[BACK]
Computer Systems Science & Engineering
DOI:10.32604/csse.2022.029230
images
Article

An Improved Genetic Algorithm for Berth Scheduling at Bulk Terminal

Xiaona Hu1,2, Shan Ji3, Hao Hua4, Baiqing Zhou1,* and Gang Hu5

1Huzhou Vocational & Technical College, Huzhou, 313000, China
2Shanghai Maritime University, Shanghai, 201306, China
3Zhengde Polytechnic, Nanjing, 211106, China
4SKEMA Business School, Lille, 59777, France
5College of Management Science and Engineering, Anhui University of Technology, Ma’anshan, 243002, China
*Corresponding Author: Baiqing Zhou. Email: zhoubaiqinghuzhou@163.com
Received: 28 February 2022; Accepted: 06 April 2022

Abstract: Berth and loading and unloading machinery are not only the main factors that affecting the terminal operation, but also the main starting point of energy saving and emission reduction. In this paper, a genetic Algorithm Framework is designed for the berth allocation with low carbon and high efficiency at bulk terminal. In solving the problem, the scheduler’s experience is transformed into a regular way to obtain the initial solution. The individual is represented as a chromosome, and the sub-chromosomes are encoded as integers, the roulette wheel method is used for selection, the two-point crossing method is used for cross, and the exchange variation method is used for variation in the procedure of designing the Algorithm. Considering the complexity of berth scheduling problem and the diversity of constraints and boundary conditions, the genetic algorithm combines with system simulation to get the final scheme of berth allocation. This model and algorithm are verified to be practical by analyzing multiple sets of examples of shorelines with different lengths. When compared with the traditional algorithms in three aspects which includes berth offset distance, departure delay cost and energy consumption of portal crane, the result indicates that the improved algorithm is more effective and feasible. The study will help to lower energy consumption and resource waste, reduce environmental pollution, and provide a reference for low-carbon, green and sustainable development of the terminal.

Keywords: Bulk terminal; Berth scheduling; Genetic algorithm; Energy-saving

1  Introduction

With the increasing competition among ports, it has become one of the key factors to enhance their competitiveness by increasing the berths’ utilization, accelerating ships’ loading and unloading, improving efficiency and service [13]. Berth position, the important resource in the port transportation system, is one of the key factors that affecting their development. So, the berth allocation has become one of the important issues in ports’ research now [46].

Scholars at home and abroad have made deep research on berth allocation, which covers forecasting of terminal throughput, optimization and configuration of ports’ equipment, configuration of port’s construction and handling operation line for single ship, simulation of ports’ system, bottleneck analysis and its optimization, coordinated configuration for container truck and operating line, berth scheduling, ship loading and its optimization, etc. In recent years, research on energy efficient port has mainly focused on macro-scopic aspects such as law, policy, planning, and equipment technique, but barely on production and operation [710].

There are two approaches to the multi-objective berth allocation, one is the widely used traditional multi-objective optimization, the other is the improved [1113]. Though the former follows the principle of algorithm of single-objective problem, it is not suitable for the large scaled. For example, Pareto Optimality needs to be optimized continuously. The results vary because there is not any relevance between each optimization, which not only wastes time, but also leads to an inefficient decision. The latter, the new-type and intelligent one, is applied to solve large, scaled problems and features advantages that not only processing large and scaled search space, but also producing multiple equilibrium solutions during the period of single optimization when compared to the traditional one [1416].

A genetic algorithm (GA) is a search technique used in computing to find exact or approximate solutions to optimization and search problems [1719]. Categorized as global search heuristics, the genetic algorithm is a particular class of evolutionary algorithm (EA) that uses techniques inspired by evolutionary biology such as inheritance, mutation, selection, and crossover. The algorithm is implemented in a computer simulation in which a population of abstract representations (called chromosomes or the genotype of the genome) of candidate solutions (called individuals, creatures, or phenotypes) to an optimization problem evolves toward better solutions. If the algorithm has terminated due to a maximum number of generations, a satisfactory solution may or may not have been reached. It find its wide application in bioinformatics, phylogenetics, computational science, engineering, economics, chemistry, manufacturing, mathematics, physics and other fields. The paper employs it to solve berth scheduling because of its parallelism, practicability, and robustness [2023].

