Next Article in Journal
Experimental Study on the Influence of a Two-Dimensional Cosine Hill on Wind Turbine Wake
Next Article in Special Issue
Ontology-Driven Guidelines for Architecting Digital Twins in Factory Automation Applications
Previous Article in Journal
A Novel Rotor Position Observer for Sensorless Control of Permanent Magnet Synchronous Motor Based on Adaptive Generalized Second-Order Integrator
Previous Article in Special Issue
Order-Driven Dynamic Resource Configuration Based on a Metamodel for an Unbalanced Assembly Line
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Vulnerability Evaluation for a Smartphone Digital Twin Workshop under Temporal and Spatial Disruptions

Key Laboratory of Precision Electronic Manufacturing Technology and Equipment, Guangdong University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Machines 2022, 10(9), 752; https://doi.org/10.3390/machines10090752
Submission received: 20 July 2022 / Revised: 25 August 2022 / Accepted: 26 August 2022 / Published: 31 August 2022
(This article belongs to the Special Issue Intelligent Factory 4.0: Advanced Production and Automation Systems)

Abstract

:
Dynamic performance analysis is essential for production systems facing random disturbances. In this paper, a vulnerability evaluation approach is proposed for smartphone assembly production systems with finite buffers under a resilient system analytic frame. Firstly, four important vulnerability indicators, namely Terminal Time Delay (TTD), Terminal Time Window (TTW), Bottleneck Time Delay (BTD), and Bottleneck Time Window (BTW), are defined to expound temporal and spatial attributes caused by disruptive events. Then, a recursive derivation approach of the queuing network model is presented to obtain a state-transition matrix, wherein machine reliability is also considered in the model. Afterward, the exact solutions of steady and transient vulnerability are evaluated based on state probabilities inference. Finally, numerical studies are carried out to validate the proposed method and translate it into a practical tool. An application program with vulnerability analysis and disturbance control functions is developed, embedded in the digital twin system independently developed by our team to solve practical problems.

1. Introduction

The products of computer, communication, and consumer electronics are replaced quickly. As the main resource of equipment to complete the product manufacturing cycle, the production line has a direct impact on the quality, cost, and delivery cycle of the product. During the production process, due to the frequent switching of the production line configuration, the disturbance factors will cause the production of local stations to be disordered and propagate along the branch link to the main link. Therefore, to ensure the stability of production capacity under frequent changes in production lines and disturbances, the design of the assembly system must be flexible.
Serial structures with intermediate finite buffers are most widely adopted in production systems. Normally, workstations are allocated according to certain process routes, and buffers are allocated in consideration of their line balancing and antijamming ability. The intervention of buffers causes the fluctuation of system performance. Traditional output indicators, such as productivity, due-time performance, and other statistical indicators, are general and effective steady-state metrics during production system modeling [1]. However, in industrial production, disturbance factors frequently come from both inside (machine failures, scheduled maintenance, the fluctuation of working time, quality defaults, etc.) and outside (urgent orders, product changeover, process change, etc.). Transient-state performance evolution cannot be well-studied under the traditional performance evaluation frame. Thus, the dynamics analysis of the production system is essential to customized design and operation optimization. Random failures and small disruptions may result in a catastrophic risk to production systems in the current highly interconnected manufacturing environment [2,3]. Performance reduction under such disruption can be well described as a vulnerability metric, which is also well explained in the resilient system research field [4,5,6]. Henry and Ramirez-Marquez [7] described the resilience of a generalized engineering system by depicting the performance transition process. Hosseini et al. [6] divided the entire process into three separate intervals, and three performance indicators are applied to match these three intervals, which are reliability, vulnerability, and recoverability, respectively. Such description and definition can also be adopted in the production system field. The resilient production system can be modeled as a discrete event dynamics system. As a constituent part of system dynamic performance, vulnerability under disruptions is an important performance indicator in production system engineering. To some content, the vulnerability effect is ubiquitous in both production systems at the workshop level [8,9] and inter-enterprises supply chains [10]. Vulnerability risks include high maintenance/servicing costs, yield reduction, and more importantly, system outage and the final large-scale delivery delay.
System vulnerability analysis (SVA) is less studied in comparison with system reliability analysis (SRA) in the production system field. System reliability is the performance metric of a resilient production system (as shown in the first interval of Figure 1), which represents the continuous working ability without failures from the static perspective. However, SVA provides a quantification study in terms of failure effect analysis, with emphasis on the effect propagation of cascading failures. Studies on SRA provide a global steady-state performance metric for fulfilling specified functions on the macro level. Accordingly, SVA affords a local dynamics survey of disturbance influences. Equal attention should be paid to SRA and SVA for resilient production systems.
For a reconfigurable electronic assembly line that is frequently replaced, it will take a lot of time to design a balanced production line structure, deploy tools, and debug and test after each disturbance causes system interruption. The digital twin platform of the production line can provide a virtual test optimization platform [11,12]. The data between the physical and virtual entities support each other in decision making, which is applied to the design, analysis, and regulation of the production line [13,14,15]. As the theoretical core of the extended application of digital twin technology, SVA plays a vital role in the evaluation and analysis module of the digital twin system. SVA provides the evaluation measures in the configuration and designing stage of production systems. Additionally, it is the fundamental work for performance control in the operational stage. New quantitative analysis methods and means should be developed to understand the nature of the vulnerability effect. Vulnerability quantification is undoubtedly more valuable than mainstream qualitative analysis. However, it is difficult to construct a precise mathematical model due to the dynamic properties of the vulnerability effect. In this paper, a transient and steady vulnerability analysis approach is proposed for a resilient serial production system considering both temporal and spatial attributes. This method establishes a mathematical analytical model for the performance evaluation module in the twin system, which not only effectively avoids the shortcoming that the simulation model takes a long time, but also can evaluate the brittle effect of the dynamic disturbance during the operation of the production line.
The remainder of this paper is organized as follows: related works are reviewed in Section 2, wherein the innovation and difference from the presented works are briefly emphasized. Section 3 provides a digital twin system and architecture. Section 4 presents the temporal and spatial attributes of SVA of production systems. Section 5 provides the transient and steady vulnerability quantitative approach for both terminal station and bottleneck station. A case study is applied to verify the proposed method in Section 6. The conclusion and an outlook outlining ideas for future research are presented in Section 7.

2. Literature Review

2.1. Resilient Production System

System resilience has been a new performance metric for a dynamic system with disruption. Resilience system modeling has been studied for engineering systems such as grid networks [16] and infrastructure systems [17,18]. A major area of resilience research related to production is on the supply chain network. Some valuable reviews can be seen in [19,20,21]. Most papers in this area focus on the risk management of supply chain disruptions, which are dedicated to elucidating the attributes of resilience in different scenarios instead of quantizing it [22,23]. There are a few quantitative analytic models. A Bayesian network model is constructed to quantify the supply chain resilience of sulfuric acid manufacturers [24]. Xu and Radhakrishnan [25] developed a multidimensional nonlinear model to capture the dynamics of the supplier–manufacturer network. At the factory level, the concept of a resilient manufacturing system was proposed by Zhang and Luttervelt [4], and related guidelines for design and management are also discussed for resilient manufacturing systems. Production loss, throughput settling time, and total under-production time are used to measure the resilience of the manufacturing system by Gu and Jin, and the proposed resilience metrics are applied to assist in the reconfiguration of system design [26]. The optimal control policy of operation rate to achieve resilience in a class of serial manufacturing networks is addressed under disruption [27]. In brief, the resilience mechanism is valuable to explore the dynamics principle under disruption, and quantitative evaluation for manufacturing systems with certain structures still needs to be further studied.

2.2. Vulnerability Analysis of Production System

Vulnerability is the dynamic performance index of the system under disturbance. The quantitative evaluation of vulnerability is the premise of disturbance control. In the field of production system manufacturing, SVA plays as the second procedure of a resilient system in Figure 1 which is also vital for the dynamics modeling of production systems. A systematic method to quantitatively study the vulnerability assessment of production systems has not been well developed to date. Compared with performance models of production quantity, some vulnerability models in terms of production quality control are proposed by applying network modeling or fuzzy theory. Qin and Zhao established a man–machine–environment brittleness model of dynamic quality characteristics using the brittleness theory of complex systems [28]. A fuzzy analytic hierarchy process is applied to further identify the brittle source of the complex manufacturing process [8]. Vulnerability value is measured for assembly manufacturing systems using complex network theory and simulation technology [9]. Alnino and Garavelli present a simple Markov model of a just-in-time production system to identify the vulnerability of backorder probability [29]. Liu and Xv proposed a modeling and evaluation method for the structural vulnerability of manufacturing systems based on the universal generating function and information entropy principle [30]. Gao and Wang evaluated the structural vulnerability of reconfigurable manufacturing systems based on the entropy principle and Markov models [31].
A major research area of SVA is still on supply chain networks and their risk management, which center on network structure modeling and vulnerability source identification through node linking relation [10,32,33,34]. Nakatani et al. proposed a supply chain model using a directed graph based on life cycle inventory data, and the Herfindahl–Hirschman index is used to rank vulnerability indicators of disruption risks [10]. Petri-Net-based visualization and triangularization clustering algorithms are studied to offer insights into a supply chain vulnerability in [33]. Risk management to reduce production system vulnerability is discussed in [35,36]. In brief, the vulnerability evaluating model under dynamic disruption remains unexplored for structured systems in the production capacity perspective.

