Table of Contents
This comes as no surprise to Bapat. Representation prediction is an area where artificial intelligence is significantly improving. “In the past, many businesses relied on consensus forecasts, weighting the opinions of different experts to arrive at an average forecast,” he said. He also noted: “Research shows that statistical forecasting methods, which use statistical techniques to extrapolate from historical data, consistently outperform consensus. methods. Even machine intelligence does a better job at prediction. But the key is making sure you use the right data."
Bapat believes this concept should be applied to supply chain management: “If you really focus on the end consumer, AI can and targeting consumers and their environment to help. Then, as you work your way back through the supply chain, consider the different costs: labor, production, taxes, inventory, and optimize them together
Home Technology peripherals AI AI has already made significant achievements in supply chain management

AI has already made significant achievements in supply chain management

Sep 19, 2023 pm 09:33 PM
AI ai

AI has already made significant achievements in supply chain management

Supply chain performs a series of actions, from product design to sourcing, manufacturing, distribution, delivery and customer service. Devavrat Bapat, director of AI/ML data products at Cisco, said: “At every point, there are huge opportunities for AI and ML.” This is because contemporary AI is already very good at what is needed for supply chain management. Two things. The first is forecasting, where AI is used to predict downstream demand or upstream shortages. Additionally, algorithms can detect one or more events that they believe are precursors to failure and then alert assembly line operators before production quality deteriorates.

The second is inspection, where AI is used to detect problems in manufacturing The problem. It can also be used to certify materials and components and track them throughout the supply chain

Ultimately, AI will optimize the supply chain to meet the needs of specific customers in any given situation. While enabling technologies already exist, a challenge remains in requiring a level of data sharing that is difficult to achieve in current supply chains. At the same time, many companies are still reaping the benefits of improved forecasting and inspection USD, with more than 41,000 employees and more than 200 factories worldwide. The company, which focuses primarily on food and health care packaging, holds the majority of the market share. "We manufacture one-third of the products in your refrigerator," said Joel Lanchin, the company's global chief information officer. Packaging.” Amcor’s manufacturing challenges relate to accurately predicting and adapting to changing demand. In the food supply chain world, orders are often modified based on changes in demand. For example, in hot weather, people drink more Gatorade, which could cause a sudden surge in demand, so demand for bottles could increase by 10 to 15 percent. The same goes for other types of products. There may suddenly be more fish in the ocean, increasing the need for packaging to accommodate more fish. "Even if we try to predict, it's very difficult because we don't always know what our customers want ahead of time," Lanchin said. The other end of the supply chain faces similar challenges. If Amcor can't accurately predict shortages, it can't stockpile raw materials in advance. What's more, the company needs to predict price changes so that it can buy more at a lower price before prices rise, or buy less if a drop looks like it's about to drop. Two years ago, Amcor began piloting EazyML, a platform that helps optimize customer demand and supply-side forecasting. They trained the tool using three years of data from the ERP to look for fluctuation patterns. The system attempts to find categories of changes, and which events are associated with different kinds of changes. For example, it examines seasonal fluctuations and whether two or more types of changes occur at the same time, or whether they are mutually exclusive. Lanchin said: "The preliminary results we obtained are very encouraging, and by far. Exceeded our expectations." If you can predict changes, you can better predict your raw material needs and replenish them in advance if necessary

This comes as no surprise to Bapat. Representation prediction is an area where artificial intelligence is significantly improving. “In the past, many businesses relied on consensus forecasts, weighting the opinions of different experts to arrive at an average forecast,” he said. He also noted: “Research shows that statistical forecasting methods, which use statistical techniques to extrapolate from historical data, consistently outperform consensus. methods. Even machine intelligence does a better job at prediction. But the key is making sure you use the right data."

CHECK

Another example of how AI is being used can be found at Intel, at There, several chips are printed on a wafer using photolithography. Those closest to the center of the wafer tend to have the best power performance curves. Those closer to the outer ring tend to suffer from reduced performance, although they are still reliable. Intel has a quality threshold against which chips should be kept or thrown away. Having humans inspect the wafers would be a time-consuming and glitch-filled process.