2  Construction of Berth Scheduling Model at Bulk Terminal

2.1 Model Assumption

The model is constructed on basis of the following assumptions: ① the ship will arrive at port at the given arrival time on time; ② the berthing length is 1.2 times the length of the ship; ③ every ship only has one chance to berth without regard to shifting; ④ the continuous shoreline is the same in depth, which is bigger than the depth of immersion; ⑤ every ship has been assigned the minimum and the maximum loading machinery respectively; ⑥ the loading machinery will move on the track and won’t stride over each other; ⑦ the ratio of the loading machinery keeps constant without regard to the mutual interference among machinery; ⑧ the loading time is inversely proportional to the numbers of the loading machinery, which meets a certain proportion.

2.2 Parameter Definition

i, j - Ships number, C is the set of all ships, i, jC.

M - Set of cranes, mM.

L - Total length of shoreline.

li - Length of Ship i.

Sti - Arrival time of Ship i.

Eti - Exiting time of Ship i.

Dti - Expected Departure time of Ship i.

Kti - Berthing time of Ship i.

Xi - Actual berthing position of Ship i.

Ei - Optimum berthing position of Ship i.

Si - Start position for berthing Ship i.

Bi - End position for berthing Ship i.

α - Constant, if the exiting time is no greater than the expected, α = 0, else, α = 1.

ω1 - Unit cost of berthing deviation distance.

ω2 - Unit cost of delayed departure time.

ω3 - Unit cost of energy consumption of cranes.

Cmi - Number of cranes assigned to Ship i.

M - Energy consumption of one-crane-one-operation in one unit time.

yik - k Cranes assigned to Ship i.

Zi - The maximum load of Ship i.

CMmaxi - The maximum number of cranes assigned to Ship i.

CMmini - The minimum number to cranes assigned to Ship i.

qim - Operating quantity distributed to Crane M by Ship i. If qim = 0, then the crane doesn’t work for Ship i.

Vo-Operation efficiency of cranes.

2.3 Destination Function

The berth scheduling model of the continuous shoreline is described as follows: First, the ship to port is assigned a specific position along the shoreline based on C (namely, all the ships), then is arranged a berthing order based on Sti, finally is assigned cranes to load based on Zi. The berth along the continuous shoreline is shown in Fig. 1.

images

Figure 1: Schematic diagram of berth along the continuous shoreline

In view of the interrelationship between cranes and ship, the destination function is of multi-objectives. It includes the minimum distance cost influenced by deviation between the actual and the optimal berthing positions, the minimum departure delay cost, and the minimum energy consumption of cranes.

The minimum distance cost influenced by deviation between the actual and the optimal berthing positions is as follows.

f(1)=Minω1i=1c|XiEi| (1)

The minimum delayed cost caused by departure is as follows.

f(2)=Minω2αi=1c|EtiDti| (2)

The minimum energy consumption produced by cranes is as follows.

f(3)=Mini=1ck=1mCmiyikN (3)

2.4 Constraint Conditions

The constraint conditions, namely assumptions that satisfy the model, are shown in the following.

EtiSti0 (4)

Eq. 4 indicates that the departure time must not be earlier than the arrival time.

(EtiKti)(KtiEti)Pij0 (5)

Eq. 5 indicates that the ships’ positions won’t interleave if the time is not interleaved, that is, the positions of these two ships won’t coincide within the same time.

CMminiCmiCMmaxi (6)

Eq. 6 indicates that the number of cranes assigned cannot be less than the maximum number of the accepted.

(BiSj)(SiBj)Sij0 (7)

Eq. 7 indicates that the ships’ positions won’t interleave if the time is not interleaved, that is, the positions of two ships won’t coincide within the same time.

i=1cXi=C (8)

Eq. 8 indicates that all the ships to port can berth.

m=1Mqim=Zi (9)

Eq. 9 ensures that all the goods in Ship i can be unloaded thoroughly.

