Current Search: Container terminals (x)
View All Items
- Title
- Berth scheduling in container terminals: a proactive approach to address uncertainties in arrival and handling times.
- Creator
- Portal Palomo, Maria I., Ghenai, Chaouki, Kaisar, Evangelos I., Golias, M. M., Graduate College
- Date Issued
- 2013-04-12
- PURL
- http://purl.flvc.org/fcla/dt/3361341
- Subject Headings
- Container terminals, Container terminals Management
- Format
- Document (PDF)
- Title
- An algorithm for the integrated scheduling problem of a container handling system within a container terminal.
- Creator
- Zhao, Yueqiong, Kaisar, Evangelos I., Graduate College
- Date Issued
- 2011-04-08
- PURL
- http://purl.flvc.org/fcla/dt/3164731
- Subject Headings
- Algorithms, Cargo handling, Container terminals
- Format
- Document (PDF)
- Title
- CYBER-PHYSICAL SYSTEMS: BUILDING A SECURITY REFERENCE ARCHITECTURE FOR CARGO PORTS.
- Creator
- Romero, Virginia Mendiola, Fernandez, Eduardo B., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Cyber-Physical Systems (CPS) are physical entities whose operations are monitored, coordinated, and controlled by a computing and communication core. These systems are highly heterogeneous and complex. Their numerous components and cross domain complexity make attacks easy to propagate and security difficult to implement. Consequently, to secure these systems, they need to be built in a systematic and holistic way, where security is an integral part of the development lifecycle and not just...
Show moreCyber-Physical Systems (CPS) are physical entities whose operations are monitored, coordinated, and controlled by a computing and communication core. These systems are highly heterogeneous and complex. Their numerous components and cross domain complexity make attacks easy to propagate and security difficult to implement. Consequently, to secure these systems, they need to be built in a systematic and holistic way, where security is an integral part of the development lifecycle and not just an activity after development. These systems present a multitude of implementation details in their component units, so it is fundamental to use abstraction in the analysis and construction of their architecture. In particular, we can apply abstraction through the use of patterns. Pattern-based architectural modeling is a powerful way to describe the system and analyze its security and the other non-functional aspects. Patterns also have the potential to unify the design of their computational, communication, and control aspects. Architectural modeling can be performed through UML diagrams to show the interactions and dependencies between different components and its stakeholders. Also, it can be used to analyze security threats and describe the possible countermeasures to mitigate these threats. An important type of CPS is a maritime container terminal, a facility where cargo containers are transported between ships and land vehicles; for example, trains or trucks, for onward transportation, and vice versa. Every cargo port performs four basic functions: receiving, storing, staging and loading for both, import and export containers. We present here a set of patterns that describe the elements and functions of a cargo port system, and a Reference Architecture (RA) built using these patterns. We analyze and systematically enumerate the possible security threats to a container terminal in a cargo port using activity diagrams derived from selected use cases of the system. We describe these threats using misuse patterns, and from them select security patterns as defenses. The RA provides a framework to determine where to add these security mechanisms to stop or mitigate these threats and build a Security Reference Architecture (SRA) for CPS. An SRA is an abstract architecture describing a conceptual model of security that provides a way to specify security requirements for a wide range of concrete architectures. The analysis and design are given using a cargo port as our example, but the approach can be used in other domains as well. This is the first work we know where patterns and RAs are used to represent cargo ports and analyze their security.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013737
- Subject Headings
- Cyber-physical systems, Cooperating objects (Computer systems), Container terminals
- Format
- Document (PDF)
- Title
- Berth scheduling in container terminals: a pro-active approach to address uncertainties in arrival and handling times.
- Creator
- Portal Palomo, Maria I., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Ports and container terminals have very complex and dynamic operations. Effective and efficient berth schedules are essential for profitable and sustainable operations. This research studies berth scheduling under uncertainties in arrival and handling times. Port operators usually face challenges in the development of berth schedules. This thesis presents a model formulation of discrete berth space that accounts for uncertainty in arrival and handling times. The problem is reformulated as a...
Show morePorts and container terminals have very complex and dynamic operations. Effective and efficient berth schedules are essential for profitable and sustainable operations. This research studies berth scheduling under uncertainties in arrival and handling times. Port operators usually face challenges in the development of berth schedules. This thesis presents a model formulation of discrete berth space that accounts for uncertainty in arrival and handling times. The problem is reformulated as a biobjective bi-level optimization berth scheduling problem. A solution approach is presented using evolutionary algorithms and heuristics. The objective of the formulation is to provide a robust berth schedule by minimizing the average and the range of the total service times for all vessels served at the terminal. Simulation is utilized to evaluate the proposed berth scheduling policy and compare it to two first-come-first-served policies. Results showed that the proposed berth schedules outperform under high congestion.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3360960
- Subject Headings
- Container terminals, Management, Marine terminals, Management, Transportation, Planning, Freight and freightage
- Format
- Document (PDF)