主管:中国科学院
主办:中国优选法统筹法与经济数学研究会
   中国科学院科技战略咨询研究院

Chinese Journal of Management Science ›› 2014, Vol. 22 ›› Issue (7): 76-81.

• Articles • Previous Articles     Next Articles

Research on Disruption Area Vulnerability Index Infrastructure based on Knowledge base

XIAO Hai-dong1,2, CHEN Ning3   

  1. 1. Shanghai Advanced Research Institute, Chinese Academy of Science, Shanghai 201210, China;
    2. Sino-Us Globe Logistics Institute, Shanghai Jiaotong University, Shanghai 200030, China;
    3. School of Information Science and Engineering East China University of Science and Technology, Shanghai 200237, China
  • Received:2012-02-10 Revised:2012-12-30 Online:2014-07-20 Published:2014-07-24

Abstract: In this paper, vulnerability index infrastructure of disruption area is constructed based on knowledge base theory, to solve the problem that vulnerability of disruption is difficult to be described or understood by computer. Firstly, vulnerability index infrastructure is analyzed based on knowledge base, and vulnerability perception structure is constructed under disruption environment, multiple dimensions vulnerability data source are from multiple levels of supply chain in scene of disruption scenarios, the whole construction processing cover 3 parts: index extraction, features evaluation and situational awareness. Then, vulnerability index knowledge is mined with HTM (Hierarchical Temporal memory) method, which contributes to simplify index description with vulnerability situational awareness. Finally, inference machine design and inference algorithm are given to construct the knowledge base. The research shows that there is close relationship between evolution of disruption events and changes of disruption area vulnerability index infrastructure, with this vulnerability index infrastructure, explicit knowledge contained in disruption events and tacit knowledge contained in disruption management can be dynamically analyzed based on knowledge base. It contributes to manager's decision in recovering disruption with key factors accurately and dynamically, and reducing cost of disruption management, improve response efficiency.

Key words: knowledge base, vulnerability, HTM, disruption management

CLC Number: