Next Article in Journal
Switch Rail Reduction Value Deviation’s Impact on Wheel–Rail Dynamic Interaction and Its Efficient Identification Method: A Numerical and Experimental Study
Next Article in Special Issue
Using Neutrosophic Cognitive Maps to Support Group Decisions About Modeling and Analyzing Smart Port Performance
Previous Article in Journal
Applying Game Theory to Teach the PERT Scheduling Method
Previous Article in Special Issue
Critical Steps and Conditions to Be Included in a Business Model in Logistics, Seeking Competitive Advantage from the Perspective of the Modern Digital Age and Industry 4.0
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

H Consistency of T-S Fuzzy Supply Chain System Based on Trust Mechanism

School of Automation, Beijing Information Science and Technology University, Beijing 100096, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(24), 12043; https://doi.org/10.3390/app142412043
Submission received: 26 November 2024 / Revised: 18 December 2024 / Accepted: 19 December 2024 / Published: 23 December 2024
(This article belongs to the Special Issue Intelligent Logistics and Supply Chain Systems)

Abstract

:
As the market environment becomes increasingly complex, the demands for supply chain performance and security are continuously rising. Consequently, it is crucial to consider the role of trust factors within the system. This paper introduces a trust mechanism in the interaction between supply and demand within supply chain logistics and information flow. The supply chain system, characterized by varying degrees of trust, is modeled as multiple subsystems using the T-S fuzzy model. The challenge of mitigating the bullwhip effect, which refers to the amplification of demand variability within the supply chain, is reformulated as an H consistency problem. A productivity and distributed consistency protocol switching controller based on fuzzy rules is designed, providing sufficient conditions for the entire system to achieve consistency. The proposed method effectively suppresses the bullwhip effect and allows certain nodes in the system to be temporarily in an abnormal state. Finally, the method’s effectiveness is validated through simulation examples.

1. Introduction

In the context of Industry 4.0, the traditional supply chain model is evolving into an intelligent supply chain model [1,2]. The data-driven intelligent manufacturing model relies on a robust and reliable supply chain, making trust evaluation of the supply chain critically important [3]. Essentially, the supply chain system (SCS) is a network control system that integrates information flow and logistics, comprising entities such as suppliers, manufacturers, distributors, and retailers [4]. These entities can independently sense the environment, make decisions, and interact with other entities, thus allowing the supply chain system to be modeled as a multi-agent system.
Trust is a crucial concept in multi-agent systems, forming the foundation for cooperative behavior and various forms of social actions [5]. When modeling the supply chain network as a multi-agent system, agents often need to collaborate with one or more other agents. By selecting partners based on the credibility of candidates, such cooperation not only enhances efficiency but also strengthens the security and stability of the supply chain [6]. Through mutual coordination and interdependence among multiple agents, the impact of uncertain demand caused by market volatility can be effectively mitigated [7,8].
In recent years, numerous studies have explored trust issues within the supply chain (see [9,10,11,12,13,14,15]). For instance, [12] proposed a method to address the evaluation and selection of long-term cooperative suppliers in the supply chain based on trust factors. Ref. [13] demonstrated that trust enhances the utility and flexibility of supply chains in managing daily fluctuations in supply and demand and addressing uncertain user needs. Ref. [14] elucidated the relationship between trust, relational capability, and supply chain performance. Ref. [15] used structural equation modeling to show that establishing a high-value supply chain requires managers to ensure optimal trust. However, existing models struggle to accurately describe the operational state of the supply chain system under varying levels of trust and to dynamically regulate the system according to trust values. Therefore, it is reasonable to construct a supply chain system model that incorporates a trust mechanism and to design a controller to regulate the system state based on trust information.
Inventory state control is a crucial aspect of supply chain management. The main goal is to minimize inventory costs while meeting user demand, and incorporating trust factors in the supply and demand chain can enhance efficiency and stability. In recent years, researchers have conducted numerous studies on inventory management and performance optimization of supply chain systems using multi-agent systems (see [16,17,18,19,20,21,22]). For instance, ref. [17] discussed the utilization of an integrated procurement-production-inventory model to enhance company performance and reduce costs. Ref. [18] explored how machine learning techniques can strengthen the sustainability of the supply chain and optimize logistics and inventory management. Ref. [22] considered the management of inventory under dynamic demand and stochastic time scales. In the field of supply chain inventory system management, few scholars have focused on the stability and robustness of the system. However, the stability and performance of the system are significantly impacted by continuous interference from uncertainty factors and unexpected events. Control theory provides a framework for achieving stability through systematic thinking, whether globally or locally. The supply chain system is dynamic, and its stability and response time are seriously affected by uncertainties. Therefore, integrating control theory with supply chain inventory management is effective and logical. It is reasonable to propose a dynamic multi-agent supply chain model based on a trust mechanism, combined with control theory.
To incorporate the concept of trust value into the supply chain system, this paper employs a fuzzy model to integrate trust value information with the supply chain model. The Takagi–Sugeno (T-S) fuzzy model is significant in the field of system modeling and control, offering unique advantages for handling complex, nonlinear systems (see [23,24,25]). Consequently, this paper constructs a productivity and distributed consensus protocol controller based on fuzzy rules derived from the T-S fuzzy model.
There are various methods for assessing supply chain performance, including (1) total supply chain cost, (2) service level, (3) average inventory, and (4) the bullwhip effect, among others. Among these performance assessment procedures, we focus on the bullwhip effect because it is a critical area of applied research in supply chain management [26]. Market demand can fluctuate due to factors such as customer satisfaction, product reliability, and the economic environment. The change in demand orders within the supply chain is often amplified as they move upstream, a phenomenon known as the bullwhip effect [27]. When managers design production plans based on inaccurate demand information, it can lead to excessive product inventory and increased inventory costs. The bullwhip effect can be measured in various ways, such as by comparing the variance between demand and orders, using different demand models, and considering cost factors [28]. The choice of measurement method should align with the research purpose and context. In this paper, we measure the bullwhip effect using the ratio of operating cost y to uncertain demand γ .
y 2 σ 2 γ
Remark 1. 
Where · 2 denotes the l 2 norm. The equation suggests that when γ is smaller, indicating a lower operating cost to address uncertain demand, the attenuation performance of the bullwhip effect improves. By focusing on reducing the impact of uncertain demand, we can transform the problem of attenuating the bullwhip effect into a control problem, with the attenuation of uncertain demand serving as the control objective.
The main contributions of this paper are outlined as follows. First, the paper transforms the challenge of suppressing the bullwhip effect in supply chain management into a control problem. The primary objective of this control approach is to prevent uneven warehouse distribution, thereby reducing inventory costs. Given that H control technology has demonstrated strong performance in mitigating the bullwhip effect caused by uncertain demand [29], this paper applies H control technology to the supply chain system to achieve this suppression. Second, the paper introduces trust value information into the supply chain system using the T-S fuzzy model. A productivity and distributed consensus protocol switching controller, which relies on fuzzy rules, is designed. Incorporating trust values allows the supply chain system to better reflect practical and complex supply scenarios, thereby enhancing system stability. Finally, the paper provides sufficient conditions for ensuring H consistency. In situations where the system experiences a failure at a particular node due to a major emergency, the average dwell time method is utilized to maintain system stability.

