A Worst Case Estimation of the Inspection Rate by a Berthing Policy in a Container Terminal
After the terrorist attack on September 11, 2001 in
U.S., the container security issue got high attention, especially by U.S.
government, which deployed a lot of measures to promote or improve
security systems. U.S. government not only enhances its national
security system, but allies with other countries against the potential
terrorist attacks in the future. For example CSI (Container Security
Initiative), it encourages foreign ports outside U.S. to become CSI
ports as a part of U.S. anti-terrorism network. Although promotion of
the security could partly reach the goal of anti-terrorism, that will
influence the efficiency of container supply chain, which is the main
concern when implementing the inspection measurements. This paper
proposes a quick estimation methodology for an inspection service
rate by a berth allocation heuristic such that the inspection activities
will not affect the original container supply chain. Theoretical and
simulation results show this approach is effective.
[1] E. Boros, L. Fedzhora, P.B. Kantor, K. Saeger, and P. Stroud, "A
large-scale linear programming model for finding optimal container
inspection strategies", Naval Research Logistics, Vol. 56, Issue 5, pp.
404-420, 2009.
[2] J. Li, S. Ming, Y. Cao, and Y. Deng, "Monte Carlo Application in
Shielding Design for an X-Ray Container/Vehicle Inspection System",
Nuclear technology, Vol. 168, No. 2, pp.391-398, 2009.
[3] K. H. Yang, P. Pulat, Y. P. Guan, "Embedded simulation on a
multiprocessor job scheduling system with inspection", Computers &
Industrial Engineering, Vol. 57, Issue 2, pp. 592-607, 2009
[4] X. Duan, J. Cheng, L. Zhang, Y. Xing, Z. Chen, and Z. Zhao, "X-ray
cargo container inspection system with few-view projection imaging",
Nuclear instruments & methods in physics research. Section A,
Accelerators, spectrometers, detectors and associated equipment, Vol.
598, No. 2, pp. 439-444, 2009.
[5] S. Pesente, M. Lunardon, G. Nebbia, G. Viesti, D. Sudac, and V.
Valkovic, "Monte Carlo analysis of tagged neutron beams for cargo
container inspection", Applied radiation and isotopes : including data,
instrumentation, and methods for use in agriculture, industry, and
medicine, Vol. 65, No. 12, pp. 1322-1329, 2007.
[6] J. X. Hong, X. J. Kong, and X. M. Liu, "A new and quick algorithm of
shielding noises realizing in images of large container inspection system",
Nuclear electronics and detection technology, Vol. 26, No. 1, pp. 81-83,
2006.
[7] M. Thibault, M. R. Brooks, and K. J. Button , "The response of the U.S.
maritime industry to the new container security initiatives"
Transportation Journal, Vol. 45, pp. 5-15, 2006.
[8] S. Sekine, E. Campos-Nanez, J. R. Harrald, and H. Abeledo, "A
simulation-based approach to trade-off analysis of port security",
Proceedings of Winter Simulation Conference, pp. 521-528, 2006.
[9] H. H.Willis and D. S. Ortiz, "Evaluating the security of the global
containerized supply chain", Tech. rep., RAND, 2004
[10] A. Roach, "Container and port security: a bilateral perspective," The
International Journal of Marine and Coastal Law, Vol. 18, Issue 3, pp.
341-361. 2003.
[11] M. Gerencser., J. Weinberg and J. Vincent, Port security wargame
implications for U.S. supply chain, Tech. rep., Booze Allen Hamilton,
2003.
[12] D. Simchi-Levi, P. Laminsky, and E. Simchi-Levi, "Designing and
managing the supply chain, 2nd ed.", McGraw-Hill/Irwin. 2002.
[13] Y. Guan., W. Q. Xiao, R. K. Cheung, and C. L. Li, "A multiprocessor task
scheduling model for berth allocation: heuristic and worst-case analysis,"
Operations Research Letters, Vol. 30, pp. 343-350, 2002.
[14] C. L. Li, X. Cai and C. Y. Lee, "Scheduling with
multiple-job-on-one-processor pattern," IIE Transactions, Vol. 30, pp.
433-445, 1998.
