Keywords

1 Introduction

In February 2022, the U.S Department of Defense (DoD) issued a long-awaited report, “Securing Defense-Critical Supply Chains” (U.S. Department of Defense [29]). The report was in response to Executive Order (E.O.) 14017, “America’s Supply Chains,” signed by President Joseph R. Biden Jr., to identify how to improve supply chain resilience and how to protect against material shortages, which had clearly become exacerbated in the COVID-19 pandemic (see Biden Jr. [1], United States White House [28]). The DoD’s report provided an assessment of defense-critical supply chains in order to improve the department’s capacity to defend the United States. With the geopolitical risk rising globally and, with the war of Russia against Ukraine raging (cf. Bilefsky, Perez-Pena, and Nagurney and Ermagun [2]), following the major invasion, beginning February 24, 2022, having a framework for the modeling, analysis, and solution of defense-critical supply chains is of major importance. Of additional relevance is having a framework to identify which of the nodes and links, corresponding, for example, to manufacturing sites and processes, storage facilities, transportation and distribution, are important since focusing on those can help to preserve the performance of the supply chain networks for critical defense products in the case of disruptions.

Parallel to the COVID-19 pandemic, which is a global healthcare disaster, not limited in location or to a time window, the number of disasters, including “natural” disasters, has been growing as well as the people affected by them (see Nagurney and Qiang [18] and Kotsireas et al. [8]). Hence, research on supply chain network performance and resilience has been garnering increasing attention (see Sheffi [25], Ivanov and Dolgui [5], Nagurney and Ermagun [16], Novoszel and Wakolbinger [22], Ramakrishnan [24]), with supply chains networks for defense products being essential to national and, even global, security. In the DoD report, manufacturing, as well as the workforce, is considered to be a strategic enabler and critical to building overall supply chain resilience.

In this chapter, a defense-critical supply chain network game theory model is constructed in which the defense firms compete noncooperatively in producing, transporting, storing, and distributing their substitutable defense products, which are distinguished by firm or “brand.” Defense products could include weaponry, radars, tanks, or even life-saving vests and medical kits. The objective function faced by a defense firm that it wishes to maximize consists of the profit and the weighted total risk associated with its supply chain network. A crucial element of the model is the availability of labor associated with each supply chain network link and a bound on the labor hours available. The governing equilibrium concept is that of a Nash equilibrium [20, 21]. Under appropriate delineated assumptions, the governing equilibrium conditions are shown to satisfy a variational inequality problem for which existence of a solution is guaranteed. An alternative variational inequality is then constructed with both defense product path flows and Lagrange multipliers associated with the link labor bounds as variables, and with the underlying feasible set being the non-negative orthant. A dynamic adjustment process is then proposed utilizing the theory of projected dynamic systems (see Nagurney and Zhang [19]) and a discrete-time algorithm outlined for computational purposes. Here, we consider a defense supply chain network economy in that the defense demand markets, which can be associated with different governments, can procure the defense products from the defense firms, which can be in different countries. The supply chain network economy can correspond, for example, to defense firms associated with NATO, or the European Union, or other such organizational bodies.

We, subsequently, turn to the construction of a defense supply chain network efficiency/performance measure, which is then applied to define the importance of a network component, whether a node, a link, or a composition of nodes and links thereof. Note is then made of how the measure can be applied to measure resilience of the supply chain network to disruptions in labor. The inclusion of labor into general supply chain networks is a recent contribution and was motivated by the impacts of the COVID-19 pandemic on workers, their health, loss of productivity, etc., as well as the negative effects of shortages of labor on profits as well as consumers. Toward that end, Nagurney [12, 13] introduced labor into supply chain networks, beginning with optimization models, and then evolving to game theory models, with the model by Nagurney [14] being the most relevant to the one constructed in this chapter. Here, however, we introduce risk since risk is a characteristic of many supply chains these days due to a challenging geopolitical landscape (see also Nagurney et al. [15], Tang [26], Tang and Tomlin [27], Qiang et al. [23], Wu and Blackhurst [30], Kotsireas et al. [8]). Furthermore, defense-critical products can include high-tech elements such as computer chips, which have been in short supply, as well as other raw materials that may be located in places under governance by antagonistic regimes.

The chapter is organized as follows. In Sect. 2, the defense-critical supply chain network game theory model with labor is presented and alternative variational inequality formulations given. In addition, a dynamic version of the model is constructed, whose set of stationary points coincides with the set of solutions to the variational inequality with defense product path flows and link Lagrange multipliers associated with the labor bounds as variables. A time discretization of the continuous-time adjustment processes, in the form of a discrete algorithm, is provided. The algorithm is applied in Sect. 4 to illustrate the framework presented here in a series of defense-critical supply chain network examples. In Sect. 3, the defense supply chain network efficiency/performance measure is proposed, along with the definition of the importance of a supply chain network component. In addition, the quantification of resilience of the supply chain network to labor disruptions is highlighted. A summary of results, along with the conclusions, and suggestions for future research, is provided in Sect. 5.