2.3. Transient Performance Analysis

In production systems engineering, a great deal of work has been devoted to analyzing the performance of manufacturing systems. Traditionally, production system modeling methods are limited to steady-state analysis [37,38,39]. Meerkov and Zhang explored transients of the states and outputs in serial production lines with Bernoulli machines [40]. Analytical formulas for evaluating the settling time of productivity rate and WIP using the Bernoulli Reliability Model are also provided by Ju et al. [41]. Hou et al. proposed a novel “split-view” method for transient and steady-state performance analysis of inhomogeneous assembly systems [42]. A Production line with a rework loop is further studied using a “self-view” method from a buffer’s viewpoint [43]. Based on Markov analysis, Chen and Huang proposed an auxiliary production line to decouple the dynamics of the original system to study the transient behavior of the production line [44]. Jia and Chen studied the transient performance evaluation problem by considering adjustments and resets on serial production lines for multi-type and low-volume production [45]. Huang and Wang introduced an analytical model to study the transient performance of a multi-product serial production line with Bernoulli reliability machines and non-negligible settings during changeover [46]. In brief, these mentioned approaches are centered on transient-state performance evaluation before reaching the steady state, for example, the typical warming-up period and shift transferring period [47]. However, transient performance analysis under sudden disruptions, such as random machine failures and other scheduled shutdowns (e.g., preventive maintenance activities), is less popularly studied and needs to be further explored.
In the related research on performance evaluation, most research literature focuses on evaluating the steady-state performance of manufacturing systems and analyzing the performance indicators of the system under long-term operation. The study of transient performance of manufacturing systems also mainly focuses on evaluating the performance of the system before reaching a steady state. Additionally, studies on how perturbation events will affect system state and capacity are rare. In the related research on vulnerability, most of the research objects are various complex systems. All of them have only carried out qualitative analysis on vulnerability, and there are few quantitative studies on system vulnerability. In practice, the impact of disturbance events on system performance is not immediately apparent due to the presence of buffers in manufacturing systems. There is even a time window in which system productivity is not affected, but little research has been conducted on this.
Therefore, the current research on the vulnerability of manufacturing systems is still insufficient, and it is necessary to pay attention to the impact of disturbance events on system productivity, quantify the capacity loss and opportunity time window, and then formulate the control strategy of the production line under disturbance. Based on the previous research results, this paper has made certain innovations on its basis:
The essence of the dynamic analysis of production systems is mainly discussed, and an evaluation method of production line vulnerability under the framework of elastic system analysis is proposed.
The method can perform transient performance analysis in the face of the sudden random disturbance production system. By quantitatively evaluating the vulnerability index of the production line under disturbance events, and formulating the regulation strategy under disturbance based on the vulnerability time window, the production loss caused by disturbance can be avoided or reduced.
The mathematical analysis model established by this method was successfully applied to the performance evaluation module in the digital twin system of the mobile phone production line developed by our team, and the research results of this paper were transformed into tools that can solve practical production problems.

3. Digital Twin System and Architecture

3.1. Digital Twin System

The assembly process of smartphones is very complex and involves many processes, including five main process steps: soldering, assembling, inspecting, quality control, and marking. For a reconfigurable electronic assembly line that is frequently replaced, it will take a lot of time to design a balanced production line structure, deploy tools, and debug and test after each disturbance causes system interruption. Therefore, in order to guarantee stable production capacity, the assembly line of the mobile phone manufacturing shop must be flexible, quickly reconfigurable, and adaptable to random interruptions.
As an emerging technology, the digital twin provides a new idea for the disturbance control and reconfiguration of mobile phone assembly lines. The digital twin system of the production line can provide a virtual test optimization platform. The data between the physical and virtual entities support each other in decision making, which is applied to the design, analysis, and regulation of the production line. As shown in Figure 2, a reconfigurable electronic assembly line digital twin system with disturbance analysis and control was independently developed by our team.
The assembly process of the smartphone can be divided into various processes such as sticking double-sided tape, dispensing, TP pressing, sticking accessories, back cover locking screws, and pasting accessories. Based on this assembly process, we construct corresponding digital virtual assembly lines and physical assembly lines. As shown in Figure 3, on the virtual platform, we built a standardized general platform (SGP) with complete functions and built a variety of special assembly machines based on this general platform. Such as locking screw machines, sticking accessories machines, TP double-sided adhesive machines, etc., for mobile phone processing. At the same time, drag-and-drop autonomous guided vehicles (AGVs) are also built for loading and unloading machines. Figure 4 shows the physical assembly line of a smartphone and its components, each of which corresponds to the components of a virtual assembly line. Based on digital twin technology, two-way real mapping and real-time interaction between physical production lines and virtual production lines can be realized.
The digital twin system shown in Figure 2 is mainly divided into three parts, including the device layer, the control network layer, and the execution system layer. The device layer includes physical production lines and virtual production lines. The control network layer includes instruction synchronization. The execution system layer includes the MES system, data analysis center, cell control system, and the SCADA system. The solid line represents the instruction channel, and the dashed line represents the information channel. Production instructions (such as scheduling scenarios or reconfiguration decisions) are issued by the global manufacturing execution system (MES) to the cell control systems, which are then passed on to machine instructions in the shop floor control network. At the same time, the supervisory control and data acquisition (SCADA) system obtains the field data and provides the field monitoring data and simulation data for the future decision making of MES.
For the digital twin system, a bidirectional connection channel is established in order to realize the synchronous operation of the physical production line and the virtual production line. As shown in Figure 2, a physical entity has a corresponding virtual entity. The PLCs in the various devices of the physical assembly line can perform input/output. These inputs/outputs are then associated with the various devices of the virtual assembly line through the soft PLC interface of the simulation software. This enables synchronization of physical and virtual production lines.
When the electronic assembly line is disturbed, the disturbance information is transmitted through the established bidirectional connection channel between the physical space and the information space, and the real-time state monitoring of the physical entity is reflected in the virtual model. The virtual model is used to simulate the line state evolution in advance, and the performance evaluation module of the data analysis center evaluates the influence of disturbance on the whole system’s fault fluctuation. Then, the structure and performance of the production line can be regulated through optimization algorithms. Finally, the optimization plan and implementation measures are given to ensure the normal production output of the whole system.

3.2. Notations and Assumptions

A digital twin system is far more than a virtual 3D model (visualization), and an accurate analytical model is essential to describe the internal operating mechanism of the system. The vulnerability analysis method proposed in this paper provides a theoretical core for the extended application of digital twin technology. As shown in Figure 5, this paper models the mobile phone assembly production system as a series system with finite buffers for analysis. The following notations are adopted in Abbreviations.
The following assumptions are made in the process of SVA.
(1)
The first station m0 is never starved, and the last station mN is never blocked.
(2)
All stations are failure-dependent and buffers are reliable.
(3)
Stations’ servicing time without consideration of failures obeys the deterministic distribution.
(4)
The servicing time is deterministically distributed when machine failure has not occurred.
(5)
Station failure obeys the exponential distribution.
(6)
Traveling time at buffers is negligible.

4. Temporal and Spatial Attributes of SVA

A resilient production system can be considered a dynamic space–time system. Finite buffers can suppress the stochastic disturbance effect and enhance product stability in the system. The consumption of work-in-process in buffers is accompanied by the alternation of the station’s starvation and blocking states. On the other hand, random failures and scheduled disruptions (e.g., preventive maintenance activities) of different stations result in differentiated production losses owing to their disturbance moment and duration. Hence, production disturbances (device failures, batch variation, process time delay, etc.) combined with inherent buffering mechanisms contribute to the dynamics of cell phone assembly systems. Consequently, system state evolution has distinct temporal and spatial attributes during the process of SVA. On account of different analysis perspectives, SVA and its quantification are separated into two parts in this section: vulnerability effect on the end-of-line station of the assembly line and vulnerability effect on the bottleneck station of the assembly line.