(EtiSti)=Zi/(V0×Cmi) (10)

Eq. 10 indicates that the operation time is equal to the volume of goods that divided by the cranes’ efficiency. In other words, it is directly proportional to the volume of goods, but is inversely proportional to the cranes’ number.

xi=0or1,I={1,2,,c} (11)

xik=0or1,I={1,2,,c},k={1,2,,m} (12)

sij=0or1,I={1,2,,c},j={1,2,,c} (13)

pij=0or1,I={1,2,,s},j={1,2,,c} (14)

Equations from (11) to (14) are binary constraints, where, if xi = 1 then Ship i berths, if xi = 0 then Ship i doesn’t berth; if xik = 1 then k cranes will be assigned to Ship i; if Sij = 1 then Ship i and Ship j are time-interleaved, else Sij = 0; if Pij = 1 then Ship i and Ship j are position-interleaved, else Pij = 0.

3  Algorithm Design for Berth Scheduling

3.1 Algorithm Framework

The weight factor transformation approach to the multi-objective problem is as follows: Assign (I = 1,2,…,n) to every sub function (I = 1,2,…,n), where ωi means the corresponding importance in multi-objective optimization, then u = ∑ωif(xi). It adds up the linear weights of all the destination functions. This convenient and efficient method will receive a feasible solution which can be used as an initial solution and applied to other methods.

It can be seen from the mathematical model that by assigning weights, the multi-objective problem is transformed to a single-objective one, and then is solved by use of genetic algorithm [2426]. Specific solutions are as follows.

Step 1: To collect data. Berth position and cranes are assigned to Ship i based on the data collected.

Step 2: To wait for berthing. The berth position is judged whether to be available or not first. If it is, then ship i berths and the berthing time is determined. Else, Ship i has to wait for berthing at anchor.

Step 3: To wait for cranes. Ship i waits for loading and unloading after berthing. First, the number of free cranes (FC) is judged whether to be sufficient or not. If it is, then ship i is assigned appropriate cranes and starts to work, and the working time is determined. Secondly, the neighbor cranes are judged whether to be called or not. Ship i has to wait at berth and can’t work until the minimum number of cranes is satisfied. We have to obey the rule that only neighbor cranes can be called.

In algorithm design, a job library is set to indicate whether the berths and cranes are in use or not and is controlled by event triggering. There are three trigger modes, the berth position is locked at berthing time, the crane is locked when starting to work, and the corresponding position and cranes is released at departure time.

3.2 Algorithm Implementation

3.2.1 Individual Coding

A genetic algorithm is employed here to obtain an optimal berth position and cranes’ number for the berth scheduling along the continuous shoreline. The berth position, berthing time and cranes assigned will affect the departure delay time and the energy consumption of cranes. Binary is widely used in coding for genetic algorithm but not for berth scheduling, because it will make problems more complicated and is detrimental to computer processing [2730].

Since the shoreline can only serve for one ship at the same time, repeated genes are not permitted. There are three decision variables in the model, the berth time Kti, the starting position Si, and the cranes’ number Cmi. Individual in this paper is expressed by genome whose subchromosomes are coded by integer. That is, the individual gene value is expressed by integer, and the coding length is decided by the number of decision variables. The ship number is thus represented by the position of the individual gene whose subchromosome number of 1, 2, and 3 represent the berth consequence, the starting position, and the cranes’ number respectively. For instance, let’s code eight ships along a ten meters shoreline, as shown in Tab. 1. Ship 1 is the first to berth at the position of ten meters from the shoreline, and three cranes are assigned. Ship 2 is the third to berth at the position of one hundred and thirty meters from the shoreline and one crane is assigned, and so on.

images

3.2.2 Population Initialization

Because the berth scheduling is complicated, there would be a large number of infeasible solutions if the initial population is generated randomly. In order to avoid this, a feasible but not optimal berth scheme is presented at first, which is shown specifically in the following.

Step 1: Let’s suppose that there will be s ships to port in twenty-four hours. The maximum length of ship is M, and the minimum is N. The maximum berth positions available can be obtained from the total length of shoreline and the minimum length of ship.

