, no. 10, pp. 13–26, 2020.
  38. T. Althaqafi, “Environmental and Social Factors in Supplier Assessment: Fuzzy-Based Green Supplier Selection,” Sustainability, vol. 15, no. 21, 2023, doi: 10.3390/su152115643
  39. T. Schoenherr, “LOGISTICS AND SUPPLY CHAIN MANAGEMENT APPLICATIONS WITHIN A GLOBAL CONTEXT: AN OVERVIEW,” J. Bus. Logist., vol. 30, no. 2, pp. 1–25, 2009, doi: https://doi.org/10.1002/j.2158-1592.2009.tb00109.x
  40. T. Althaqafi, “The Impact of State-of-the-Art Supply Chain Management Practices on Operational Performance”, Int. J. Supply Chain Manag., vol. Vol 9, No, 2020.
  41. V. Gkioulos and N. Chowdhury, “Cyber security training for critical infrastructure protection: A literature review,” Comput. Sci. Rev., vol. 40, May 2021, doi: 10.1016/J.COSREV.2021.100361
  42. Y. Yu, X. Wang, R. Y. Zhong, and G. Q. Huang, “E-commerce Logistics in Supply Chain Management: Practice Perspective,” Procedia CIRP, vol. 52, pp. 179–185, 2016, doi: https://doi.org/10.1016/j.procir.2016.08.002


DOI: https://doi.org/10.24294/jipd.v8i12.9517

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Torky Althaqafi

License URL: https://creativecommons.org/licenses/by/4.0/

This site is licensed under a Creative Commons Attribution 4.0 International License.