2 Defense-Critical Supply Chain Network Game Theory Modeling

The supply chain network model with labor constructed here focuses on defense-critical products. We consider I firms involved in the production, transportation, storage, and ultimate distribution of the defense products, which are substitutable. The products could, for example, be related weaponry, such as missiles, or tanks, or even protective equipment such as helmets, life-saving vests for the military and/or citizens, or medical kits. The demand markets, here, represent the governmental defense demand markets. Note that we do not limit the model to a specific country. The demand markets can correspond to demand markets of different countries, but they are assumed to be partners and not antagonists. Hence, this model could be useful, for example, for NATO countries, for countries in the European Union, or other such coalitions.

The topology of the supply chain networks of the firms in the “defense supply chain network economy” is depicted in Fig. 1. All vectors are column vectors. The model builds upon the model in Nagurney [14] but with the addition of the crucial feature of risk management. Here, we also focus on labor bounds on links and provide, for the first time, a network performance/efficiency measure for a supply chain network game theory model with labor and a formalism for the identification of the importance of nodes and links and their ranking.

Fig. 1
A model of defense supply chain network. It consists of a number of defense firms and defense demand markets. The process begins with production, transportation, storage, and distribution.

The defense-critical supply chain network topology

A typical defense firm is denoted by i. Each defense firm i has \(n^i_M\) production facilities; can utilize \(n^i_D\) distribution centers, and can distribute its defense product to the \(n_R\) defense demand markets. \(L^i\) represent the links of the supply chain network of defense firm i; \(i=1,\ldots ,I\), with \(n_{L^i}\) elements. By \(G=[N,L]\) is denoted the graph consisting of the set of nodes N and the set of links L in Fig. 1. The defense supply chain network topology in Fig. 1 can be modified/adapted according to the specific defense product under study.

The notation for the model is given in Table 1.

Table 1 Notation for the defense-critical supply chain game theory model

The conservation of defense product flow equations is now presented.

The demand for each defense firm’s product at each defense demand market must be satisfied by the defense product flows from the defense firm to the defense demand market, as follows: For each defense firm i: \(i=1,\ldots ,I\):

$$\displaystyle \begin{aligned} \sum_{p\in P^i_k} x_p=d_{ik},\quad k=1,\ldots,n_R. {} \end{aligned} $$
(1)

Furthermore, the defense product path flows must be non-negative; where, for each defense firm i; \(i=1,\ldots ,I\):

$$\displaystyle \begin{aligned} x_p\ge 0, \quad \forall p\in P^i. {} \end{aligned} $$
(2)

The link product flows of each defense firm i; \(i=1,\ldots ,I\), must satisfy the following equations:

$$\displaystyle \begin{aligned} f_a=\sum_{p\in P^i} x_p\delta_{ap},\quad \forall a\in L^i, {} \end{aligned} $$
(3)

where \(\delta _{ap}=1,\) if link a is contained in path p, and 0, otherwise. Note that (3) guarantees that the flow of a defense firm’s product on a link is equal to the sum of that defense product’s flows on paths that contain that link.

As in Nagurney [12,13,14], the product output on each link is a linear function of the labor input, where

$$\displaystyle \begin{aligned} f_a=\alpha_al_a,\quad \forall a\in L^i, \quad i=1,\ldots,I. {} \end{aligned} $$
(4)

The greater the value of \(\alpha _a\), the more productive the labor on the link. Some economic background on such a construct can be found in Mishra [9].

We also consider the following constraints on labor since shortage of skilled labor is a big issue in defense-critical supply chains: for each defense firm i; \(i=1,\ldots ,I\):

$$\displaystyle \begin{aligned} l_a\le \bar l_a,\quad \forall a\in L^i. {} \end{aligned} $$
(5)

The utility function of defense firm i, \(U^i\); \(i=1,\ldots ,I\), is the profit, consisting of the difference between its revenue and its total costs, the wages paid out, and the weighted total risk:

$$\displaystyle \begin{aligned} U^i = \sum_{k=1}^{n_R} \rho_{ik}(d)d_{ik} - \sum_{a\in L^i} \hat c_a(f)-\sum_{a\in L^i}w_al_a-\beta_i\sum_{a\in L^i} r_a(f). {} \end{aligned} $$
(6a)

The first expression after the equal sign in (6a) is the revenue of defense firm i. The second expression in (6a) is the total operational costs for the supply chain network \(L^i\) of defense firm i; the third expression is the total payout in terms of wages to laborers of defense firm i, and the last term in (6a) is the weighted total risk of defense firm i. The utility functions \(U_i\); \(i=1,\ldots ,I\), are assumed to be concave, with the demand price functions being monotone decreasing and continuously differentiable and the total link cost functions being convex and also continuously differentiable with the same assumptions made for the risk functions.

Each defense firm i; \(i=1,\ldots ,I\), hence, seeks to solve the following optimization problem:

$$\displaystyle \begin{aligned} \mbox{Maximize}\quad \sum_{k=1}^{n_R} \rho_{ik}(d)d_{ik} - \sum_{a\in L^i} \hat c_a(f)-\sum_{a\in L^i}w_al_a-\beta_i\sum_{a\in L^i} r_a(f), {} \end{aligned} $$
(6b)

subject to: (1)–(5).

