Analysis of Information Propagation Mechanism Based on Hierarchical Temporal Memory

Article Preview

Abstract:

This paper proposes to develop method for disruption mechanism analysis of supply chain systems against information propagate fluctuation, information distortion and non recurrent disasters,with an objective of achieving recognition of supply chain disruption mechanism and control efficiency. Disruption knowledge structure preferences will be modeled and evaluated under different types of supply chain scenarios. A hierarchical temporal memory modeling framework incorporating various measures is established, which can be used to better understand the effects of disruption preferences on supply chain planning, and to find a robust solution against disruption scenarios. Simulation includes supply chain disruption management using past disruption scenario of individual phases data will be carried out for HTM training and testing analysis of model parameters. A key feature of this proposed research distinguishing itself from most existing studies is the integration of hierarchical temporal memory technology and the disruption management of the entire supply chain.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3429-3433

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] CHRISTOPHER S. TANG Robust strategies for mitigating supply chain disruptions International Journal of Logistics: Research and Applications Vol. 9, No. 1, March 2006, 33–45.

DOI: 10.1080/13675560500405584

Google Scholar

[2] Christopher S. Tang. Robust strategies for mitigating supply chain disruptions, Decision, Operations and Technology Management, 2005 , pp.22-35.

Google Scholar

[3] Zhibin (Ben) Yang, Göker Aydın, Volodymyr Babich Supply Disruptions, Asymmetric Information, and a Backup Production Option, MANAGEMENT SCIENCE Vol. 55, No. 2, February 2009, p.192–209.

DOI: 10.1287/mnsc.1080.0943

Google Scholar

[4] Brian Tomlin, On the Value of Mitigation and Contingency Strategies for Managing Supply Chain Disruption Risks MANAGEMENT SCIENCE Vol. 52, No. 5, May 2006, 639–657.

DOI: 10.1287/mnsc.1060.0515

Google Scholar

[5] Kang Zhao ; Kumar, A. ; Harrison, T.P. ; Yen, J. ; Analyzing the Resilience of Complex Supply Network Topologies Against Random and Targeted Disruptions, Systems Journal, IEEE , March 2011 , V(5-1) 28.

DOI: 10.1109/jsyst.2010.2100192

Google Scholar

[6] Xiao Haidong, Li Jianhua, Analysis of Security Situation of Networks based on Knowledge base,Published on WSEAS Transactions on Electronics, v 3, n 1, January, 2006, pp.34-39.

Google Scholar

[7] Xiao Haidong, Li Jianhua, Analysis of Grid Security Authorization Police Based on Knowledge Mining, published on WSEAS Transactions on Computers, v 4, n 9, September, 2005, pp.1105-1112.

Google Scholar

[8] A. Aamodt, E. Plaza (1994); Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches. AI Communications. IOS Press, Vol. 7: 1, 1994, 39-59.

DOI: 10.3233/aic-1994-7104

Google Scholar

[9] J. Hawkins & S. Blakeslee, On Intelligence. New York: Henry Holt, (2004).

Google Scholar

[10] Hierarchical Temporal Memory Concepts, Theory, and Terminology Jeff Hawkins and Dileep George, Numenta Inc.

Google Scholar

[11] Joost van Doremalen, Lou Boves Spoken Digit Recognition using a Hierarchical Temporal Memory, 2008 ISCA, pp.2566-2570.

DOI: 10.21437/interspeech.2008-636

Google Scholar

[12] Speech Processing with Hierarchical Temporal Memory, Document Version 1. 0, June 2008, pp.8-12.

Google Scholar

[13] D. George & B. Jaros, The HTM Learning Algorithms, Numenta, (2007).

Google Scholar