2. Multi-Agent Supply Chain Model

Suppose the weighted graph of N subchains is G = { V , E , A } , where each node is a subchain, and the facilities in each subchain can be considered as children of the node. V is the set of nodes containing the vertices of all nodes, V = { 1 , 2 , , N } . E V × V is the set of edges in the graph. When nodes i , j belong to the same edge and i , j can communicate with each other, j is said to be a neighboring node of i. Denote the set of neighboring nodes of node i by N i = { j | j V , ( j , i ) E } . When a node does not have any neighboring nodes, it is called an isolated node. The weighted adjacency matrix between individual nodes is denoted as A = [ α i j ] R N × N , where α i j = 1 if and only if i and j are neighboring nodes. The Laplace matrix of the graph G is defined as L = [ l i j ] R N × N .
l i j = α i j , i j s N i α i s , i = j .
Based on the discussion above, we consider a multi-agent supply chain system. This system comprises N sub-chains, each treated as an intelligent agent and represented as a node within a graph. Each sub-chain contains n facilities. Figure 1 illustrates the i-th sub-chain, where x i s 1 represents the inventory status of the first supplier facility in the i-th sub-chain.
x i ( k ) = [ x i 1 ( k ) , , x i n ( k ) ] T R n u i ( k ) = u i 1 ( k ) , , u i n ( k ) T R n d i ( k ) = 0 , , 0 , d i n ( k ) T R n ( i = 1 , , N )
where x i ( k ) represents the inventory status of the ith subchain at time k, u i ( k ) denotes the productivity at time k, d i ( k ) indicates the market demand at time k, and ρ is the loss rate in the warehousing process. The production and supply process for each subchain commences with the supplier providing the means of production, progresses through a sequence of processing facilities, and concludes with the customer purchasing the finished product. Here, u i n ( k ) represents not only the productivity of the current facility but also the demand of the preceding facility. Market demand directly influences only the final facility, yet it propagates through the supply chain, impacting all nodes. From a control perspective, x can be viewed as the inventory state at time k, u as the control input, and d as the external perturbation.
To model the supply chain system, we must establish the following assumptions.
Assumption 1. 
Goods in the warehouse will have a certain amount of wear and tear with storage time, and different goods in different warehouses have different rates of wear and tear.
Assumption 2. 
The user’s demand is divided into a known regular demand d ¯ i n , and an unknown time-varying demand ω i n l 2 [ 0 , ) , so that the demand is represented as
d i n ( k ) = d ¯ i n + ω i n ( k )
In Assumptions 1 and 2, the ith subchain is modeled as
x i ( k + 1 ) = ( I ρ i ) x i ( k ) + B i u i ( k ) d i ( k )
where
ρ i = diag ρ 1 , ρ 2 , , ρ n B i = 1 1 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 1 .
In a supply chain system with N sub-chains, it is necessary to compare inventory levels between neighboring nodes to adjust productivity and achieve system consensus. To ensure the stability of this supply chain system and reach consensus, two controllers must be designed to meet the control objectives: the production controller, which adjusts the production rate based on the local conditions of each sub-chain, and the consensus agreement controller, which modifies the production rate through communication with neighboring nodes, facilitating consensus among all agents.
Remark 2. 
It is important to note that communication between agents is subject to delays. Specifically, the production communication delay between two facilities within the same subchain differs from the consensus communication delay between two subchains. The following section will provide a detailed description of the choice of delay.
Thus, the controller of the subchain is
u i ( k ) = u ^ i ( k ) + u ¯ i ( k ) u ^ i ( k ) = K ^ x i ( k τ 1 ) x i ( 0 ) + B i 1 b i ^ u ¯ i ( k ) = K ¯ j N i α i j x j ( k τ 2 ) x i ( k τ 2 )
where K ^ is the production rate gain, K ¯ is the consensus gain, and b i ^ = 0 , , 0 , d ¯ i n T . In addition, 0 τ 1 τ ¯ 1 ,   0 τ 2 τ ¯ 2 , where τ ¯ 1 , τ ¯ 2 is a positive scalar constant and is an upper bound on the time lag, while x i ( 0 ) denotes the inventory control objective of the ith subchain.
Substituting (5) into (4) yields the kinetic equation for the ith subchain as
x i ( k + 1 ) = ( I ρ i ) x i ( k ) + B i u ^ i ( k ) + B i u ¯ i ( k ) d i ( k )
x i ( k + 1 ) = A i x i ( k ) + B i K ^ x i ( k τ 1 ) x i ( 0 ) K ¯ j N i l i j x j ( k τ 2 ) + ω i ( k )
where A i = I ρ i , ω i ( k ) = 0 , , 0 , ω i n ( k ) T , l i j is the ( i , j ) th element in the Laplacian matrix L.
A multi-agent-based supply chain system model can be obtained by aggregating the sub-chains.
x ( k + 1 ) = ( I N A ) x ( k ) + ( I N B K ^ ) x ( k τ 1 ) x ( 0 ) ( L B K ¯ ) x ( k τ 2 ) + ω ( k )
where x ( k ) = [ x 1 T ( k ) , , x N T ( k ) ] T , ω ( k ) = [ ω 1 T ( k ) , , ω N T ( k ) ] T , and L is the Laplace matrix of the graph.
The average inventory status of the system is x ¯ ( k ) = ( 1 / N ) i = 1 N x i ( k ) , and the error between the inventory state of each agent and the average inventory state is δ i ( k ) = x i ( k ) x ¯ ( k ) . According to Equation (8), we can obtain the error equation for the ith subchain as
δ i ( k + 1 ) = A i δ i ( k ) + B i K ^ ( δ i ( k τ 1 ) δ i ( 0 ) ) B i K ¯ j N i l i j δ j i ( k τ 2 ) + ω i ( k ) 1 N j = 1 N ω j ( k )
where δ ( k ) = [ δ 1 T ( k ) , , δ N T ( k ) ] T . The complete supply chain error system is as follows:
δ ( k + 1 ) = A ^ δ ( k ) + B ^ ( δ ( k τ 1 ) δ ( 0 ) ) + B ¯ δ ( k τ 2 ) + B ω ω ( k ) z ( k ) = δ ( k )
where A ^ = ( I N A ) , B ^ = I N B K ^ ,   B ¯ = ( L B K ¯ ) , and z ( k ) is the output of the system.
B ω = N 1 N 1 N 1 N 1 N N 1 N 1 N 1 N 1 N N 1 N
Remark 3. 
In a multi-agent system, the consistency problem can be redefined as a stabilization problem of an error system, where the error is the deviation between the state value of each agent and the target value. When the error is zero, it indicates that the system has reached consistency and achieved the control objective

