• 沒有找到結果。

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Appendix B

Simulated Annealing Method

In this Appendix, we summarize the simulated annealing method which is reported by Kirk-patrick et al. [14] and Laarhoven and Aarts [24]. Simulated annealing is an effective method for finding a good optimal solution to an optimization problem. Usually, finding an optimal solu-tion for some optimizasolu-tion can be a difficult task. This is not only because when the problem becomes sufficiently large we need to search enormous number of feasible solutions to find the optimal, but also because even using modern computing methods there are still too many feasible solutions to consider. In our model, we need to search five parameters, which areM, pM, pL, h, andm. The vector xk denotes the five parameters at state k in the searching precess, and f(x) is the objective function of our optimization model. It has over 90 million feasible solutions to be considered. Therefore, we can extremely decrease computing time via simulated annealing.

Firstly, let us figure out how simulated annealing works. The main idea of simulated anneal-ing algorithm is inspired from the procedure of annealanneal-ing in metallurgy. Annealanneal-ing involves heating and cooling a metal to change its internal structure and physical properties. When the structure becomes fixed, metal consequently can retain its new obtained properties. So, in simu-lated annealing, we will set up a parameter called temperature to simulate the heating or cooling process. As the algorithm runs, the temperature will be allowed to decrease slowly. While the temperature parameter at high value, the simulated annealing algorithm will be allowed to accept feasible solutions that are worse than the current solution more frequency. This useful property

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

gives the algorithm the ability to jump out of the local optimums. Therefore, simulated anneal-ing algorithm is remarkably effective for findanneal-ing a close to optimum solution when dealanneal-ing with searching numerous local optimums.

Secondly, before shows the algorithm, we should introduce the acceptance probability func-tion. Since simulated annealing will occasionally accept worse solutions, it depends on Boltz-mann’s function to decide which solutions to accept. That is

PR(f(xk)) =min{1, e

(−∆ f Tk

)

},

wherePR(f(xk))is the probability that the algorithm will accept the current statexk,∆ f is the difference of the objective function value between current statexkand the previous state xk1, andTkis the control temperature in statek. After having the PR(f(xk)), we compute a random variableV between 0 and 1 to compare with it. If V >PR(f(xk)), then we abandon the statexk, otherwise accept it. Eventually, in our algorithm, we check if the neighbor solution is better than our current solution. If it is, we accept it unconditionally. If however, the neighbor solution is worse than the current solution, we use Boltzmann’s function to decide whether accept it or not.

From the Boltzmann’s function we know that the algorithm is more likely accept solutions at high temperatures. Actually, the temperature parameterT is not constant, we set Tk+1=0.95Tk.

Finally, we give the pseudo-code of the simulated annealing in Algorithm 1.

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Algorithm 1 Simulated Annealing Algorithm

Require: f(x): objective function;x0: initial solution;T0: initial temperature;K: step size;

Ensure: optimal best valuexb

1: Initialk = 0, current best state xb = x0, current best value f(xb) = f(x0), current tem-peratureTC = T0;

2: whilek <K do

3: Compute the neighbor ofxk, which isxk+1;

4: if f(xk+1) f(xk)then

5: xb =xk+1, f(xb) = f(xk+1);

6: else

7: Compute the PR(f(xk))and the random variableV;

8: if V PR(f(xk))then

9: xb = xk+1, f(xb) = f(xk+1);

10: else

11: xb = xk, f(xb) = f(xk);

12: end if

13: end if

14: Tk+1 =0.95Tkandk=k+1;

15: end while

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

Bibliography

[1] Computer-Assisted Passenger Prescreening System, 2004. https:

//en.wikipedia.org/wiki/Computer-Assisted_Passenger_

Prescreening_System.

[2] TSA announces expansion of Black Diamond self-select lanes to Norfolk international airport, 2008. http://www.marketwired.com/press-release/tsa-

announces-expansion-black-diamond-self-select-lanes-norfolk-international-airport-927005.htm.

[3] Secure Flight Program, 2009. https://en.wikipedia.org/wiki/Secure_

Flight.

[4] Support grows for tiered risk system at airports, 2011. http://www.nytimes.com/

2011/02/08/business/08security.html?_r=0.

[5] Arnold Barnett. CAPPS II: The foundation of aviation security? Risk Analysis, 24(4):

909–916, 2004.

[6] Huseyin Cavusoglu, Byungwan Koh, and Srinivasan Raghunathan. An analysis of the impact of passenger profiling for transportation security. Operations Research, 58(5):

1287–1302, 2010.

[7] Dae W. Choi, Nam K. Kim, and Kyung C. Chae. A two-moment approximation for the GI/G/c queue with finite capacity. INFORMS Journal on Computing, 17(1):75–81, 2005.

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

[8] Robert de Lange, Ilya Samoilovich, and Bo van der Rhee. Virtual queuing at airport secu-rity lanes. European Journal of Operational Research, 225(1):153–165, 2013.

[9] Wolfgang Fischer and Kathleen Meier-Hellstern. The Markov-modulated Poisson process (MMPP) cookbook. Performance evaluation, 18(2):149–171, 1993.

[10] Donald Gross and Donald Gross. Fundamentals of queueing theory. Wiley series in prob-ability and statistics. Wiley, Hoboken, N.J., 4th edition, 2008.

[11] Boudewijn R Haverkort, Aad PA van Moorsel, and Arvid Dijkstra. MGMtool: A perfor-mance modelling tool based on matrix geometric techniques. 1992.

[12] Oliver C. Ibe. Markov processes for stochastic modeling. Academic Press, Amsterdam, Boston, 2009.

[13] Sheldon H Jacobson, Tamana Karnani, John E Kobza, and Lynsey Ritchie. A cost-benefit analysis of alternative device configurations for aviation-checked baggage security screen-ing. Risk Analysis, 26(2):297–310, 2006.

[14] Scott Kirkpatrick, C Daniel Gelatt, Mario P Vecchi, et al. Optimization by simulated annealing. science, 220(4598):671–680, 1983.

[15] Q.-L. Li and J. Cao. A Computational Framework for the Mixing Times in the QBD Processes with Infinitely-Many Levels. ArXiv e-prints, aug 2013.

[16] Randolph Nelson. Probability, stochastic processes, and queueing theory : the mathemat-ics of computer performance modeling. Springer-Verlag, New York, 1995.

[17] Xiaofeng Nie, Gautam Parab, Rajan Batta, and Li Lin. Simulation-based selectee lane queueing design for passenger checkpoint screening. European Journal of Operational Research, 219(1):146–155, 2012.

[18] Md Mostafizur Rahman and Attahiru Sule Alfa. Computational procedures for a class of GI/D/k systems in discrete time. Journal of Probability and Statistics, 2009:1–18, 2009.

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

[19] George Passantino Robert W. Poole Jr. A risk-based airport security policy. Policy Study, 308, 2003.

[20] Sheldon M. Ross. Stochastic processes. Wiley series in probability and statistics Proba-bility and statistics. Wiley, New York, 2nd edition, 1996.

[21] Young U Ryu and Hyeun-Suk Rhee. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and System Security (TISSEC), 11(4):20, 2008.

[22] Hans-Peter Schwefel. Performance Analysis of Intermediate Systems Serving Aggregated ON/OFF Traffic with Long-Range Dependent Properties. Dissertation, Technische Uni-versität München, München, 2000.

[23] Cen Song and Jun Zhuang. Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors. Annals of Operations Research, pages 1–26, 2015.

[24] Peter J Van Laarhoven and Emile H Aarts. Simulated annealing: theory and applications, volume 37. Springer Science & Business Media, 1987.

[25] Ward Whitt. Queues with service times and interarrival times depending linearly and ran-domly upon waiting times. Queueing Systems, 6(1):335–351, 1990.

[26] Zhe George Zhang, Hsing Paul Luh, and Chia-Hung Wang. Modeling security-check queues. Management Science, 57(11):1979–1995, 2011.

相關文件