Step 2: According to the initial parameters, ships awaiting are viewed as rectangles which is to be put in box, and then are checked, sorted, and decoded based on the estimated arrival time.

Step 3: The rectangles are arranged based on ships’ load in the order from big to small.

Step 4: The maximum load is assumed to be i. Item with the maximum load is selected from Set s and put in the lower left corner of the box.

Step 5: When cut horizontally along the line above Ship i, the remaining space is divided into two parts. The space below is the first layer to be boxed.

Step 6: Items with the same load of i are searched in the remaining Set s. Item with the minimum load difference is selected (which is also assumed to be j), put in the first layer, and then arranged to the right adjoining j. Set s is scanned continuously to search for items with the minimum load difference and arranged to the right.

Step 7: Cut horizontally along the line above Ship j, rescan Set s, and search for item with the minimum load difference which will be arranged in the upper right. The process will be repeated till the first layer is occupied.

Step 8: Whether the item can be arranged in the next layer or not depends on the estimated arrival time. Set s is updated. Steps from 3 to 7 are repeated to select appropriate rectangular items which will be put into the two-dimension space.

In order to ensure the maximum daily throughput, after the first ship in every layer is confirmed, the arrival time of ships that arranged in the next layer is computed. If the load of ships that arranged in the next layer is more than that of the first layer, then ships in the next layer take the priority to be arranged. Meanwhile, whether the ships can be arranged in a certain layer depends on the estimated arrival time t, and then Set s is updated.

After subchromosome 1 and 2 are decided, subchromosome 3 is selected randomly from cranes’ set C, which must obey the rules that number of cranes assigned to each ship is neither greater than the maximum number of cranes which each ship can accept nor smaller than the minimum one.

3.2.3 Design of Fitness Function

Fitness function in the genetic algorithm is a non-negative value, which is expected to be as large as possible in general. But the destination function in the paper aims at a minimum operation cost, so it has to be transferred to meet the requirements. Fitness function is usually expressed by an inverse destination function or by M, a considerable large number, that taking away the destination function. The latter method is employed to transfer the destination function and its corresponding fitness function.

Fitness(x)={Mf(x),whenf(x)<M0,othersituations (15)

where, f(x) is the original destination function that features the minimum costs of deviation distance for berthing, delayed time for departure, and energy consumption for loading and unloading, namely, f = min (ω1f1 + ω2f2 + ω2f2)

3.2.4 Selection Operation

Selection operation usually employs roulette method, in which, individual selection probability is proportional to its fitness. Suppose the group to be n, and the individual fitness to be fi, and then probability i is computed by pi = fi /∑fj. The individual selection probability is positive correlated with the fitness. When the individual is selected from the group, the crossed individual is then determined by repeated selections. A uniform random number between 0 and 1 will be produced in each section. The number is employed to determine the selected individual which will be associated randomly to cross over. Here in the paper the roulette wheel method.is employed.

3.2.5 Crossover Operation

A two-point crossing is employed because of the complex destination and constraint. If the crossed offspring couldn’t satisfy the constraint that the ship has one and only one berthing chance and the cranes allocated is not more than the maximum cranes, an infeasible solution will emerge. Other exchange or adjustment strategy will be used to transfer the infeasible solution to the feasible one. Specific crossover is shown in Fig. 2.

images

Figure 2: Schematic diagram of chromosomal crossover

It can be drawn from the figure above that A and B are parent generation, and child generation C1 and D1 are generated from two-point crossing. It can also be drawn from the middle subgeneration of subchromosome 1 that Row 1 is the same as Row 5, and Row 4 is the same as Row 7. The middle subgeneration D1 can’t satisfy the constraint that each ship only has one chance to berth.

