Service Network Design with Asset Management: Formulations and Comparative Analyzes

Size: px
Start display at page:

Download "Service Network Design with Asset Management: Formulations and Comparative Analyzes"

Transcription

1 Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT

2 Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen 1,2,*,Teodor Gabriel Crainic 3, Marielle Christiansen 1 1 Deartment of Industrial Economics and Technology Management, Norwegian University of Science and Technology, 7491 Trondheim, Norway 2 Institute of Transort Economics, Gaustadalléen 21, 0349 Oslo, Norway 3 Interuniversity Research Centre on Enterrise Networks, Logistics and Transortation (CIRRELT), Université de Montréal, C.P. 6128, succursale Centre-ville, Montréal, Canada H3C 3J7 and NSERC Industrial Research Chair in Logistics Management, Université du Québec à Montréal, C.P. 8888, succursale Centre-ville, Montréal, Canada H3C 3P8 Abstract. In this aer, we address the Service Network Design with Asset Management roblem, SNDAM. This roblem arises when vehicles need to be considered while designing service networks, and integrates a new layer of vehicle management decisions to the service network design roblem that traditionally has considered selection of services (design arcs) and routing of flow. We introduce extended asset management constraints to the roblem and roose alternative formulations of the SNDAM roblem based on new cycle design variables. In the comutational study, we solve test cases reresenting real lanning roblems in order to analyze the strengths and weaknesses of the various model formulations and the imact of asset management considerations on the transortation lan. Exerimental results indicate that formulations based on cycle variables outerform traditional arc-based formulations, and that considering asset management issues may significantly imact the outcome of the service lanning models. Keywords. Service network design, freight transortation, caacitated multicommodity network design, asset management. Acknowledgements. This work has received financial suort from The Norwegian Research Council through the Polcorridor Logchain roject. Partial funding has also been sulied by the Natural Sciences and Engineering Research Council of Canada (NSERC) through its Discovery and Industrial Research Chair grant rograms. Results and views exressed in this ublication are the sole resonsibility of the authors and do not necessarily reflect those of CIRRELT. Les résultats et oinions contenus dans cette ublication ne reflètent as nécessairement la osition du CIRRELT et n'engagent as sa resonsabilité. * Corresonding author: jardar.andersen@iot.ntnu.no Déôt légal Bibliothèque nationale du Québec, Bibliothèque nationale du Canada, 2007 Coyright Andersen, Crainic, Christiansen and CIRRELT, 2007

3 Service Network Design with Asset Management: Formulations and Comarative Analyzes 1 Introduction Transortation is among the most vital industries in a modern economy. Increased cometition and reduced rofit margins in the transort industry have increased the need for efficient oerations for carriers. Simultaneously, there has been a change in attitude among customers with increased focus on service quality. Service roviders in the transort industry are thus facing a more challenging situation than just a few decades ago, and survivability is becoming more deendent of intelligent lanning, design, and execution of oerations. For this urose, decision suort systems and otimization models have been increasingly used to assist in decision-making and resource allocation. There has traditionally been a distinction between three lanning levels in transortation lanning (Crainic and Laorte, 1997, Macharis and Bontekoning, 2004). Strategic lanning deals with long-term issues (several years) like major investments and general develoment olicies. Examles of strategic lanning issues are location of terminals, network configurations, and design and layout of terminals. Tactical lanning covers medium-term issues (tyically weeks, months) such as efficient allocation and utilization of resources. One examle is service network design covering issues like determination of service schedules and routing of flow. Oerational lanning covers short-term issues (real-time, days, weeks) in a dynamic environment where the time factor is articularly imortant. Examles are imlementation and adjustment of schedules for services and dynamic allocation of scarce resources. Service network design models address issues like route selection and terminal olicies, whether to use direct or consolidating services, and how often to oerate (Crainic, 2000). Service network design issues are usually considered to be at a tactical lanning level, but asects of strategic or oerational lanning may also be considered. The resulting formulations are often fixed charge caacitated multicommodity network design (CMND) models. Services are reresented as arcs or aths in the network that may be oerated or not. The fixed charges reresent costs that must be aid for each network arc that is oened, while the network is caacitated because several flows need to share caacities of the arcs that are oened. In order to meet requirements for more intelligent lanning, service network design models are increasingly being made more sohisticated. Simultaneously, advances in comutational caacity and methodological develoment have increased the range of roblems that can be solved. Traditional service network design studies have included two layers: The design layer includes decisions on what services to oerate, while the flow layer focuses on routing the demand in the system. From the alication side, a need for inclusion of a third layer to service network design model has been exressed, namely a layer reresenting assets that are needed to oerate services. The standard aroach has however been to manage such assets in an a osteriori analysis. Vehicles that are needed for oeration of transort services are an examle of such assets. When assets are considered in the service network design rocess, we refer to the resulting models as Service Network Design with Asset Management (SNDAM). In this aer, we study the imact of asset management on service network design. One asset management issue that has been studied in the literature is ensuring that there is an equal number of assets entering and leaving each terminal (node) in the network. Constraints ensuring this are referred to as design balance constraints (Pedersen, 2006; Pedersen et al., 2007). Design balance constraints have been modeled for various modes of transortation, see e.g. Smilowitz et al. (2003), Lai and Lo (2004), Barnhart and Schneur (1996), Kim et al. (1999) and CIRRELT

