A Collaborative Berth Planning Approach for Disruption Recovery

X. Lyu*, R.R. Negenborn, Xiaoning Shi, F. Schulte

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

20 Downloads (Pure)

Abstract

Traditionally, terminal operators create an initial berthing plan before the arrival of incoming vessels. This plan involves decisions on when and where to load or discharge containers for the calling vessels. However, disruptive unforeseen events (i.e., arrival delays, equipment breakdowns, tides, or extreme weather) interfere with the implementation of this initial plan. For terminals, berths and quay cranes are both crucial resources, and their capacity limits the efficiency of port operations. Thus, one way to minimize the adverse effects caused by disruption is to ally different terminals to share berthing resources. In some challenging situations, terminal operators also need to consider the extensive transshipment connections between feeder and mother vessels. Therefore, in this work, we investigate a collaborative variant of the berth allocation recovery problem which focuses on the collaboration among terminals and transshipment connections between vessels. We propose a mixed-integer programming model to (re)-optimize the initial berth and quay crane allocation plan and develop a Squeaky Wheel Optimization metaheuristic to find near-optimal solutions for large-scale instances. The results from the performed computational experiments, considering multiple scenarios with disruptive events, show consistent improvements of up to 40% for the suggested collaborative strategy (in terms of costs for the terminal operators).
Original languageEnglish
Pages (from-to)153-164
JournalIEEE Open Journal of Intelligent Transportation Systems
Volume3
DOIs
Publication statusPublished - 2022

Keywords

  • Collaborative berth planning
  • disruption recovery
  • mixed-integer program
  • metaheuristic

Fingerprint

Dive into the research topics of 'A Collaborative Berth Planning Approach for Disruption Recovery'. Together they form a unique fingerprint.

Cite this