3.2.6 Mutation Operation

In practice, exchange mutation is employed in berthing sequence, while substitution mutation is in berthing position, in which a position is selected randomly to substitute. The mutated chromosome should satisfy the constraint that the individual ship has one and only one berthing chance and the number of cranes assigned could neither be more than the maximum number of cranes needed nor less than the minimum number of cranes assigned. The specific mutation is as shown if Fig. 3.

images

Figure 3: Schematic diagram of chromosomal mutation

3.2.7 Termination Condition

Different problems call for different termination criteria in the genetic algorithm. There are four commonly used criteria: ① MaxGen, the maximum genetic algebra, is given. The algorithm terminates when the iteration number reaches MaxGen; ② LB, the lower bound, is given. The algorithm terminates when the iteration number reaches Ɛ, a required deviation in evolving; ③ the algorithm terminates when a continuous Generation K emerges, and a better solution is not evolved; ④ the combination of all the above.

Here in the paper, the maximum iteration number is used as termination condition in solving berth scheduling model. Each individual destination function is computed till the iteration number reach a preset value, and then the computation ends with a corresponding result.

4  Algorithm and Simulation

Complicated mathematical models and constraints are used in solving the complicated berth scheduling. Simulation is an effective way to estimate a complicated system, but not to provide an optimal strategy. Because some of the genes generated is infeasible, they need to be repaired or abandoned. It is easy for the simulation software but not easy for the genetic algorithm itself to repair genes by programming. For example, one ship crosses over the other in a certain time. Simulation will search for a practical berthing strategy by repairing genes. Here in the paper, both simulation and optimization algorithm are used in the specific example.

The implementation steps are as follows:

Step 1: Initialize the genetic algorithm to produce randomly initial data, the initial berth allocation scheme that includes service order of ships, berth position, and number of crane allocation.

Step 2: Let I = 1.

Step 3: Based on the information of Individual i, initialize the simulation model and run it. The constraint of the energy consumption module is expressed via the simulation module. If the simulated individual satisfies the constraint, all the cost consumed, namely the optimized target, will be computed by running the simulation. Otherwise, the simulation will terminate and feedback a biggish fitness function to the genetic algorithm.

Step 4: If I < 1 return to Step 3, else go to the next step.

Step 5: Evaluate scheme with the fitness values of the individual and produce the optimal value in the population.

Step 6: If the designated iteration times is not met, the genetic operation has to be performed again to produce a new solution, and then return to Step 2 to perform simulation optimization till the iteration times is met, and then produce the optimal result and scheme for berth allocation.

5  Example Analysis

The efficiency and reliability of the genetic algorithm are verified with experiments on different values, including lengths of continuous shoreline, numbers of ships to port in a certain time, and numbers of cranes which are not provided infinitely and are generally taken with one percent of the shoreline’ length. In the experiment, the algorithm’s performance is verified by shorelines with lengths of 400, 600, 800, 1000, 1200 and 1400 m. Each shoreline with the same length will be tested for three times, and an interval of 10 is employed to set the ships’ number.

When the shoreline is 400 m long, the cranes’ number is set to 4, the ships’ number is 5, 15, and 25 for the three-time test respectively. A 600-m shoreline is set with 6 cranes and 8, 18 and 28 ships. A 800 m shoreline is set with 8 cranes and 11, 21 and 31 ships; a 1000 meter shoreline is set with 10 cranes and 13, 23 and 33 ships. A 1200-m shoreline is set with 12 cranes and 17, 27 and 37 ships. A 1400-meter shoreline is set with 14 cranes and 18, 28 and 38 ships. Each group of experiments will be verified for ten times, whose average value will be used to prove the efficiency and practicality of the algorithm. All the ships’ load and length are shown in Tab. 2. The ship’s load is supposed to be distributed evenly with its length.

images

Tab. 3 shows the comparison between the result from the genetic algorithm and that from the traditional method when computed with the genetic module in the simulation software.

images

By comparing the berthing deviation, delay punishment, and energy consumption of cranes, we can draw a conclusion that the genetic algorithm is better than the traditional one, which indicates that the algorithm is effective and practical.

