A note on two inventory models
نویسندگان
چکیده
منابع مشابه
Note on Stochastic Inventory Models with Service Level Constraint
This note examines the inventory model with service level constraint in which the lead time, the reordered point and order quantity are treated as decision variables. The previous researchers believed that the objective function is concave in the lead time such that the minimummust occur on the boundary points of each sub-domain. In this note, we will show that their belief contains questionabl...
متن کاملA Note on Two Models of Sibling Resemblance
Your use of the JSTOR database indicates your acceptance of JSTOR's Terms and Conditions of Use. A copy of JSTOR's Terms and Conditions of Use is available at http://www.jstor.org/about/terms.html, by contacting JSTOR at [email protected], or by calling JSTOR at (888)388-3574, (734)998-9101 or (FAX) (734)998-9113. No part of a JSTOR transmission may be copied, downloaded, stored, further tra...
متن کاملA note on periodic review inventory models with stochastic supplier’s visit intervals and fixed ordering cost
Most periodic review models in the inventory literature have assumed a fixed length of the review periods. In this note, we extend the work of Chiang (2008) , and consider backlogged and lost-sales periodic review models where the review periods are of a variable length and there is a fixed cost of ordering for replenishment. Assuming that period lengths are independently and identically distri...
متن کاملA note on "Two-warehouse inventory model with deterioration under FIFO dispatch policy"
A recently published paper by Lee [C.C. Lee, Two-warehouse inventory model with deterioration under FIFO dispatching policy, European Journal of Operational Research 174 (2006) 861–873] considers different dispatching models for the two-warehouse inventory system with deteriorating items, in which Pakkala and Achary’s LIFO (last-in–first-out) model [T.P.M. Pakkala, K.K. Achary, A deterministic ...
متن کاملA note on the security of two improved RFID protocols
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Belgian Mathematical Society - Simon Stevin
سال: 1997
ISSN: 1370-1444
DOI: 10.36045/bbms/1105733255