1. Introduction
The products of computer, communication, and consumer electronics are replaced quickly. As the main resource of equipment to complete the product manufacturing cycle, the production line has a direct impact on the quality, cost, and delivery cycle of the product. During the production process, due to the frequent switching of the production line configuration, the disturbance factors will cause the production of local stations to be disordered and propagate along the branch link to the main link. Therefore, to ensure the stability of production capacity under frequent changes in production lines and disturbances, the design of the assembly system must be flexible.
Serial structures with intermediate finite buffers are most widely adopted in production systems. Normally, workstations are allocated according to certain process routes, and buffers are allocated in consideration of their line balancing and antijamming ability. The intervention of buffers causes the fluctuation of system performance. Traditional output indicators, such as productivity, due-time performance, and other statistical indicators, are general and effective steady-state metrics during production system modeling [
1]. However, in industrial production, disturbance factors frequently come from both inside (machine failures, scheduled maintenance, the fluctuation of working time, quality defaults, etc.) and outside (urgent orders, product changeover, process change, etc.). Transient-state performance evolution cannot be well-studied under the traditional performance evaluation frame. Thus, the dynamics analysis of the production system is essential to customized design and operation optimization. Random failures and small disruptions may result in a catastrophic risk to production systems in the current highly interconnected manufacturing environment [
2,
3]. Performance reduction under such disruption can be well described as a vulnerability metric, which is also well explained in the resilient system research field [
4,
5,
6]. Henry and Ramirez-Marquez [
7] described the resilience of a generalized engineering system by depicting the performance transition process. Hosseini et al. [
6] divided the entire process into three separate intervals, and three performance indicators are applied to match these three intervals, which are reliability, vulnerability, and recoverability, respectively. Such description and definition can also be adopted in the production system field. The resilient production system can be modeled as a discrete event dynamics system. As a constituent part of system dynamic performance, vulnerability under disruptions is an important performance indicator in production system engineering. To some content, the vulnerability effect is ubiquitous in both production systems at the workshop level [
8,
9] and inter-enterprises supply chains [
10]. Vulnerability risks include high maintenance/servicing costs, yield reduction, and more importantly, system outage and the final large-scale delivery delay.
System vulnerability analysis (SVA) is less studied in comparison with system reliability analysis (SRA) in the production system field. System reliability is the performance metric of a resilient production system (as shown in the first interval of
Figure 1), which represents the continuous working ability without failures from the static perspective. However, SVA provides a quantification study in terms of failure effect analysis, with emphasis on the effect propagation of cascading failures. Studies on SRA provide a global steady-state performance metric for fulfilling specified functions on the macro level. Accordingly, SVA affords a local dynamics survey of disturbance influences. Equal attention should be paid to SRA and SVA for resilient production systems.
For a reconfigurable electronic assembly line that is frequently replaced, it will take a lot of time to design a balanced production line structure, deploy tools, and debug and test after each disturbance causes system interruption. The digital twin platform of the production line can provide a virtual test optimization platform [
11,
12]. The data between the physical and virtual entities support each other in decision making, which is applied to the design, analysis, and regulation of the production line [
13,
14,
15]. As the theoretical core of the extended application of digital twin technology, SVA plays a vital role in the evaluation and analysis module of the digital twin system. SVA provides the evaluation measures in the configuration and designing stage of production systems. Additionally, it is the fundamental work for performance control in the operational stage. New quantitative analysis methods and means should be developed to understand the nature of the vulnerability effect. Vulnerability quantification is undoubtedly more valuable than mainstream qualitative analysis. However, it is difficult to construct a precise mathematical model due to the dynamic properties of the vulnerability effect. In this paper, a transient and steady vulnerability analysis approach is proposed for a resilient serial production system considering both temporal and spatial attributes. This method establishes a mathematical analytical model for the performance evaluation module in the twin system, which not only effectively avoids the shortcoming that the simulation model takes a long time, but also can evaluate the brittle effect of the dynamic disturbance during the operation of the production line.
The remainder of this paper is organized as follows: related works are reviewed in
Section 2, wherein the innovation and difference from the presented works are briefly emphasized.
Section 3 provides a digital twin system and architecture.
Section 4 presents the temporal and spatial attributes of SVA of production systems.