6  Conclusion

In order to achieve the goals for carbon peaking and carbon neutrality under the new developmnet philosophy in China, a multi-objective model with the minimum departure delay cost, the minimum berthing deviation cost, and the minimum energy consumption of cranes is established by analyzing the studies of scholars at home and abroad. The genetic algorithm is employed to improve the model, in which, individuals are represented by genome, each subchromosome is encoded with intege, roulette wheel method is used for selection, two point crossing is for crossover and exchange mutation is to ensure the algorithm’s high-efficiency and stability. And then the improved genetic algorithm is integrated with simulation. Six shorelines with different lengths and eighteen types of berthing ships are designed to test the algorithm’s practicability. The test shows that this model not only reduces the berthing deviation distance, but also saves the ships’ operating time, the time in port and the cranes’ energy consumption. The model is proved to be effective and, feasible and the berth scheduling will provide reference for the actual operation and management.

Funding Statement: This work is supported by the project of Zhejiang Federation of Humanities and Social Science in 2022 (NO: 2022B36), Xiaona Hu received the grant and URL to the sponsor’s website is https://www.zjskw.gov.cn/. This work is also supported by the Natural Science Foundation of Anhui Province, China (No: 2108085MG236), Gang Hu received the grant and URL to the sponsor’s website is http://kjt.ah.gov.cn/. This work is supported by the Natural Science Foundation from the Education Bureau of Anhui Province, China (No. KJ2021A0385), Gang Hu received the grant and URL to the sponsor’s website is http://jyt.ah.gov.cn/.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

 1.  L. Lin, “The combined scheduling of berth and quay crane at container terminal,” Master Dissertation, Dalian Maritime University, China, 2017. [Google Scholar]

 2.  H. Pierre, O. Ceyda and M. Nenad, “Variable neighborhood search for minimum cost berth allocation,” European Journal of Operational Research, vol. 3, no. 191, pp. 636–649, 2008. [Google Scholar]

 3.  Y. Ren, F. Zhu, J. Wang, P. Sharma and U. Ghosh, “Novel vote scheme for decision-making feedback based on blockchain in internet of vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 2, pp. 1639–1648, 2022. [Google Scholar]

 4.  X. N. Hu, W. Yan, J. L. He and Z. C. Bian, “Study on bulk terminal berth allocation based on heuristic algorithm,” in Proc. of the 2012 Inte Conf. of Modern Computer Science and Applications, vol. 191, no. 1, pp. 413–419, 2013. [Google Scholar]

 5.  J. Wang, H. Han, H. Li, S. He, P. K. Sharma et al., “Multiple strategies differential privacy on sparse tensor factorization for network traffic analysis in 5G,” IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1939–1948, 2022. [Google Scholar]

 6.  C. Bierwirth and F. Meisel, “A follow up survey of berth allocation and quay crane scheduling problems in container terminals,” European Journal of Operational Research, vol. 244, no. 3, pp. 675–689, 2015. [Google Scholar]

 7.  D. F. Chang, X. N. Hu and Z. C. Bian, “A research on port tug dynamic scheduling model and algorithm,” in 1st Int. Conf. on Energy and Environmental Protection, vol. 524, no. 1, pp. 832–835, 2012. [Google Scholar]

 8.  J. F. Correcher and R. Alvarez-Valdes, “A biased random-key genetic algorithm for the time-invariant berth allocation and quay assignment problem,” Expert Systems with Applications, vol. 89, no. 15, pp. 112–128, 2017. [Google Scholar]

 9.  Y. Ren, Y. Leng, J. Qi, K. S. Pradip, J. Wang et al., “Multiple cloud storage mechanism based on blockchain in smart homes,” Future Generation Computer Systems, vol. 115, no. 3, pp. 304–313, 2021. [Google Scholar]

10. T. Li, N. P. Li, Q. Qian, W. Xu, Y. Ren et al., “Inversion of temperature and humidity profile of microwave radiometer based on bp network,” Intelligent Automation & Soft Computing, vol. 29, no. 3, pp. 741–755, 2021. [Google Scholar]

11. Y. J. Ren, F. J. Zhu, S. P. Kumar, T. Wang, J. Wang et al., “Data query mechanism based on hash computing power of blockchain in internet of things,” Sensors, vol. 20, no. 1, pp. 1–22, 2020. [Google Scholar]

12. X. R. Zhang, X. Sun, W. Sun, T. Xu and P. P. Wang, “Deformation expression of soft tissue based on BP neural network,” Intelligent Automation & Soft Computing, vol. 32, no. 2, pp. 1041–1053, 2022. [Google Scholar]