4 Service Network Design with Asset Management: Formulations and Comarative Analyzes Andersen et al. (2007). However, these constraints and their imact on the service network design models and lans have not been extensively studied in the literature, and most other asset management issues have not been addressed at all. This aer aims to contribute to fill this ga. The goal of this aer is to discuss how service network design models can incororate various asset management issues, and to analyze how the exlicit consideration of asset management issues imacts the solutions that are roduced by service network design models. We resent four alternate formulations of an extended model by introducing cycles as design variables in addition to the more common ath variables for the flow. We comare exerimentally the four model formulations on roblem instances that can be handled through a riori enumeration of columns (cycles and aths). The same set of roblem instances is used as a test bed for evaluating the imact of constraints reresenting various asset management issues. The contributions of the aer are thus twofold. First, it offers a comrehensive modeling framework for SNDAM, together with cycle and ath generation methods exloring the secial structure of the formulations. Second, the aer contributes with an extended analysis of how asset management issues affect service network design. The outline of the aer is as follows. In Section 2, we recall service network design and associated earlier work on asset management. Section 3 resents an extended model for SNDAM. We develo three alternate formulations of the extended SNDAM model in Section 4, and resent algorithms for model solving in Section 5. The comutational study, comaring the different formulations of the extended model and analyzing the imact of asset management issues on service design, is resented in Section 6. Finally, concluding remarks are given in Section 7. 2 Service network design formulations In this section, we recall formulations of service network design from the literature. We introduce the fixed charge caacitated multicommodity network design (CMND) roblem in Section 2.1, CMND being the traditional formulation for service network design roblems. In Section 2.2, we recall the basic formulation of the Service Network Design with Asset Management (SNDAM) roblem, incororating the first asset management issue considered in the service network design literature. 2.1 Fixed charge caacitated multicommodity network design The directed grah G= ( NxA, ) reresents the network, where N is the set of nodes and A the set of arcs. Without loss of generality, we assume that all arcs (, i j) A are design arcs. In this aer, we refer to commodities as roducts P = { } that need to be transorted through the network. Each roduct has a demanded volume w that has to be transorted from the unique origin node of the roduct o to its unique destination node d. Design variables y are binary variables indicating whether an arc is used or not, while the flow variables x are nonnegative real numbers. Each design arc y has an associated caacity u, and a fixed cost f associated with the use of the arc. For each unit of roduct, there is a flow cost + c for traversing arc ( i, j) A. Sets N () i = { j N :(, i j) A } and N () i = { j N :( j,) i A } b = min w, u. The roblem of outward and inward neighbors are defined for each node. Let { } CIRRELT

5 Service Network Design with Asset Management: Formulations and Comarative Analyzes consists of minimizing the sum of fixed costs and flow costs while satisfying all demand, and the arc-based formulation of the CMND roblem is formulated in (1) (5). Min z = f y + c x (, i j) A (, i j) A P (1) w, i = o x x = w, i = d 0, otherwise, ji + j N () i j N () i P x x u y 0 i Nv, Pv, (2), (, i j) Av, (3) b y 0, (, i j) Av, P, (4) x 0, (, i j) Av, P, (5) { } y 0,1, (, i j) Av. (6) The objective function (1) minimizes the sum of fixed costs for oening design arcs and flow costs for all roducts that are transorted through the network. Constraints (2) are node balance constraints for the flow. Constraints (3) and (4) are weak and strong forcing constraints, resectively, defining arc caacities and forcing flows to zero when arcs are not oened. Constraints (4) are redundant in the MIP-formulation, but have aeared to imrove the lower bounds obtained through relaxations (Crainic et al., 2001). The formulation including (4) is the strong formulation, while removal of (4) results in the weak formulation. Constraints (5) and (6) are variable-tye constraints, restricting x to nonnegative real numbers and y variables to binary values. An equivalent network design formulation is based on ath variables for the flow (e.g., Ahuja et al., 1993; Crainic et al., 2000). We define the set of aths L that roduct may use from its origin node to its destination node. For these aths, we define arameters (, i j) A belongs to ath l h a l =1 if arc, while the flow cost for transorting roduct on ath l is l L for roduct, 0 otherwise. The flow of roduct on ath l is l l l k, k = c a. The athbased formulation can then be resented as in (7)-(12). (, i j) A CIRRELT

6 Service Network Design with Asset Management: Formulations and Comarative Analyzes = + l l Min z f y k h (, i j) A P l L (7) l L h l P l L l L a h = w a h, u y l l b y l l 0 P, (8), (, i j) Av, (9) 0, (, i j) Av, P, (10) l h 0, Pv, l L, (11) { 0,1} y, (, i j) Av. (12) The objective function (7) minimizes the sum of fixed costs for oening design arcs and flow costs on aths. Constraints (8) now state that the sum of flow on all aths for a roduct has to equal the demand for this roduct. The other constraints are similar to those of (1)-(6), with the new variables and arameters substituted into the formulation: Strong and weak forcing constraints are found in (9) and (10), resectively, while variable-tye constraints are resented in (11) and (12). We refer to model (1)-(6) as aa-cmnd, because both design variables and flow variables are arcs. Model (7)-(12) is referred to as a-cmnd, because the flow variables are defined in terms of aths. 2.2 Basic SNDAM model In this subsection we define the basic SNDAM model that corresonds to what was labeled Design Balanced Multicommodity Network Design in Pedersen (2006). The basic idea is that there should be an equal number of vehicles leaving and entering a node. We introduce design balance constraints (13) to ensure that all nodes have equal in- and out-degree of oened arcs. y y = 0, + j N () i j N () i ji i Nv. (13) The balancing requirement exressed in (13) has been resent in most design models within maritime and air transortation. For these modes of transortation, the focus is on routing exensive assets in an otimal way, which leads to the requirements for vehicle balance at terminals. Examles of such design studies with balancing requirements are Lai and Lo (2004) who model ferry service network design with balancing constraints for the ferries, and Barnhart and Schneur (1996), who model a balanced exress shiment design roblem for air transort. The literature with design balance constraints is however sarse in traditional service network design. Smilowitz et al. (2003) resent a model for multimodal ackage delivery with design balance constraints for ground vehicles, while Andersen et al. (2007) and Pedersen (2006; see also Pedersen and Crainic, 2007; Pedersen et al., 2007) resent service network design models with design balance constraints for locomotives. CIRRELT