Section 5 provides the transient and steady vulnerability quantitative approach for both terminal station and bottleneck station. A case study is applied to verify the proposed method in
Section 6. The conclusion and an outlook outlining ideas for future research are presented in
Section 7.
4. Temporal and Spatial Attributes of SVA
A resilient production system can be considered a dynamic space–time system. Finite buffers can suppress the stochastic disturbance effect and enhance product stability in the system. The consumption of work-in-process in buffers is accompanied by the alternation of the station’s starvation and blocking states. On the other hand, random failures and scheduled disruptions (e.g., preventive maintenance activities) of different stations result in differentiated production losses owing to their disturbance moment and duration. Hence, production disturbances (device failures, batch variation, process time delay, etc.) combined with inherent buffering mechanisms contribute to the dynamics of cell phone assembly systems. Consequently, system state evolution has distinct temporal and spatial attributes during the process of SVA. On account of different analysis perspectives, SVA and its quantification are separated into two parts in this section: vulnerability effect on the end-of-line station of the assembly line and vulnerability effect on the bottleneck station of the assembly line.
4.1. Vulnerability Effect on End-of-Line Station
System yield is computed by the production count of the end-of-line station. Any disruption of due-time performance may lead to product shortage and the irretrievable risk of delivery delay. Once stoppage occurs in an end-of-line station, the downstream industry chains are likely to be badly hit. Thus, it is necessary to analyze the vulnerability effect on the end-of-line station.
As shown in
Figure 6, once a failure event of a certain station occurs for a serial transfer line with
N + 1 stations and
N buffers, it is unlikely for the failure event to immediately cause system performance reduction because of the function of finite buffers. System state evolution heavily depends on the configuration structure. The disturbance event immediately leads to local instability of a certain station, but it takes a propagation time to cause production reduction at the end-of-line station. Such a phenomenon is explained as Terminal Time Delay (TTD) effect in this paper. On the other hand, there is an opportunity window for the repair process such that the end-of-line station’s production will not stop. The opportunity window is indicated as Terminal Time Window (TTW) below.
Suppose a disturbance event
E (
mi,
te,
de) occurs, wherein
mi is the
i th station (
i = 0, 1, 2, …,
N),
te is the occurrence time, and
de is the duration of event
E. The bottleneck station is indicated as
mk. The production system can be divided into three parts as
Figure 5: line
L1 between the first station and
mi (
mk if
mi locates at the downstream of
mk,
I >
k), line
L2 between
mi and
mk, line
L3 between
mk (
mi if
mk locates at the upstream of
mi,
I >
k) and the last station.
TTD of the event E(mi, te, de), which is indicated as TDi(te), can be defined as follows.
Definition 1. Terminal Time Delay (TTD) is the time interval between the occurrence moment of the disruption and the moment of production stoppage at the end-of-line station.
As shown in
Figure 7 and
Figure 8, the stagnant production of the end-of-line station does not occur until the time moment
te + TDi(
te). Accordingly, TTD can be represented qualitatively according to the residence time (RT) of line
L2 (
RT(
L2)) and
L3 (
RT(
L3)).
As shown in Equation (1), TTD is determined in terms of the disruption location and occupancy situation of downstream buffers. Therefore, the disruption’s TTD has a distinct spatial attribute determined by the distance from the last station. Additoinally, it also has distinct temporal attributes determined by the work-in-process (WIP) dynamics of downstream buffers and stations.
The TTW of the event E(mi, te, de), which is indicated as TWi(te), can be defined as follows.
Definition 2. Terminal Time Window (TTW) is the opportunity time that the disruption does not lead to the production stoppage at the end-of-line station.
Note that the TTW is definitely less than the TTD. As shown in
Figure 7 and
Figure 8, once the disturbance event
E(
mi,
te,
de) occurs, the last work-piece before disruption flows through line
L3 if
i >
k (line
L2 and
L3 if
i k). There is an opportunity window for the repair process (the repair time is
de) such that the first work-piece after repair catches up with the foregoing last work-piece exactly at
mN. Thus,
mN could never be stopped as if the disturbance event had never occurred.
Once
E(
mi,
te,
de) occurs, the vulnerability effect on the end-of-line station can be rescued if the following equation is satisfied.
If Equation (2) is not satisfied, production cessation at the end-of-line station will occur at te + TDi(te).
In conclusion, the values of TTD, TTW, and de jointly determine the triggering moment and effect of end-of-line vulnerability.