We now demonstrate that the objective function of each firm i; \(i=1,\ldots ,I\), can be expressed in path flow variables only. We proceed as follows. In view of (2) and (3), we can redefine the total operational cost link functions as: \(\tilde c_a(x)\equiv \hat c_a(f)\), \(\forall a \in L\); the demand price functions as \(\tilde \rho _{ik}(x)\equiv \rho _{ik}(d)\), \(\forall i\), \(\forall k\), and the risk functions \(\tilde r_a(x)\equiv r_a(f)\), \(\forall a\in L\). As noted in Nagurney [12, 13], it follows from (3) and (4) that \(l_a={{\sum _{p\in P} x_p\delta _{ap}}\over {\alpha _a}}\), for all \(a\in L\).

Hence, one can redefine the utility functions \(\tilde U^i(x)\equiv U^i\); \(i=1\dots ,I\), and group the utilities of all the defense firms into an I-dimensional vector \(\tilde U\), where

$$\displaystyle \begin{aligned} \tilde U=\tilde U(x). {} \end{aligned} $$
(7)

The optimization problem faced by defense firm i; \(i=1,\ldots ,I\), can be expressed as

$$\displaystyle \begin{aligned} \begin{array}{ll} \mbox{Maximize}\quad \tilde U^i(x)&=\displaystyle\sum_{k=1}^{n_R} \tilde\rho_{ik}(x)\displaystyle\sum_{p\in P^i_k}x_{p} - \displaystyle\sum_{a\in L^i} \tilde c_a(x)\\ &\quad -\displaystyle\sum_{a\in L^i}{{w_a}\over{\alpha_a}}\displaystyle\sum_{p\in P^i} x_p\delta_{ap}-\beta_i\displaystyle\sum_{a\in L^i} \tilde r_a(x),{} \end{array} \end{aligned} $$
(8)

subject to the non-negativity constraints (1) and the re-expressing of constraints in (5) as

$$\displaystyle \begin{aligned} {{\sum_{p\in P^i} x_p\delta_{ap}}\over{\alpha_a}}\le \bar l_a, \quad \forall a\in L^i. {} \end{aligned} $$
(9)

2.1 Governing Equilibrium Conditions and Variational Inequality Formulations

The governing equilibrium conditions are now stated, along with alternative variational inequality formulations.

2.1.1 Nash Equilibrium Conditions and Variational Inequality Formulations

The feasible set \(K_i\) for defense firm i is defined as: \(K_i\equiv \{x^i \vert x^i\in R_+^{n_{P^i}}, {{\sum _{p\in P^i}x_p\delta _{ap}}\over {\alpha _a}}\le \bar l_a, \forall a\in L^i\}\), for \(i=1,\ldots ,I\), with \(K\equiv \prod _{i=1}^I K_i\). Clearly, K is a convex set.

Since the defense firms are utility-maximizers, they compete noncooperatively until the following Defense Supply Chain Nash Equilibrium is attained.

Definition 1 (Defense Supply Chain Network Nash Equilibrium)

A defense product path flow pattern \(x^*\in K\) is a Defense Supply Chain Network Nash Equilibrium if for each defense firm i; \(i=1,\ldots ,I\):

$$\displaystyle \begin{aligned} \tilde U^i(x^{i*},\hat x^{i*})\ge \tilde U^i(x^i,\hat x^{i*}),\quad \forall x^i\in K_i, {} \end{aligned} $$
(10)

where \(\hat x^{i*}\equiv (x^{1*},\dots ,x^{i-1*},x^{i+1*},\dots ,x^{I*})\).

Conditions (10) state that a Defense Supply Chain Nash Equilibrium is achieved if no defense firm can improve upon its utility unilaterally.

It follows from the classical theory of Nash equilibria and variational inequalities that, under the imposed assumptions on the total cost, the demand price, and the risk functions (cf. Gabay and Moulin [4] and Nagurney [10]), the solution to the above Defense Supply Chain Nash Equilibrium problem (see Nash [20, 21]) coincides with the solution of the variational inequality problem: Determine \(x^*\in K\), such that

$$\displaystyle \begin{aligned} -\sum_{i=1}^I \langle \nabla_{x^i} \tilde U^i(x^*), x^i-x^{i*}\rangle \ge 0,\quad \forall x\in K, {} \end{aligned} $$
(11)

where \(\langle \cdot , \cdot \rangle \) denotes the inner product in the corresponding Euclidean space (here, of dimension \(n_P\)), and \(\nabla _{x^i}\tilde U^i(x)\) is the gradient of \(\tilde U^i(x)\) with respect to \(x^i\).

Existence of a solution to variational inequality (11) is guaranteed since the feasible set K is compact and the utility functions are continuously differentiable under our imposed assumptions (cf. Kinderlehrer and Stampacchia [6]).