4.1. Vulnerability Effect on End-of-Line Station

System yield is computed by the production count of the end-of-line station. Any disruption of due-time performance may lead to product shortage and the irretrievable risk of delivery delay. Once stoppage occurs in an end-of-line station, the downstream industry chains are likely to be badly hit. Thus, it is necessary to analyze the vulnerability effect on the end-of-line station.
As shown in Figure 6, once a failure event of a certain station occurs for a serial transfer line with N + 1 stations and N buffers, it is unlikely for the failure event to immediately cause system performance reduction because of the function of finite buffers. System state evolution heavily depends on the configuration structure. The disturbance event immediately leads to local instability of a certain station, but it takes a propagation time to cause production reduction at the end-of-line station. Such a phenomenon is explained as Terminal Time Delay (TTD) effect in this paper. On the other hand, there is an opportunity window for the repair process such that the end-of-line station’s production will not stop. The opportunity window is indicated as Terminal Time Window (TTW) below.
Suppose a disturbance event E (mi, te, de) occurs, wherein mi is the i th station (i = 0, 1, 2, …, N), te is the occurrence time, and de is the duration of event E. The bottleneck station is indicated as mk. The production system can be divided into three parts as Figure 5: line L1 between the first station and mi (mk if mi locates at the downstream of mk, I > k), line L2 between mi and mk, line L3 between mk (mi if mk locates at the upstream of mi, I > k) and the last station.
TTD of the event E(mi, te, de), which is indicated as TDi(te), can be defined as follows.
Definition 1.
Terminal Time Delay (TTD) is the time interval between the occurrence moment of the disruption and the moment of production stoppage at the end-of-line station.
As shown in Figure 7 and Figure 8, the stagnant production of the end-of-line station does not occur until the time moment te + TDi(te). Accordingly, TTD can be represented qualitatively according to the residence time (RT) of line L2 (RT(L2)) and L3 (RT(L3)).
As shown in Equation (1), TTD is determined in terms of the disruption location and occupancy situation of downstream buffers. Therefore, the disruption’s TTD has a distinct spatial attribute determined by the distance from the last station. Additoinally, it also has distinct temporal attributes determined by the work-in-process (WIP) dynamics of downstream buffers and stations.
T D i ( t e ) = { R T ( L 2 ) + R T ( L 3 )                 i k R T ( L 3 )                 i   > k  
The TTW of the event E(mi, te, de), which is indicated as TWi(te), can be defined as follows.
Definition 2.
Terminal Time Window (TTW) is the opportunity time that the disruption does not lead to the production stoppage at the end-of-line station.
Note that the TTW is definitely less than the TTD. As shown in Figure 7 and Figure 8, once the disturbance event E(mi, te, de) occurs, the last work-piece before disruption flows through line L3 if i > k (line L2 and L3 if i  k). There is an opportunity window for the repair process (the repair time is de) such that the first work-piece after repair catches up with the foregoing last work-piece exactly at mN. Thus, mN could never be stopped as if the disturbance event had never occurred.
Once E(mi, te, de) occurs, the vulnerability effect on the end-of-line station can be rescued if the following equation is satisfied.
T W i ( t e ) > d e
If Equation (2) is not satisfied, production cessation at the end-of-line station will occur at te + TDi(te).
In conclusion, the values of TTD, TTW, and de jointly determine the triggering moment and effect of end-of-line vulnerability.

4.2. Vulnerability Effect on Bottleneck Station

According to the theory of constraints [48], system performance is restricted by the bottleneck station. Provided the bottleneck station mk is not affected by the event E(mi, te, de), the production of the whole system remains stable owing to the buffering mechanism of line L2. Namely, in the case of i  k, mk keeps working because of the WIPs in line L2; in the other case of i > k, mk keeps working because of the vacancies in line L2. Note that downtime of mk will lead to permanent system production losses. Accordingly, E(mi, te, de) immediately leads to the local instability of neighboring stations of mi, but it takes a certain duration of time for E(mi, te, de) to cause permanent system production losses. Such a duration of time is defined as Bottleneck Time Delay (BTD). On the other hand, there is an opportune time for the repair process such that the bottleneck station’s production will not stop. The opportunity time is indicated as Bottleneck Time Window (BTW) below.
BTD of the event E(mi, te, de), which is indicated as BDi(te), can be defined as follows.
Definition 3.
Bottleneck Time Delay (BTD) is the time interval between the occurrence moment of the disruption and the moment of production stoppage at the bottleneck station.
As shown in Figure 7 and Figure 8, the stagnant production of the bottleneck station does not occur until the time moment te + BDi(te). Accordingly, BTD can be represented qualitatively according to the residence time (RT) of line L2.
B D i ( t e ) = { R T ( L 2 )                 i k R T ( L 2 ) R T ( L 2 )                 i   > k  
where RT′(L2) is the residence time of line L2 when buffers between mi and mk are all full, RT(L2) is the normal mean residence time without the disruption.
BTD is determined based on the distance and buffer occupancy situation between mi and mk. Namely, if i  k, BTD is the time interval for all WIPs in line L2 passing through mk. If i > k, BTD is the time interval for all buffers in line L2 becoming full. Therefore, the disruption’s BTD has distinct spatial attributes determined by their distance. Additionally, it also has distinct temporal attributes determined by vacancy dynamics between mi and mk.
Definition 4.
Bottleneck Time Window (BTW) is the time interval between the occurrence moment of the disruption and the moment causing permanent production losses.
Note that the BTW is definitely less than the BTD. As shown in Figure 7 (i  k), once the disturbance event E(mi, te, de) occurs, the last work-piece before disruption flows through line L2. There is an opportunity window for the repair process (the repair time is de) such that the first work-piece after repair catches up with the foregoing last work-piece exactly at mk. Thus, mk could never be starved because of the disruption as if the disturbance event never occurs.
On the other hand, as shown in Figure 8 (i > k), once the disturbance event E(mi, te, de) occurs, there is an opportunity window for the repair process (the repair time is de), such that mk+1 returns to its normal work and obtains a work-piece from the full Bk. Thus, E(mi, te, de) will not lead to the blocking of mk as if the disturbance event never occurs.
Let us construct such a scenario in the assumption of the continuous flow model [49]. The production line can be considered as a long rope with children (maybe on a mountaineering trip) tied in succession (similar to the Drum–Buffer–Rope model in the theory of constraints [48]). Once a child tumbles, there is a time window for his/her recovery that causes no effect on queue velocity. Thus, the time window is the time that ropes between the falling child and bottleneck child (maybe a ‘little fatty’) becoming totally tight if the falling child locates after the bottleneck child or becomes completely relaxed (children huddle together) if the bottleneck child locates after the falling child. The Drum–Buffer–Rope example is helpful for understanding the vulnerability delay. However, there is an error in such a continuous flow model. It holds that the bottleneck child will not be affected by the falling child as long as he/she recovers in the moments of the above two critical state limits. Jobs in mobile phone machining production lines are generally discretely delivered. Thus, it takes time to pass from the failure machine to the bottleneck machine.
Once E(mi, te, de) occurs, the vulnerability effect on the bottleneck station can be rescued if the following equation is satisfied.
B W i ( t e ) > d e
If Equation (4) is not satisfied, permanent production losses of the entitled system will occur at te + BDi(te) because normal production of mk is affected.
Similarly, the values of BTD, BTW, and de jointly determine the triggering moment and effect of bottleneck vulnerability.
As shown in Figure 6, once the disturbance event E(mi, te, de) occurs, the production process of the whole system remains stable during the time interval [te, te + BDi(te)]. As shown in Figure 7, the production process of the whole system turns to be unstable because of the new bottleneck of line L3, and such a period sustains at the time interval [te, te + TDi(te)]. It is remarkable that there is no relationship of size between BTD and TTD or BTW and TTW. In another way, BTW can be defined as the longest possible downtime of mi that does not result in permanent production loss at mN. TTW can be defined as the longest possible downtime of mi that does not result in the production stoppage of mN.
As shown in Figure 7 and Figure 8, the time span between a disruptive event and the repair action can be quantified as mean time to repair (MTTR), which is indicated as de in this paper. Similarly, there is Recovery Time Delay (RTD) for productivity restoration because of the existence of propagation time. Furthermore, a longer period is consumed to recover to a stable state.

5. Vulnerability Quantification

Equations (1)–(4) give qualitative descriptions of the vulnerability effect on the end-of-line station and bottleneck station of the mobile phone assembly line. However, system vulnerability should be further quantified in the following procedures. We can consider the mobile phone production system in Figure 6 as a tandem open queuing network system. Thus, production performance can be estimated by the stochastic service system model.