Greg Lavender, senior vice president and chief technology officer at Intel, said: "We use artificial intelligence to select high-quality chips so that they can be produced more quickly and brought to market to provide better Quality.” Of course, this is just one of the things we do with artificial intelligence. I have hundreds of AI software engineers reporting to me. Some of the work they do is used for inspection and testing in our factories, but sometimes the AI ​​they develop is also used internally to deliver our products without necessarily being known to people

A case in point is how Intel helps their OEM customers test malware by providing software tools. One of these tools is Intel Threat Detection Technology, which runs on Intel laptops. When executing code in Windows, the Intel code examines the flow of instructions in the CPU. Utilizing an adaptive learning signature algorithm, it looks for anomalies in the code that match malware signatures. Once a match is found, the tool intercepts or blocks the malware and alerts Windows Defender of device infections. "Threat detection technology is built into all of our customer CPUs," Lavender said. These infections are delivered through the provisioning Chains creep in - when the final product is put together, the only way to find them is with this tool. We've been offering this and other AI tools for the past few years, but now with all the talk about large language models, more people are talking about it.

Inspections are an important part of supply chain management, according to Cisco's Bapat. Inspection becomes easier if the right steps are taken during the product design phase. "If you embed in the product design process instrumentation that can generate data to help monitor flow, you can save a lot of costs," he said. "If you consider the material costs and labor burden costs of any product, you'll find that they are very high." The burden mainly includes product quality and supervision and management costs. Today, artificial intelligence is already helping to minimize these costs arrival. Bapat learned an important lesson from when he was designing one of his best AI algorithms. It took nine months to develop and deploy—and ultimately, it still took a surprisingly long time to get it working. Thinking back on what went wrong, he realized that no matter how good the technology was, it wouldn't produce the desired results if he didn't first take the time to understand who the end customers were and how they planned to use the application. He also noted that while they often have the loudest voices, senior management are not the end customers.

He said: "Since then, I have always emphasized that whether it involves sales or supply chain management, I always start with a good understanding of the basic business." "Once I have a good understanding of this requirement With a solid understanding, I will go back to the field of data and AI.”

Bapat believes this concept should be applied to supply chain management: “If you really focus on the end consumer, AI can and targeting consumers and their environment to help. Then, as you work your way back through the supply chain, consider the different costs: labor, production, taxes, inventory, and optimize them together

him Adding that once the supply chain is optimized for the process, you can start installing and executing predictive quality and maintenance. From that point on, you can go back to the procurement side of supply management.

He said: " This supports the view that suppliers are partners, not adversaries. ”

So the nature of the supply chain, which is made up of at least three independent companies that don’t share data, is a long-standing challenge. First, these companies may have one or more partners in the line of business Competition. Second, they may be part of competing supply chains. Third, they retain information to increase their strength at the bargaining table.

The current generation of artificial intelligence can optimize supply chains and even tailor Customization, delivering the right product to the right customer at the right price. However, achieving this requires a level of data sharing that few companies are ready for. Bapat said: “What’s missing are technologies that allow businesses to share parts of their data with full confidence without them revealing too much. “It will take us another five to 10 years to achieve this goal. ”

The above is the detailed content of AI has already made significant achievements in supply chain management. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to implement file sorting by debian readdir How to implement file sorting by debian readdir Apr 13, 2025 am 09:06 AM

In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

How to optimize the performance of debian readdir How to optimize the performance of debian readdir Apr 13, 2025 am 08:48 AM

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

How debian readdir integrates with other tools How debian readdir integrates with other tools Apr 13, 2025 am 09:42 AM

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

Debian mail server firewall configuration tips Debian mail server firewall configuration tips Apr 13, 2025 am 11:42 AM

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

How to configure firewall rules for Debian syslog How to configure firewall rules for Debian syslog Apr 13, 2025 am 06:51 AM

This article describes how to configure firewall rules using iptables or ufw in Debian systems and use Syslog to record firewall activities. Method 1: Use iptablesiptables is a powerful command line firewall tool in Debian system. View existing rules: Use the following command to view the current iptables rules: sudoiptables-L-n-v allows specific IP access: For example, allow IP address 192.168.1.100 to access port 80: sudoiptables-AINPUT-ptcp--dport80-s192.16

How to set the Debian Apache log level How to set the Debian Apache log level Apr 13, 2025 am 08:33 AM

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

How to learn Debian syslog How to learn Debian syslog Apr 13, 2025 am 11:51 AM

This guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud

How Debian OpenSSL prevents man-in-the-middle attacks How Debian OpenSSL prevents man-in-the-middle attacks Apr 13, 2025 am 10:30 AM

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

See all articles