[1] E. Boros, L. Fedzhora, P.B. Kantor, K. Saeger, and P. Stroud, "A
large-scale linear programming model for finding optimal container
inspection strategies", Naval Research Logistics, Vol. 56, Issue 5, pp.
404-420, 2009.
[2] J. Li, S. Ming, Y. Cao, and Y. Deng, "Monte Carlo Application in
Shielding Design for an X-Ray Container/Vehicle Inspection System",
Nuclear technology, Vol. 168, No. 2, pp.391-398, 2009.
[3] K. H. Yang, P. Pulat, Y. P. Guan, "Embedded simulation on a
multiprocessor job scheduling system with inspection", Computers &
Industrial Engineering, Vol. 57, Issue 2, pp. 592-607, 2009
[4] X. Duan, J. Cheng, L. Zhang, Y. Xing, Z. Chen, and Z. Zhao, "X-ray
cargo container inspection system with few-view projection imaging",
Nuclear instruments & methods in physics research. Section A,
Accelerators, spectrometers, detectors and associated equipment, Vol.
598, No. 2, pp. 439-444, 2009.
[5] S. Pesente, M. Lunardon, G. Nebbia, G. Viesti, D. Sudac, and V.
Valkovic, "Monte Carlo analysis of tagged neutron beams for cargo
container inspection", Applied radiation and isotopes : including data,
instrumentation, and methods for use in agriculture, industry, and
medicine, Vol. 65, No. 12, pp. 1322-1329, 2007.
[6] J. X. Hong, X. J. Kong, and X. M. Liu, "A new and quick algorithm of
shielding noises realizing in images of large container inspection system",
Nuclear electronics and detection technology, Vol. 26, No. 1, pp. 81-83,
2006.
[7] M. Thibault, M. R. Brooks, and K. J. Button , "The response of the U.S.
maritime industry to the new container security initiatives"
Transportation Journal, Vol. 45, pp. 5-15, 2006.
[8] S. Sekine, E. Campos-Nanez, J. R. Harrald, and H. Abeledo, "A
simulation-based approach to trade-off analysis of port security",
Proceedings of Winter Simulation Conference, pp. 521-528, 2006.
[9] H. H.Willis and D. S. Ortiz, "Evaluating the security of the global
containerized supply chain", Tech. rep., RAND, 2004
[10] A. Roach, "Container and port security: a bilateral perspective," The
International Journal of Marine and Coastal Law, Vol. 18, Issue 3, pp.
341-361. 2003.
[11] M. Gerencser., J. Weinberg and J. Vincent, Port security wargame
implications for U.S. supply chain, Tech. rep., Booze Allen Hamilton,
2003.
[12] D. Simchi-Levi, P. Laminsky, and E. Simchi-Levi, "Designing and
managing the supply chain, 2nd ed.", McGraw-Hill/Irwin. 2002.
[13] Y. Guan., W. Q. Xiao, R. K. Cheung, and C. L. Li, "A multiprocessor task
scheduling model for berth allocation: heuristic and worst-case analysis,"
Operations Research Letters, Vol. 30, pp. 343-350, 2002.
[14] C. L. Li, X. Cai and C. Y. Lee, "Scheduling with
multiple-job-on-one-processor pattern," IIE Transactions, Vol. 30, pp.
433-445, 1998.
@article{"International Journal of Business, Human and Social Sciences:61480", author = "K.H. Yang", title = "A Worst Case Estimation of the Inspection Rate by a Berthing Policy in a Container Terminal", abstract = "After the terrorist attack on September 11, 2001 in
U.S., the container security issue got high attention, especially by U.S.
government, which deployed a lot of measures to promote or improve
security systems. U.S. government not only enhances its national
security system, but allies with other countries against the potential
terrorist attacks in the future. For example CSI (Container Security
Initiative), it encourages foreign ports outside U.S. to become CSI
ports as a part of U.S. anti-terrorism network. Although promotion of
the security could partly reach the goal of anti-terrorism, that will
influence the efficiency of container supply chain, which is the main
concern when implementing the inspection measurements. This paper
proposes a quick estimation methodology for an inspection service
rate by a berth allocation heuristic such that the inspection activities
will not affect the original container supply chain. Theoretical and
simulation results show this approach is effective.", keywords = "Berth allocation, Container, Heuristic, Inspection.", volume = "4", number = "10", pages = "2093-5", }