5.1. Stochastic System Model

The transition probability matrix of the tandem system with (N + 1) stations is deduced recursively in this subsection.
The servicing rate of mi is indicated as a constant μ i when failure is not considered. Failure time obeys exponential distribution with rate parameter λ i . Suppose Xi and Ti are the producing number and survival time of mi, respectively. Thus, we can infer the following equation.
P ( X i x i ) = P ( μ i T i x i ) = P ( T i x i / μ i ) = 0 x i μ i λ i e λ i x i d x i = 1 e     λ i x i μ i
Therefore, if failures are considered, the servicing rate of mi is an exponential distribution with parameter ω i , which is calculated by:
ω i = λ i / μ i ,                     i = 0 , 1 , , N
Considering that the first station m0 is never starved, the system can be modeled as an N node tandem open queuing network without m0. Let bi(t) be the queue length at time t, (i = 1, 2, …, N). Thus, the state space is represented as EN = {(b2(t), b1(t)}, which ranks in lexicographical order. The ith state-space Ei, which is i dimension Markov process, can be represented by Ei1 of the 1st to (i − 1)th service station.
E i = { ( 0 , h ) , ( 1 , h ) , , ( B i , h ) , h E i 1 }                 2 i N , E 1 = { ( 0 ) , ( 1 ) , , ( B 1 ) }
In order to investigate the recurrence relation between Ei1 and Ei, the survey of a state-transition process for the first buffer B1 is necessary. The birth and death rates are ω 0 and ω 1 , respectively. The corresponding state-transition matrix Q1 of E1 is shown in Figure 9.
Q 1 = [ ω 0 ω 0 ω 1 ( ω 0 + ω 1 ) ω 0 ω 1 ( ω 0 + ω 1 ) ω 0 ω 1 ( ω 0 + ω 1 ) ω 0 ω 1 ω 1 ]
The death rate of the first service station (namely, ω 1 ) is exactly the birth rate of the second service one. E2 = {(bN(t), bN-1(t), , bi(t), …, b1(t)), i = 1, …, N, bi(t) = 0, 1, …, Bi}, b2(t) = 0, 1, 2, …, B2, b1(t) = 0, 1, 2, …, B1; the state-transition process of both buffer B1 and B2 is shown in Figure 10.
Considering the Markov property in Figure 10, the state process of nodes is only related to their adjacent nodes’ states. Thereby, we can deduce the state-transition matrix Q2 of E2 based on Q1. Firstly, the state transition density matrix of the process (0, b1(t)) → (0, b1(t +t)), which matches with the first row in Figure 10, can be indicated as Q 1 a in the following context.
Q 1 a = [ ω 0 ω 0 ( ω 0 + ω 1 ) ω 0 ( ω 0 + ω 1 ) ω 0 ( ω 0 + ω 1 ) ω 0 ω 1 ]
The transition rate of state (r, b1(t)) → (r + 1, b1(t +t)) is exactly the death rate ω 1 of the first station, which means a work-piece is transferred to Queue 2 from Queue 1 (r = 0, 1,…, B2 − 1). The state transition density matrix of such a process, which is indicated as Q 1 b , is shown as Equation (10).
Q 1 b = Q 1 Q 1 a = [ 0 ω 1 0 ω 1 0 ω 1 0 ω 1 0 ]
Accordingly, the transition density matrix of the process (r + 1, b1(t)) → (r, b1(t +t)) is indicated as ω 2 I , which means a part is finished at Queue 2 (r = 0, 1,…, B2−1). Additionally, the transition density matrix of (r, b1(t)) → (r, b1(t +t)) is Q 1 a ω 2 I , wherein 2 r B 2 1 .
As for (B2, b1(t)) → (B2, b1(t +t)), the transition density matrix, which matches with the last row in Figure 10, can be shown as the following transformation:
( Q 1 a + Q 1 b D 1 ) ω 2 I = [ ω 0 ω 2 ω 0 ω 0 ω 2 ω 0 ω 0 ω 2 ω 0 ω 2 ]
where D 1 = [ 0 I 0 I 0 I 0 ] .
Hence, Q2 can be obtained based on Q1 as the following equation:
Q 2 = [ Q 1 a Q 1 b ω 2 I Q 1 a ω 2 I Q 1 b ω 2 I Q 1 a ω 2 I Q 1 b ω 2 I Q 1 a ω 2 I Q 1 b ω 2 I Q 1 a + Q 1 b D 1 ω 2 I ]
Accordingly, the state process of Ei is a quasi-birth and death process (QBD). The birth rate of the ith queue is the death rate of the (i − 1)th queue (i > 1). The transition matrix of such a process is Q i 1 b (i > 1). The transition matrix of state space {(r + 1, h), h Ei1, r = 0, 1, …, Bi − 1} to {(r, h), h Ei1, r = 0, 1,…, Bi − 1} is ω i I , which means a part is finished by the ith queue. Accordingly, the state-transition matrix Qi with a higher dimension can also be derived by Qi−1 according to the recurrence relation.
Q i = [ Q i 1 a Q i 1 b ω i I Q i 1 a ω i I Q i 1 b ω i I Q i 1 a ω i I Q i 1 b ω i I Q i 1 a ω i I Q i 1 b ω i I Q i 1 a + Q i 1 b D i 1 ω i I ]
2 i N .
wherein,
Q i a = [ Q i 1 a Q i 1 b Q i 1 a ω i I Q i 1 b Q i 1 a ω i I Q i 1 b Q i 1 a ω i I Q i 1 b Q i 1 a + Q i 1 b D i 1 ω i I ] ,
D i 1 = [ 0 I 0 I 0 I 0 ] ,   Q i b = Q i Q i a .

5.2. State Space Equations

The exact performance of small-scale systems can be computed, avoiding the large-scale matrix QN. Suppose Y = (Y0, Y1, Y2, …, YN) is the steady-state solution of the stochastic service system model. The following equation should be satisfied according to the equilibrium condition.
Y Q N = 0
where QN is computed in terms of Equation (13). Thus, the following equations can be obtained.
Y 0 Q N 1 a + Y 1 ω N I = 0
Y 0 Q N 1 b + Y 1 ( Q N 1 a ω N I ) + Y 2 ( ω N I ) = 0
Y i 1 Q N 1 b + Y i ( Q N 1 a ω N I ) + Y i + 1 ( ω N I ) = 0
Y N 1 Q N 1 b + Y N ( Q N 1 a + Q N 1 b D N 1 ω N I ) = 0
The following constraint is given by
Y 0 e 0 + i = 1 N Y i e 1 = 1
where the dimension of all 1 column vectors e0 and e1 is the same as Y0 and Y1.
Let C = ( ω N I ) 1 , Yi+1 can be obtained according to Equation (17).
Y i + 1 = Y i 1 Q N 1 b C + Y i [ Q N 1 a ω N I ] C
Y 2 = Y 0 Q N 1 b C + Y 1 [ Q N 1 a ω N I ] C
Y 1 = Y 0 Q N 1 a C
In order to simplify the derivative process, we give the following substitution parameters:
H 1 = 0 ,       H 2 = Q N 1 b C ,     G 1 = I ,     G 2 = [ Q N 1 a ω N I ] C
H i + 1 = H i 1 Q N 1 b C + H i [ Q N 1 a ω N I ] C ,                 1 < i < B N 1
G i + 1 = G i 1 Q N 1 b C + G i [ Q N 1 a ω N I ] C ,                 1 < i < B N 1
Y2 can be represented as (Y0H2 + Y1G2) according to Equations (21) and (23). Then, Yi can also be expressed by Y0 and Y1 through iterative computing.
Y i = Y 0 H i + Y 1 G i ,             1 i B N 1
Yi can be further expressed containing only Y0 using Equation (22).
Y i = Y 0 ( H i + Q N 1 a C G i ) ,             1 i B N 1
We further calculate YN by Equation (18).
Y N = Y N 1 Q N 1 b ( Q N 1 a + Q N 1 b D N 1 ω N I ) 1             = Y 0 ( H N 1 + Q N 1 a C G N 1 ) Q N 1 b ( Q N 1 a + Q N 1 b D N 1 ω N I ) 1
In order to simplify the derivative process, we further give the following substitution variable:
R i = H i + Q N 1 a C G i ,             1 i B N 1 ,             R N = R N 1 Q N 1 b ( Q N 1 a + Q N 1 b D N 1 ω N I ) 1
Thus, Yi = Y0Ri, I = 1, 2, …, N. By adding together Equations (15) and (18), we can obtain the following formula containing only Y0:
Y 0 [ Q N 1 + i = 1 N 1 R i Q N 1 + R N ( Q N 1 a + Q N 1 b D N 1 ) ] = 0
Equation (19) can also be shown as follows:
Y 0 ( e 0 + i = 1 N R i e 1 ) = 1
In conclusion, Y0 can be determined by the following linear inhomogeneous equations:
[ [ Q N 1 + i = 1 N 1 R i Q N 1 + R N ( Q N 1 a + Q N 1 b D N 1 ) ] T ( e 0 + i = 1 N R i e 1 ) T ] Y 0 T = [ 0 M N 1 × 1 1 ]
wherein, M N 1 = i = 1 N 1 ( B i + 1 ) . Additionally, Y can be further calculated by Equations (27) and (28).

