A Worst Case Estimation of the Inspection Rate by a Berthing Policy in a Container Terminal

After the terrorist attack on September 11, 2001 in U.S., the container security issue got high attention, especially by U.S. government, which deployed a lot of measures to promote or improve security systems. U.S. government not only enhances its national security system, but allies with other countries against the potential terrorist attacks in the future. For example CSI (Container Security Initiative), it encourages foreign ports outside U.S. to become CSI ports as a part of U.S. anti-terrorism network. Although promotion of the security could partly reach the goal of anti-terrorism, that will influence the efficiency of container supply chain, which is the main concern when implementing the inspection measurements. This paper proposes a quick estimation methodology for an inspection service rate by a berth allocation heuristic such that the inspection activities will not affect the original container supply chain. Theoretical and simulation results show this approach is effective.

Authors:



References:
[1] E. Boros, L. Fedzhora, P.B. Kantor, K. Saeger, and P. Stroud, "A
large-scale linear programming model for finding optimal container
inspection strategies", Naval Research Logistics, Vol. 56, Issue 5, pp.
404-420, 2009.
[2] J. Li, S. Ming, Y. Cao, and Y. Deng, "Monte Carlo Application in
Shielding Design for an X-Ray Container/Vehicle Inspection System",
Nuclear technology, Vol. 168, No. 2, pp.391-398, 2009.
[3] K. H. Yang, P. Pulat, Y. P. Guan, "Embedded simulation on a
multiprocessor job scheduling system with inspection", Computers &
Industrial Engineering, Vol. 57, Issue 2, pp. 592-607, 2009
[4] X. Duan, J. Cheng, L. Zhang, Y. Xing, Z. Chen, and Z. Zhao, "X-ray
cargo container inspection system with few-view projection imaging",
Nuclear instruments & methods in physics research. Section A,
Accelerators, spectrometers, detectors and associated equipment, Vol.
598, No. 2, pp. 439-444, 2009.
[5] S. Pesente, M. Lunardon, G. Nebbia, G. Viesti, D. Sudac, and V.
Valkovic, "Monte Carlo analysis of tagged neutron beams for cargo
container inspection", Applied radiation and isotopes : including data,
instrumentation, and methods for use in agriculture, industry, and
medicine, Vol. 65, No. 12, pp. 1322-1329, 2007.
[6] J. X. Hong, X. J. Kong, and X. M. Liu, "A new and quick algorithm of
shielding noises realizing in images of large container inspection system",
Nuclear electronics and detection technology, Vol. 26, No. 1, pp. 81-83,
2006.
[7] M. Thibault, M. R. Brooks, and K. J. Button , "The response of the U.S.
maritime industry to the new container security initiatives"
Transportation Journal, Vol. 45, pp. 5-15, 2006.
[8] S. Sekine, E. Campos-Nanez, J. R. Harrald, and H. Abeledo, "A
simulation-based approach to trade-off analysis of port security",
Proceedings of Winter Simulation Conference, pp. 521-528, 2006.
[9] H. H.Willis and D. S. Ortiz, "Evaluating the security of the global
containerized supply chain", Tech. rep., RAND, 2004
[10] A. Roach, "Container and port security: a bilateral perspective," The
International Journal of Marine and Coastal Law, Vol. 18, Issue 3, pp.
341-361. 2003.
[11] M. Gerencser., J. Weinberg and J. Vincent, Port security wargame
implications for U.S. supply chain, Tech. rep., Booze Allen Hamilton,
2003.
[12] D. Simchi-Levi, P. Laminsky, and E. Simchi-Levi, "Designing and
managing the supply chain, 2nd ed.", McGraw-Hill/Irwin. 2002.
[13] Y. Guan., W. Q. Xiao, R. K. Cheung, and C. L. Li, "A multiprocessor task
scheduling model for berth allocation: heuristic and worst-case analysis,"
Operations Research Letters, Vol. 30, pp. 343-350, 2002.
[14] C. L. Li, X. Cai and C. Y. Lee, "Scheduling with
multiple-job-on-one-processor pattern," IIE Transactions, Vol. 30, pp.
433-445, 1998.