3. T-S Fuzzy Model

Previous studies indicate that the trust value between two nodes influences the degree of information sharing between them. A higher degree of sharing correlates with increased frequency of information interaction [6,30,31]. For instance, ref. [30] categorizes the degree of information sharing into four levels based on trust value and provides a detailed description of the interaction status between nodes at these levels. Consequently, the trust value informs us about the strength of information interaction between nodes and the duration of any communication lag. Additionally, as trust value increases, the frequency of interaction between nodes rises, leading to reduced inventory loss from backlogs; thus, a higher trust value corresponds to a lower inventory loss rate.
For simplicity, consider the supply chain system scenario consisting of two sub-chains, with θ j ( t ) ( j = 1 , 2 ) being the premise variable and W j i ( i = 1 , 2 ; j = 1 , 2 ) being the fuzzy set. In this paper, θ j ( t ) = G T j is each sub-chain’s global trust value level.
Nine scenarios are considered based on the high and low global trust levels of the two sub-chains, as shown in Table 1. Here, the superscript i = ( 1 , 2 ) in W j i denotes the number of sub-chains, while the subscript j = ( 1 , 2 , 3 ) represents the three trust scenarios: high, medium, and low, respectively. This framework can fully approximate the dynamic relationships among the nine scenarios in the actual product and supply process. Moreover, it enables the construction of T-S fuzzy set divisions and fuzzy rules for the nine subsystems.
According to the subsystem division rule, let G T i > 1 denote complete trust, and G T i < 0 denote complete distrust, while 0 G T i 1 is the fuzzy range that lies between the two cases.
A fuzzy set is established based on the above, and the affiliation function of G T i ( i = 1 , 2 ) is W j i , whose expression is shown in (11)–(13).
W 1 i ( G T i ) = 0 0 GT i 0.5 2 G T i 1 0.5 G T i 1
W 2 i ( G T i ) = 2 G T i 0 GT i 0.5 2 2 G T i 0.5 G T i 1
W 3 i ( G T i ) = 1 2 G T i 0 GT i 0.5 0 0.5 G T i 1
The system dynamics equations for the production process of the supply chain under different rules are as follows.
Rule 1: IF θ 1 ( t ) is W 1 1 , and θ 2 ( t ) is W 2 1 , then
x ( k + 1 ) = ( I N A r 1 ) x ( k ) + ( I N B K ^ ) x ( k τ 1 ) x ( 0 ) ( L r 1 B h r 1 K ¯ ) x ( k τ 2 ) + ω ( k )
where A r 1 = 1 ρ 1 ̲ 0 0 0 0 1 ρ 2 ̲ 0 0 0 0 1 ρ 3 ̲ 0 0 0 0 1 ρ 4 ̲ , L r 1 = 1 ε ¯ ε ¯ 1 , τ r 1 ( k ) = τ 1 ̲ τ 2 ̲
Rule 4: IF θ 1 ( t ) is W 1 2 , and θ 2 ( t ) is W 2 2 , then
x ( k + 1 ) = ( I N A r 4 ) x ( k ) + ( I N B K ^ ) x ( k τ 1 ) x ( 0 ) ( L r 4 B h r 4 K ¯ ) x ( k τ 2 ) + ω ( k )
where A r 4 = 1 ρ 1 0 0 0 0 1 ρ 2 0 0 0 0 1 ρ 3 0 0 0 0 1 ρ 4 , L r 4 = 1 ε ε 1 , τ r 4 ( k ) = τ 1 τ 2
Rule 9: IF θ 1 ( t ) is W 1 3 , and θ 2 ( t ) is W 2 3 , then
x ( k + 1 ) = ( I N A r 9 ) x ( k ) + ( I N B K ^ ) x ( k τ 1 ) x ( 0 ) ( L r 9 B h r 9 K ¯ ) x ( k τ 2 ) + ω ( k )
where A r 9 = 1 ρ 1 ¯ 0 0 0 0 1 ρ 2 ¯ 0 0 0 0 1 ρ 3 ¯ 0 0 0 0 1 ρ 4 ¯ , L r 9 = 1 ε ̲ ε ̲ 1 , τ r 9 ( k ) = τ 1 ¯ τ 2 ¯
In the above equations, ρ ¯ , ρ ̲ , ε ¯ , ε ̲ , and τ ¯ , τ ̲ denote the upper and lower bounds of the storage loss rate, interaction strength, and interaction delay, respectively. The variable h represents the scaling gain of the controller, which varies with the strength of the interaction. Consider Rule 1 as an example. In this case, the trust value of both sub-chains is at its highest level when the degree of information sharing among the nodes reaches a peak. The interaction strength E between nodes is at its maximum, and the information transfer delays τ 1 , τ 2 are at their minimum. Ideally, this can be regarded as a zero-inventory supply state that realizes just-in-time production and sales. Consequently, the inventory loss rate ρ due to backlog is significantly reduced. Simultaneously, the scaling gain h is maximized, meaning a greater weight is given to the consistency protocol controller. The equations corresponding to the remaining rules are analogous to the above and are not enumerated here.
Using the T-S fuzzy model to model the supply chain system can obtain the global system as
x ( k + 1 ) = i = 1 9 ν i θ ( t ) [ ( I N A r ) x ( k ) + ( I N B K ^ ) x ( k τ 1 ) x ( 0 ) ( L r B h r K ¯ ) x ( k τ 2 ) + ω ( k ) ]
where ν i θ ( t ) = h i ( θ ( t ) ) / i = 1 9 h i ( θ ( t ) ) , h i ( θ ( t ) ) = j = 1 3 W j i ( θ j ( t ) ) , W j i ( θ j ( t ) ) , W j i ( θ j ( t ) ) is value of the affiliation function of θ j ( t ) in W j i .
Combining (17) and (10), we can obtain the supply chain error system model containing trust information as
δ ( k + 1 ) = A ^ r δ ( k ) + B ^ ( δ ( k τ 1 r ) δ ( 0 ) ) + B ¯ r δ ( k τ 2 r ) + B ω ω ( k ) z ( k ) = δ ( k )
where A r ^ = i = 1 9 ν i θ ( t ) A ^ , B ¯ r = i = 1 9 ν i θ ( t ) h B ¯ , τ r ( k ) = i = 1 9 ν i θ ( t ) τ 1 i = 1 9 ν i θ ( t ) τ 2 .
The system (18) can be considered to reach a consensus under the action of the controller (18) if under any initial condition x i ( 0 ) R n , lim k x i ( k ) x j ( k ) 2 = 0 i , j V holds.