5.3. Vulnerability Quantification

The disruptive event E(mi, te, de) will bring different levels of impact on system production performance, which has distinct temporal and spatial attributes owing to the disruption location and duration. According to Equations (1) and (3), the transient vulnerability of E(mi, te, de) is determined by the WIPs and vacancies condition at the moment of te.
From the foregoing definition, both terminal vulnerability and bottleneck vulnerability are required to be quantified. In Equation (1), according to little’s law, Transient TTD in te is computed based on work-pieces of downstream buffers and stations after mi.
T D i ( t e ) = h = i + 1 N L h ( t e ) ( 1 S T N ) ω N = h = i + 1 N [ b h ( t e ) + x m h ( t e ) ] ( 1 S T N ) ω N
where Lh(te) is the queue length of the hth service station, bh(te) is the number of WIPs in the hth buffer, and x m h ( t e ) is the variate that indicates whether there is a work-piece in mh, which equals to 1 if there is one, 0 otherwise. Note that both bh(te) and x m h ( t e ) should be given as the input condition. The probability of the starvation of the last station is STN, which is calculated by
S T N = P { L N = 0 } = ξ E N S Y ξ
where LN is the queue length of the last station, Y ξ is the probability of state ξ , and state space ENS is shown as:
E N S = { 0 , b N 1 ( t ) , , b i ( t ) ,   , b 1 ( t ) , i = 1 , , N 1 , b i ( t ) = 0 , 1 , , B i }
Transient TTW for the repair process of mi, namely the opportunity window that the first work-piece after repair catches up with the foregoing last work-piece exactly at mN, can be quantified by the following equation.
T W i ( t e ) = h = i + 1 N L h ( t e ) ( 1 S T N ) ω N h = i N 1 1 ω h = h = i + 1 N [ b h ( t e ) + x m h ( t e ) ] ( 1 S T N ) ω N h = i N 1 1 ω h
The steady TTD of a disruptive event E(mi, te, de) can be computed by the average queue length between mi and mN, which is shown as:
T D i ¯ = E L i T T D ( 1 S T N ) ω N
E L i T T D represents the expected queue length between mi and mN in the steady state. In the above equation, the steady joint probability distribution of each queue length can be indicated as the following equation:
P { h = 1 N ( L h = l h ) } = ξ E N Y ξ , E N = { ( b N , b N 1 , , b i , , b 1 ) , b i = 1 , , B i }
E L i T T D can be determined by the following equation:
E L i T T D = ξ E N [ Y ξ h = i + 1 N b h ( ξ ) ]
where b h ( ξ ) is the number of work pieces in Queue h under the state ξ .
The steady TTW can also be computed by the average queue length.
T W i ¯ = E L i T T D ( 1 S T N ) ω N h = i N 1 1 ω h
As for the bottleneck-dominated vulnerability, the BTD of E(mi, te, de) is determined by the WIPs and vacancies condition at the moment of te. Suppose a disruptive event occurs in mi, and the bottleneck station is mk. If i  k, BTD is the time interval for all WIPs in line L2 passing through mk. If i > k, BTD is the time interval for all buffers in line L2 becoming full.
Therefore, if I > k, the transient BTD of E(mi, te, de) can be computed by the sojourn time of the last WIP before disruption event between mi and mk. If i > k, the transient BTD of E(mi, te, de) can be computed by the time that all vacancies between mi and mk become full.
B D i ( t e ) = { h = i + 1 k L h ( t e ) S B k ω k ,                               i < k 0   ,                                                                 i = k h = k + 1 i [ B h L h ( t e ) ] S B k ω k ,                 i > k
where SBk is the probability that mk is neither starved nor blocked. SBk is calculated by the following equation:
S B k = ξ E B S k Y ξ ,             E B S k = { b N , b N 1 , , b k + 1 B k + 1 , b k 0 , , b 1 } , b k = 0 , 1 , , B k
Bottleneck station mk is determined by the starvation and blocking probability.
S h = | S T h + 1 B L h | + | S T h B L h 1 | ,             h = 1 , 2 , , N 1 S 0 = | S T 1 B L 0 | ,             S N = | S T N B L N 1 |
where the starvation probability of mh is obtained by
S T h = ξ E S T h Y ξ ,             E S T h = { b N , b N 1 , , b h = 0 , , b 1 } , b h = 0 , 1 , , B h
and the blocking probability of mh is obtained by
B L h = ξ E B L h Y ξ ,             E B L h = { b N 1 , , b h , b h + 1 = B h + 1 , , b 1 } , b h = 0 , 1 , , B h
Queue length at mh is obtained by
L h ( t e ) = [ b h ( t e ) + x m h ( t e ) ]
Steady BTD can be computed by the average queue length.
B D i ¯ = { E L i k B T D S B k ω k ,                               i < k 0 ,                                                                 i = k h = k + 1 i B h E L i k B T D S B k ω k ,                 i > k
E L i k B T D represents the expected queue length between mi and mk, which can be computed in a similar way.
E L i k B T D = { ξ E B S k [ Y ξ h = i + 1 k b h ( ξ ) ] ,                               i < k 0 ,                                                                 i = k ξ E B S k [ Y ξ h = k + 1 i b h ( ξ ) ] ,                 i > k
Accordingly, transient BTW for the repair process of mi, namely the opportunity window that the first work-piece after repair catches up with the foregoing last work-piece exactly at the bottleneck station mk, can be quantified by the following equation:
B W i ( t e ) = { h = i + 1 k L h ( t e ) S B k ω k h = i k 1 1 ω h ,                               i < k 0 ,                                                                 i = k h = k + 1 i [ B h L h ( t e ) ] S B k ω k h = k i 1 1 ω h ,                 i > k
The steady BTW can also be computed by the average queue length.
B W i ¯ = { E L i k B T D S B k ω k h = i k 1 1 ω h ,                               i < k 0 ,                                                                 i = k h = k + 1 i B h E L i k B T D S B k ω k h = k i 1 1 ω h ,                 i > k
Therefore, the transient vulnerability effect on the terminal station can be quantified for each disturbance event E(mi, te, de) as follows:
V i T ( t e ) = { 0 ,                                 d e T W i ( t e ) λ i ω N ( 1 S T N ) [ d e T W i ( t e ) ] ,                                 d e > T W i ( t e )
The steady vulnerability effect of mi on the final station can be quantified by
V i T = { 0 ,                                 d e T W i ¯ λ i ω N ( 1 S T N ) ( d e T W i ¯ ) ,                                                             d e > T W i ¯
The transient vulnerability effect on the system bottleneck can be quantified for each disturbance event E(mi, te, de) as follows:
V i B ( t e ) = { 0 ,                                 d e B W i ( t e ) λ i ω k [ d e B W i ( t e ) ] ,               d e > B W i ( t e )
The steady vulnerability effect of mi on the system output can be quantified by
V i B = { 0 ,                                 d e B W i ¯ λ i ω k ( d e B W i ¯ ) ,                                                             d e > B W i ¯

