Professional Documents
Culture Documents
= = =
(
=
(
n m
j j
i gi gi
i j
S M M (2)
To obtain
1
m
j =
j
gi
M perform the fuzzy addition operation of m extent analysis values for a
particular matrix
Such that:
1 1 1 1
, , (3)
= = = =
| |
=
|
|
\
m m m m
j
gi j j j
j j j j
M l m u (3)
and to obtain
1
1 1
= =
(
(
n m
j
gi
i j
M , perform the fuzzy edition operation of m extent analysis values
for a particular matrix such that:
38 Mohammad Ali Vosooghi, Safar Fazli and Reza Kiani Mavi
1 1 1 1 1
, , (4)
= = = = =
| |
=
|
|
\
n m m m m
j
gi i i i
i j j j j
M l m u (4)
Then, the inverse of the vector in equation (5) is computed as:
1
1 1
1 1 1
1 1 1
, ,
= =
= = =
| |
( |
=
|
\
n n
j
gi n n n
i j
i i i
i i i
M
u m l
(5)
Step 2. The degree of possibility of M
2
= (l
2
, m
2
, u
2
) M
1
= (l
1
, m
1
, u
1
) is defined as:
( ) ( ) ( )
2 1 1 2
[ ( , )]
M M
V M M Sup Min x y = (6)
this can be expressed equivalently as follows:
( ) ( )
2
2 1
2 1 2 1 1 2
1 2
2 2 1 1
1
( ) ( ) ( ) 0 (7)
if
V hgt d if
M
otherwise
m m
l u M M M M
l u
m u m l
= = =
(7)
where d is the ordinate of the highest intersection point D between
M1
and
M2
(see Figure. 1). To
compare M
1
and M
2
, both the values of V(M
1
M
2
) and V(M
2
M
1
) are needed.
Step 3. The degree possibility for a convex fuzzy number to be greater than k convex fuzzy
numbers Mi (i = 1, 2, . . . , k) can be defined by:
V (M M
1
, M
2
, . . . ,M
k
) = V[ (M M
1
) and (M M
2
) and . . . and (M M
k
) ] = min
V(M M
i
) , i = 1 , 2, . . . ,k . (8)
Assume That :
d (S
i
) = min V (S
i
S
k
) (9)
Figure 1: The intersection between M1 and M2
For k = 1, 2, . . . , n; k i. Then the weight vector is given by:
W = d (S
1
), d (S
2
), . . . , d (S
n
))
T
(10)
where S
i
(i = 1, 2, . . . , n) are n elements.
Step 4. After normalization (the elements of each column is divided by the sum of that column
and the elements in each resulting row are added and this sum is divided by the number of elements in
the row), the normalized weight vectors are obtained as follows:
W = (d(S
1
), d(S
2
), . . . , d(S
n
))
T
Where W is not a fuzzy number.
Crude Oil Supply Chain Risk Management with Fuzzy Analytic Hierarchy Process 39
In fuzzy-AHP, firstly, the criteria and alternatives importance weights must be compared. For
this reason, there must be linguistic terms and their equivalent fuzzy numbers denoting comparison
measures. Afterwards, for the first step, the comparisons about the criteria and alternatives, and the
weight calculation need to be made. Thus, the evaluation of the criteria according to the main goal and
the evaluation of the alternatives for these criteria must be realized. Then, after all these evaluation
procedure, the weights of the alternatives can be calculated (Gumus, 2009).
4. Criteria of Decision Making
In the following we define five risk sources, a, b, c, d, and e as our decision making criteria. For doing
so we apply the taxonomy of Wagner and Bode, (2008) and then by using experts viewpoints and
reviewing existing literature define risk types for each risk source as sub-criteria. Then we explain risk
management strategies.
1. Criteria
a) Demand side risks: These risks are based on downstream supply chain activities (Svensson,
2002). In other words demand side risks results from disruptions emerging from downstream
operations supply chain (Jttner, Supply Chain Risk Management - Understanding the
Business Requirements From a Practitioner Perspective, 2005).
b) Supply side risks: companies are exposed to various risks associated with the upstream side of
their supply chains. These risks reside in purchasing, suppliers, supplier relationships, and
supply networks (Wagner and Bode, 2008).
c) Regulatory risks: This category refers to the legal enforceability and execution of supply
chain-relevant laws and policies as well as the degree and frequency of changes in these laws
and policies (Wagner and Bode, 2008).
d) Infrastructure risks: This category of risk involves disruptions that materialize from the
infrastructure that a firm maintains for its supply chain operations (Wagner and Bode, 2008).