4. Model Stability Analysis

This section provides the solvability conditions for the H problem in a multi-agent-based supply chain system. The controller parameters that meet the requirements are obtained by solving linear matrix inequality (LMI) equations. For the system to achieve H performance γ , the following conditions must be satisfied:
The error system (18) is exponentially stable at ω ( k ) = 0 (i.e., there exist scalars a and b such that δ ( k ) a e b ( k k 0 ) δ ( k 0 ) ). The H norm of the transfer function from the disturbance input ω ( k ) to the system output z ( k ) is less than γ , that is, under the condition δ ( k ) = 0 , k [ 0 , t ] , k = 0 z T ( k ) z ( k ) γ 2 k = 0 ω T ( k ) ω ( k ) , ω ( t ) l 2 [ 0 , ) , where γ is the decay level of the bullwhip effect.
To complete the proof, it is also necessary to introduce the following lemma.
Lemma 1 
([32]). (Moon’s inequality) For any vectors a , b of appropriate dimensions and matrices N , X , Y , Z If X Y Y T Z 0 , the following inequality holds
2 a T N b a b T X Y N Y T N T Z a b
For the system (10), choose the Lyapunov function as
V ( k ) = V 1 ( k ) + V 2 ( k ) + V 3 ( k )
where V 1 ( k ) = δ T ( k ) P δ T ( k )
V 2 = θ = k τ ¯ 1 k 1 e α ( s k + 1 ) δ T ( θ ) Q ^ δ ( θ ) + θ = 0 k 1 e α ( s k + 1 ) δ T ( 0 ) δ ( 0 ) + θ = τ ¯ 1 1 s = k + θ k 1 e α ( s k + 1 ) y T ( s ) Z ^ y ( s )
V 3 = θ = k τ ¯ 2 k 1 e α ( s k + 1 ) δ T ( θ ) Q ¯ δ ( θ ) + θ = τ ¯ 2 1 s = k + θ k 1 e α ( s k + 1 ) y T ( s ) Z ¯ y ( s )
where y ( s ) = δ ( k + 1 ) δ ( k ) and P 1 , Q ^ , Z ^ , Q ¯ , Z ¯ are symmetric positive definite matrices of appropriate dimensions.
Based on the above conditions, we can derive the following lemma:
Theorem 1. 
If Assumptions 1 and 2 hold, for a given scalar 0 τ 1 τ ¯ 1 , 0 τ 2 τ ¯ 2 , γ > 0 , the system (18) has H performance γ. If there exist symmetric positive definite matrices P 1 , Q ^ , Z ^ , Q ¯ , Z ¯ , symmetric semipositive definite matrices X ^ , Y ^ , X ¯ , Y ¯ , then
Ω ζ T ( k ) P τ ¯ 1 ζ T ( k ) Z ^ τ ¯ 2 ζ T ( k ) Z ¯ P 0 0 τ ¯ 1 Z ^ 0 τ ¯ 2 Z ¯ < 0
and
X ^ Y ^ Z ^ 0 , X ¯ Y ¯ Z ¯ 0
where
ζ T ( k ) = ( A ^ I ) B ^ B ¯ B ω B ^
Ω = Φ Y ^ P B ^ Y ¯ P B ¯ r P B ω P B ^ e α τ ¯ 1 Q ^ 0 0 0 e α τ ¯ 2 Q ¯ 0 0 γ 2 0 I
Φ = [ P ( A ^ r I ) + ( A ^ r I ) T P + τ 1 ¯ X ^ + Y ^ + Y ^ T + τ 2 ¯ X ¯ + Y ¯ + Y ¯ T + Q ^ + Q ¯ + I + ( 1 e α ) P ]
Proof of Theorem 1. 
Obviously, δ ( k ) satisfies
δ ( k ) = δ ( k τ ) + θ τ k 1 y ( θ )
Consequently,
y ( k ) = A ^ + B ^ + B ¯ I δ ( k ) + B ω ω ( k ) B ^ δ ( 0 ) B ^ θ τ ¯ l k 1 y ( θ ) B ¯ θ τ ¯ l k 1 y ( θ )
Consider that when ω ( k ) = 0 , for the Lyapunov function (15) along the trajectory of the system (10), for the forward difference, we have
V ( k + 1 ) e α V ( k ) = V 1 ( k + 1 ) e α V 1 ( k ) + V 2 ( k + 1 ) e α V 2 ( k ) + V 3 ( k + 1 ) e α V 3 ( k )
where
V 1 ( k + 1 ) e α V 1 ( k ) = 2 δ T ( k ) P y ( k ) + y T ( k ) P y ( k ) + ( 1 e α ) δ T ( k ) P δ ( k )
It follows from (23)
2 δ T ( k ) P y ( k ) = 2 δ T ( k ) P A ^ + B ^ + B ¯ I δ ( k ) + B φ ω ( k ) B ^ δ ( 0 ) θ = k τ ¯ l k 1 B ^ y ( θ ) θ = k τ ¯ 2 k 1 B ¯ y ( θ )
Combining this with Lemma 1 yields
2 θ = k τ ¯ 1 k 1 δ T ( k ) P B ^ y ( θ ) θ = k τ ¯ 1 k 1 δ ( k ) y ( θ ) T × X ^ Y ^ P B ^ Z ^ δ ( k ) y ( θ ) = τ ¯ 1 δ T ( k ) X ^ δ ( k ) + 2 δ T ( k ) ( Y ^ P B ^ ) × δ ( k ) δ k τ ¯ 1 + θ = k τ ¯ 1 k 1 y T ( θ ) Z ^ y ( θ )
where X ^ Y ^ are symmetric matrices of appropriate dimension and
X ^ Y ^ Z ^ 0
The same reasoning can be used to obtain
2 θ = k τ ¯ 2 k 1 δ T ( k ) P B ¯ y ( θ ) θ = k τ ¯ 2 k 1 δ ( k ) y ( θ ) T × X ¯ Y ¯ P B ¯ Z ¯ δ ( k ) y ( θ ) = τ ¯ 2 δ T ( k ) X ¯ δ ( k ) + 2 δ T ( k ) ( Y ¯ P B ¯ ) × δ ( k ) δ k τ ¯ 2 + θ = k τ ¯ 2 k 1 y T ( θ ) Z ¯ y ( θ )
where X ¯ , Y ¯ are symmetric matrices of appropriate dimension and
X ¯ Y ¯ Z ¯ 0
Consequently,
V 1 ( k + 1 ) V 1 ( k ) ξ T ( k ) ψ 1 ξ ( k ) + y T ( θ ) P y ( θ ) + θ = k ˙ τ ¯ 1 k ˙ 1 y T ( θ ) Z ^ y ( θ ) + θ = k ˙ τ ¯ 2 k ˙ 1 y T ( θ ) Z ^ y ( θ )
where
ξ T ( k ) = δ T ( k ) , δ T ( k τ ¯ 1 ) , δ T ( k τ ¯ 2 ) , ω T ( k ) , δ ( 0 )
Φ 1 = P ( A ^ r I ) + ( A ^ r I ) T P + τ ¯ 1 X ^ + Y ^ + Y ^ T + τ 2 ¯ X ¯ + Y ¯ + Y ¯ T + ( 1 e α ) P ]
ψ 1 = Φ 1 Y ^ P B ^ Y ¯ P B ¯ P B ω P B ^ 0 0 0 0 0 0 0 0 0 0
Continuing the calculations, we have
V 2 ( k + 1 ) e α V 2 ( k ) = δ T ( k ) Q ^ δ ( k ) e α τ ¯ 1 δ T ( k τ ¯ 1 ) Q ^ δ ( k τ ¯ 1 ) + τ ¯ 1 y T ( k ) Z ^ y ( k ) θ = k τ ¯ 1 k 1 e α ( θ k ) y T ( θ ) Z ^ y ( θ ) + δ T ( 0 ) δ ( 0 ) = ξ T ( k ) ψ 2 ξ ( k ) + τ ¯ 1 y T ( k ) Z ^ y ( k ) θ = k τ ¯ 1 k 1 e α ( θ k ) y T ( θ ) Z ^ y ( θ )
where ψ 2 = d i a g { Q ^ , e α τ ¯ 1 Q ^ , 0 , 0 , I }
An equation of the same kind obtains
V 3 ( k + 1 ) e α V 3 ( k ) = δ T ( k ) Q ¯ δ ( k ) e α τ ¯ 2 δ T ( k τ ¯ 2 ) Q ¯ δ ( k τ ¯ 2 ) + τ ¯ 2 y T ( k ) Z ¯ y ( k ) θ = k ¯ τ ¯ 2 k 1 e α ( θ k ¯ ) y T ( θ ) Z ¯ y ( θ ) = ξ T ( k ) ψ 3 ξ ( k ) + τ ¯ 2 y T ( k ) Z ¯ y ( k ) θ = k τ ¯ 2 k ˙ 1 e α ( θ k ˙ ) y T ( θ ) Z ¯ y ( θ )