6. Case Study

The rapid replacement of mobile phone products poses a serious challenge to its assembly system. Frequent product replacement results in frequent switching of the configuration structure of the production line, which leads to the instability of the production process and the loss of production capacity. The mobile phone assembly process is very complicated and has many procedures, including dozens of procedures such as mainboard inspection, camera welding, antenna bracket installation, camera fixing, and button board welding. Due to factors such as frequent product replacement, equipment failure, and adjustment of line change parameters, the production capacity of the production line is often lost. At present, most mobile phone assembly companies belong to foundries, with meager profits. The loss of capacity due to frequent interruptions will seriously affect corporate profits. Therefore, in order to ensure the stable production capacity of the production line under high-frequency disturbance, it is very important to carry out vulnerability analysis and control strategies.
The Digital Twin System (DTS) is a 3D design and simulation optimization system designed by our team for the characteristics and needs of the 3C manufacturing industry. It has strong 3D near-physical simulation capabilities and good scalability. Figure 11 is the virtual simulation platform and physical production line of the mobile phone assembly line built by DTS, respectively. The entire project is based on digital twin technology, which not only supports open architecture design, rapid reconfiguration of production lines, distributed integration testing, transparent monitoring, high-fidelity hardware-in-the-loop simulation, rapid custom design of the entire line, and other application modalities, but also includes a fully automatic production line, custom design platform, intelligent control system, and other parts.
DTS is mainly composed of four functional modules including basic management, near-physical simulation, multi-view synchronization, performance analysis, and regulation, and each module contains multiple sub-functions. The main function modules and main interface of the system are shown in Figure 12 respectively. Figure 12a is the main interface of the digital twin system, which mainly includes functional areas such as the 3D view window, function menu area, component library, model BOM tree, and model attribute management. Figure 12b is the scene layout of the system interface, which can design the layout of the production line in the 3D scene. Figure 12c is the model property management interface, which can set the near-physical properties of the 3D model. Figure 12d is the scripting interface, which can Script control of equipment actions and WIP flow in the production line. Figure 12e is the PLC connection management interface, which can establish a communication channel between physical equipment and virtual models. Figure 12f is the performance analysis and control interface, which can analyze the performance of the production line and iteratively optimize the design of the production line. The vulnerability analysis method proposed in this paper is an important theoretical basis for the performance analysis and control module. Based on this method, the module can realize the real-time analysis of the production line performance. Simulate disturbance events, quantify vulnerability indicators, and then formulate appropriate disturbance control strategies to avoid production residual losses.
Combining the theoretical research results in this paper, this chapter develops a vulnerability analysis application that supports disturbance simulation, vulnerability quantification, and disturbance control. Additionally, it encapsulate it as a functional component into the performance and analysis control module of the digital twin system, as shown in Figure 13. In the vulnerability quantitative analysis and control strategy module, after inputting fault data, the “Vulnerability Index Solving” function can quantify the vulnerability index of the production line, generate a production line performance analysis chart, and display the quantification results. The “disturbance control strategy” function can generate the control strategy when the equipment fails.
The analytical models described in the previous sections can accurately evaluate the performance of production systems under dynamic disruptions, and the case studies in this section aim to validate the vulnerability quantification method. Select some of the processes in the mobile phone assembly process for virtual simulation, namely sticking double-sided tape, dispensing, TP pressing, back cover locking screws, pasting accessories, etc. Suppose the production line consists of 8 tandem queues, namely 8 stations and 7 buffers. The configuration parameters of the line are listed in Table 1. It is supposed that the first station is never starved.
Note that transient vulnerability is determined by the monitoring buffer/machine occupancy dynamics. Transient vulnerability evaluation is helpful for real-time decision support such as opportunity maintenance. It can be inferred by real-time queue lengths using Equations (33), (36), (41), and (49). On account of the number of work-pieces in buffers being variable, a steady evaluation is more valuable for configuration design or vulnerability control.
Figure 14 exhibits the steady vulnerability evaluation results. Steady TTD, TTW, BTD, and BTW results are used to illustrate the temporal and spatial attributes. As shown in Figure 14, B D 2 ¯ and B W 2 ¯ equal 0. Thus, M1 (Queue 2) can be inferred as the main bottleneck machine according to Equations (47) and (50). In terms of the evaluation of terminal vulnerability, both TTD and TTW gradually diminish with the decrease in distance from the terminal machine. From the perspective of bottleneck vulnerability, both the BTD and BTW gradually increase as the distance is augmented from the bottleneck machine. Despite the obvious trend of vulnerability, this paper presents a quantitative approach that is the basis of further precise performance control strategies. Note that it will lead to large errors if the TTD and BTD are considered as the TTW and BTW in responsive controlling decisions. For example, in order not to cause any system production loss, the permitted opportunity maintenance window for machines should be determined by the BTW instead of the BTD.
The vulnerability delay effect can be clearly displayed in Figure 15 and Figure 16. An obvious time delay of disruption can be evaluated via the proposed approach. After certain critical time points, namely steady TTWs in Figure 15 and steady BTWs in Figure 16, the vulnerability effect will be linearly related to the repair time de with different slopes. The vulnerability effects of the bottleneck machine (namely M1) are obvious. However, the terminal vulnerability of M0 will surpass M1 at a certain de, becoming the most vulnerable machine. On the whole, the bottleneck vulnerability effect turns out to be more obvious when it is farther away from M1. Accordingly, failure fluctuations of the terminal machine can be well assessed via the results of terminal vulnerability in Figure 15. Further controlling decisions (for example, permitted opportunity maintenance intervals) are available to avoid the stockout of the downstream supply chain. Additionally, failure fluctuations of the whole system output can be well assessed via the results of bottleneck vulnerability in Figure 16. Additional controlling decisions (for example, buffer reallocation, line rebalancing, or permitted opportunity maintenance window for individual equipment) turn out to be available to keep normal production output.
Apart from the distinct temporal and spatial characteristics when determining the null points, the evolutional curve of vulnerability is closely sensitive to the failure rate of mi and the service rate of the line. As shown in Figure 15 and Equation (52), terminal vulnerability is quite sensitive to failure rate λ i and the average processing speed of the last queue, while bottleneck vulnerability is determined by the average processing speed of the bottleneck.
This paper affords an analytical model of vulnerability evaluation under sudden disruptive events. The computing speed of the analytical model is faster than the normal event simulation model. The proposed vulnerability evaluation model is the basis (mainly the four performance indicators) for further quick decisions (such as reconfiguration optimization) under disruptions in the digital twin system. The four performance indicators are steady results. To verify them, we use Plant Simulation software to build the simulation model shown in the Figure 17, and conduct simulation experiments.
Table 2 shows the numerical comparison of the analytical model and the simulation model of the terminal time delay. The comparison result shows that the analytical results of Figure 15 are basically anastomotic with the real assembly scenario, and the evaluating errors lie in 2% for all machines.

7. Conclusions

This paper explores the nature of dynamics analysis of production systems and proposes a vulnerability evaluation approach for mobile phone assembly lines under a resilient system analytic frame. The vulnerability effect on the terminal and bottleneck machine is surveyed based on the stochastic production system model, wherein temporal and spatial attributes are expounded via vulnerability delay phenomena. Four special vulnerability indicators, namely TTD, TTW, TTD, and TTW, are defined. Afterward, the transition matrix of the production system (N + 1 machines and N buffers) is obtained by a recursive derivation means. Transient and steady vulnerabilities are evaluated in two different modes, terminal vulnerability and bottleneck vulnerability, respectively. The theoretical research is then translated into practical tools. An application program for brittleness analysis and evaluation is developed and applied to the digital twin system independently developed by the team to solve practical problems.
Potential future work can be divided into two aspects, vulnerability evaluation and vulnerability control, respectively. On the one hand, the proposed exact evaluating approach is valuable for the future approximative model of large production systems. Additionally, different failure distributions such as the phase-type distribution should be studied. On the other hand, based on the proposed vulnerability analysis approach, vulnerability control through reconfiguration planning or preventive maintenance is the prospective research issue.

Author Contributions

Conceptualization, D.Z.; formal analysis, D.Z., Y.P. and Q.L.; investigation, D.Z., Y.P. and Q.L.; methodology, D.Z.; writing—original draft preparation, D.Z.; writing—review and editing, Y.P. All authors have read and agreed to the published version of the manuscript.

Funding

This project is supported by the National Key R & D Program of China (2019YFB170620X), National Natural Science Foundation of China (Grant No. 51805095, 71971181), The Guangdong Provincial Natural Science Foundation (Grant No. 2020A1515010879), Hong Kong Scholar Program (XJ2019058), The Science and Technology Planning Project of Guangdong Province of China (Grant No. 2019B090916002, 2019A050503010).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

SVAsystem vulnerability analysis
TTDterminal time delay
TTWterminal time window
BTDbottleneck time delay
BTWbottleneck time window
TDi(te)TTD of mi at time moment te
TWi(te)TTW of mi at time moment te
BDi(te)BTD of mi at time moment te
BWi(te)BTW of mi at time moment te
E(mi, te, de)disruption event of mi at te, with the duration time de
μ i servicing rate of mi without consideration of failures (deterministic distribution)
λ i the failure rate of mi
ω i the servicing rate of mi with consideration of station failure
Lh(te) the queue length of the hth station, with the expected queue length Lh
bh(te)the number of work-pieces in the hth buffer, with the expected value bh
STNthe probability of the starvation of the last station
SBkthe probability that mk is neither starved or blocked
E L i T T D expected queue length between mi and mN
E L i k B T D expected queue length between mi and mk
V i T ( t e ) transient vulnerability on the terminal station at te, with the steady value V i T
V i B ( t e ) transient vulnerability on the system bottleneck, with the steady value V i B

