Hostname: page-component-77f85d65b8-t6st2 Total loading time: 0 Render date: 2026-03-28T00:19:27.169Z Has data issue: false hasContentIssue false

Design process robustness: a bipartite network analysis reveals the central importance of people

Published online by Cambridge University Press:  11 January 2018

Sebastiano A. Piccolo*
Affiliation:
Department of Management Engineering, Engineering Systems Division, Technical University of Denmark, Kgs. Lyngby, 2800, Denmark
Sune Lehmann
Affiliation:
DTU Compute, Technical University of Denmark, Kgs. Lyngby, 2800, Denmark
Anja Maier
Affiliation:
Department of Management Engineering, Engineering Systems Division, Technical University of Denmark, Kgs. Lyngby, 2800, Denmark
*
Email address for correspondence: sebpi@dtu.dk
Rights & Permissions [Opens in a new window]

Abstract

Design processes require the joint effort of many people to collaborate and work on multiple activities. Effective techniques to analyse and model design processes are important for understanding organisational dynamics, for improving collaboration, and for planning robust design processes, reducing the risk of rework and delays. Although there has been much progress in modelling and understanding design processes, little is known about the interplay between people and the activities they perform and its influence on design process robustness. To analyse this interplay, we model a large-scale design process of a biomass power plant with $100+$ people and ${\sim}150$ activities as a bipartite network. Observing that some people act as bridges between activities organised to form nearly independent modules, in order to evaluate process fragility, we simulate random failures and targeted attacks to people and activities. We find that our process is more vulnerable to attacks to people rather than activities. These findings show how the allocation of people to activities can obscure an inherent fragility, making the process highly sensitive and dependent on specific people. More generally, we show that the behaviour of robustness is determined by the degree distributions, the heterogeneity of which can be leveraged to improve robustness and resilience to cascading failures. Overall, we show that it is important to carefully plan the assignment of people to activities.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
Distributed as Open Access under a CC-BY 4.0 license (http://creativecommons.org/licenses/by/4.0/)
Copyright
Copyright © The Author(s) 2018
Figure 0

Figure 1. Two different bipartite configurations produce the same configuration after the application of a bipartite network projection. The configuration on the left is a star (non-cyclic configuration) which results in a triangle (cycle) after the projection. The configuration on the right is a cycle between six nodes and also results in a triangle after the projection. However, there is no possibility to distinguish between the two. In both cases the information about the other node set is lost. Thus, a direct analysis of the bipartite network, without relying on projections, is preferable.

Figure 1

Table 1. Descriptive statistics for the bipartite network

Figure 2

Figure 2. (A) Degree histogram for people and activities. The degree distribution for people is more skewed than the degree distribution for activities. (B) Complementary cumulative distribution function (CCDF) for the two degree distributions: there are more people connected to only one activity than activities connected to only one person. The degree distribution for people has more variation than the degree distribution for activities. (C) Parallel coordinates plot for centrality measures: each line represents the score of each node for each centrality measure: degree (DC), betweenness (BC), closeness (CC) and eigenvector (EC).

Figure 3

Table 2. Correlation between centrality measures

Figure 4

Figure 3. Simplification of the topology of this design process: the process is modularised in such a way that a number of specialists can work separately on different modular activities. Generalists manage different modular activities, collaborating on some integrative activities to integrate the output of different process modules.

Figure 5

Figure 4. (A) Decay of the relative size of the giant connected component (S) to random (black squares) and targeted (red circles) node removal. The process network is resistant to random perturbations but vulnerable to targeted ones. (B) Decay of the relative size of the giant connected component (S) to random removal of people (black squares) and activities (red circles). The process network is resistant to random perturbations to both people and activities. (C) Decay of the relative size of the giant connected component (S) to targeted removal of people (black squares) and people (red circles). The process network is vulnerable to targeted perturbations to people. (D) Force directed layout of the process network: people are represented by circles and activities are represented by squares.

Figure 6

Table 3. Comparison between the three what-if scenarios. (Original) Status of the original network without any perturbations. (what-if 1) Status of the resulting network after the removal of the first 20 nodes by degree, that are 12 people and 8 activities. (what-if 2) Status of the resulting network after the removal of the first 20 activities by degree. (what-if 3) Status of the resulting network after the removal of the first 20 people by degree

Figure 7

Figure 5. Top panel: results of simulations that preserve the two degree distributions. (A) Decay of the relative size of the giant connected component (S) to targeted node removal: in red, the decay curve from the observed network; in blue, the decay curves for 10 000 simulated networks. The observed network and the simulated ones have very similar robustness (though the original network is less robust than most of the simulated networks). (B) Decay of the relative size of the giant connected component (S) to targeted removal of people (blue lines) and activities (red lines) for the simulated networks; in black, the decay curves for the observed network. (C) Assortativity distribution of the simulated networks. Bottom panel: results of simulations that do not preserve the two degree distributions, assigning connections at random. (D) Decay of the relative size of the giant connected component (S) to targeted node removal: in red, the decay curve from the observed network; in blue, the decay curves for 10 000 simulated networks. The observed network is much less robust than the randomly generated networks. (E) Decay of the relative size of the giant connected component (S) to targeted removal of people (blue lines) and activities (red lines) for the simulated networks; in black, the decay curves for the observed network. (F) Assortativity distribution of the simulated networks.

Figure 8

Figure 6. Simulations of cascades on the three networks. The blue line represents the threshold probability needed for which no node can activate a catastrophic cascade. The threshold for the original network is around 94%, for the improved network is around 91%, and for the homogeneous network is around 83%.