7 Service Network Design with Asset Management: Formulations and Comarative Analyzes All the model formulations resented in Section 2 may be used on a static or a time-sace network. In a time-sace reresentation, the lanning horizon is divided into a set of time eriods, and the nodes in the static network are relicated in each time eriod. Service arcs reresent movements in both time and sace. In addition, holding arcs between consecutive time realizations of hysical nodes reresent the ossibility that assets and flow wait at nodes. The time-sace network increases the size of the network considerably, but allows for analysis of dynamic asects within the lanning horizon. 3 Extended SNDAM model The basic SNDAM model resented in Section 2.2 reresents an imortant ste for imroved reresentation of real-world decisions. There are however additional challenges from real-world roblems that have to be addressed in service network design models. In this subsection we develo an extended SNDAM model with constraints reresenting several asset management issues integrated within the service network design. We introduce relevant definitions and notation in Section 3.1, while the different asset management issues are discussed in Section 3.2. The extended SNDAM model is resented in Section Definitions and notation In this subsection, we resent definitions and notation for the extended SNDAM model. We first discuss the time-sace reresentation of network oerations including holding and reositioning decisions, before resenting the notation in the second subsection Time-sace reresentation of network oerations The asset management asects that we introduce require that we work in a time-sace setting. In the rest of this aer we assume an initial static network, but use a time-sace reresentation where the nodes in the static network are relicated in each time eriod. Figure 1 illustrates a time-sace network with three hysical nodes and four time eriods. The usual reresentation in service network design is to let services with intermediate stos between the origin and destination nodes be reresented as aths in the network, while non-sto services are reresented with single arcs. In this aer, we assume that all services can be reresented as network arcs, as illustrated in Figure 1. This does not affect the generality of the results, but allows us to kee the resentation simler than if we introduced service aths. The solid lines in Figure 1a) reresent design arcs that may be chosen for oeration. In Figure 1b), six design arcs are oened, and these satisfy design balance constraints (13), as all nodes have the same in- and out-degree. CIRRELT

8 Service Network Design with Asset Management: Formulations and Comarative Analyzes t=1 t=2 t=3 t=4 t=1 t=2 t=3 t=4 Node 1 Node 1 Node 2 Node 2 Node 3 Node 3 1a) 1b) Figure 1. Time-sace diagram for a network with three nodes and four time eriods (1a) and examle of feasible service lan (1b). In time-sace networks, holding arcs reresent assets or flow units ket at a hysical node from one time eriod to the next and, thus, link consecutive reresentations in time of the same hysical node. In the following, we assume that the models always have holding arcs for the flow, so that flow units may be ket at a hysical node from one time eriod to the next. Holding arcs for assets should be included unless it is required that the assets should oerate without any idle time. The latter is not usually an advantage, because it considerably restricts the management of the assets. Holding arcs are assumed to have infinite caacity both for assets and for flow. We do not comlicate the model formulation with articular notation and variables for holding arcs. In the rest of this aer we label arcs in the time-sace network that are not holding arcs as movement arcs. We do not include reositioning arcs for the assets. Notice that the design balance constraints (13) ensure that an equal number of assets enter and leave all nodes. Thus, reositioning may be reresented by a service without flow. The restriction imosed by this aroach is that direct reositioning is only ermitted between nodes that are connected with services. This does not imact the generality of the develoment, however, because including exlicit reositioning arcs does not change the structure of the model (but makes the resentation significantly more comlex) Notation We define a time-sace reresentation by dividing the lanning horizon into a set of time eriods T = { t} = { 1,.., TMAX} =. We refer to the grah G' = ( N ', A') for the static service network that is not time-exanded, and to the grah G= ( NxA, ) for the time-sace network. A node i ' N ' in the static service network is referred to as a hysical node, and has T MAX time realizations i N in the time-sace network. Each node i N has an associated time eriod, Ti T, and reresents a hysical node Ni ' N '. We allow services to leave at any time eriod. The service arcs (', i j') A ' are thus available in TMAX realizations, one for each time eriod. The duration of arcs (, i j) A in the time-sace network is the same for all realizations in time of the arcs in the static service network and is equal to Tj Ti. The flow costs on arcs, c, reresent time costs. They are CIRRELT

9 Service Network Design with Asset Management: Formulations and Comarative Analyzes calculated as the roduct of the value of time for a roduct and the traversal time of the arc. The maximum number of vehicles available is MAX V. Products have secific origin nodes in the time-sace network, but no unique destination nodes, because no exlicit delivery due-dates are considered. We introduce sink-destination nodes and zero-cost arcs from all time realizations of a hysical node to the sink-destination node for the roduct considered. Notice that, because roduct arc costs generally are reresented as time costs, this aroach will result in bringing the roducts to their destinations as early as ossible, even though there are no hard constraints reresenting due times. Delivery due dates for roducts may be incororated, however, by increasing the costs on the artificial arcs for the time eriods when a roduct is not allowed to arrive at its destination 3.2 Asset management issues We refer to the model formulation in Section 2.2 as the basic SNDAM model. We resent three extensions based on ideas from real-world alications Fleet size and asset costs In many service network design studies, secific fleet sizes for articular assets have to be resected. This is tyically the case for roblems that are closer to oerational-level lanning, where the degrees of freedom are fewer than in higher-level lanning. By introducing a set of new constraints to the model, we are able to connect the design variables to vehicle utilization. We assume that there is an uer bound on the number of vehicles, V MAX, and state in (14) that V MAX is an uer bound on the number of oerations that may be erformed in each time eriod. y VMAX (, i j) A : T i t< T j, t T. (14) The fleet of vehicles is assumed to be given and the objective function in the model is not directly affected by how these vehicles are managed. It may still be useful to include an otion to not utilize all vehicles in the fleet. By introducing a vehicle utilization cost, f, we let the model determine the minimum number of vehicles required to erform the transortation services for the given demand. The idea is not to include asects of investment analysis with trade-offs between fixed costs for vehicles and flow costs for roducts, but rather to investigate whether the fleet size could be reduced. Vehicles (assets) oerate not only when roviding service, but also to move from one service to the next. Thus, introducing vehicle utilization costs require the reresentation of the comlete vehicle workload. We resent this reresentation in Section We take this oortunity, however, to notice that, in this case, the fixed costs for oening arcs associated in the objective functions (1) and (7) to the cost of selecting/oerating services, is not really required any more. Therefore, in the rest of this aer, we will relace these fixed costs with the vehicle (asset) utilization costs Frequency constraints Secific lower and uer bounds may be imosed on service frequencies, i.e., on the number of occurrences of each service arc in the time-sace setting. These bounds may come from oerational requirements like this service should be oerated at least three times, but not more than six times a CIRRELT

