Applying inverse DEA and cone constraint to sensitivity analysis of DMUs with undesirable inputs and outputs

被引:18
|
作者
Eyni, M. [1 ]
Tohidi, G. [2 ]
Mehrabeian, S. [3 ]
机构
[1] Payame Noor Univ, Dept Math, Tehran, Iran
[2] Islamic Azad Univ, Dept Math, Cent Tehran Branch, Tehran, Iran
[3] Kharazmi Univ, Dept Math & Comp, Karaj, Iran
关键词
DEA; inverse DEA; MOLP; undesirable data; cone constraints; DATA ENVELOPMENT ANALYSIS; DECISION-MAKING UNITS; EFFICIENCY; MODEL;
D O I
10.1057/s41274-016-0004-7
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
In this paper, the inverse data envelopment analysis (DEA) with the preference of cone constraints will be discussed in a way that in the decision-making units, the undesirable inputs and outputs exist simultaneously. Supposing that the efficiency level does not change, if the unit under assessment increases the level of the desirable outputs and decreases the level of the undesirable outputs, how will it affect the amount of the desirable input level and the undesirable input level? To answer this question, the application of the inverse DEA with preference of cone constraints is suggested. The suggested approach, while maintaining the efficiency level, increases the level of its undesirable input and decreases the level of its desirable input by selection of strongly efficient solutions or some weakly efficient solutions of the multiple objective linear programming (MOLP) model. While maintaining the efficiency level, the suggested approach by selection of strongly efficient solution or some of the weakly efficient solutions of the MOLP model can increase the undesirable input level and decrease the desirable input level. Similarly, the suggested approach can be applied if the decision-making unit increases its undesirable input level and decreases the desirable input level so that the undesirable output level decreases and the desirable output level increases while maintaining the efficiency level. As an illustration, two numerical examples are rendered.
引用
收藏
页码:34 / 40
页数:7
相关论文
共 44 条
  • [1] Undesirable inputs and outputs in DEA models
    Jahanshahloo, GR
    Lotfi, FH
    Shoja, N
    Tohidi, G
    Razavyan, S
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 917 - 925
  • [2] DEA models with undesirable inputs and outputs
    W. B. Liu
    W. Meng
    X. X. Li
    D. Q. Zhang
    [J]. Annals of Operations Research, 2010, 173 : 177 - 194
  • [3] DEA models with undesirable inputs and outputs
    Liu, W. B.
    Meng, W.
    Li, X. X.
    Zhang, D. Q.
    [J]. ANNALS OF OPERATIONS RESEARCH, 2010, 173 (01) : 177 - 194
  • [4] A complete ranking of DMUs with undesirable outputs using restrictions in DEA models
    Guo, Dong
    Wu, Jie
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1102 - 1109
  • [5] Inputs/outputs estimation in DEA when some factors are undesirable
    Jahanshahloo, GR
    Vencheh, AH
    Foroughi, AA
    Matin, RK
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 156 (01) : 19 - 32
  • [6] An inverse DEA model for inputs/outputs estimate
    Wei, QL
    Zhang, JZ
    Zhang, XS
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2000, 121 (01) : 151 - 163
  • [7] Applying non-radial DEA on undesirable outputs for sustainability
    Wang, Yu-Jie
    Han, Tzeu-Chen
    [J]. 2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 757 - 761
  • [8] A Novel Inverse DEA-R Model for Inputs/Outputs Estimation
    Sohrabi, A.
    Gerami, J.
    Mozaffari, M. M.
    [J]. JOURNAL OF MATHEMATICAL EXTENSION, 2022, 16 (08)
  • [9] Analysis of Farming Environmental Efficiency Using a DEA Model with Undesirable Outputs
    Kuo, Hsing-Fu
    Chen, Hsiang-Leng
    Tsou, Ko-Wan
    [J]. 5TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND DEVELOPMENT - ICESD 2014, 2014, 10 : 154 - 158
  • [10] A New Model for Classifying Inputs and Outputs and Evaluating the DMUs Efficiency in DEA Based on Cobb-Douglas Production Function
    Hatefi, S. M.
    Jolai, F.
    Kor, H.
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 390 - 394