An alternative variational inequality to (11) is now provided over a simpler feasible set, following the arguments in Nagurney [13]. The alternative variational inequality is over the non-negative orthant and will suggest an elegant computational procedure based on the underlying dynamics as the defense firms adjust their defense product flows over time, with signals provided by Lagrange multipliers associated with the labor link bounds, until a stationary point; equivalently, an equilibrium point satisfying the variational inequality is achieved. We associate Lagrange multipliers \(\lambda _a\) with the constraint (9) for each link \(a\in L\) and group the Lagrange multipliers for each defense firm i’s supply chain network \(L^i\) into the vector \(\lambda ^i\). All such vectors for the defense firms are then grouped into the vector \(\lambda \in R_+^{n_L}\). Also, we introduce the feasible sets: \(K_i^1\equiv \{(x^i,\lambda ^i)\vert (x^i,\lambda ^i)\in R_+^{n_{P^i}+n_{L^i}}\}\); \(i=1,\ldots ,I\), and \(K^1\equiv \prod _{i=1}^I K_i^1\).

Theorem 1 (Alternative Variational Inequality Formulation of the Defense Supply Chain Nash Equilibrium)

The Defense Supply Chain Network Nash Equilibrium satisfying Definition 1 is equivalent to the solution of the variational inequality: determine the vector of equilibrium defense product path flows and the vector of optimal Lagrange multipliers, \((x^*, \lambda ^*)\in {K^1}\), such that

$$\displaystyle \begin{aligned} \begin{array}{ll} \displaystyle\sum_{i=1}^I\displaystyle\sum_{k=1}^{n_R}\displaystyle\sum_{p\in P^i_k}&\left[\dfrac{\partial \tilde C_p(x^*)}{\partial x_p} + \beta_i\dfrac{\partial \tilde R_p(x^*)}{\partial x_p} +\displaystyle\sum_{a\in L^i} {{\lambda^*_a}\over{\alpha_a}}\delta_{ap} +\displaystyle\sum_{a\in L^i} {{w_a}\over{\alpha_a}}\delta_{ap} - \tilde \rho_{ik}(x^*)\right.\\ &\left.-\displaystyle\sum_{l=1}^{n_R} {\displaystyle\frac{\partial \tilde \rho_{il}(x^*)}{\partial x_p}\displaystyle\sum_{q\in P^i_l} x^{*}_q} \right]\times [x_p-x^{*}_p] \end{array} \end{aligned}$$
$$\displaystyle \begin{aligned} +\sum_{a\in L}\left[\bar l_a-{{\sum_{p\in P} x_p^*\delta_{ap}}\over{\alpha_a}}\right]\times\left[ \lambda_a-\lambda_a^*\right]\ge 0,\quad \forall (x,\lambda)\in K^1, {} \end{aligned} $$
(12)

where

$$\displaystyle \begin{aligned} {{\partial \tilde C_p(x)}\over{\partial x_p}}\equiv \sum_{a\in L^i}\sum_{b\in L^i} {{\partial \hat c_b(f)}\over{\partial f_a}}\delta_{ap}, \quad \forall p\in P^i, {} \end{aligned} $$
(13)
$$\displaystyle \begin{aligned} {{\partial \tilde R_p(x)}\over{\partial x_p}}\equiv \sum_{a\in L^i}\sum_{b\in L^i} {{\partial r_b(f)}\over{\partial f_a}}\delta_{ap}, \quad \forall p\in P^i. \end{aligned} $$
(14)

Proof

See proof of Theorem 1 in Nagurney [14].

Variational inequality (12) is now put into standard form (cf. Nagurney [10]), VI\((F,\mathcal {K})\), where one seeks to determine a vector \(X^*\in \mathcal {K}\subset R^{\mathcal {N}}\), such that

$$\displaystyle \begin{aligned} \langle F(X^*),X-X^*\rangle \geq 0,\quad \forall X \in \mathcal{K}, {} \end{aligned} $$
(15)

where F is a given continuous function from \(\mathcal {K}\) to \(R^{\mathcal {N}}\), \(\mathcal {K}\) is a given closed, convex set, and \(\langle \cdot ,\cdot \rangle \) denotes the inner product in \(\mathcal {N}\)-dimensional Euclidean space.

In order to put the variational inequality (12) into the form in (15), we let \(\mathcal {N}\equiv n_P+n_L\); \(X\equiv (x,\lambda )\) and \(F(X)\equiv (F^1(X), F^2(X))\), where the pth component of \(F^1(X)\equiv \frac {\partial \tilde C_p(x)}{\partial x_p} + \beta _i\frac {\partial \tilde R_p(x)}{\partial x_p} +\sum _{a\in L^i} {{\lambda _a}\over {\alpha _a}}\delta _{ap} +\sum _{a\in L^i} {{w_a}\over {\alpha _a}}\delta _{ap} - \tilde \rho _{ik}(x) - \sum _{l=1}^{n_R} {\frac {\partial \tilde \rho _{il}(x)}{\partial x_p}\sum _{q\in P^i_l} x_q}\) and the ath component of \(F^2(X)\equiv \bar l_a-{{\sum _{p\in P} x_p\delta _{ap}}\over {\alpha _a}}\).