10 Service Network Design with Asset Management: Formulations and Comarative Analyzes week (Andersen et al., 2007). We label lower and uer frequencies on service arcs ( i', j') A ', L i' j' and U i' j', resectively. The constraints are formulated in (15). L y U i' j' i' j' (, i j) A: N = i' UN = j' i j, (', i j') A ' v. (15) Several model runs would rovide the means to evaluate the cost of meeting these requirements, which might be imortant inut to decision-makers. If the costs for meeting such requirements are high, it might be worthwhile to reconsider whether these constraints are necessary for the case that is considered Route length constraints In many lanning roblems there is the need for reetitiveness in asset rotations. Considering crew management, for examle, this reresents the requirements that eole should leave their hometown every Monday morning. For vehicles, it may be that individual vehicles should oerate the same attern of services in all relications of the lanning horizon, even if these vehicles belong to fleets of homogenous vehicles. We use Figure 2 to illustrate this idea. Time TMAX Node 1 Nodes in hysical network Node 2 Node 3 Node 4 Node 5 Figure 2. Time-sace network with asset routes with length equal to two lanning horizons. In Figure 2, we have two assets that are used to oen design arcs in a cyclic time-sace network, and node balance constraints (13) are satisfied at all nodes. However, we observe that the assets interchange the arcs they cover at every second time eriod. It thus takes two reetitions of the lanning horizon for the assets to return to their initial attern. In other words, the route length for the assets corresonds to two times the length of the lanning horizon. The requirement that we want to address is that these assets routes are limited to the length of the lanning horizon. The oerations in Figure 2 will not be feasible if we imose such route length constraints. In order to cature the route length asect, the model needs to have a more exlicit V = v = 1,.., VMAX =. In addition, we reresentation of the vehicles. We introduce a set of vehicles { } { } need binary decision variables for each vehicle, δ v =, indicating whether it is used or not. The decision variables for design arcs y, have to be indexed for vehicles v, thus the new decision variables are y v. When this change is imlemented, we will have node balance constraints for each CIRRELT

11 Service Network Design with Asset Management: Formulations and Comarative Analyzes individual vehicle, not for the fleet of vehicles. The route length constraints (16) ensure that in each time eriod, each vehicle that is selected for oeration is engaged in one activity only. (, i j) A : T t< T : i j y v δ = 0, v t T, v V. (16) Observe that, with route length requirements, the asset movements constitute cycles in the time-sace network with length equal to the length of the lanning horizon, as is the case in Figure 1. It might seem that the strict cycle length of a single lanning horizon imoses a rigid structure, but, as illustrated in Figure 3, the reresentation allows the oeration of cycles shorter than this length. Time TMAX Node 1 Nodes in hysical network Node 2 Node 3 Node 4 Node 5 Figure 3. Examles of asset cycles in a time-sace network. The black arcs in Figure 3 corresond to oerations that satisfy the route length constraints, the length of the resulting cycle being equal to one lanning horizon. In the static service network, this time-sace cycle consists of two cycles, one from node 3 at time 1 to node 3 at time 4, and one from node 3 at time 4 to node 3 at time 1. The grey arcs in Figure 3 reresent another examle of a feasible vehicle rotation. With three holding arcs, including the one from time T MAX to time 1, the oerating cycle lasts for four time eriods only. There is thus flexibility in the system even when route length restrictions are imosed. 3.3 Extended SNDAM model Adding the extensions of Section 3.2 to the basic SNDAM formulation defined in Section 2 yields the model defined by exressions (17)-(27). The rest of this aer will be based on this formulation, which we label extended SNDAM. CIRRELT

12 Service Network Design with Asset Management: Formulations and Comarative Analyzes Min z = c x + f δ v (, i j) A P v V (, i j) A : T t< T : i y j y v v + j N () i j N () i v V y v 1, δ = 0, v y = 0, jiv L y U i' j' v i' j' (, i j) A : N = i' UN = j' i j, (17) t T, v V, (18) i Nv, v V, (19) (, i j) A, v (20) (', i j') A ' v, (21) w, i = o x x = w, i = d 0, otherwise, ji + j N () i j N () i P x x u y v v V b y v v V 0 P, i Nv, (22), (, i j) A, v (23) 0, (, i j) Av, P, (24) x 0, (, i j) Av, P, (25) v { 0,1} y, (, i j) A, v V, (26) v { 0,1} δ, v V. (27) The objective function (17) minimizes the total system cost comuted as the sum of the flow costs and of the costs associated with using the assets. Constraints (18) state for each time eriod that if an asset is utilized, it should be engaged in one activity only. These are the route length constraints that were introduced in Section Constraints (19) are the design balance constraints, while relations (20) ensure that only one vehicle can oerate an arc( i, j) A, which is analogous to the binary y variables in the basic SNDAM formulation (1)-(6) and (13). Lower and uer bounds on service frequencies are enforced by constraints (21), while flow balance is ensured through equations (22). Constraints (23) and (24) are the weak and strong forcing constraints, resectively, where we now aggregate over all vehicles. Finally, variable-tye constraints are given in (25) to (27). CIRRELT

13 Service Network Design with Asset Management: Formulations and Comarative Analyzes 4 Alternate formulations of the extended SNDAM model Solution aroaches for CMND models are based on either arc- or ath-based formulations referring to the decision variables associated to roduct flows, as discussed in Section 2.1. Obviously, a athbased formulation also exists for the basic SNDAM model. Notice that, when design balance constraints are introduced, the selection of the design arcs follows closed ath-like structures. Indeed, while roduct aths must start and end at different nodes, namely the origin and destination nodes of the roduct demands, the aths of design variables must return to their starting nodes, at a different time eriod, to satisfy the design balance constraints. Selected design variables thus form cycles and, when route length constraints are imosed, these cycles cover all time eriods exactly once. Examles of such cycles were found in Figure 3. Four different reresentations of the extended SNDAM model can be written using the two different reresentations for the flow variables and the two reresentations for the design variables. To distinguish them, we introduce the following naming scheme for the SNDAM formulations: yx-sndam, where y = a or c, deending of whether design variables are defined in terms of arcs or cycles x = a or, deending of whether flow variables are defined in terms of arcs or aths The extended model formulation (17) - (27) is therefore aa-sndam. In the following subsections we resent the three other formulations to the extended SNDAM model. 4.1 Arc-Path formulation of SNDAM We define aths L for roduct as in Section 2.1, and arameters to ath l L for roduct, 0 otherwise. The flow of roduct on ath l is l l l cost for transorting roduct on ath l is k, k = c a SNDAM (arc-based design, ath-based flow variables): (, i j) A l a =1 if arc ( i, j) A belongs l h, while the flow. We can then formulate a- CIRRELT

14 Service Network Design with Asset Management: Formulations and Comarative Analyzes l l Min z = k h + f δv P l L v V (28) (, i j) A : T t< T : i y j y v v + j N () i j N () i v V y v 1, δ = 0, v y = 0, jiv L y U i' j' v i' j' (, i j) A : N = i' UN = j' l L h l P l L l L a h i = w a h j, u y l l v v V b y l l v v V, 0 t T, v V, (29) i Nv, v V, (30) (, i j) A, v (31) (', i j') A ' v, (32) P, (33), (, i j) A, v (34) 0, (, i j) A, P, v (35) l h 0, Pv, l L, (36) v { 0,1} y, (, i j) A, v V, (37) v { 0,1} δ, v V. (38) The objective function (28) minimizes the sum of flow costs on aths and fixed costs for assets. Constraints (29)-(32) are identical to (19)-(22). The major change from model formulation (17)-(27) is reresented by constraints (33) stating that for each roduct, the sum of the flows on all aths need to equal the demand. These constraints relace the flow balance constraints (22) of aa- SNDAM, which are ensured by the ath definition. As in revious formulations, inequalities (34) and (35) are the weak and strong forcing constraints, resectively, while the variable-tye constraints are resented in (36)-(38). 4.2 Cycle-Arc formulation of SNDAM We introduce cycle design variables k g,{ k} Kv, equal to 1 if cycle kvis in the solution, and 0 k otherwise. We also define arameter r vequal to 1 if arc ( i, j) A is in cycle kv, 0 otherwise. We may then formulate the ca-sndam model (cycle-based design, arc-based flow variables), where route length constraints enforce the requirement that selected cycles cover all time eriods in the time-sace reresentation. The cycles in Figure 3 are examles of feasible asset cycles. Notice that, CIRRELT

15 Service Network Design with Asset Management: Formulations and Comarative Analyzes we no longer need the asset decision variables, because each selected cycle reresents a unit of asset (a vehicle). The cycle-arc version of the extended SNDAM model is resented in (39)-(47): Min z = c x + f g k (, i j) A P k K (39) k K k K k g VMAX rg k k, 1, (, i j) A, (41) L rg U k k i' j' i' j' k K (, i j) A: NOD = i' UNOD = j' i j w, i = o x x = w, i = d 0, otherwise, ji + j N () i j N () i P x x u r g k k k K b r g k k k K 0, (40) (', i j') A ' v, (42) P, i Nv, (43), (, i j) A, v (44) 0, (, i j) Av, P, (45) x 0, (, i j) Av, P, (46) { 0,1} k g, k Kv. (47) The objective function (39) minimizes the sum of the flow distribution costs and fixed costs for the assets that are selected and used. The structurally new constraint is (40). This constraint restricts the cycle selection, stating that the number of selected cycles is limited by the size of the V = 1,.., VMAX =in the aa- available fleet of assets. This roerty was ensured by the dimension of set { } SNDAM and a-sndam formulations. Constraints (41) state that each arc( i, j) A can be chosen by at most one cycle, which is analogous to constraints (20). In relations (42) we set the lower and uer bounds on service frequencies, while flow balance is ensured through constraints (43). Weak and strong forcing constraints are formulated in (44) and (45), resectively, while variable-tye constraints are found in (46) and (47). 4.3 Cycle-Path formulation of SNDAM We can combine ath variables for the flow and cycle variables for the design arcs. The cycle-ath formulation is resented in (48)-(56), where the objective function (48) minimizes the sum of the flow costs on aths and fixed costs for assets utilized on cycle routes. The fleet size restriction aears in (49), while selection of arc disjoint cycles is enforced by constraint (50). Lower and uer bounds on service frequencies are formulated in constraints (51), while demand satisfaction is CIRRELT

16 Service Network Design with Asset Management: Formulations and Comarative Analyzes rovided by relations (52). Weak and strong forcing constraints are found in (53) and (54), resectively, while variable-tye constraints aear in constraints (55) to (56). Min z = k h + f g k K P l L k g VMAX l l k, k K (48) (49) k K rg k k 1, (, i j) A, (50) L rg U k k i' j' i' j' k K (, i j) A: NOD = i' UNOD = j' i j, (', i j') A ' v, (51) l L h l = w, P, (52) P l L a h u r g l l k k k K 0, (, i j) A, v (53) l L a h b r g l l k k k K 0, (, i j) Av, P, (54) l h 0, Pv, l L, (55) { 0,1} k g, k Kv. (56) 5 Algorithms for ath and cycle generation CMND models may be solved in a variety of ways, see for instance Magnanti and Wong (1984) and Gendron et al. (1999). The develoment of articular methods for the models roosed is well beyond the scoe of this aer. Our goal is rather to comare the different formulations of the extended SNDAM model in order to identify their strengths and weaknesses with resect to comutational efficiency, and to study the imact of asset management considerations. We erform this comarison on roblem instances where all aths and cycles have been generated a riori. This avoids the unnecessary burden of develoing rogressive variable generation-based rocedures that, together with meta-heuristics, are required to address larger instances and should be the scoe of future work. We describe algorithms for generation of flow aths and design cycles in Sections 5.1 and 5.2, resectively. CIRRELT

17 Service Network Design with Asset Management: Formulations and Comarative Analyzes 5.1 Path generation We now resent an algorithm for comlete a riori generation of flow aths. We assume that there are no connections between nodes of the same time eriod and that the ath length cannot exceed the length of the lanning horizon. The algorithm considers all outgoing arcs from the origin node of a roduct. For each of these arcs, a ath, reresented as a linked list is created. These aths constitute an initial ool of candidate aths. The algorithm then traverses all nodes, starting from the closest successor among the nodes that are reached by the outgoing arcs from the origin node. For all candidate aths whose last node so far is the current node, the candidate aths are udated with the outgoing arcs from these nodes. When a node belonging to the roduct hysical destination node is reached, a feasible roduct ath from origin to destination is found. A dominance rule is introduced to avoid an exonentially growing number of aths as a consequence of the existence of holding arcs: If a candidate ath has already visited a hysical node, it should not return to the same hysical node later, since using the uncaacitated holding arcs in this case is at least as chea as using movement arcs. The algorithm is resented in Figure 4. forall( in Product) do forall(arcs starting in the roduct s origin) do create candidate list based on the arc; end-do define candidate nodes to be nodes from the time eriod after the roduct becomes available to the end of the lanning horizon, and again starting from the first eriod until two time eriods before the roduct becomes available; forall(candidate nodes) do forall(candidate lists where last node = this node) do forall(emanating arcs of the candidate node) do if(destination node of arc belongs to the roduct s destination node) then a ath has been found, store it; else if(visited=false for the aurtenant hysical node) then if(destination of arc is reached without crossing the time eriod where the roduct becomes available) then add arc to candidate ath; visited of aurtenant hysical node of candidate ath=true; end-if else if(the origin and destination of the arc have the same aurtenant hysical node) then add arc to candidate ath; end-if end-if end-if end-do end-do end-do end-do Figure 4. Pseudo-code for the ath generation algorithm. 5.2 Cycle generation A cycle is a set of consecutive arcs in the time-sace network, a ath, with length equal to the length of the lanning horizon, and closed such that one will return to the initial node after traversing all the arcs. To build cycles, we start with all arcs emanating from nodes in the first time eriod, and define each of these arcs to be the first arc in a candidate ath. Then, for nodes in time eriod 2 and CIRRELT

18 Service Network Design with Asset Management: Formulations and Comarative Analyzes later, we check if the candidate aths have this node as their current last node. In the affirmative, the outgoing arcs of this node are added to these candidate aths. Thus, for examle, if there are three emanating arcs at a node, each candidate ath that has this node as its current last node yields three candidate aths, one for each emanating arc. If the destination node of such an outgoing arc is the origin node of the candidate ath, a cycle has been found. However, if the destination node of the arc is such that the length of the candidate ath is longer than or equal to the length of the lanning horizon and no cycle has been established, then this candidate ath is not udated with the arc, because it cannot result in a feasible cycle covering all time eriods in the lanning horizon exactly once. When all arcs have duration of one time eriod, this aroach is sufficient to create all ossible cycles. However, when arcs with longer durations exist, aths that do not include nodes at eriod 1 may be overlooked. To avoid such a case, we include a second hase where candidate aths are established from all arcs that are cross-horizon arcs (origin node has a smaller node number than the destination node) and end after time eriod 1. The algorithm for cycle generation thus consists of three hases, where the two first hases generate initial candidate aths and the third hase traverses the network and searches for cycles. In Figure 5 we illustrate one cycle, solid lined, which would be created from the first hase of the algorithm, and a dotted cycle that would be created from the second hase of the algorithm. Time TMAX Nodes in hysical network Node 1 Node 2 Node 3 Node 4 Figure 5. Cycles that are created from the first (solid) and second (dotted) hase of the algorithm. There are no restrictions on asset movement during the cycle generation. Thus, for instance, a vehicle may enter and leave a terminal (node) several times throughout a weekly lanning horizon. The algorithm for cycle generation is summarized in Figure 6. 6 Comutational study The urose of the comutational study is to evaluate the erformance of the different formulations of the extended SNDAM model with resect to solution times - and to study the effect of asset management on solution times and on the lans obtained from the models. For cycles and aths, we use the a riori generation rocedures resented in Section 5. We are interested, in articular, whether the introduction of cycles seems useful and, if this is the case, under what circumstances do the associated formulations erform well. CIRRELT

19 Service Network Design with Asset Management: Formulations and Comarative Analyzes To exlore these issues, we create a set of roblem instances with varying dimensions. On the one hand, we create instances with 15, 20, and 25 time eriods, and 15, 20, and 25 roducts, roducing 9 scenarios. On the other hand, we exlore two different network densities, reresenting sarse and dense networks, building networks with 5 hysical nodes and 10 and 15 arcs in each time eriod, resectively. Finally, we generate three 15 arcs and 15 time eriods scenarios where we increased the number of roducts to 50, 100 and 200. The 21 data sets and corresonding scenarios are labeled nwaxtyz, where w is the number of hysical nodes, x is the number of hysical arcs excluding holding arcs, y is the number of time eriods, and z is the number of roducts. We work with the strong formulations of the roblem throughout the comutational study, imlying that the strong forcing constraints are included in the formulations. This increases the size of the roblems considerably, which again reduces the tractable roblem dimensions. Yet, because for general CMND models the strength of the linear relaxations is imroved significantly when strong forcing constraints are considered, we find it relevant to consider the strong formulations for the SNDAM as well. Initialization hase 1 forall(nodes in first time eriod) do forall(emanating arcs) do create candidate ath based on the arc; end-do end-do Initialization hase 2 forall(nodes after first time eriod) do forall(emanating arcs) do if(the arc is a cross-horizon arc and ends after the first eriod) then create candidate ath based on the arc; end-if end-do end-do Joint cycle generation hase forall(nodes after first time eriod) do forall(candidate aths where last node = this node) do forall(emanating arcs of this node) do if(destination of arc = the aths origin) then a cycle has been found, store it; else if(destination of arc > the aths origin) then ski arc because we cannot make a cycle; else add arc to candidate ath; end-if end-if end-do end-do end-do Figure 6. Pseudo-code for the cycle generation algorithm. We comare the four SNDAM formulations in Section 6.1 using the 21 scenarios defined above. To make a stronger claim on the reresentativeness of the results, we also comare the formulations on five additional data sets generated for a subset of the scenarios. Section 6.2 is dedicated to the study of the imact of the asset management issues. We choose a subset of the scenarios from Section 6.1 and examine how solution times and otimal integer solution values are affected by the various asset management issues of the extended SNDAM model. CIRRELT

20 Service Network Design with Asset Management: Formulations and Comarative Analyzes The solution times of the arc-based formulations are sensitive to the fleet size, because a large number of vehicles introduces symmetry and increases the number of binary design variables. To mitigate this imact, we always solve the cycle-based formulations first, and use the resulting otimal number of vehicles as the asset fleet size when solving the arc-based formulations. All formulations are modeled in XPRESS-IVE version and matrix files are created on a comuter with an Intel Dual Core 2,3Ghz rocessor and 2GB memory. The matrix files are imorted to CPLEX and solved using a 2.4 GHz AMD Oteron 250 rocessor with 16GB memory. The algorithms for a riori generation of flow aths and design cycles are imlemented in Visual C Comaring the SNDAM formulations Table 1 dislays solution times for finding the otimal integer solution for the four formulations of the extended SNDAM roblem in columns 1 to 4, resectively. All roblems were run for 10 hours ( CPU seconds). No integer is marked when no integer solution was found within 10 hours of CPU time. The ga between the lower and uer bounds at termination is reorted when integer solutions were found, but otimality could not be roven within 10 hours of CPU time. The last two columns of Table 1 dislay the gas between the strong linear relaxations at the root node of the branch-and-bound with the two arc- and the two cycle-based formulations, resectively, and the best integer solution obtained within 10 hours of CPU time with any of the four formulations. For most of the instances, this integer solution was the otimal integer solution of the roblem. These gas gave an indication of the tightness of the strong linear relaxations of the formulations. We observe from Table 1 that the cycle-based formulations erform very well comared to the formulations with design arcs. In all scenarios, the fastest solution time was obtained with one of the cycle-based formulations. It is not so that both cycle-based formulations are the best for all the roblems but, in general, they outerform the arc-based formulations. One interesting observation is that for given numbers of hysical arcs and roducts, increases in the number of time eriods increases the solution times for the cycle-based formulations. The reason for this is that the number of cycles grows exonentially with the number of time eriods. For arc-based formulations, however, we observe the oosite effect in several cases; the solution times are reduced with an increased number of time eriods. To exlain this, we observe that for a given demand and duration of the arcs, one vehicle can oerate more services during the lanning horizon with more time eriods, and fewer vehicles are thus needed to cover the demand. The latter reduces the roblem with symmetry in the arc-based formulations, which are based on vehicle-indexed design arcs. However, if we increase the number of roducts for a given number of time eriods, the solution time increases also for the arc-arc and arc-ath formulations. To summarize the discussion, cyclebased formulations aear to erform significantly better than the formulations with design arcs, and the difference in solution times increases if the ratio between volumes shied and number of time eriods increases. CIRRELT

21 Service Network Design with Asset Management: Formulations and Comarative Analyzes Table 1. Solution times (CPU seconds) and gas between strong linear relaxation at root node and best integer solution. Otimality ga is reorted if solution time exceeds sec. Problem Arc-arc Arc-ath Cycle-arc Cycle-ath Strong LP-ga Strong LP-ga solution time solution time solution time solution time aa and a ca and c n5a10t % 9 % n5a10t % 6 % n5a10t % 5 % n5a10t % 3 % n5a10t % 4 % n5a10t % 4 % n5a10t1525 ga 3.6% ga 4.5% % 4 % n5a10t2025 ga 6.0% ga 3.9% % 2 % n5a10t % 3 % n5a15t <0.5 <0.5 9 % 0.5 % n5a15t % 6 % n5a15t % 0.0 % n5a15t % 1 % n5a15t % 1 % n5a15t2520 ga 1.5% ga 3.0% % 2 % n5a15t1525 ga 4.6% ga 4.8% % 5 % n5a15t2025 ga 4.1% ga 4.1% % 4 % n5a15t % 0.2 % n5a15t1550 ga 10.9% ga 8.4% % 2 % n5a15t15100 No integer ga 10.4% ga 0.8% ga 0.7% 9 % 2 % n5a15t15200 No integer No integer ga 0.6% ga 0.5% 20 % 1 % Caacitated multicommodity fixed charge network design roblems usually have oor linear relaxations (Gendron and Crainic, 1996), which is one imortant reason for the difficulty associated with addressing CMND models. In the last two columns of Table 1, we reort the ga between the strong linear relaxation at the root node of the branch-and-bound tree with arc- and cycle-based formulations, and the best integer solution that was obtained for the secific instance with any of the four formulations. Table 1 indicates that there is a significant difference between the formulations with arc-based and cycle-based design variables when it comes to the strength of the linear relaxation. While the arc-arc and the arc-ath formulations tyically yield gas from 5% to 20%, the cycle-arc and cycle-ath formulations dislay gas from 1% to 5%. This weakness of the lower bounds contributes certainly to the long solution times of the arc-arc and the arc-ath formulation reorted in Table 1. The results of the comutational study thus indicate that the introduction of cycle-based design variables constitutes a romising research direction for efficient solution methods for service network design roblems with asset management. For the last three scenarios reorted in Table 1, the number of roducts is increased towards more realistic values. We observe that the cycle-based formulations become more difficult to solve when the dimensions of the roblems increase; otimal solution cannot be roved for the 100 and 200 roduct roblem instances within 10 hours of CPU time. However, the cycle-based formulations still outerform arc-based formulations. For 200 roducts, none of the arc-based formulations roduce integer solutions, while for 100 roducts, only one integer solution is found for the arc-ath formulation, with an otimality ga of 10.4% after 10 hours of CPU time. We thus conclude that cycle-based formulations offer the most attractive ersective for designing solution methods for this class of roblems. CIRRELT

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

A Brief Overview of Intermodal Transportation

A Brief Overview of Intermodal Transportation A Brief Overview of Intermodal Transortation Tolga Bektas Teodor Gabriel Crainic January 2007 CIRRELT-2007-03 Tolga Bektas 1, Teodor Gabriel Crainic 1,* 1 Interuniversity Research Centre on Enterrise Networks,

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

Large firms and heterogeneity: the structure of trade and industry under oligopoly

Large firms and heterogeneity: the structure of trade and industry under oligopoly Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems

Optimal Routing and Scheduling in Transportation: Using Genetic Algorithm to Solve Difficult Optimization Problems By Partha Chakroborty Brics "The roblem of designing a good or efficient route set (or route network) for a transit system is a difficult otimization roblem which does not lend itself readily to mathematical

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

IEEM 101: Inventory control

IEEM 101: Inventory control IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

Piracy and Network Externality An Analysis for the Monopolized Software Industry

Piracy and Network Externality An Analysis for the Monopolized Software Industry Piracy and Network Externality An Analysis for the Monoolized Software Industry Ming Chung Chang Deartment of Economics and Graduate Institute of Industrial Economics mcchang@mgt.ncu.edu.tw Chiu Fen Lin

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Jena Research Papers in Business and Economics

Jena Research Papers in Business and Economics Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

Sage Document Management. User's Guide Version 13.1

Sage Document Management. User's Guide Version 13.1 Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm

More information

Improved Algorithms for Data Visualization in Forensic DNA Analysis

Improved Algorithms for Data Visualization in Forensic DNA Analysis Imroved Algorithms for Data Visualization in Forensic DNA Analysis Noor Maizura Mohamad Noor, Senior Member IACSIT, Mohd Iqbal akim arun, and Ahmad Faiz Ghazali Abstract DNA rofiles from forensic evidence

More information

An Introduction to Risk Parity Hossein Kazemi

An Introduction to Risk Parity Hossein Kazemi An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Service Design Models for Rail Intermodal Transportation

Service Design Models for Rail Intermodal Transportation Service Design Models for Rail Intermodal Transportation Teodor Gabriel Crainic February 2007 CIRRELT-2007-04 Teodor Gabriel Crainic 1,* 1 Interuniversity Research Centre on Enterprise Networks, Logistics

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Sage Document Management. User's Guide Version 12.1

Sage Document Management. User's Guide Version 12.1 Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

An Associative Memory Readout in ESN for Neural Action Potential Detection

An Associative Memory Readout in ESN for Neural Action Potential Detection g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

Service Network Design with Management and Coordination of Multiple Fleets

Service Network Design with Management and Coordination of Multiple Fleets ervice Network Design with Management and Coordination of Multiple Fleets Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen July 2007 CIRRELT-2007-21 ervice Network Design with Management and

More information

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo

Partial-Order Planning Algorithms todomainfeatures. Information Sciences Institute University ofwaterloo Relating the Performance of Partial-Order Planning Algorithms todomainfeatures Craig A. Knoblock Qiang Yang Information Sciences Institute University ofwaterloo University of Southern California Comuter

More information

Rejuvenating the Supply Chain by Benchmarking using Fuzzy Cross-Boundary Performance Evaluation Approach

Rejuvenating the Supply Chain by Benchmarking using Fuzzy Cross-Boundary Performance Evaluation Approach ICSI International Journal of Engineering and echnology, Vol.2, o.6, December 2 ISS: 793-8236 Rejuvenating the Suly Chain by Benchmarking using uzzy Cross-Boundary erformance Evaluation roach RU SUIL BIDU,

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

An effective multi-objective approach to prioritisation of sewer pipe inspection

An effective multi-objective approach to prioritisation of sewer pipe inspection An effective multi-objective aroach to rioritisation of sewer ie insection L. Berardi 1 *, O.Giustolisi 1, D.A. Savic 2 and Z. Kaelan 2 1 Technical University of Bari, Civil and Environmental Engineering

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China The current issue and full text archive of this journal is available at www.emeraldinsight.com/2044-1398.htm CFRI 3,4 322 constraints and cororate caital structure: a model Wuxiang Zhu School of Economics

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents

Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents Situation Based Strategic Positioning for Coordinating a Team of Homogeneous Agents Luís Paulo Reis, Nuno Lau 2 and Eugénio Costa Oliveira LIACC Artificial Intelligence and Comuter Science Lab., University

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

On Traffic Fairness in Data Center Fabrics

On Traffic Fairness in Data Center Fabrics On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

A Certification Authority for Elliptic Curve X.509v3 Certificates

A Certification Authority for Elliptic Curve X.509v3 Certificates A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena

More information

Software Cognitive Complexity Measure Based on Scope of Variables

Software Cognitive Complexity Measure Based on Scope of Variables Software Cognitive Comlexity Measure Based on Scoe of Variables Kwangmyong Rim and Yonghua Choe Faculty of Mathematics, Kim Il Sung University, D.P.R.K mathchoeyh@yahoo.com Abstract In this aer, we define

More information

An optimal batch size for a JIT manufacturing system

An optimal batch size for a JIT manufacturing system Comuters & Industrial Engineering 4 (00) 17±136 www.elsevier.com/locate/dsw n otimal batch size for a JIT manufacturing system Lutfar R. Khan a, *, Ruhul. Sarker b a School of Communications and Informatics,

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND

STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Interbank Market and Central Bank Policy

Interbank Market and Central Bank Policy Federal Reserve Bank of New York Staff Reorts Interbank Market and Central Bank Policy Jung-Hyun Ahn Vincent Bignon Régis Breton Antoine Martin Staff Reort No. 763 January 206 This aer resents reliminary

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

An Efficient NURBS Path Generator for a Open Source CNC

An Efficient NURBS Path Generator for a Open Source CNC An Efficient NURBS Path Generator for a Oen Source CNC ERNESTO LO VALVO, STEFANO DRAGO Diartimento di Ingegneria Chimica, Gestionale, Informatica e Meccanica Università degli Studi di Palermo Viale delle

More information

Free Software Development. 2. Chemical Database Management

Free Software Development. 2. Chemical Database Management Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you

More information