Among the risks reported in Marsh national oil company conference 2007, one of them is
upgrading systems and structures, such that they continue to meet required technical
standards and existing proposed usage requirements.
e) Catastrophic: This category involves pervasive events that, when they occur, have a severe
impact on the area of their occurrence (Wagner and Bode, 2008).
The hierarchy of the SCRM is as figure 2.
Figure 2:The hierarchy of the SCRM
5. Applying the Illustrated Method
The aggregated comparison matrix for supply chain risk management can be seen from Table 1.
SCRM
Infrastructure
risks
Regulatory
risks
Supply side
risks
Demand side
risks
Catastrophic
40 Mohammad Ali Vosooghi, Safar Fazli and Reza Kiani Mavi
Table 1: Inter-criteria comparison matrix
C1 C2 C3 C4 C5
C1 (1,1,1) (1,3,5) (3/2,2,5/2) (2/5,1,2/3) (3/2,2,5/2)
C2 (1/5,1/3,1) (1,1,1) (1,3,5) (1/5,1/3,1) (1,3,5)
C3 (2/5,1,2/3) (1/5,1/3,1) (1,1,1) (1/6,1/4,1/2) (1,1,3)
C4 (3/2,2,5/2) (1,3,5) (2,4,6) (1,1,1) (3,5,7)
C5 (2/5,1,2/3) (1/5,1/3,1) (1/3,1,1) (1/7,1/5,1/3) (1,1,1)
First we calculate
1
m
j
gi
j
M
=
= =
(
(
value:
1
n m
j
gi
i 1 j 1
1 1 1
M , , (0.0177, 0.0258, 0.0452)
56.34 38.78 22.14
= =
(
| |
= =
( |
\
S
i
values for each column of reciprocal matrix are calculated as:
S
1
= (5.4, 9, 11.67) (0.0177, 0.0258, 0.0452) = (0.0956, 0.2322, 0.5275)
S
2
= (3.4, 7.64, 13) (0.0177, 0.0258, 0.0452) = (0.0602, 0.1979, 0.5876)
S
3
= (2.77, 3.58, 6.17) (0.0177, 0.0258, 0.0452) = (0.049, 0.0924, 0.2789)
S
4
= (8.5, 15, 21.5) (0.0177, 0.0258, 0.0452) = (0.1505, 0.387, 0.9718)
S
5
= (2.076, 3.33, 4) (0.0177, 0.0258, 0.0452) = (0.0366, 0.0911, 0.1808)
Then the V values are calculated by using these vectors:
V (S
1
S
2
) = 1 V (S
1
S
3
) = 1 V (S
1
S
4
) =
( )
0.1505 0.5275
0.7089
0.2322 0.5257 (0.387 0.1505)
=
V (S
1
S
5
) = 1
V (S
2
S
1
) = 0.9348 V (S
2
S
3
) = 1 V (S
2
S
4
) = 0.69 V (S
2
S
5
) = 1
V (S
3
S
1
) =0.5673 V (S
3
S
2
) =0.6746 V (S
3
S
4
) =0.3035 V (S
3
S
5
) =1
V (S
4
S
1
) =1 V (S
4
S
2
) = 1 V (S
4
S
3
) = 1 V (S
4
S
5
) = 1
V (S
5
S
1
) =0.3756 V (S
5
S
2
) =0.5303 V (S
5
S
3
) =0.9902 V (S
5
S
4
) =0.0929
Table 2: V values result table
Criteria
1 2 3 4 5
Column Row 0.9348 0.5673 1 0.3756
Column Row 1 0.6746 1 0.5303
Column Row 1 1 1 0.9902
Column Row 0.7089 0.69 0.3035 0.0929
Column Row 1 1 1 1
Crude Oil Supply Chain Risk Management with Fuzzy Analytic Hierarchy Process 41
Final weights (W) and normalized weights (w) are shown in Table 3.