where ψ 3 = d i a g { Q ¯ , 0 , e α τ 2 Q ¯ , 0 , 0 } .
From (19) and (28)~(30), we obtain
Δ V ( k ) = V ( k + 1 ) e α V ( k ) ξ T ( k ) ψ ξ ( k ) ψ = Φ 1 Y ^ P B ^ Y ¯ P B ¯ r P B ω P B ^ e α τ ¯ 1 Q ^ 0 0 0 e α τ ¯ 2 Q ^ 0 0 0 0 I + ( A ^ I ) T B ^ T B ¯ r T B ¯ ω B ^ T × ( P + τ ¯ 1 Z ^ + τ ¯ 2 Z ¯ ) ( A ^ I ) B ^ B ¯ r B ω B ^
Using the Schur complement lemma, it can be shown that LMI (20) is equivalent to ψ < 0 . The system (18) is stable by Liapunov’s stability theory.
Next, under zero initial conditions, consider the performance metrics
J ( ω ) = k = 0 z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t )
Then, for any ω ( t ) l 2 [ 0 , ) , it follows from the properties of the Lyapunov generalized function and the zero initial condition that
J ( ω ) = k = 0 z T ( k ) z ( k ) γ 2 ω T ( k ) ω ( k ) + V ( k + 1 ) e α V ( k ) ( 1 e α ) k = 1 V ( k ) V ( ) k = 0 z T ( k ) z ( k ) γ 2 ω T ( k ) c o ( k ) + V ( k + 1 ) e α V ( k ) = k = 0 ξ T ( k ) Ψ ξ ( k ) + δ T ( k ) δ ( k ) γ 2 ω T ( k ) ω ( k ) = k = 0 ξ T ( k ) Ξ ξ ( k )
where Ξ = ψ d i a g ( I , 0 , 0 , γ 2 , 0 )
By Schur complement lemma, (20) is equivalent to Ξ < 0 , and thus J ( ω ) < 0 , i.e.,
k = 0 z T ( k ) z ( k ) < γ 2 k = 0 ω T ( k ) ω ( k )
Thus, the system (18) has H performance γ . □
In the operation of a supply chain system, major accidents can lead to the failure of nodes, resulting in what we term “isolated nodes.” When the supply chain cannot meet the supply demand, the system proactively replaces and upgrades nodes to ensure overall security and efficiency. However, this process may temporarily result in isolated nodes. We define these failed nodes as the isolated nodes of the system, denoted by σ ( h ) = j ( j = 0 , 1 , n ) , where σ ( h ) = 0 indicates that there are no isolated nodes, while σ ( h ) = 1 signifies that the first node is isolated. For simplicity, we assume that only one node fails at any given time, and the failed node can be restored to normal operation after adjusting and replacing the supply facility. For systems with isolated nodes, there are
δ ( k + 1 ) = A ^ r δ ( k ) + B ^ ( δ ( k τ 1 r ) δ ( 0 ) ) + B ¯ r σ ( h ) δ ( k τ 2 r ) + B ω ω ( k ) z ( k ) = δ ( k )
For the system (32), choose the Lyapunov function as
V σ ( h ) ( k ) = V 1 σ ( h ) ( k ) + V 2 σ ( h ) ( k ) + V 3 σ ( h ) ( k )
where
V 1 σ ( h ) ( k ) = δ T ( k ) P σ ( h ) δ ( k )
V 2 σ ( h ) = θ = k τ 1 ¯ k 1 e β ( k s 1 ) δ T ( θ ) Q ^ σ ( h ) δ ( θ ) + θ = τ 1 ¯ 1 s = k + θ k 1 e β ( k s 1 ) y T ( s ) Z ^ σ ( h ) y ( s ) + θ = 0 k 1 e α ( s k + 1 ) δ T ( 0 ) δ ( 0 )
V 3 σ ( h ) = θ = k τ 2 ¯ k 1 e β ( k s 1 ) δ T ( θ ) Q ¯ σ ( h ) δ ( θ ) + θ = τ 2 ¯ 1 s = k + θ k 1 e β ( k s 1 ) y T ( s ) Z ¯ σ ( h ) y ( s )
y ( s ) = δ ( k + 1 ) δ ( k ) , and P σ ( h ) , Q ^ σ ( h ) , Z ^ σ ( h ) , Q ¯ σ ( h ) , Z ¯ σ ( h ) is a symmetric positive definite matrix of appropriate dimension.
Based on the above conditions, we can derive the following lemma
Theorem 2. 
If Assumptions 1 and 2 hold, for a given scalar 0 τ 1 τ ¯ 1 , 0 τ 2 τ ¯ 2 , γ > 0 , , the system (18) has H performance γ. If there exist symmetric positive definite matrices P σ ( h ) , Q ^ σ ( h ) , Z ^ σ ( h ) , Q ¯ σ ( h ) , Z ¯ σ ( h ) , symmetric semipositive definite matrices X ^ σ ( h ) , Y ^ σ ( h ) , X ¯ σ ( h ) , Y ¯ σ ( h ) , then
Ω ζ T ( k ) P σ ( h ) τ ¯ 1 ζ T ( k ) Z ^ σ ( h ) τ ¯ 2 ζ T ( k ) Z ¯ σ ( h ) P σ ( h ) 0 0 τ ¯ 1 Z ^ σ ( h ) 0 τ ¯ 2 Z ¯ σ ( h ) < 0
and
X ^ σ ( h ) Y ^ σ ( h ) Z ^ σ ( h ) 0 , X ¯ σ ( h ) Y ¯ σ ( h ) Z ¯ σ ( h ) 0
where
ζ T ( k ) = ( A ^ r I ) B ^ B ¯ r σ ( h ) B ω B ^
Ω = Φ Y ^ P B ^ Y ¯ P B ¯ r σ ( h ) P B ω P B ^ e β τ ¯ 1 Q ^ 0 0 0 e β τ ¯ 2 Q ¯ 0 0 γ 2 0 I
Φ = [ P σ ( h ) ( A ^ r I ) + ( A ^ r I ) T P σ ( h ) + τ ¯ 1 X ^ σ ( h ) + Y ^ σ ( h ) + Y ^ σ ( h ) T + τ ¯ 2 X ¯ σ ( h ) + Y ¯ σ ( h ) + Y ¯ σ ( h ) T + Q ^ σ ( h ) + Q ¯ σ ( h ) + I + ( 1 e β ) P σ ( h ) ]
The proof of Theorem 2 is similar to that of Theorem 1 and is omitted here for space reasons.
Theorems 1 and 2 provide the H consensus conditions for supply chain systems under uncertain demand. The gains of the controller can be determined by employing methods similar to those presented in [33,34].
When a node in the supply chain fails, the system’s stability is compromised, rendering it non-stabilizable. Additionally, the disruption and restoration of nodes result in changes to the network’s topology, which subsequently alters the corresponding Laplacian matrix. To address both unforeseen events and the impacts of structural upgrades in the supply chain, we demonstrate that the system can remain stabilizable under certain conditions. Specifically, as long as a reasonable average dwell time is designed, and the ratio of the operating time of the non-stabilizable subsystems to that of the stabilizable subsystems is below a certain threshold, the switching system remains stabilizable.
Let N σ ( k 1 , k 2 ) denote the number of switches in time k 1 and k 2 for any k 2 > k 1 0 . If there exist T a > 0 and N 0 0 , such that the following conditions hold, then T a is the mean residence time, and N 0 is the jitter-bound.
N σ ( k 1 , k 2 ) N 0 + k 2 k 1 T a
For simplicity and without loss of generality, we choose N 0 = 0 , which divides the time interval into two categories, with and without isolated nodes. Where k 2 p , k 2 p + 1   ( p = 0 , 1 n ) , the absence of isolated nodes, is stabilizable, and k 2 p + 1 , k 2 p + 2 , the presence of isolated nodes, is not stabilizable. Define N l ( k 1 , k 2 ) as the number of times a stabilizable system switches to a system with an isolated node in [ k 1 , k 2 ) ; denote by T l ( k 1 , k 2 ) the total time a subsystem with an isolated node is running in k 1 , k 2 . f l ( k 1 , k 2 ) = T l ( k 1 , k 2 ) / ( k 2 k 1 ) .
Theorem 3. 
For a given scalar 0 τ 1 τ 2 , 0 < α < 1 , 0 < β < 1 , the system (32) is stable. If there exists a symmetric positive definite matrix P σ ( h ) , Q ^ σ ( h ) , Z ^ σ ( h ) , Q ¯ σ ( h ) , Z ¯ σ ( h ) , satisfying (20) and (34), and T a , f l ( k 1 , k 2 ) satisfying
T a > T = ln ( μ μ 1 ) α , α ( 0 , α )
f l ( k 0 , k ) α α α + β
where μ satisfies
P 0 μ P j Q 0 ^ μ Q j ^ Q 0 ¯ μ Q j ¯ Z 0 ^ μ Z j ^ Z 0 ¯ μ Z j ¯ P j μ P 0 Q ^ j μ Q ^ 0 Q ¯ j μ Q ¯ 0 Z ^ j μ Z ^ 0 Z ¯ j μ Z ¯ 0 μ 1 = e ( α + β ) τ 2 j = 1 , 2 , , N
Proof of Theorem 3. 
For the switching system (37), the Lyapunov function V 0 is (19) when σ ( h ) = 0 and V j is (33) when σ ( h ) = j . Based on the above conditions, it follows that
V 0 ( k ) μ V j ( k ) , V j ( k ) μ μ 1 V 0 ( k ) ( j = 1 , , N )
From Lemma 1 and Theorem 2, it is known that
V ( k ) = V σ ( k ) ( k ) e α ( k k 2 p ) V 0 ( k 2 p ) , k [ k 2 p , k 2 p + 1 ) e β ( k k 2 p + 1 ) V j ( k 2 p + 1 ) , k [ k 2 p + 1 , k 2 p + 2 ) ( p = 0 , 1 , 2 , )
Combining (38) and (39) yields
V ( k ) V j ( k 2 p + 1 ) e β ( k k 2 p + 1 ) μ μ 1 V 0 ( k 2 p ) e α ( k 2 p + 1 k 2 p ) e β ( k k 2 p + 1 ) μ N σ ( k 0 , k ) μ 1 N l ( k 0 , k ) V 0 ( k 0 ) e α ( k k 0 T l ( k 0 , k ) ) + β T l ( k 0 , k )
Since N l ( k 0 , k ) ( N σ ( k 0 , k ) + 1 ) / 2 , by combining with (36) and (37), we can obtain
V ( k ) e N σ ( k 0 , k ) ln μ e ( N σ ( k 0 , k ) + 1 ) ln μ 1 2 e [ α ( 1 T l ( k 0 , k ) k k 0 ) + β T l ( k 0 , k ) k k 0 ] ( k k 0 ) V 0 ( k 0 ) e ln μ 1 e k k 0 T a ln ( μ μ 1 ) e [ α ( 1 f l ( k 0 , k ) ) + β f l ( k 0 , k ) ] ( k k 0 ) V 0 ( k 0 ) μ 1 e ( ln ( μ μ 1 ) T a α + ( α + β ) f l ( k 0 , k ) ) ( k k 0 ) V 0 ( k 0 ) μ 1 e 2 ( k k 0 ) V 0 ( k 0 )
where = 1 2 α α .
ε 1 δ ( k ) 2 V ( k ) μ 1 e 2 ( k k 0 ) V 0 ( k 0 ) ε 2 μ 1 e 2 ( k k 0 ) δ ( k 0 ) 2 δ ( k ) ε 2 μ 1 ε 1 e ( k k 0 ) δ ( k 0 )
The error switching system (32) is exponentially stable because > 0 .
It follows from Lemma 1 that
V ( k ) e α V ( k 1 ) F ( k 1 ) e 2 α V ( k 2 ) F ( k 1 ) e α F ( k 2 ) e α ( k k 0 ) V ( k k 0 ) s = k 0 k 1 e α ( k s 1 ) F ( s )
where F ( k ) = k = 0 z T ( k ) z ( k ) γ 2 k = 0 ω T ( k ) ω ( k ) . The same reasoning leads to
V ( k ) e α ( k k 2 p ) V ( k 2 p ) + s = k 2 p k 1 e α ( k s 1 ) F ( s ) , k [ k 2 p , k 2 p + 1 ) e β ( k k 2 p + 1 ) V j ( k 2 p + 1 ) + s = k 2 p + 1 k 1 e β ( k s 1 ) F ( s ) , k [ k 2 p + 1 , k 2 p + 2 )
It follows from (42) that
V ( k ) μ 1 e 2 ϵ ( k k 0 ) V 0 ( k 0 ) s = k 0 k 1 e 2 ϵ ( k s ) F ( s )
The proof process is similar to that in (40) and (41); hence, it is omitted here.
Under zero initial conditions, from (43), it follows that
0 s = k 0 k 1 e 2 ϵ ( k s ) F ( s ) s = 0 z T ( s ) z ( s ) γ 2 s = 0 ω T ( s ) ω ( s )
Thus, supply chain systems containing isolated nodes, provided they satisfy the conditions outlined in Theorem 3, are exponentially stable and achieve an H performance level of γ . □
Theorems 1–3 establish the conditions for the switching topology and H consistency of a T-S fuzzy supply chain system based on a trust mechanism under uncertain demand. The design steps for the controller are as follows:
  • Step 1: Substitute the controller from Equation (5) into Equation (6) to derive the supply chain system represented by Equation (8). Subsequently, transform system (8) into the error system represented by Equation (10);
  • Step 2: Determine the parameters of the supply chain system and the scaling gain of the consistency controller based on the fuzzy rules. This results in the supply chain error system model incorporating trust information, represented by Equation (18);
  • Step 3: Utilize the Schur complement lemma and matrix transformations to obtain the control gains and necessary parameters. This is achieved by solving the linear matrix inequalities (LMIs) given by Equations (20), (21), (34) and (35), and the constraints specified in (36) and (37).