4.2. Vulnerability Effect on Bottleneck Station
According to the theory of constraints [
48], system performance is restricted by the bottleneck station. Provided the bottleneck station
mk is not affected by the event
E(
mi,
te,
de), the production of the whole system remains stable owing to the buffering mechanism of line
L2. Namely, in the case of
i k,
mk keeps working because of the WIPs in line
L2; in the other case of
i >
k,
mk keeps working because of the vacancies in line
L2. Note that downtime of
mk will lead to permanent system production losses. Accordingly,
E(
mi,
te,
de) immediately leads to the local instability of neighboring stations of
mi, but it takes a certain duration of time for
E(
mi,
te,
de) to cause permanent system production losses. Such a duration of time is defined as Bottleneck Time Delay (BTD). On the other hand, there is an opportune time for the repair process such that the bottleneck station’s production will not stop. The opportunity time is indicated as Bottleneck Time Window (BTW) below.
BTD of the event E(mi, te, de), which is indicated as BDi(te), can be defined as follows.
Definition 3. Bottleneck Time Delay (BTD) is the time interval between the occurrence moment of the disruption and the moment of production stoppage at the bottleneck station.
As shown in
Figure 7 and
Figure 8, the stagnant production of the bottleneck station does not occur until the time moment
te + BDi(
te). Accordingly, BTD can be represented qualitatively according to the residence time (RT) of line
L2.
where
RT′(
L2) is the residence time of line
L2 when buffers between
mi and
mk are all full,
RT(
L2) is the normal mean residence time without the disruption.
BTD is determined based on the distance and buffer occupancy situation between mi and mk. Namely, if i k, BTD is the time interval for all WIPs in line L2 passing through mk. If i > k, BTD is the time interval for all buffers in line L2 becoming full. Therefore, the disruption’s BTD has distinct spatial attributes determined by their distance. Additionally, it also has distinct temporal attributes determined by vacancy dynamics between mi and mk.
Definition 4. Bottleneck Time Window (BTW) is the time interval between the occurrence moment of the disruption and the moment causing permanent production losses.
Note that the BTW is definitely less than the BTD. As shown in
Figure 7 (
i k), once the disturbance event
E(
mi,
te,
de) occurs, the last work-piece before disruption flows through line
L2. There is an opportunity window for the repair process (the repair time is
de) such that the first work-piece after repair catches up with the foregoing last work-piece exactly at
mk. Thus,
mk could never be starved because of the disruption as if the disturbance event never occurs.
On the other hand, as shown in
Figure 8 (
i >
k), once the disturbance event
E(
mi,
te,
de) occurs, there is an opportunity window for the repair process (the repair time is
de), such that
mk+1 returns to its normal work and obtains a work-piece from the full
Bk. Thus,
E(
mi,
te,
de) will not lead to the blocking of
mk as if the disturbance event never occurs.
Let us construct such a scenario in the assumption of the continuous flow model [
49]. The production line can be considered as a long rope with children (maybe on a mountaineering trip) tied in succession (similar to the Drum–Buffer–Rope model in the theory of constraints [
48]). Once a child tumbles, there is a time window for his/her recovery that causes no effect on queue velocity. Thus, the time window is the time that ropes between the falling child and bottleneck child (maybe a ‘little fatty’) becoming totally tight if the falling child locates after the bottleneck child or becomes completely relaxed (children huddle together) if the bottleneck child locates after the falling child. The Drum–Buffer–Rope example is helpful for understanding the vulnerability delay. However, there is an error in such a continuous flow model. It holds that the bottleneck child will not be affected by the falling child as long as he/she recovers in the moments of the above two critical state limits. Jobs in mobile phone machining production lines are generally discretely delivered. Thus, it takes time to pass from the failure machine to the bottleneck machine.
Once
E(
mi,
te,
de) occurs, the vulnerability effect on the bottleneck station can be rescued if the following equation is satisfied.
If Equation (4) is not satisfied, permanent production losses of the entitled system will occur at te + BDi(te) because normal production of mk is affected.
Similarly, the values of BTD, BTW, and de jointly determine the triggering moment and effect of bottleneck vulnerability.
As shown in
Figure 6, once the disturbance event
E(
mi,
te,
de) occurs, the production process of the whole system remains stable during the time interval [
te,
te + BDi(
te)]. As shown in
Figure 7, the production process of the whole system turns to be unstable because of the new bottleneck of line
L3, and such a period sustains at the time interval [
te,
te + TDi(
te)]. It is remarkable that there is no relationship of size between BTD and TTD or BTW and TTW. In another way, BTW can be defined as the longest possible downtime of
mi that does not result in permanent production loss at
mN. TTW can be defined as the longest possible downtime of
mi that does not result in the production stoppage of
mN.
As shown in
Figure 7 and
Figure 8, the time span between a disruptive event and the repair action can be quantified as mean time to repair (MTTR), which is indicated as
de in this paper. Similarly, there is Recovery Time Delay (RTD) for productivity restoration because of the existence of propagation time. Furthermore, a longer period is consumed to recover to a stable state.
5. Vulnerability Quantification
Equations (1)–(4) give qualitative descriptions of the vulnerability effect on the end-of-line station and bottleneck station of the mobile phone assembly line. However, system vulnerability should be further quantified in the following procedures. We can consider the mobile phone production system in
Figure 6 as a tandem open queuing network system. Thus, production performance can be estimated by the stochastic service system model.
5.1. Stochastic System Model
The transition probability matrix of the tandem system with (N + 1) stations is deduced recursively in this subsection.
The servicing rate of
mi is indicated as a constant
when failure is not considered. Failure time obeys exponential distribution with rate parameter
. Suppose
Xi and
Ti are the producing number and survival time of
mi, respectively. Thus, we can infer the following equation.
Therefore, if failures are considered, the servicing rate of
mi is an exponential distribution with parameter
, which is calculated by:
Considering that the first station
m0 is never starved, the system can be modeled as an N node tandem open queuing network without
m0. Let
bi(
t) be the queue length at time
t, (
i = 1, 2, …,
N). Thus, the state space is represented as
EN = {(
b2(
t),
b1(
t)}, which ranks in lexicographical order. The
ith state-space
Ei, which is
i dimension Markov process, can be represented by
Ei−1 of the 1st to (
i − 1)th service station.
In order to investigate the recurrence relation between
Ei−1 and
Ei, the survey of a state-transition process for the first buffer
B1 is necessary. The birth and death rates are
and
, respectively. The corresponding state-transition matrix
Q1 of
E1 is shown in
Figure 9.
The death rate of the first service station (namely,
) is exactly the birth rate of the second service one.
E2 = {(
bN(
t),
bN-1(
t),
…,
bi(
t), …,
b1(
t)),
i = 1, …,
N,
bi(
t) = 0, 1, …,
Bi},
b2(
t) = 0, 1, 2, …,
B2,
b1(
t) = 0, 1, 2, …,
B1; the state-transition process of both buffer
B1 and
B2 is shown in
Figure 10.
Considering the Markov property in
Figure 10, the state process of nodes is only related to their adjacent nodes’ states. Thereby, we can deduce the state-transition matrix
Q2 of
E2 based on
Q1. Firstly, the state transition density matrix of the process (0,
b1(
t)) → (0,
b1(
t + ∆
t)), which matches with the first row in
Figure 10, can be indicated as
in the following context.
The transition rate of state (
r,
b1(
t)) → (
r + 1,
b1(
t + ∆
t)) is exactly the death rate
of the first station, which means a work-piece is transferred to Queue 2 from Queue 1 (
r = 0, 1,…,
B2 − 1). The state transition density matrix of such a process, which is indicated as
, is shown as Equation (10).
Accordingly, the transition density matrix of the process (r + 1, b1(t)) → (r, b1(t + ∆t)) is indicated as , which means a part is finished at Queue 2 (r = 0, 1,…, B2−1). Additionally, the transition density matrix of (r, b1(t)) → (r, b1(t + ∆t)) is , wherein .
As for (
B2,
b1(
t)) → (
B2,
b1(
t + ∆
t)), the transition density matrix, which matches with the last row in
Figure 10, can be shown as the following transformation:
where
.
Hence,
Q2 can be obtained based on
Q1 as the following equation:
Accordingly, the state process of
Ei is a quasi-birth and death process (QBD). The birth rate of the
ith queue is the death rate of the (
i − 1)th queue (
i > 1). The transition matrix of such a process is
(
i > 1). The transition matrix of state space {(
r + 1,
h),
hEi−1, r = 0, 1, …,
Bi − 1} to {(
r,
h),
hEi−1, r = 0, 1,…,
Bi − 1} is
, which means a part is finished by the
ith queue. Accordingly, the state-transition matrix
Qi with a higher dimension can also be derived by
Qi−1 according to the recurrence relation.
.
5.2. State Space Equations
The exact performance of small-scale systems can be computed, avoiding the large-scale matrix
QN. Suppose
Y = (
Y0,
Y1,
Y2, …,
YN) is the steady-state solution of the stochastic service system model. The following equation should be satisfied according to the equilibrium condition.
where
QN is computed in terms of Equation (13). Thus, the following equations can be obtained.
The following constraint is given by
where the dimension of all 1 column vectors
e0 and
e1 is the same as
Y0 and
Y1.
Let
,
Yi+1 can be obtained according to Equation (17).
In order to simplify the derivative process, we give the following substitution parameters:
Y2 can be represented as (
Y0H2 +
Y1G2) according to Equations (21) and (23). Then,
Yi can also be expressed by
Y0 and
Y1 through iterative computing.
Yi can be further expressed containing only
Y0 using Equation (22).
We further calculate
YN by Equation (18).
In order to simplify the derivative process, we further give the following substitution variable:
Thus,
Yi =
Y0Ri,
I = 1, 2, …,
N. By adding together Equations (15) and (18), we can obtain the following formula containing only
Y0:
Equation (19) can also be shown as follows:
In conclusion,
Y0 can be determined by the following linear inhomogeneous equations:
wherein,
. Additionally,
Y can be further calculated by Equations (27) and (28).
5.3. Vulnerability Quantification
The disruptive event E(mi, te, de) will bring different levels of impact on system production performance, which has distinct temporal and spatial attributes owing to the disruption location and duration. According to Equations (1) and (3), the transient vulnerability of E(mi, te, de) is determined by the WIPs and vacancies condition at the moment of te.
From the foregoing definition, both terminal vulnerability and bottleneck vulnerability are required to be quantified. In Equation (1), according to little’s law, Transient TTD in
te is computed based on work-pieces of downstream buffers and stations after
mi.
where
Lh(
te) is the queue length of the
hth service station,
bh(
te) is the number of WIPs in the
hth buffer, and
is the variate that indicates whether there is a work-piece in
mh, which equals to 1 if there is one, 0 otherwise. Note that both
bh(
te) and
should be given as the input condition. The probability of the starvation of the last station is
STN, which is calculated by
where
LN is the queue length of the last station,
is the probability of state
, and state space
ENS is shown as:
Transient TTW for the repair process of
mi, namely the opportunity window that the first work-piece after repair catches up with the foregoing last work-piece exactly at
mN, can be quantified by the following equation.
The steady TTD of a disruptive event
E(
mi,
te,
de) can be computed by the average queue length between
mi and
mN, which is shown as:
represents the expected queue length between
mi and
mN in the steady state. In the above equation, the steady joint probability distribution of each queue length can be indicated as the following equation:
can be determined by the following equation:
where
is the number of work pieces in Queue
h under the state
.
The steady TTW can also be computed by the average queue length.
As for the bottleneck-dominated vulnerability, the BTD of E(mi, te, de) is determined by the WIPs and vacancies condition at the moment of te. Suppose a disruptive event occurs in mi, and the bottleneck station is mk. If i k, BTD is the time interval for all WIPs in line L2 passing through mk. If i > k, BTD is the time interval for all buffers in line L2 becoming full.
Therefore, if
I >
k, the transient BTD of
E(
mi,
te,
de) can be computed by the sojourn time of the last WIP before disruption event between
mi and
mk. If
i >
k, the transient BTD of
E(
mi,
te,
de) can be computed by the time that all vacancies between
mi and
mk become full.
where
SBk is the probability that
mk is neither starved nor blocked.
SBk is calculated by the following equation:
Bottleneck station
mk is determined by the starvation and blocking probability.
where the starvation probability of
mh is obtained by
and the blocking probability of
mh is obtained by
Queue length at
mh is obtained by
Steady BTD can be computed by the average queue length.
represents the expected queue length between
mi and
mk, which can be computed in a similar way.
Accordingly, transient BTW for the repair process of
mi, namely the opportunity window that the first work-piece after repair catches up with the foregoing last work-piece exactly at the bottleneck station
mk, can be quantified by the following equation:
The steady BTW can also be computed by the average queue length.
Therefore, the transient vulnerability effect on the terminal station can be quantified for each disturbance event
E(
mi,
te,
de) as follows:
The steady vulnerability effect of
mi on the final station can be quantified by
The transient vulnerability effect on the system bottleneck can be quantified for each disturbance event
E(
mi,
te,
de) as follows:
The steady vulnerability effect of
mi on the system output can be quantified by
6. Case Study
The rapid replacement of mobile phone products poses a serious challenge to its assembly system. Frequent product replacement results in frequent switching of the configuration structure of the production line, which leads to the instability of the production process and the loss of production capacity. The mobile phone assembly process is very complicated and has many procedures, including dozens of procedures such as mainboard inspection, camera welding, antenna bracket installation, camera fixing, and button board welding. Due to factors such as frequent product replacement, equipment failure, and adjustment of line change parameters, the production capacity of the production line is often lost. At present, most mobile phone assembly companies belong to foundries, with meager profits. The loss of capacity due to frequent interruptions will seriously affect corporate profits. Therefore, in order to ensure the stable production capacity of the production line under high-frequency disturbance, it is very important to carry out vulnerability analysis and control strategies.
The Digital Twin System (DTS) is a 3D design and simulation optimization system designed by our team for the characteristics and needs of the 3C manufacturing industry. It has strong 3D near-physical simulation capabilities and good scalability.
Figure 11 is the virtual simulation platform and physical production line of the mobile phone assembly line built by DTS, respectively. The entire project is based on digital twin technology, which not only supports open architecture design, rapid reconfiguration of production lines, distributed integration testing, transparent monitoring, high-fidelity hardware-in-the-loop simulation, rapid custom design of the entire line, and other application modalities, but also includes a fully automatic production line, custom design platform, intelligent control system, and other parts.
DTS is mainly composed of four functional modules including basic management, near-physical simulation, multi-view synchronization, performance analysis, and regulation, and each module contains multiple sub-functions. The main function modules and main interface of the system are shown in
Figure 12 respectively.
Figure 12a is the main interface of the digital twin system, which mainly includes functional areas such as the 3D view window, function menu area, component library, model BOM tree, and model attribute management.
Figure 12b is the scene layout of the system interface, which can design the layout of the production line in the 3D scene.
Figure 12c is the model property management interface, which can set the near-physical properties of the 3D model.
Figure 12d is the scripting interface, which can Script control of equipment actions and WIP flow in the production line.
Figure 12e is the PLC connection management interface, which can establish a communication channel between physical equipment and virtual models.
Figure 12f is the performance analysis and control interface, which can analyze the performance of the production line and iteratively optimize the design of the production line. The vulnerability analysis method proposed in this paper is an important theoretical basis for the performance analysis and control module. Based on this method, the module can realize the real-time analysis of the production line performance. Simulate disturbance events, quantify vulnerability indicators, and then formulate appropriate disturbance control strategies to avoid production residual losses.
Combining the theoretical research results in this paper, this chapter develops a vulnerability analysis application that supports disturbance simulation, vulnerability quantification, and disturbance control. Additionally, it encapsulate it as a functional component into the performance and analysis control module of the digital twin system, as shown in
Figure 13. In the vulnerability quantitative analysis and control strategy module, after inputting fault data, the “Vulnerability Index Solving” function can quantify the vulnerability index of the production line, generate a production line performance analysis chart, and display the quantification results. The “disturbance control strategy” function can generate the control strategy when the equipment fails.
The analytical models described in the previous sections can accurately evaluate the performance of production systems under dynamic disruptions, and the case studies in this section aim to validate the vulnerability quantification method. Select some of the processes in the mobile phone assembly process for virtual simulation, namely sticking double-sided tape, dispensing, TP pressing, back cover locking screws, pasting accessories, etc. Suppose the production line consists of 8 tandem queues, namely 8 stations and 7 buffers. The configuration parameters of the line are listed in
Table 1. It is supposed that the first station is never starved.
Note that transient vulnerability is determined by the monitoring buffer/machine occupancy dynamics. Transient vulnerability evaluation is helpful for real-time decision support such as opportunity maintenance. It can be inferred by real-time queue lengths using Equations (33), (36), (41), and (49). On account of the number of work-pieces in buffers being variable, a steady evaluation is more valuable for configuration design or vulnerability control.
Figure 14 exhibits the steady vulnerability evaluation results. Steady TTD, TTW, BTD, and BTW results are used to illustrate the temporal and spatial attributes. As shown in
Figure 14,
and
equal 0. Thus, M
1 (Queue 2) can be inferred as the main bottleneck machine according to Equations (47) and (50). In terms of the evaluation of terminal vulnerability, both TTD and TTW gradually diminish with the decrease in distance from the terminal machine. From the perspective of bottleneck vulnerability, both the BTD and BTW gradually increase as the distance is augmented from the bottleneck machine. Despite the obvious trend of vulnerability, this paper presents a quantitative approach that is the basis of further precise performance control strategies. Note that it will lead to large errors if the TTD and BTD are considered as the TTW and BTW in responsive controlling decisions. For example, in order not to cause any system production loss, the permitted opportunity maintenance window for machines should be determined by the BTW instead of the BTD.
The vulnerability delay effect can be clearly displayed in
Figure 15 and
Figure 16. An obvious time delay of disruption can be evaluated via the proposed approach. After certain critical time points, namely steady TTWs in
Figure 15 and steady BTWs in
Figure 16, the vulnerability effect will be linearly related to the repair time
de with different slopes. The vulnerability effects of the bottleneck machine (namely M
1) are obvious. However, the terminal vulnerability of M
0 will surpass M
1 at a certain
de, becoming the most vulnerable machine. On the whole, the bottleneck vulnerability effect turns out to be more obvious when it is farther away from M
1. Accordingly, failure fluctuations of the terminal machine can be well assessed via the results of terminal vulnerability in
Figure 15. Further controlling decisions (for example, permitted opportunity maintenance intervals) are available to avoid the stockout of the downstream supply chain. Additionally, failure fluctuations of the whole system output can be well assessed via the results of bottleneck vulnerability in
Figure 16. Additional controlling decisions (for example, buffer reallocation, line rebalancing, or permitted opportunity maintenance window for individual equipment) turn out to be available to keep normal production output.
Apart from the distinct temporal and spatial characteristics when determining the null points, the evolutional curve of vulnerability is closely sensitive to the failure rate of
mi and the service rate of the line. As shown in
Figure 15 and Equation (52), terminal vulnerability is quite sensitive to failure rate
and the average processing speed of the last queue, while bottleneck vulnerability is determined by the average processing speed of the bottleneck.
This paper affords an analytical model of vulnerability evaluation under sudden disruptive events. The computing speed of the analytical model is faster than the normal event simulation model. The proposed vulnerability evaluation model is the basis (mainly the four performance indicators) for further quick decisions (such as reconfiguration optimization) under disruptions in the digital twin system. The four performance indicators are steady results. To verify them, we use Plant Simulation software to build the simulation model shown in the
Figure 17, and conduct simulation experiments.
Table 2 shows the numerical comparison of the analytical model and the simulation model of the terminal time delay. The comparison result shows that the analytical results of
Figure 15 are basically anastomotic with the real assembly scenario, and the evaluating errors lie in 2% for all machines.
7. Conclusions
This paper explores the nature of dynamics analysis of production systems and proposes a vulnerability evaluation approach for mobile phone assembly lines under a resilient system analytic frame. The vulnerability effect on the terminal and bottleneck machine is surveyed based on the stochastic production system model, wherein temporal and spatial attributes are expounded via vulnerability delay phenomena. Four special vulnerability indicators, namely TTD, TTW, TTD, and TTW, are defined. Afterward, the transition matrix of the production system (N + 1 machines and N buffers) is obtained by a recursive derivation means. Transient and steady vulnerabilities are evaluated in two different modes, terminal vulnerability and bottleneck vulnerability, respectively. The theoretical research is then translated into practical tools. An application program for brittleness analysis and evaluation is developed and applied to the digital twin system independently developed by the team to solve practical problems.
Potential future work can be divided into two aspects, vulnerability evaluation and vulnerability control, respectively. On the one hand, the proposed exact evaluating approach is valuable for the future approximative model of large production systems. Additionally, different failure distributions such as the phase-type distribution should be studied. On the other hand, based on the proposed vulnerability analysis approach, vulnerability control through reconfiguration planning or preventive maintenance is the prospective research issue.