References

  1. Li, J.; Meerkov, S.M. Summary of Main Facts of Production Systems Engineering. In Production Systems Engineering; Springer: Boston, MA, USA, 2009; pp. 1–8. [Google Scholar]
  2. Matsuo, H. Implications of the Tohoku earthquake for Toyota’s coordination mechanism: Supply chain disruption of automotive semiconductors. Int. J. Prod. Econ. 2015, 161, 217–227. [Google Scholar] [CrossRef]
  3. Opritescu, D.; Hartmann, C.; Riedl, W.; Ritter, M.; Volk, W. Low-Risk bypassing of machine failure scenarios in automotive industry press shops by releasing overall capacity of the production networks. J. Manuf. Syst. 2019, 52, 121–130. [Google Scholar] [CrossRef]
  4. Zhang, W.J.; van Luttervelt, C.A. Toward a resilient manufacturing system. CIRP Ann. Manuf. Technol. 2011, 60, 469–472. [Google Scholar] [CrossRef]
  5. Barker, K.; Ramirez-Marquez, J.E.; Rocco, C.M. Resilience-based network component importance measures. Reliab. Eng. Syst. Saf. 2013, 117, 89–97. [Google Scholar] [CrossRef]
  6. Hosseini, S.; Barker, K.; Ramirez-Marquez, J.E. A review of definitions and measures of system resilience. Reliab. Eng. Syst. Saf. 2016, 145, 47–61. [Google Scholar] [CrossRef]
  7. Henry, D.; Ramirez-Marquez, J.E. Generic metrics and quantitative approaches for system resilience as a function of time. Reliab. Eng. Syst. Saf. 2012, 99, 114–122. [Google Scholar] [CrossRef]
  8. Xiang, Y.; Mo, R.; Qiao, H. An Evaluation Method for Brittle Source of the Key Procedure in Complex Parts’ Manufacturing. Math. Probl. Eng. 2018, 2018, 1952674. [Google Scholar] [CrossRef]
  9. Gao, G.B.; Yue, W.H.; Ou, W.C.; Tang, H. Vulnerability evaluation method applied to manufacturing systems. Reliab. Eng. Syst. Saf. 2018, 180, 255–265. [Google Scholar]
  10. Nakatani, J.; Tahara, K.; Nakajima, K.; Daigo, I.; Kurishima, H.; Kudoh, Y.; Moriguchi, Y. A graph theory-based methodology for vulnerability assessment of supply chains using the life cycle inventory database. Omega-Int. J. Manag. Sci. 2018, 75, 165–181. [Google Scholar] [CrossRef]
  11. Gao, L.; Shen, W.M.; Li, X.Y. New Trends in Intelligent Manufacturing. Engineering 2019, 5, 619–620. [Google Scholar] [CrossRef]
  12. Tao, F.; Qi, Q.L.; Wang, L.H.; Nee, A.Y.C. Digital Twins and Cyber-Physical Systems toward Smart Manufacturing and Industry 4.0: Correlation and Comparison. Engineering 2019, 5, 653–661. [Google Scholar] [CrossRef]
  13. Zhang, H.; Liu, Q.; Chen, X.; Zhang, D.; Leng, J.W. A Digital Twin-Based Approach for Designing and Multi-Objective Optimization of Hollow Glass Production Line. IEEE Access 2017, 5, 26901–26911. [Google Scholar] [CrossRef]
  14. Liu, Q.; Zhang, H.; Leng, J.W.; Chen, X. Digital twin-driven rapid individualised designing of automated flow-shop manufacturing system. Int. J. Prod. Res. 2019, 57, 3903–3919. [Google Scholar] [CrossRef]
  15. Zhuang, C.B.; Liu, J.H.; Xiong, H. Digital twin-based smart production management and control framework for the complex product assembly shop-floor. Int. J. Adv. Manuf. Technol. 2018, 96, 1149–1163. [Google Scholar] [CrossRef]
  16. Cai, B.P.; Xie, M.; Liu, Y.H.; Liu, Y.L.; Feng, Q. Availability-based engineering resilience metric and its corresponding evaluation methodology. Reliab. Eng. Syst. Saf. 2018, 172, 216–224. [Google Scholar] [CrossRef]
  17. Ouyang, M.; Duenas-Osorio, L. Time-dependent resilience assessment and improvement of urban infrastructure systems. Chaos 2012, 22, 11. [Google Scholar] [CrossRef]
  18. Zio, E. Challenges in the vulnerability and risk analysis of critical infrastructures. Reliab. Eng. Syst. Saf. 2016, 152, 137–150. [Google Scholar] [CrossRef]
  19. Tukamuhabwa, B.R.; Stevenson, M.; Busby, J.; Zorzini, M. Supply chain resilience: Definition, review and theoretical foundations for further study. Int. J. Prod. Res. 2015, 53, 5592–5623. [Google Scholar] [CrossRef]
  20. Jain, V.; Kumar, S.; Soni, U.; Chandra, C. Supply chain resilience: Model development and empirical analysis. Int. J. Prod. Res. 2017, 55, 6779–6800. [Google Scholar] [CrossRef]
  21. Wieland, A.; Wallenburg, C.M. The influence of relational competencies on supply chain resilience: A relational view. Int. J. Phys. Distrib. Logist. Manag. 2013, 43, 300–320. [Google Scholar] [CrossRef]
  22. Ambulkar, S.; Blackhurst, J.; Grawe, S. Firm’s resilience to supply chain disruptions: Scale development and empirical examination. J. Oper. Manag. 2015, 33–34, 111–122. [Google Scholar] [CrossRef]
  23. Spiegler, V.L.M.; Naim, M.M.; Wikner, J. A control engineering approach to the assessment of supply chain resilience. Int. J. Prod. Res. 2012, 50, 6162–6187. [Google Scholar] [CrossRef]
  24. Hosseini, S.; Al Khaled, A.; Sarder, M.D. A general framework for assessing system resilience using Bayesian networks: A case study of sulfuric acid manufacturer. J. Manuf. Syst. 2016, 41, 211–227. [Google Scholar] [CrossRef]
  25. Xu, M.K.; Radhakrishnan, S.; Kamarthi, S.; Jin, X.N. Resiliency of Mutualistic Supplier-Manufacturer Networks. Sci. Rep. 2019, 9, 13559. [Google Scholar] [CrossRef] [PubMed]
  26. Gu, X.; Jin, X.N.; Ni, J.; Koren, Y. Manufacturing System Design for Resilience. In Proceedings of the 25th CIRP Design Conference, Haifa, Israel, 2–4 March 2015; Elsevier Science Bv: Haifa, Israel, 2015; pp. 135–140. [Google Scholar]
  27. Hu, Y.; Li, J.S.; Holloway, L.E. Resilient Control for Serial Manufacturing Networks with Advance Notice of Disruptions. IEEE Trans. Syst. Man Cybern. Syst. 2013, 43, 98–114. [Google Scholar] [CrossRef]
  28. Qin, Y.T.; Zhao, L.P.; Yao, Y.Y. Dynamic quality characteristics modelling based on brittleness theory in complex manufacturing processes. Int. J. Comput. Integr. Manuf. 2011, 24, 915–926. [Google Scholar] [CrossRef]
  29. Albino, V.; Garavelli, A. A methodology for the vulnerability analysis of just-in-time production systems. Int. J. Prod. Econ. 1995, 41, 71–80. [Google Scholar] [CrossRef]
  30. Liu, W.Q.; Xu, L.Y.; Chen, Y.P.; Li, A.P. Structural Vulnerability Modeling and Evaluation of Manufacturing System Based on State Entropy. In Proceedings of the 51st CIRP Conference on Manufacturing Systems (CIRP CMS), Stockholm, Sweden, 16–18 May 2018; Elsevier Science Bv: Stockholm, Sweden, 2018; pp. 750–755. [Google Scholar]
  31. Gao, G.B.; Wang, J.S.; Yue, W.H.; Ou, W.C. Structural-vulnerability assessment of reconfigurable manufacturing system based on universal generating function. Reliab. Eng. Syst. Saf. 2020, 203, 11. [Google Scholar] [CrossRef]
  32. Wagner, S.M.; Neshat, N. Assessing the vulnerability of supply chains using graph theory. Int. J. Prod. Econ. 2010, 126, 121–129. [Google Scholar] [CrossRef]
  33. Blackhurst, J.; Rungtusanatham, M.J.; Scheibe, K.; Ambulkar, S. Supply chain vulnerability assessment: A network based visualization and clustering analysis approach. J. Purch. Supply Manag. 2018, 24, 21–30. [Google Scholar] [CrossRef]
  34. Wagner, S.M.; Neshat, N. A comparison of supply chain vulnerability indices for different categories of firms. Int. J. Prod. Res. 2012, 50, 2877–2891. [Google Scholar] [CrossRef]
  35. Bogataj, D.; Bogataj, M. Measuring the supply chain risk and vulnerability in frequency space. Int. J. Prod. Econ. 2007, 108, 291–301. [Google Scholar] [CrossRef]
  36. Chang, J.; Lu, H.B.; Shi, J. Stockout risk of production-inventory systems with compound Poisson demands. Omega Int. J. Manage. Sci. 2019, 83, 181–198. [Google Scholar] [CrossRef]
