2015 Informs Annual Meeting
SB79
INFORMS Philadelphia – 2015
3 - An Empirical Analysis of Sustainable Supply Chain Capabilities and Cross-Value Integration Peiran Gao, Huazhong University of Science and Technology, School of Management, 1037 Luoyu Road, Wuhan, China, gaopeiran2007@126.com, Yeming Gong, Jinlong Zhang Using multi-source data from more than 100 organizations in retailing industry, we apply structural equation modeling to understand nonlinear relationship among cross-value integration, supply chain coordination and integration, and the performance of sustainable supply chain. We find the moderate effect of cross- value integration on the relationship between sustainable supply chain capabilities and operational competencies. 4 - Storage Location and Pick Position Assignment Problem for MIAPP-AS/RS Faraz Ramtin, University of Central Florida, 2011 Puritan Rd, Orlando, FL, 32807, United States of America, faraz.ramtin@ucf.edu, Jennifer Pazour MIAPP-AS/RS is a semi-automated case-level order fulfillment technology. The put-away to the storage locations and replenishment to pick positions are performed by the crane and the in-the-aisle case-picking is done by human order pickers. We develop binary integer models to find the optimal assignment of SKUs to storage locations, as well as to pick positions for a dedicated storage policy. We develop an accelerated Benders Decomposition approach to improve the tractability of the models. Software Demonstration Cluster: Software Demonstrations Invited Session 1 - Simio Simulation and Scheduling Software - Introduction to Simio Simulation and Scheduling Software C Dennis Pegden, CEO and Founder, Simio Simulation and Scheduling Software, Eric Howard Simio is a premier simulation and scheduling software that allows you to expand traditional benefits of simulation to improve daily operations. In this tutorial, we will demonstrate Simio’s 3D rapid modeling capability to effectively solve real problems. Explore how a single tool can be used to not only optimize your system design, but also provide effective planning and scheduling. Come explore the Simio difference and see why so many professional and novice simulationists are changing to Simio. 2 - Forio Simulations - Publishing Interactive Analytics or Operations Research Models on the Web Michael Bean, Co-Founder and President, Forio Simulations Forio’s web platform makes your analytic model available to hundreds of people within your organization through the browser. We will start with an introduction to the platform and example analytics applications. Then we’ll divide the workshop into two parts. In the first part we will teach you how to get your analysis on a server so it can be shared. In the second part we’ll focus on creating a user interface for your model. SB79 79-Room 302, CC
2 - The Spectrum of Anarchy: Algorithmic Game Theory in UAV Routing Michael Couche, University at Buffalo, 342 Bell Hall, Buffalo, United States of America, mjcouche@gmail.com, Nagi Rakesh, Mark Karwan Game theoretic routing approaches lend insight into the price of anarchy that occurs due to decentralization. We can model a team of UAVs using several different approaches, ranging from greedy-based routing, competitive gaming, leader-follower gaming, to cooperative gaming. A comparison of the algorithms used is presented, along with a discussion of using these approaches as a fast routing heuristic that competes with mathematical programming models. 3 - Optimization of UAV Teams Hector Ortiz-pena, CUBRC, Genesee St, Buffalo, United States of America, hector.ortiz-pena@cubrc.org, Michael Hirsch, Moises Sudit, Mark Karwan We develop a formulation to maximize the information gain from a team of autonomous unmanned vehicles (UxVs) to support Intelligence, Surveillance and Reconnaissance (ISR) mission objectives. The formulation is used to evaluate the Price of Anarchy. SC02 02-Room 302, Marriott Cyber-Physical Protection Models and Analysis Cluster: Homeland Security Invited Session Chair: Feng Pan, Research Engineer, Pacific Northwest National Laboratory, P.O. Box 999 MSIN K1-85, Richland, WA, 99352, United States of America, feng.pan@pnnl.gov Co-Chair: Guanhua Yan, Assistant Professor, Binghamton University, Department of Computer Science, Binghamton, NY, 13902, United States of America, ghyan@binghamton.edu 1 - Analytical Framework for Cyber-physical Integrated Assessment: An Overview Matthew Oster, Pacific Northwest National Laboratory, 902 Battelle Blvd, Richland, WA, 99352, United States of America, matthew.oster@pnnl.gov, Casey Perkins Cyber and physical security systems present a unique challenge for security analyses traditionally charged with focusing on only a singular aspect of the system, either physical or cyber. Looking at an integrated security environment requires revisiting vulnerability analysis methods and integrating previously isolated evaluations. This talk will focus on the challenge of creating an integrated modeling framework with both physical and cyber security elements to quantify hidden vulnerability. 2 - A Big Data Approach to Automating Malware Analysis Guanhua Yan, Assistant Professor, Binghamton University, Department of Computer Science, Binghamton, NY, 13902, United States of America, ghyan@binghamton.edu, Yunus Kucuk Thwarting the severe threat posed by the voluminous malware variants demands effective, yet efficient, techniques for malware analysis. We propose a big data framework for automated malware analysis. This framework combines various big data tools to provide a unifying and scalable solution to a wide range of malware analysis tasks, such as classification, clustering, and indexing. We will present our experience with developing this framework, as well as the research challenges ahead. 3 - A Mixed Integer Program for Securing a Cyber-physical System Feng Pan, Research Engineer, Pacific Northwest National Laboratory, P.O. Box 999 MSIN K1-85, Richland, WA, 99352, United States of America, feng.pan@pnnl.gov, Casey Perkins, Samrat Chatterjee, Satish Chikkagoudar, Matthew Oster Securing a modern facility has to consider both cyber and physical aspects. In this talk, we present a set of metrics for measuring facility security. Given the complexity of facilities, simulation models are often used to measure the overall security. Combining simulation results, we introduce a mixed integer programming approach to allocate security assets in both cyber and physical layers for enhancing security of a facility.
Sunday, 1:30pm - 3:00pm
SC01 01-Room 301, Marriott Military O.R. and Applications I Sponsor: Military Applications Sponsored Session
Chair: Michael Hirsch, ISEA TEK, 620 N. Wymore Rd., Ste. 260, Maitland, FL, 32751, United States of America, mhirsch@iseatek.com 1 - An Algorithm for Solving the Convoy Routing Problem Ambika Tiwari, Research Scholar, IIT Madras, DoMS,Delhi
Avenue, 834, Sabarmati Hostel, Chennai, 600036, India, tiwariambika4@gmail.com, Chandrasekharan Rajendran, Hans Zeigler
The problem of routing military convoys from a specific origin to a destination adhering to certain constraints is considered. An algorithm for minimizing the sum of arrival times at destination of the convoys is proposed. Its performance with respect to that of existing algorithm is analyzed. Computational results are presented.
92
Made with FlippingBook