2.2 Dynamics and Algorithm

It is interesting and valuable to also discuss the underlying dynamics as the defense firms adjust their defense product outputs over time and the Lagrange multipliers associated with the link labor bounds also evolve over time. For this purpose, we can apply the theory of projected dynamical systems (cf. Dupuis and Nagurney [3] and Nagurney and Zhang [19]). We recall the projection operator \(\Pi _{\mathcal {K}}(X,v)\):

$$\displaystyle \begin{aligned} \Pi_{\mathcal{K}}(X,v)=\lim_{\delta\rightarrow 0} {{(P_{\mathcal{K}}(X+\delta v)-X)}\over{\delta}}, {} \end{aligned} $$
(16)

with \(P_{\mathcal {K}}\) being the classical projection operator (see Nagurney [10]). The ordinary differential equation of interest is then

$$\displaystyle \begin{aligned} \dot X=\Pi_{\mathcal{K}}(X,-F(X)), \quad X(0)=X^0\in \mathcal{K}. {} \end{aligned} $$
(17)

We know from Theorem 1.23 in Nagurney [10] that a stationary point \(X^*\) of the projected dynamical system (17), which, by definition, satisfies

$$\displaystyle \begin{aligned} 0=\Pi_{\mathcal{K}}(X^*,-F(X^*)), {} \end{aligned} $$
(18)

coincides with the solution of variational inequality (15).

Specifically, in the context of the model, the rate of change of the defense product flow at a point in time on a path p depends on \(-\frac {\partial \tilde C_p(x)}{\partial x_p} - \beta _i\frac {\partial \tilde R_p(x)}{\partial x_p} -\sum _{a\in L^i} {{\lambda _a}\over {\alpha _a}}\delta _{ap} -\sum _{a\in L^i} {{w_a}\over {\alpha _a}}\delta _{ap} + \tilde \rho _{ik}(x) + \sum _{l=1}^{n_R} {\frac {\partial \tilde \rho _{il}(x)}{\partial x_p}\sum _{q\in P^i_l} x_q}\) at that point in time, whereas the rate of change of the Lagrange multiplier on a link a depends on \(-\bar l_a+{{\sum _{p\in P} x_p\delta _{ap}}\over {\alpha _a}}\) at the point in time. If the marginal revenue associated with a path of a firm’s supply chain network exceeds the marginal costs plus the weighted marginal risk on the path, then the defense product flow will increase; if not, it will decrease, provided that it does not become negative. The projection operator \(\Pi _{\mathcal {K}}\) guarantees that the evolution of the product path flows and of the Lagrange multipliers always lies within the feasible set \(\mathcal {K}\); in other words, they always remain non-negative. A plethora of dynamic supply chain network models, including multitiered ones (but without labor), can be found in the book by Nagurney [11]. Nagurney and Ermagun [16] used the modified projection method of Korpelevich [7], whereas in this chapter, the Euler method is used.

Observe that (17) represents a continuous-time adjustment process. However, for computational purposes, a discrete-time algorithm that can be easily implemented is needed. For the solution of the model, we propose the Euler method, which is induced by the general iterative scheme of Dupuis and Nagurney [3], with its statement being as follows.

The Euler Method

Initialize with \(X^0\in \mathcal {K}\) and set \(\tau =0\). Compute

$$\displaystyle \begin{aligned} X^{\tau+1}=P_{\mathcal{K}}(X^\tau-a_\tau F(X^\tau)), {} \end{aligned} $$
(19)

where \(\sum _{\tau =0}^\infty a_\tau =\infty \), \( a_\tau >0\), \(a_\tau \rightarrow \infty \), as \(\tau \rightarrow \infty \).

As mentioned earlier, the feasible set \(\mathcal {K}\) for the variational inequality (12) (see also 15) for the defense supply chain network model is the non-negative orthant, and, hence, the resolution of the algorithmic scheme in (19) yields closed-form expressions for the defense product path flows and for the Lagrange multipliers as stated below.

Explicit Formulae for the Defense Product Path Flows at an Iteration

At iteration \({\tau +1}\), one computes the following for each path \(p; p\in P^i_k, \forall i,k\):

$$\displaystyle \begin{aligned} \begin{array}{ll} x_p^{\tau+1}&=\max\bigg\{0, x_a^{\tau} -a_\tau\bigg(\frac{\partial \tilde C_p(x^\tau)}{\partial x_p} + \beta_i\frac{\partial \tilde R_p(x^\tau)}{\partial x_p} +\sum_{a\in L^i} {{\lambda_a^\tau}\over{\alpha_a}}\delta_{ap} +\sum_{a\in L^i} {{w_a}\over{\alpha_a}}\delta_{ap}\\ &\qquad -\tilde \rho_{ik}(x^\tau)-\sum_{l=1}^{n_R} {\frac{\partial \tilde \rho_{il}(x^\tau)}{\partial x_p}\sum_{q\in P^i_l} x_q^\tau}\bigg)\bigg\};{} \end{array} \end{aligned} $$
(20)

Explicit Formulae for the Lagrange Multipliers at an Iteration

At iteration \({\tau + 1}\), one computes the following for each Lagrange multiplier \(a\in L\):

$$\displaystyle \begin{aligned} l_a^{\tau +1}=\max\bigg\{0, l_a^{\tau}-a_\tau\bigg(\bar l_a-{{\sum_{p\in P} x_p^{\tau}\delta_{ap}}\over{\alpha_a}}\bigg)\bigg\}. {} \end{aligned} $$
(21)

We apply this algorithm in Sect. 4 to defense supply chain network examples for which we report the solutions, along with the network performance/efficiency values and additional information, using also results in Sect. 3.

