Discovery of Key Production Nodes in Multi-objective Job Shop Based on Entropy Weight Fuzzy Comprehensive Evaluation

  • Jiarong Han
  • Xuesong JiangEmail author
  • Xiumei Wei
  • Jian Wang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 891)


The multi-objective Job Shop complex network model based on data information is a new idea to solve the transformation of multi-objective shop scheduling problem in recent years. Finding key nodes on the complex networks model is the focus of this paper. The existing key nodes recognition method ignores the overall characteristics of the network, is susceptible to subjective factors, and does not apply to data based complex networks model. According to the characteristics of subjective and objective weighting, the entropy weight method in fuzzy mathematics is applied to the method of analytic hierarchy process (AHP). The next step is to establish a key nodes recognition method suitable for new model–Entropy weight fuzzy comprehensive evaluation method. To some extent, this method has made up for the lack of subjectivity and index capability of the method of analytic hierarchy process. Finally, the simulation results show that the method can effectively mine the key nodes in the model, and prove the rationality and effectiveness of the method.


Entropy weight fuzzy comprehensive evaluation Intelligent manufacturing Industrial big data Multi-objective job shop problems Complex networks Discovery of key nodes 



This work was supported by Key Research and Development Plan Project of Shandong Province, China (No. 2017GGX201001).


  1. 1.
    Zhang, F., Jiang, P.: A summary of the application research of complex network theory in the production process of discrete workshops. Ind. Eng. 19(6), 1–8 (2016). Scholar
  2. 2.
    Feng, H.: Research on Job-Shop Multi-bottleneck Recognition Method Based on Complex Network. Xinjiang University (2016)Google Scholar
  3. 3.
    Duan, C.: Discussion on data quality control of industrial big data under the background of intelligent manufacturing. Mech. Des. Manuf. Eng. 2, 13–16 (2018). Scholar
  4. 4.
    Callaway, D.S., Newman, M.E., Strogatz, S.H., et al.: Network robustness and fragility: percolation on random graphs. Phys. Rev. Lett. 85(25), 5468 (2000)CrossRefGoogle Scholar
  5. 5.
    Cohen, R., Erez, K., Ben-Avraham, D., et al.: Breakdown of the internet under intentional attack. Phys. Rev. Lett. 86(16), 3682 (2001). Scholar
  6. 6.
    Xuan, Z., FengMing, Z., KeWu, L.: Finding vital node by node importance evaluation matrix in complex networks. J. Phys. 61(5), 50201 (2012). Scholar
  7. 7.
    Lü, L., Chen, D., Ren, X.L., et al.: Vital nodes identification in complex networks. Phys. Rep. 650, 1–63 (2016). Scholar
  8. 8.
    Nan, H.E., DeYi, L.I., WenYan, G.A.N.: Mining vital nodes in complex networks. Comput. Sci. 34(12), 1–5 (2007). Scholar
  9. 9.
    Beijing: Mining vital nodes in complex networks. Computer Science (2007)Google Scholar
  10. 10.
    Zhang, X., Li, Y., Liu, G., et al.: Complex network node importance evaluation method based on node importance contribution. Complex Syst. Complex. Sci. 11(3), 26–32 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Jiarong Han
    • 1
  • Xuesong Jiang
    • 1
    Email author
  • Xiumei Wei
    • 1
  • Jian Wang
    • 2
  1. 1.Qilu University of Technology (Shandong Academy of Sciences)JinanChina
  2. 2.Shandong College of Information TechnologyJinanChina

Personalised recommendations