Summaries - Office of Research & Innovation
Research Summaries
Back Supply Chain Vulnerability Identification Using Big Data Techniques
Fiscal Year | 2019 |
Division | Research & Sponsored Programs |
Department | NPS Naval Research Program |
Investigator(s) | MacKinnon, Douglas J. |
Sponsor | NPS Naval Research Program (Navy) |
Summary |
Through the successful application of Big Data analysis tools, beginning-to-end analysis of enterprise supply chains has resulted in the identification of valuable optimization opportunities. With complex supply chains generating large amounts of structured and unstructured data, an enterprise’s ability to analyze and interpret mass amounts of disparate datasets is a source of competitive advantage. With the U.S. Navy operating a complex, multi-tiered global logistics system, its ability to optimize its supply chain is critical to its ongoing success. In our research, we seek to focus Big Data analysis methods on critical weapon systems like the MV-22 Osprey, SPY radar, and F-35 in order to identify unseen relationships in their supply chains. Utilizing Lexical Link Analysis (LLA), a Big Data analytics tool with proven utility for Department of Defense (DoD) datasets, we plan to better understand the relationships between critical vendors, wholesale supply, Navy and Marine Corps retail supply sites, intermediate maintenance sites, and depot level repair facilities. We seek to find opportunities to improve the Navy’s understanding of its supply and maintenance practices in support of critical weapon systems through the holistic analysis of datasets from multiple levels of the supply chain. Ultimately, this effort’s goal is to identify pitfalls in weapon system sustainment, improving the effectiveness of the Navy’s supply chain and the operational availability of its weapon systems. With the results of this analysis we will provide a metrics based assessment of the health of the weapon system’s supply chain and a list of potential vulnerabilities and strengths. 1) How can Big Data methodologies be used to identify supply chain vulnerabilities? 2) What relationships exist between different data sources that indicate resilience and indicate critical weaknesses? 3) What policies promote superior and effective supply chain management? |
Keywords | |
Publications | Publications, theses (not shown) and data repositories will be added to the portal record when information is available in FAIRS and brought back to the portal |
Data | Publications, theses (not shown) and data repositories will be added to the portal record when information is available in FAIRS and brought back to the portal |