Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A Worst Case Estimation of the Inspection Rate by a Berthing Policy in a Container Terminal
Authors: K.H. Yang
Abstract:
After the terrorist attack on September 11, 2001 in U.S., the container security issue got high attention, especially by U.S. government, which deployed a lot of measures to promote or improve security systems. U.S. government not only enhances its national security system, but allies with other countries against the potential terrorist attacks in the future. For example CSI (Container Security Initiative), it encourages foreign ports outside U.S. to become CSI ports as a part of U.S. anti-terrorism network. Although promotion of the security could partly reach the goal of anti-terrorism, that will influence the efficiency of container supply chain, which is the main concern when implementing the inspection measurements. This paper proposes a quick estimation methodology for an inspection service rate by a berth allocation heuristic such that the inspection activities will not affect the original container supply chain. Theoretical and simulation results show this approach is effective.Keywords: Berth allocation, Container, Heuristic, Inspection.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1079232
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1414References:
[1] E. Boros, L. Fedzhora, P.B. Kantor, K. Saeger, and P. Stroud, "A large-scale linear programming model for finding optimal container inspection strategies", Naval Research Logistics, Vol. 56, Issue 5, pp. 404-420, 2009.
[2] J. Li, S. Ming, Y. Cao, and Y. Deng, "Monte Carlo Application in Shielding Design for an X-Ray Container/Vehicle Inspection System", Nuclear technology, Vol. 168, No. 2, pp.391-398, 2009.
[3] K. H. Yang, P. Pulat, Y. P. Guan, "Embedded simulation on a multiprocessor job scheduling system with inspection", Computers & Industrial Engineering, Vol. 57, Issue 2, pp. 592-607, 2009
[4] X. Duan, J. Cheng, L. Zhang, Y. Xing, Z. Chen, and Z. Zhao, "X-ray cargo container inspection system with few-view projection imaging", Nuclear instruments & methods in physics research. Section A, Accelerators, spectrometers, detectors and associated equipment, Vol. 598, No. 2, pp. 439-444, 2009.
[5] S. Pesente, M. Lunardon, G. Nebbia, G. Viesti, D. Sudac, and V. Valkovic, "Monte Carlo analysis of tagged neutron beams for cargo container inspection", Applied radiation and isotopes : including data, instrumentation, and methods for use in agriculture, industry, and medicine, Vol. 65, No. 12, pp. 1322-1329, 2007.
[6] J. X. Hong, X. J. Kong, and X. M. Liu, "A new and quick algorithm of shielding noises realizing in images of large container inspection system", Nuclear electronics and detection technology, Vol. 26, No. 1, pp. 81-83, 2006.
[7] M. Thibault, M. R. Brooks, and K. J. Button , "The response of the U.S. maritime industry to the new container security initiatives" Transportation Journal, Vol. 45, pp. 5-15, 2006.
[8] S. Sekine, E. Campos-Nanez, J. R. Harrald, and H. Abeledo, "A simulation-based approach to trade-off analysis of port security", Proceedings of Winter Simulation Conference, pp. 521-528, 2006.
[9] H. H.Willis and D. S. Ortiz, "Evaluating the security of the global containerized supply chain", Tech. rep., RAND, 2004
[10] A. Roach, "Container and port security: a bilateral perspective," The International Journal of Marine and Coastal Law, Vol. 18, Issue 3, pp. 341-361. 2003.
[11] M. Gerencser., J. Weinberg and J. Vincent, Port security wargame implications for U.S. supply chain, Tech. rep., Booze Allen Hamilton, 2003.
[12] D. Simchi-Levi, P. Laminsky, and E. Simchi-Levi, "Designing and managing the supply chain, 2nd ed.", McGraw-Hill/Irwin. 2002.
[13] Y. Guan., W. Q. Xiao, R. K. Cheung, and C. L. Li, "A multiprocessor task scheduling model for berth allocation: heuristic and worst-case analysis," Operations Research Letters, Vol. 30, pp. 343-350, 2002.
[14] C. L. Li, X. Cai and C. Y. Lee, "Scheduling with multiple-job-on-one-processor pattern," IIE Transactions, Vol. 30, pp. 433-445, 1998.