Table 3: Weight of Criteria
W W
C1 0.7089 0.2536
C2 0.69 0.2468
C3 0.3035 0.1086
C4 1 0.3577
C5 0.0929 0.0332
The weights of the five risk categories (C 1, C 2, C 3, C 4, C 5) for improving the decision of
crude oil SCRM are available in Table 3, which are 0.2356, 0.2468, 0.1086, 0.3577, and 0.0332,
respectively. They imply that the fourth criterion i.e., regulatory and environmental risk is the most
important and the fifth i.e., catastrophic risk is the least important
6. Conclusion
In the risky global market which is highly dependent on crude oil, risk management is a critical
problem for a crude oil supply chain. Despite this high dependency and the importance of the subject in
global economy, the existing literature has paid less attention to apply SCRM in oil industry in
comparison with other industries like automobile. This paper suggests that framing a risk structure of
crude oil supply chain and applying FAHP model can aid managers on risk management decisions.
The main risks related to crude oil supply chain were singled out from the literature and argued
with the experts. We applied ANP approach to rank the risks. The results presented that most important
risk area is the regulatory and environmental risks and within this area the most important risk is
government risk and the second important is international actions risk.
References
[1] Blome, C., & Schoenherr, T. (2011). Supply chain risk management in financial crisesA
multiple case-study approach. International Journal of Production Economics ,
doi:10.1016/j.ijpe.2011.01.002.
[2] Carneiro, M. C., Ribas, G. P., & Hamacher, S. (2010). Risk Management in the Oil Supply
Chain: A CVaR Approach. Ind. Eng. Chem. Res. , 32863294.
[3] Chopra, S., & Sodhi, M. S. (2004). Managing risk to avoid supply-chain breakdown. MIT
Sloan Management Review , 53-61.
[4] Christopher, M., & Lee, H. L. (2004). Mitigating Supply Chain Risk Through Improved
Confidence. International Journal of Physical Distribution & Logistics Management , 388396.
[5] Cigolini, R., & Rossi, T. (2010). Managing operational risks along the oil supply chain.
Production Planning & Control , 452467.
[6] Fawcett, S. E. (2000). SUPPLY CHAIN MANAGEMENT: COMPETING THROUGH
INTEGRATION . In P. M. Swamidass(ed.), ENCYCLOPEDIA OF PRODUCTION AND
MANUFACTURING MANAGEMENT (pp. 755-760). Boston/Dordrecht/London: Kluwer
Academic Publishers.
[7] Fernandes, L. J., Barbosa-Pvoa, A. P., & Relvas, S. (2009). Risk Management in Petroleum
Supply Chain. 14 Congresso da APDIO, (pp. 157-164).
[8] Gumus AT (2009) Evaluation of hazardous waste transportation firms by using a two step
fuzzy AHP and TOPSIS methodology. Expert Systems with Applications. 36: 40674074.
42 Mohammad Ali Vosooghi, Safar Fazli and Reza Kiani Mavi
[9] Hussain, R., Assavapokee, T., & Khumawala, B. (2006). Supply Chain Management in the
Petroleum Industry:Challenges and Opportunities. International Journal of Global Logistics &
Supply Chain Management , 90 97.
[10] Jttner, U. (2005). Supply Chain Risk Management - Understanding the Business Requirements
From a Practitioner Perspective. The International Journal of Logis tics Management , 120-141.
[11] Jttner, U., Peck, H., & Christopher, M. (2003). SUPPLY CHAIN RISK
MANAGEMENT:OUTLINING AN AGENDA FOR FUTURE RESEARCH. International
Journal of Logistics : Research & Applications , 6 (4), 197-210.
[12] Manuj, I., & Mentzer, J. T. (2008). Global supply chain risk management strategies.
International Journal of Physical Distribution & Logistics Management , 192-223.
[13] Shah, N. K., Li, Z., & Ierapetritou, M. G. (2011). Petroleum Refining Operations: Key Issues,
Advances, and Opportunities. Ind. Eng. Chem. Res. , 11611170.
[14] Tang, C. S. (2006). Perspectives in supply chain risk management. International Journal of
Production Economics , 451488.
[15] Vanany, I., Zailani, S., & Pujawan, N. (2009). Supply Chain Risk Management:Literature
Review and Future Research. Internationa Journal of Information Systems and Supply Chain
Management , 16-33.
[16] Wagner, S. M., & Bode, C. (2008). AN EMPIRICAL EXAMINATION OF SUPPLY CHAIN
PERFORMANCE ALONG SEVERAL DIMENSIONS OF RISK. JOURNAL OF BUSINESS
LOGISTICS , 307-325.
[17] Wagner, S. M., & Bode, C. (2006 ). An empirical investigation into supply chain vulnerability.
Journal of Purchasing & Supply Management , 301312.