3 Defense Supply Chain Network Efficiency/Performance

It is important to recognize that, in matters of defense, a government, in preparing for conflicts and/or in times of war, may need to acquire defense supplies from a country other than its own. Our defense supply chain network model allows for this, and we see that this is happening now as the war by Russia against Ukraine rages. Hence, we believe that an adaptation of the constructs for supply chain network performance/efficiency of Nagurney and Qiang [18] and of Nagurney and Li [17] can also be applied to the new model in this chapter, with note that the new model, unlike the previous ones in the above citations, includes labor; plus, we also have explicit weighted risk functions since risk is of high relevance in the defense sector.

3.1 Efficiency/Performance of a Defense Supply Chain Network and Importance Identification of a Network Component

The efficiency/performance of a defense supply chain network, denoted by efficiency, \(\mathcal {E}\), is defined as

$$\displaystyle \begin{aligned} {\mathcal{E}}={\mathcal{E}}(G,\hat c, \rho, w, r,\beta,\alpha,\bar l)\equiv \sum_{i=1}^I\sum_{k=1}^{n_R}{{{{d_{ik}^*}\over{\rho_{ik}(d^*)}}}\over{In_R}}, {} \end{aligned} $$
(22)

with the demands, \(d^*\), and the incurred defense demand market prices in (22), evaluated at the solution to (12). Observe that, given a defense supply chain network economy, and the various parameters and functions, the corresponding multifirm supply chain network is considered as performing better if, on the average, it can handle higher demands at lower prices. Note that, as can be inferred from variational inequality (12), the defense demand market prices capture the information associated with the operational costs, the wages paid out to labor, as well as the weighted risk.

Following then Nagurney and Qiang [18] for results therein for supply chains and Nagurney and Li [17], one can then define the importance of a component g (node, link, or a combination of nodes and links), \(I(g)\), which represents the efficiency drop when g is removed from the defense supply chain network, as

$$\displaystyle \begin{aligned} I(g)={{\Delta\mathcal{E}}\over{\mathcal{E}}}={{{\mathcal{E}}(G,\hat c, \rho, w, r,\beta,\alpha,\bar l)-{\mathcal{E}}(G-g,\hat c, \rho, w, r, \beta,\alpha,\bar l)}\over{{\mathcal{E}}(G,\hat c, \rho, w, r,\beta,\alpha,\bar l)}}. {} \end{aligned} $$
(23)

One can rank the importance of nodes or links, using (23). This formalism can be quite valuable for those engaged in decision-making and policymaking in the military and defense. Those defense supply chain network components that are of higher importance should be paid greater attention to since a disruption to those components will have a bigger overall impact.

Using the above efficiency/performance measure \({\mathcal {E}}\), one can also quantify the resilience of the defense supply chain network economy to disruptions in labor as discussed in Nagurney and Ermagun [16], but in the context of a supply chain network optimization model with labor and not a game theory model that also captures risk.

3.2 Resilience Measure Associated with Labor Disruptions

We can adapt the measure proposed in Nagurney and Ermagun [16] for the defense supply chain network game theory model. As therein, let \(\bar l\gamma \) denote the reduction of labor availability with \(\gamma \in (0,1]\) so if \(\gamma =0.8\) this means that the labor availability associated with the labor constraints is now \(80\%\) of the original labor availability as in \({\mathcal {E}}\).

Resilience Measure Capturing Labor Availability

One can define the resilience measure with respect to labor availability, \(\mathcal {R}^{\bar l\gamma }\), as

$$\displaystyle \begin{aligned} \mathcal{R}^{\bar l\gamma}\equiv\mathcal{R}^{\bar l\gamma}(G,\hat c, \rho, \pi, \alpha,\bar l)={{\mathcal{E}}^{\bar l\gamma}\over{\mathcal{E}}}\times 100\%, {} \end{aligned} $$
(24)

with \(\mathcal {E}\) as in (22).

The expression (24) quantifies the resilience of the defense supply chain network subject to reduction of labor availability. The closer the value is to \(100\%\), the greater the resilience.

4 Numerical Examples

In this section, the modeling framework is illustrated through numerical examples. The Euler method was implemented in FORTRAN and a Linux system used for the computations. The \(\{a_\tau \}\) sequence used was \(\{10(1,{{1}\over {2}}, {{1}\over {2}}, {{1}\over {3}},{{1}\over {3}},{{1}\over {3}},\ldots )\}\). The algorithm was initialized with a demand of 40 for each demand market of each firm with the demand equally distributed among the paths of each firm. The initial Lagrange multipliers were set to \(0.00\). The algorithm was deemed to have converged when the absolute value of each computed variable evaluated at two successive iterations differed by no more than \({10}^{-7}\).

The defense supply chain network economy for the specific defense product, which could correspond, for example, to helmets or protective vests, consists of two defense firms, each of which has two production sites, a single distribution center, and serves two defense demand markets, as depicted in Fig. 2.

Fig. 2
A schematic model of a supply chain network. It consists of two defense firms and defense demand markets. The process begins with production, followed by transportation, storage, and distribution. The numbers are labeled in the model.

The supply chain network topology for the numerical examples

Example 1 (Baseline)

The first example, which serves as the baseline, has the following data. Note that, in this example, we assume that the firms are not concerned about risk, so that all the risk functions are identically equal to \(0.00\).

The total operational cost functions associated with Defense Firm 1’s supply chain network links \(L^1\) are

$$\displaystyle \begin{aligned} \hat c_a(f)=0.006f_a^2, \quad \hat c_b(f)=0.007f_b^2, \quad \hat c_c(f)=0.01f_c^2, \quad \hat c_d(f)=0.01f_d^2, \end{aligned}$$
$$\displaystyle \begin{aligned} \hat c_e(f)=0.02f_e^2, \quad \hat c_f(f)=0.05f_f^2, \quad \hat c_g(f)=0.05f_g^2.\end{aligned}$$

The total operational costs associated with Defense Firm 2’s supply chain network links \(L^2\) are

$$\displaystyle \begin{aligned} \hat c_h(f)=0.0075f_h^2, \quad \hat c_i(f)=0.008f_i^2, \quad \hat c_j(f)=0.005f_j^2, \quad \hat c_k(f)=0.005f_k^2, \end{aligned}$$
$$\displaystyle \begin{aligned} \hat c_l(f)=0.015f_l^2, \quad \hat c_m(f)=0.1f_m^2, \quad \hat c_n(f)=0.1f_n^2.\end{aligned}$$

The hourly labor wages are

$$\displaystyle \begin{aligned} w_a=10,\quad w_b=10,\quad w_c=15,\quad w_d=15,\quad w_e=20,\quad w_f=17,\quad w_g=18,\end{aligned}$$
$$\displaystyle \begin{aligned} w_h=11,\quad w_i=22,\quad w_j=15,\quad w_k=15,\quad w_l=18,\quad w_m=18,\quad w_n=18.\end{aligned}$$

The link labor productivity factors are

$$\displaystyle \begin{aligned} \alpha_a=24,\quad \alpha_b=25,\quad \alpha_c=100,\quad \alpha_d=100,\quad \alpha_e=50,\quad \alpha_f=100,\quad \alpha_g=100,\end{aligned}$$
$$\displaystyle \begin{aligned} \alpha_h=23,\quad \alpha_i=24,\quad \alpha_j=100,\quad \alpha_k=100,\quad \alpha_l=70,\quad \alpha_m=100,\quad \alpha_n=100.\end{aligned}$$

The bounds on labor are

$$\displaystyle \begin{aligned} \bar l_a=100,\quad \bar l_b=200,\quad \bar l_c=300,\quad \bar l_d=300,\quad \bar l_e=100,\quad \bar l_f=120,\quad \bar l_g=120,\end{aligned}$$
$$\displaystyle \begin{aligned} \bar l_h=800,\quad \bar l_i=90,\quad \bar l_j=200,\quad \bar l_k=200,\quad \bar l_l=300,\quad \bar l_m=100,\quad \bar l_n=100.\end{aligned}$$

The demand price functions of Defense Firm 1 are

$$\displaystyle \begin{aligned} \rho_{11}(d)=-0.0001d_{11}-0.00005d_{21}+600,\quad \rho_{12}(d)=-0.0002d_{12}-0.0001d_{22}+800.\end{aligned}$$

The demand price functions of Defense Firm 2 are

$$\displaystyle \begin{aligned} \rho_{21}(d)=-0.0003d_{21}+700,\quad \rho_{22}(d)=-0.0002d_{22}+700.\end{aligned}$$

The paths are \(p_1=(a,c,e,f)\), \(p_2=(b,d,e,f)\), \(p_3=(a,c,e,g)\), \(p_r=(b,d,e,g)\) for Defense Firm 1 and \(p_5=(h,j,l,m)\), \(p_6=(i,k,l,m)\), \(p_7=(h,j,l,n)\), and \(p_8=(i,k,l,n)\) for Defense Firm 2.

The computed equilibrium defense product path flows are reported in Table 2. The computed equilibrium labor values are reported in Table 3. All the Lagrange multipliers have a value of 0.00 at the equilibrium.

Table 2 Equilibrium defense product path flows for Examples 1 and 2
Table 3 Equilibrium link labor values for Examples 1 and 2

The defense product prices at equilibrium are

$$\displaystyle \begin{aligned} \rho_{11}=599.75, \quad \rho_{12}=799.10,\quad \rho_{21}=699.40,\quad \rho_{22}=699.60,\end{aligned}$$

with the equilibrium demands:

$$\displaystyle \begin{aligned} d_{11}^*=1506.19,\quad d_{12}^*=3494.12,\quad d_{21}^*=1999.04,\quad d_{22}^*=2001.03.\end{aligned}$$

The utility for Defense Firm 1 is 2,258,772.50 and that for Defense Firm 2 is 1,649,827.75.

We report the efficiency of this supply chain network, even with all the risk functions set to \(0.00\). The \({\mathcal {E}}=3.15\).

Example 2 (Addition of Risk Functions Associated with Production Sites)

Example 2 has the same data as that in Example 1, except that now we consider the situation that the production sites are suffering from geopolitical risk and, hence, we have

$$\displaystyle \begin{aligned} r_a=f_a^2,\quad r_b(f)=f_b^2, \quad r_h(f)=f_h^2,\quad r_i(f)=f_i^2,\end{aligned}$$

with the risk weights of the two firms: \(\beta _1=\beta _2=1\).

The computed equilibrium path flows are reported in Table 2, with the computed labor values given in Table 3. All the Lagrange multipliers, again, have a value of 0.00 at the equilibrium. In other words, the respective labor bounds are not reached in Example 2.

The defense product prices at equilibrium are now

$$\displaystyle \begin{aligned} \rho_{11}=599.98, \quad \rho_{12}=799.83,\quad \rho_{21}=699.91,\quad \rho_{22}=699.94,\end{aligned}$$

with the equilibrium demands:

$$\displaystyle \begin{aligned} d_{11}^*=0.00,\quad d_{12}^*=690.49,\quad d_{21}^*=305.50,\quad d_{22}^*=305.80.\end{aligned}$$

The utility for Defense Firm 1 now is 275,793.59 and that for Defense Firm 2: 213,562.31. One can see that the utilities of both firms have dropped precipitously in comparison to the utilities that they earned in Example 1, when there was no risk. The efficiency of this defense supply chain network, with risk functions associated with production sites, \({\mathcal {E}}=0.43\). We see that this value is much lower than that in Example 1. We then proceeded to see how resilient this defense supply chain network is with respect to labor disruptions. We calculated \(\mathcal {R}^{\bar l\gamma }\) for \(\gamma =0.9,0.7,0.5,0.3,0.1\) and found that \(\mathcal {R}^{\bar l\gamma }=1\) for all the values of \(\gamma \) noted, except when \(\gamma =0.1\), where \(\mathcal {R}^{\bar l.1}=0.7\). We can conclude that this defense supply chain network, with the data provided, is quite resilient to labor disruptions.

In Table 4, we report the efficiency of the defense supply chain network for Example 2 when a link g is removed, along with the importance \(I(g)\), for \(g=a,\ldots ,n\). Table 4 provides interesting results. Overall, one can see that the supply chain network of Defense Firm 2 is more important than that of Defense Firm 1 to this defense supply chain network economy, and cognizant governments should make note of this. Indeed, five of the seven links of Defense Firm 2’s supply chain network have positive values in terms of their importance. Furthermore, Defense Firm 2’s link l, which corresponds to a storage link, has the highest importance value; therefore, every effort should be expended to preserve its functionality. Also, the production link i of Defense Firm 2 merits maintenance and care as do the transportation links j and k. Finally, link m, a distribution link to Defense Demand Market 2, is also of importance. As for the supply chain network of Defense Firm 1, link e, which is a storage link, has the highest value in terms of importance for Defense Firm 1 and, interestingly, its production site associated with link a is of the lowest importance. We emphasize that not only the absolute values in terms of importance of supply chain network components are relevant but also their relative values.

Table 4 Efficiency of the defense supply chain network for Example 2 when Link g Is removed and the importance \(I(g)\)

5 Summary, Conclusions, and Suggestions for Future Research

In this chapter, a defense-critical supply chain network game theory model was introduced, which includes labor and associated constraints, as well as risk, since current world events have heightened the importance of both risk management and resilience of supply chain networks to disruptions, including those associated with labor, which have been significant in the COVID-19 pandemic. The methodological framework for the modeling, analysis, and computations made use of both variational inequality theory and the theory of projected dynamical systems.

We proposed a noncooperative game theory model consisting of defense firms seeking to supply defense products that are substitutable to demand markets, which can be associated with different governments that are not antagonistic to one another. The labor constraints are bounds on hours of labor available on the supply chain network links, which are production, transportation, storage, and distribution links. The utility function of each firm captures revenue as well as weighted risk and the governing equilibrium concept is that of a Nash equilibrium. Under appropriate assumptions on the utility functions, we provide alternative variational inequality formulations of the governing equilibrium conditions. In addition, a dynamic model is constructed, whose stationary points coincide with the set of solutions to the variational inequality with variables consisting of defense product path flows and Lagrange multipliers associated with the labor constraints. An algorithm, the Euler method, is proposed for the time discretization of the continuous-time trajectories and used in the solution of the numerical examples.

In addition, a network efficiency/performance measure is proposed for the defense supply chain network economy, which can then be applied to quantify the importance of supply chain network components, and then rank them. A resilience measure is also constructed to assess the impacts of disruptions to labor availability.

In order to illustrate the defense supply chain network modeling framework, numerical examples are solved with input and output data reported. The information regarding the defense supply chain network economy, made possible with the tools in the chapter, can be useful for decision-makers and policymakers in governments that are concerned about defense.

It would be interesting, for future research, to investigate the supply chain network efficiency under different kinds of labor constraints (see also Nagurney [14]) and also under different productivity levels (Nagurney and Ermagun [16]). It would also be worthwhile to include additional tiers in the supply chain network to include, specifically, suppliers and their behavior, along with labor, and address issues of supply chain network efficiency and resilience in the defense sector.