  37. Li, J.S.; Blumenfeld, D.E.; Huang, N.J.; Alden, J.M. Throughput analysis of production systems: Recent advances and future topics. Int. J. Prod. Res. 2009, 47, 3823–3851. [Google Scholar] [CrossRef]
  38. Li, J.; Meerkov, S.M.; Zhang, L. Production Systems Engineering: Review and Recent Developments. In Handbook of Stochastic Models and Analysis of Manufacturing System Operations; Smith, J.M., Tan, B., Eds.; Springer: New York, NY, USA, 2013; pp. 167–210. [Google Scholar]
  39. Jia, Z.Y.; Zhang, L. Serial production lines with geometric machines and finite production runs: Performance analysis and system-theoretic properties. Int. J. Prod. Res. 2019, 57, 2247–2262. [Google Scholar] [CrossRef]
  40. Meerkov, S.M.; Zhang, L. Transient behavior of serial production lines with Bernoulli machines. IIE Trans. 2008, 40, 297–312. [Google Scholar] [CrossRef]
  41. Ju, F.; Li, J.S.; Horst, J.A. Transient Analysis of Serial Production Lines with Perishable Products: Bernoulli Reliability Model. IEEE Trans. Autom. Control 2017, 62, 694–707. [Google Scholar] [CrossRef]
  42. Hou, Y.K.; Li, L.; Ge, Y.T.; Zhang, K.F.; Li, Y. A new modeling method for both transient and steady-state analyses of inhomogeneous assembly systems. J. Manuf. Syst. 2018, 49, 46–60. [Google Scholar] [CrossRef]
  43. Ge, Y.T.; Li, L.; Wang, Y. Modeling of Bernoulli production line with the rework loop for transient and steady-state analysis. J. Manuf. Syst. 2017, 44, 22–41. [Google Scholar] [CrossRef]
  44. Chen, J.C.; Jia, Z.Y.; Huang, L.Z.; Dai, Y.P. Transient Performance Evaluation of Flexible Production Lines with Two Bernoulli Machines and Dedicated Buffers. In Proceedings of the 16th IEEE International Conference on Automation Science and Engineering (CASE), Electr Network, Hong Kong, China, 20–21 August 2020; pp. 836–841. [Google Scholar]
  45. Jia, Z.Y.; Huang, L.Z.; Chen, J.C.A. Order-Reduced Dynamic Decoupling Approach for Performance Evaluation of Multitype and Small-Batch-Based Serial Lines With Adjustments and Resets. IEEE Syst. J. 2021, 15, 3902–3912. [Google Scholar] [CrossRef]
  46. Wang, M.Y.; Huang, H.X.; Li, J.S. Transient Analysis of Multiproduct Bernoulli Serial Lines with Setups. IEEE Trans. Autom. Sci. Eng. 2021, 18, 135–150. [Google Scholar] [CrossRef]
  47. Chen, G.R.; Zhang, L.; Arinez, J.; Biller, S. Energy-Efficient Production Systems Through Schedule-Based Operations. IEEE Trans. Autom. Sci. Eng. 2013, 10, 27–37. [Google Scholar] [CrossRef]
  48. Rahman, S. Theory of constraints. Int. J. Oper. Prod. Manag. 1998, 18, 336–355. [Google Scholar] [CrossRef]
  49. Chang, Q.; Biller, S.; Xiao, G.X. Transient Analysis of Downtimes and Bottleneck Dynamics in Serial Manufacturing Systems. J. Manuf. Sci. Eng. Trans. ASME 2010, 132, 9. [Google Scholar] [CrossRef]
Figure 1. Performance transition of a resilient system.
Figure 1. Performance transition of a resilient system.
Machines 10 00752 g001
Figure 2. A digital twin system of disturbance evaluation and regulation.
Figure 2. A digital twin system of disturbance evaluation and regulation.
Machines 10 00752 g002
Figure 3. Virtual assembly line and its components.
Figure 3. Virtual assembly line and its components.
Machines 10 00752 g003
Figure 4. Physical assembly line and its components.
Figure 4. Physical assembly line and its components.
Machines 10 00752 g004
Figure 5. General system configuration structure.
Figure 5. General system configuration structure.
Machines 10 00752 g005
Figure 6. Line division according to the location of mi and mk.
Figure 6. Line division according to the location of mi and mk.
Machines 10 00752 g006
Figure 7. Description of temporal dynamics of a disruptive event (i  k).
Figure 7. Description of temporal dynamics of a disruptive event (i  k).
Machines 10 00752 g007
Figure 8. Description of temporal dynamics of a disruptive event (i > k).
Figure 8. Description of temporal dynamics of a disruptive event (i > k).
Machines 10 00752 g008
Figure 9. State-transition diagram of the buffer B1.
Figure 9. State-transition diagram of the buffer B1.
Machines 10 00752 g009
Figure 10. State-transition diagram of the buffer B1 and B2.
Figure 10. State-transition diagram of the buffer B1 and B2.
Machines 10 00752 g010
Figure 11. Mobile phone assembly line. (a) Virtual Simulation Platform. (b) Physical assembly line.
Figure 11. Mobile phone assembly line. (a) Virtual Simulation Platform. (b) Physical assembly line.
Machines 10 00752 g011
Figure 12. Introduction to the main function interface of DTS. (a) Digital twin interface. (b) Scene layout management interface. (c) Models’ property management interface. (d) Script writing interface. (e) PLC connection management interface. (f) Performance analysis and control interface.
Figure 12. Introduction to the main function interface of DTS. (a) Digital twin interface. (b) Scene layout management interface. (c) Models’ property management interface. (d) Script writing interface. (e) PLC connection management interface. (f) Performance analysis and control interface.
Machines 10 00752 g012aMachines 10 00752 g012b
Figure 13. Vulnerability quantitative analysis and disturbance control strategies interface.
Figure 13. Vulnerability quantitative analysis and disturbance control strategies interface.
Machines 10 00752 g013
Figure 14. Steady TTD, TTW, BTD, and BTW results.
Figure 14. Steady TTD, TTW, BTD, and BTW results.
Machines 10 00752 g014
Figure 15. Terminal vulnerability delay and its evolutional curve.
Figure 15. Terminal vulnerability delay and its evolutional curve.
Machines 10 00752 g015
Figure 16. Bottleneck vulnerability delay and its evolutional curve.
Figure 16. Bottleneck vulnerability delay and its evolutional curve.
Machines 10 00752 g016
Figure 17. Simulation model of a mobile phone assembly line.
Figure 17. Simulation model of a mobile phone assembly line.
Machines 10 00752 g017
Table 1. Configuration information and reliability parameters.
Table 1. Configuration information and reliability parameters.
Queue 1Queue 2Queue 3Queue 4Queue 5Queue 6Queue 7Queue 8
Buffer capacity/2222222
Service rate μ i 4.54.34.14.34.54.24.54.5
Failure rate λ i 0.0360.0400.0310.0290.0290.0400.0340.034
Table 2. Terminal time delay quantization results.
Table 2. Terminal time delay quantization results.
MachineAnalytical MethodSimulation MethodEvaluate Errors
m01202.751198.450.35%
m1891.63897.110.61%
m2595.97588.291.2%
m3385.98382.290.95%
m4224.53222.860.74%
m5152.85151.490.89%
m642.1642.470.73%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, D.; Pei, Y.; Liu, Q. Vulnerability Evaluation for a Smartphone Digital Twin Workshop under Temporal and Spatial Disruptions. Machines 2022, 10, 752. https://doi.org/10.3390/machines10090752

AMA Style

Zhang D, Pei Y, Liu Q. Vulnerability Evaluation for a Smartphone Digital Twin Workshop under Temporal and Spatial Disruptions. Machines. 2022; 10(9):752. https://doi.org/10.3390/machines10090752

Chicago/Turabian Style

Zhang, Ding, Yu Pei, and Qiang Liu. 2022. "Vulnerability Evaluation for a Smartphone Digital Twin Workshop under Temporal and Spatial Disruptions" Machines 10, no. 9: 752. https://doi.org/10.3390/machines10090752

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop