Allotment of aircraft spare parts using genetic alorithms
نویسندگان
چکیده
منابع مشابه
Efficient aircraft spare parts inventory management under demand uncertainty
In airline industries, the aircraft maintenance cost takes up about 13% of the total operating cost. It can be reduced by a good planning. Spare parts inventories exist to serve the maintenance planning. Compared with commonly used reorder point system (ROP) and forecasting methods which only consider historical data, this paper presents two non-linear programming models which predict impending...
متن کاملSpare parts inventory control for an aircraft component repair shop
We study spare parts inventory control for a repair shop for aircraft components. Defect components that are removed from the aircraft are sent to such a shop for repair. Only after the component has been inspected does it become clear which specific spare parts are needed to repair it, and in what quantity they are needed. Market requirements for shop performance are reflected in fill rate req...
متن کاملStock Optimization of Spare Parts with Genetic Algorithm
In this research, a new method is proposed for the optimization of warship spare parts stock with genetic algorithm. Warships should fulfill her duties in all circumstances. Considering the warships have more than a hundred thousand unique parts, it is a very hard problem to decide which spare parts should be stocked at warehouse aiming to use in case of failure. In this study, genetic algorith...
متن کاملOn spare parts optimization
In the book “Optimal inventory modeling of systems: multi-echelon techniques” the author Craig Sherbrooke, who has developed several important model in this area, describes a part of the model cosidered in this manuscript as follows (in “aircraft language”): “When a malfunction is diagnosed on an aircraft, the malfuncioning item is removed from the aircraft and brought into base supply. If a sp...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pesquisa Operacional
سال: 2003
ISSN: 0101-7438
DOI: 10.1590/s0101-74382003000100011