5. Numerical Example

In this section, the effectiveness of the proposed method will be verified based on simulation examples.
As coal progresses through various stages from raw to finished product, each storage phase is influenced by factors such as natural weathering, rain, and snow erosion, leading to varying storage loss rates. Considering the operational data of a coal enterprise [35], the model parameters are set as follows according to the actual situation and the historical data of the enterprise: the inventory loss rate is diag 0.08 0.05 0.03 0.02 . The upper bounds of the interaction delay are given as τ 1 ¯ = 4 and τ 2 ¯ = 7 . The initial stock values for the three subchains are: x i ( 0 ) = 90 60 70 40 T tons, x j ( 0 ) = 50 40 60 90 T tons, and x m ( 0 ) = 70 50 70 60 T tons. The control targets for inventory are 15 19 22 25 . The control objective is to ensure uninterrupted logistics and to manage inventory levels such that higher loss rates result in lower steady-state inventory. This approach aims to effectively reduce the economic losses associated with inventory loss rates. The parameters α = 0.7 , α = 0.45 , and β = 0.53 are used in the model.
The system’s topology is forced to change when a significant accidental event occurs, causing breaks in the supply chain nodes and resulting in isolated nodes. The switching of the system topology is illustrated in Figure 2. During normal operations, the trust value between subchains increases with the number of successful transactions. However, the emergence of isolated nodes impacts the trustworthiness of each subchain to varying extents. The switching signals generated by the system due to isolated nodes are depicted in Figure 3, where the y-axis coordinates 1, 2, and 3 correspond to the presence of isolated nodes in subchains i, j, and m, respectively, and the corresponding changes in the trustworthiness of the subchains are shown in Figure 4. The controller gains are shown below.
K 0 ^ = 0.0418 0.0492 0.0539 0.0572 0.0317 0.0368 0.0403 0.0428 0.0211 0.0248 0.0268 0.0284 0.0106 0.0124 0.0136 0.0140   K 0 ¯ = 0.0265 0.0312 0.0342 0.0362 0.0202 0.0234 0.0256 0.0271 0.0134 0.0157 0.0170 0.0180 0.0067 0.0079 0.0086 0.0089 K σ ^ = 0.0424 0.0472 0.0501 0.0522 0.0289 0.0363 0.0386 0.0401 0.0193 0.0217 0.0270 0.0280 0.0096 0.0108 0.0116 0.0159   K σ ¯ = 0.0846 0.0942 0.1002 0.1043 0.0656 0.0699 0.0744 0.0775 0.0437 0.0486 0.0486 0.0507 0.0219 0.0243 0.0258 0.0239
Based on the conditions described above, the changes in the inventory status of each node in the supply chain can be observed in Figure 5. In this figure, parts (a) and (b) represent the inventory changes at the head and tail nodes of the supply chain, which are most affected by perturbations. Part (c) illustrates the inventory changes of the ith sub-chain. Finally, part (d) displays the inventory error variation curves for all sub-chains.
From Figure 5, it is evident that the inventory levels of all facilities within the supply chain system converge to a uniform level. This prevents scenarios of stockouts in some regions and excess inventory in others due to uneven distribution, thereby enhancing the overall efficiency of the supply chain. At steady state, the inventory levels at each node in the sub-chain meet the desired inventory control objectives, contributing to improved economic efficiency. Additionally, the system demonstrates the ability to swiftly return to normal operation following disruptions, such as node updates or replacements, minimizing the impact and improving system stability. Therefore, it can be concluded that the supply chain model proposed in this paper effectively mitigates the bullwhip effect caused by uncertain demand. By ensuring system stability, it enhances supply chain performance, reduces economic losses, and minimizes the adverse effects of uncertainties.
To verify the superiority of the proposed model, we compared the method presented in this paper with existing supply chain inventory control strategies. Figure 6 illustrates the inventory state changes of the supply chain system under a closed-loop switching control strategy with Markov jump parameters [35]. Although both control strategies stabilize the system, the method proposed in this paper outperforms it in terms of control tracking accuracy, time required to reach stabilization, and the ability to mitigate the effects of disturbances. Furthermore, when compared to certain fuzzy-system-based methods [36,37], the T-S fuzzy switching control design based on the trust mechanism proposed here demonstrates enhanced capability in handling node failures, node update iterations, and other perturbations during system operation.
To verify the generalizability of the model and comprehensively evaluate its performance, we proceed to analyze its application across various industries with differing characteristics. Specifically, we assess the model’s impact on mitigating the bullwhip effect, enhancing cost-effectiveness, and improving lead-time indicators within the supply chain, using actual data for validation.
Take the fresh food and television factory industries as examples. The supply chain of the fresh food industry has a higher inventory loss rate, more stringent conditions required for storage, and needs to spend more on inventory costs, so it needs to keep the inventory in a lower state. Due to the short time period of goods storage and high real-time requirements, it is necessary to set a lower upper bound of interaction latency. At the same time, it should pay more attention to the production and sales of its own nodes to set the control scheme, so the scaling gain of the consistency controller should be reduced. TV industry products at all stages in the storage process are not easy to wear and tear, and the storage cost is lower, but when subjected to unforeseen events by the impact will be greater (such as the replacement of chip manufacturers, etc.). The node will spend a longer period of time in a broken state, so you need to ensure a higher inventory to withstand market turbulence. Due to the characteristics of larger reserves, longer production cycles, and greater impact by perturbations, the TV industry is more likely to have uneven distribution of goods between warehouses, so it is necessary to give the consistency of the protocol controller greater gain.
Taking the actual data in the supply chain operation of a domestic TV set manufacturer as an example, Figure 7 shows the impact on the cost-effectiveness and lead time of the supply chain under different control strategies. It can be seen that the method proposed in this paper has a better effect on reducing supply chain cost and improving supply chain efficiency.
Table 2 presents the results comparing the impact of the bullwhip effect when applying the control method proposed in this paper versus the Markov jump control method, across different supply chain structures and varying inventory loss rates.
The results indicate that the method proposed in this paper outperforms the Markov jump method in suppressing the bullwhip effect. This improvement is particularly evident in application scenarios with high storage loss rates, such as the fresh food industry. Additionally, the proposed method demonstrates superior performance when more intelligence is integrated into the supply chain system.

6. Conclusions

This paper investigates the management problem when a supply chain breaks down due to unexpected events from a control theory perspective. The main objective of control is to minimize the economic cost and improve the supply efficiency in case of a smooth supply chain. For this, we modeled the supply chain system based on trust factors through a T-S fuzzy model and designed fuzzy controllers related to trust strength to reduce the impact of perturbations on the system due to node updating and replacing during the switching process of collaborative control. Meanwhile, the impact of the bullwhip effect is suppressed by H control. A notable limitation of this study is its reliance on inventory-focused modeling and the authenticity of trust strength, which necessitates a collaborative supply chain ecosystem involving multiple parties. These constraints provide a foundation for future research directions.

Author Contributions

Methodology, Y.H. and Q.L.; validation, Y.H.; writing—original draft preparation, Y.H.; writing—review and editing, Y.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China of Qingkui Li under Grant 2020YFB1708200.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Shah, H.M.; Gardas, B.B.; Narwane, V.S.; Mehta, H.S. The contemporary state of big data analytics and artificial intelligence towards intelligent supply chain risk management: A comprehensive review. Kybernetes 2023, 52, 1643–1697. [Google Scholar] [CrossRef]
  2. Xie, Y.; Yin, Y.; Xue, W.; Shi, H.; Chong, D. Intelligent supply chain performance measurement in Industry 4.0. Syst. Res. Behav. Sci. 2020, 37, 711–718. [Google Scholar] [CrossRef]
  3. Wu, Y.; Zhang, Y. An integrated framework for blockchain-enabled supply chain trust management towards smart manufacturing. Adv. Eng. Inform. 2022, 51, 101522. [Google Scholar] [CrossRef]
  4. Sarimveis, H.; Patrinos, P.; Tarantilis, C.D.; Kiranoudis, C.T. Dynamic modeling and control of supply chain systems: A review. Comput. Oper. Res. 2008, 35, 3530–3561. [Google Scholar] [CrossRef]
  5. Liu, L.; Chen, X. Conditional investment strategy in evolutionary trust games with repeated group interactions. Inf. Sci. 2022, 609, 1694–1705. [Google Scholar] [CrossRef]
  6. Zhang, X.; Lam, J.S.L. Measuring the Impact of E-Collaboration on Supply Chain Parties: A Value-Based Management Approach. IEEE Access 2021, 9, 118181–118193. [Google Scholar] [CrossRef]
  7. Pulikottil, T.; Estrada-Jimenez, L.A.; Rehman, H.U.; Barata, J.; Nikghadam-Hojjati, S.; Zarzycki, L. Multi-agent based manufacturing: Current trends and challenges. In Proceedings of the 2021 26th IEEE international conference on emerging technologies and factory automation (ETFA), Vasteras, Sweden, 7–10 September 2021; pp. 1–7. [Google Scholar]
  8. Dorri, A.; Kanhere, S.S.; Jurdak, R. Multi-agent systems: A survey. IEEE Access 2018, 6, 28573–28593. [Google Scholar] [CrossRef]
  9. Malik, S.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trustchain: Trust management in blockchain and iot supported supply chains. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, 14–17 July 2019; pp. 184–193. [Google Scholar]
  10. Jiang, R.; Kang, Y.; Liu, Y.; Liang, Z.; Duan, Y.; Sun, Y.; Liu, J. A trust transitivity model of small and medium-sized manufacturing enterprises under blockchain-based supply chain finance. Int. J. Prod. Econ. 2022, 247, 108469. [Google Scholar] [CrossRef]
  11. Zhang, H.; Nakamura, T.; Sakurai, K. Security and trust issues on digital supply chain. In Proceedings of the 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 5–8 August 2019; pp. 338–343. [Google Scholar]
  12. Ghadimi, P.; Wang, C.; Lim, M.K.; Heavey, C. Intelligent sustainable supplier selection using multi-agent technology: Theory and application for Industry 4.0 supply chains. Comput. Ind. Eng. 2019, 127, 588–600. [Google Scholar] [CrossRef]
  13. Shahzad, M.F.; Xu, S.; Baheer, R.; Ahmad, W. Unveiling the role of supply chain parameters approved by blockchain technology towards firm performance through trust: The moderating role of government support. Heliyon 2023, 9, e21831. [Google Scholar] [CrossRef] [PubMed]
  14. Pattanayak, S.; Ramkumar, M.; Goswami, M.; Rana, N.P. Blockchain technology and supply chain performance: The role of trust and relational capabilities. Int. J. Prod. Econ. 2024, 271, 109198. [Google Scholar] [CrossRef]
  15. Kiwala, Y.; Olivier, J.; Kintu, I. Antecedents and enablers of supply chain value creation: An analysis of trust and competences. Dev. South. Afr. 2023, 40, 580–598. [Google Scholar] [CrossRef]
  16. Kim, B.; Kim, J.G.; Lee, S. A multi-agent reinforcement learning model for inventory transshipments under supply chain disruption. IISE Trans. 2024, 56, 715–728. [Google Scholar] [CrossRef]
  17. Utama, D.M.; Santoso, I.; Hendrawan, Y.; Dania, W.A.P. Integrated procurement-production inventory model in supply chain: A systematic review. Oper. Res. Perspect. 2022, 9, 100221. [Google Scholar] [CrossRef]
  18. Pasupuleti, V.; Thuraka, B.; Kodete, C.S.; Malisetty, S. Enhancing supply chain agility and sustainability through machine learning: Optimization techniques for logistics and inventory management. Logistics 2024, 8, 73. [Google Scholar] [CrossRef]
  19. Du, J.; Jing, H.; Choo, K.K.R.; Sugumaran, V.; Castro-Lacouture, D. An ontology and multi-agent based decision support framework for prefabricated component supply chain. Inf. Syst. Front. 2020, 22, 1467–1485. [Google Scholar] [CrossRef]
  20. Fierro, L.H.; Cano, R.E.; García, J.I. Modelling of a multi-agent supply chain management system using Colored Petri Nets. Procedia Manuf. 2020, 42, 288–295. [Google Scholar] [CrossRef]
  21. Li, Q.K.; Lin, H.; Tan, X.; Du, S. H consensus for multiagent-based supply chain systems under switching topology and uncertain demands. IEEE Trans. Syst. Man Cybern. Syst. 2018, 50, 4905–4918. [Google Scholar] [CrossRef]
  22. Khokhar, M.; Zia, S.; Khan, S.A.; Saleem, S.T.; Siddiqui, A.A.; Abbas, M. Decision Support System for Safety Stock and Safety Time Buffers in Multi-Item Single-Stage Industrial Supply Chains. Int. J. Inf. Syst. Soc. Chang. 2023, 14, 1–13. [Google Scholar] [CrossRef]
  23. Tseng, C.S.; Chen, B.S.; Uang, H.J. Fuzzy tracking control design for nonlinear dynamic systems via TS fuzzy model. IEEE Trans. Fuzzy Syst. 2001, 9, 381–392. [Google Scholar] [CrossRef]
  24. Wang, J.; Chang, Q.; Gao, T.; Zhang, K.; Pal, N.R. Sensitivity analysis of Takagi–Sugeno fuzzy neural network. Inf. Sci. 2022, 582, 725–749. [Google Scholar] [CrossRef]
  25. Aslam, M.S.; Tiwari, P.; Pandey, H.M.; Band, S.S. Robust stability analysis for class of Takagi-Sugeno (TS) fuzzy with stochastic process for sustainable hypersonic vehicles. Inf. Sci. 2023, 641, 119044. [Google Scholar] [CrossRef]
  26. Bhattacharya, R.; Bandyopadhyay, S. A review of the causes of bullwhip effect in a supply chain. Int. J. Adv. Manuf. Technol. 2011, 54, 1245–1261. [Google Scholar] [CrossRef]
  27. Lee, H.L.; Padmanabhan, V.; Whang, S. The bullwhip effect in supply chains. Sloan Manag. Rev. 1997, 38, 93–102. [Google Scholar] [CrossRef]
  28. Wang, X.; Disney, S.M. The bullwhip effect: Progress, trends and directions. Eur. J. Oper. Res. 2016, 250, 691–701. [Google Scholar] [CrossRef]
  29. Huang, X.Y.; Yan, N.N.; Guo, H.F. An H control method of the bullwhip effect for a class of supply chain system. Int. J. Prod. Res. 2007, 45, 207–226. [Google Scholar] [CrossRef]
  30. Fawcett, S.E.; Jones, S.L.; Fawcett, A.M. Supply chain trust: The catalyst for collaborative innovation. Bus. Horizons 2012, 55, 163–178. [Google Scholar] [CrossRef]
  31. Ouzrout, Y.; Chaze, L.; Lavastre, O.; Dominguez, C.; Akhter, S.H. Simulation of trust in supply chains. In Supply Chain Performance: Collaboration, Alignment and Coordination; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2013; pp. 267–315. [Google Scholar]
  32. Moon, Y.S.; Park, P.; Kwon, W.H.; Lee, Y.S. Delay-dependent robust stabilization of uncertain state-delayed systems. Int. J. Control 2001, 74, 1447–1455. [Google Scholar] [CrossRef]
  33. Li, J.; Chen, Z.; Cai, D.; Zhen, W.; Huang, Q. Delay-dependent stability control for power system with multiple time-delays. IEEE Trans. Power Syst. 2015, 31, 2316–2326. [Google Scholar] [CrossRef]
  34. Rodrigues, L.; Boukas, E.K. Piecewise-linear H controller synthesis with applications to inventory control of switched production systems. Automatica 2006, 42, 1245–1254. [Google Scholar] [CrossRef]
  35. Aditya, I.; Simaremare, A.A.; Hudaya, C. Study of Coal Inventory Planning Analysis in a coal-fired power plant using continuous and Periodic Review. In Proceedings of the 2019 IEEE 2nd International Conference on Power and Energy Applications (ICPEA), Singapore, 27–30 April 2019; pp. 33–36. [Google Scholar]
  36. Luan, T.; Sun, M.; Hu, Z.; Fu, Q.; Wang, H. A novel TS fuzzy robust control for part transportation of aircraft carrier considering transportation time and stochastic demand. Aerosp. Sci. Technol. 2021, 119, 107096. [Google Scholar] [CrossRef]
  37. Goodarzian, F.; Ghasemi, P.; Gunasekaran, A.; Labib, A. A fuzzy sustainable model for COVID-19 medical waste supply chain network. Fuzzy Optim. Decis. Mak. 2024, 23, 93–127. [Google Scholar] [CrossRef]
Figure 1. Subchain i production process with n facilities.
Figure 1. Subchain i production process with n facilities.
Applsci 14 12043 g001
Figure 2. Topology switching (Red indicates isolated nodes).
Figure 2. Topology switching (Red indicates isolated nodes).
Applsci 14 12043 g002
Figure 3. Switching signals.
Figure 3. Switching signals.
Applsci 14 12043 g003
Figure 4. Trust change.
Figure 4. Trust change.
Applsci 14 12043 g004
Figure 5. Inventory changes: (a) inventory changes at the supplier nodes of subchains i, j, m; (b) inventory changes at the retailer nodes of subchains i, j, m; (c) inventory changes at the four nodes of subchain i; and (d) changes in consistency error among all nodes.
Figure 5. Inventory changes: (a) inventory changes at the supplier nodes of subchains i, j, m; (b) inventory changes at the retailer nodes of subchains i, j, m; (c) inventory changes at the four nodes of subchain i; and (d) changes in consistency error among all nodes.
Applsci 14 12043 g005
Figure 6. Changes in inventory under traditional control methods: (a) inventory changes at the supplier nodes of subchains i, j, m; (b) inventory changes at the retailer nodes of subchains i, j, m; (c) inventory changes at the four nodes of subchain i; and (d) changes in consistency error among all nodes.
Figure 6. Changes in inventory under traditional control methods: (a) inventory changes at the supplier nodes of subchains i, j, m; (b) inventory changes at the retailer nodes of subchains i, j, m; (c) inventory changes at the four nodes of subchain i; and (d) changes in consistency error among all nodes.
Applsci 14 12043 g006
Figure 7. Supply chain performance indicators under different control strategies: (a) cost of inventory spent per month (unit: thousands of dollars); (b) average lead time per month (unit: days).
Figure 7. Supply chain performance indicators under different control strategies: (a) cost of inventory spent per month (unit: thousands of dollars); (b) average lead time per month (unit: days).
Applsci 14 12043 g007
Table 1. Fuzzy rules under different trust.
Table 1. Fuzzy rules under different trust.
Fuzzy Sets W j i W 1 1 W 1 2 W 1 3
W 1 2 Rule 1 ( R 1 )Rule 2 ( R 2 )Rule 3 ( R 3 )
W 2 2 Rule 4 ( R 4 )Rule 5 ( R 5 )Rule 6 ( R 6 )
W 3 2 Rule 7 ( R 7 )Rule 8 ( R 8 )Rule 9 ( R 9 )
Table 2. The bullwhip effect in different situations.
Table 2. The bullwhip effect in different situations.
Supply Chain StructureBullwhip Effect Y min
ρ = [ 0.08 0.05 0.03 0.02 ] ρ = [ 0.2 0.17 0.13 0.1 ]
Three subchains (this paper)0.78340.9682
Three subchains (Markov jump)1.04711.3701
Two subchains (this paper)1.47381.6975
Two subchains (Markov jump)1.53641.9624
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, Y.; Li, Q. H Consistency of T-S Fuzzy Supply Chain System Based on Trust Mechanism. Appl. Sci. 2024, 14, 12043. https://doi.org/10.3390/app142412043

AMA Style

Huang Y, Li Q. H Consistency of T-S Fuzzy Supply Chain System Based on Trust Mechanism. Applied Sciences. 2024; 14(24):12043. https://doi.org/10.3390/app142412043

Chicago/Turabian Style

Huang, Yong, and Qingkui Li. 2024. "H Consistency of T-S Fuzzy Supply Chain System Based on Trust Mechanism" Applied Sciences 14, no. 24: 12043. https://doi.org/10.3390/app142412043

APA Style

Huang, Y., & Li, Q. (2024). H Consistency of T-S Fuzzy Supply Chain System Based on Trust Mechanism. Applied Sciences, 14(24), 12043. https://doi.org/10.3390/app142412043

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop