Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

PFDA-FMEA-VSM Application for Outsourcing Risk Analysis

Version 1 : Received: 31 December 2021 / Approved: 4 January 2022 / Online: 4 January 2022 (12:23:06 CET)

How to cite: García Aguirre, P.A.; Perez-Dominugez, L.; Luviano-Cruz, D.; Romero-López, R.; Leon-Castro, E. PFDA-FMEA-VSM Application for Outsourcing Risk Analysis. Preprints 2022, 2022010002. https://doi.org/10.20944/preprints202201.0002.v1 García Aguirre, P.A.; Perez-Dominugez, L.; Luviano-Cruz, D.; Romero-López, R.; Leon-Castro, E. PFDA-FMEA-VSM Application for Outsourcing Risk Analysis. Preprints 2022, 2022010002. https://doi.org/10.20944/preprints202201.0002.v1

Abstract

Manufacturing corporations has the acceptance of the Outsourcing Process (OP) to improve industrial activities as well as to archive the revenue objectives, and with this, Risk Analysis (RA) tools are constantly used to assure expected results. Failure Mode and Effect Analysis (FMEA) is one of preferred RA tools, moreover, it is proven that FMEA adds uncertainty because of the human participation at the RA, afterward it is demonstrated that Pythagorean Fuzzy Dimensional Analysis – FMEA – Value Stream Mapping (PFDA-FMEA-VSM) method removes the uncertainty in RA, likewise it aids to the stakeholders for decision making, giving more advantages improving the use of the resources on the project. This document exhibits a real case scenario in a manufacturing firm applying PFDA-FMEA-VSM method adapted for manufacturing OP. The application of PFDA-FMEA-VSM shows solid RA results, removing the human intervention uncertainty added to the risk ranking, gives advantages to the stakeholders for visualize the main risks in detailed diagram, as well as make easier to take better decisions on where to apply resources and mitigate risks during OP.

Keywords

Failure Mode and Effect Analysis (FMEA); Pythagorean Fuzzy Dimensional Analysis (PFDA); Value Stream Mapping (VSM); Outsourcing Process (OP); Risk Analysis (RA).

Subject

Computer Science and Mathematics, Mathematics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.