13. Y. Ren, Y. Leng, Y. P. Cheng and J. Wang, “Secure data storage based on blockchain and coding in edge computing,” Mathematical Biosciences and Engineering, vol. 16, no. 4, pp. 1874–1892, 2019. [Google Scholar]

14. C. P. Ge, W. Susilo, Z. Liu, J. Y. Xia, L. M. Fang et al., “Secure keyword search and data sharing mechanism for cloud computing,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 2787–2800, 2021. [Google Scholar]

15. J. Wang, C. Y. Jin, Q. Tang, N. X. Xiong and G. Srivastava, “Intelligent ubiquitous network accessibility for wireless-powered MEC in UAV-assisted B5G,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 4, pp. 2801–2813, 2021. [Google Scholar]

16. C. P. Ge, Z. Liu, J. Y. Xia and L. M. Fang, “Revocable identity-based broadcast proxy re-encryption for data sharing in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1214–1226, 2021. [Google Scholar]

17. Y. J. Ren, K. Zhu, Y. Q. Gao, J. Y. Xia, S. Zhou et al., “Long-term preservation of electronic record based on digital continuity in smart cities,” Computers Materials & Continua, vol. 66, no. 3, pp. 3271–3287, 2021. [Google Scholar]

18. Y. Ren, J. Qi, Y. P. Cheng, J. Wang and O. Alfarraj, “Digital continuity guarantee approach of electronic record based on data quality theory,” Computers Materials & Continua, vol. 63, no. 3, pp. 1471–1483, 2020. [Google Scholar]

19. X. R. Zhang, W. F. Zhang, W. Sun, X. M. Sun and S. K. Jha, “A robust 3-D medical watermarking based on wavelet transform for data protection,” Computer Systems Science & Engineering, vol. 41, no. 3, pp. 1043–1056, 2022. [Google Scholar]

20. Y. J. Ren, J. Qi, Y. P. Liu, J. Wang and G. Kim, “Integrity verification mechanism of sensor data based on bilinear map accumulator,” ACM transactions on Internet Technology, vol. 21, no. 1, pp. 1–20, 2021. [Google Scholar]

21. A. Karam and A. B. Eltawil, “Functional integration approach for the berth allocation, quay crane assignment and specific quay crane assignment problems,” Computers & Industrial Engineering, vol. 102, no. 3, pp. 458–466, 2016. [Google Scholar]

22. C. P. Ge, W. Susilo, J. Baek, Z. Liu, J. Y. Xia et al., “Revocable attribute-based encryption with data integrity in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 2, pp. 1–12, 2021. [Google Scholar]

23. L. M. Fang, M. H. Li, Z. Liu, C. T. Lin, S. L. Ji et al., “A secure and authenticated mobile payment protocol against off-site attack strategy,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 11, pp. 1–12, 2021. [Google Scholar]

24. C. P. Ge, W. Susilo, J. Baek, Z. Liu, J. Y. Xia et al., “A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 7, pp. 1–12, 2021. [Google Scholar]

25. T. Li, W. D. Xu, L. N. Wang, N. P. Li, Y. J. Ren et al., “An integrated artificial neural network-based precipitation revision model,” KSII Transactions on Internet and Information Systems, vol. 15, no. 5, pp. 1690–1707, 2021. [Google Scholar]

26. X. R. Zhang, W. F. Zhang, W. Sun, X. M. Sun and S. K. Jha, “A robust 3-D medical watermarking based on wavelet transform for bata protection,” Computer Systems Science & Engineering, vol. 41, no. 3, pp. 1043–1056, 2022. [Google Scholar]

27. D. Lee, H. Q. Wang and L. Miao, “Quay crane scheduling with non-interference constraints in port container terminals,” Transportation Research Part E: Logistics and Transportation Review, vol. 44, no. 1, pp. 124–135, 2008. [Google Scholar]

28. S. F. Ma and J. Zhou, “Research on multi-resource cooperative scheduling optimization of bulk cargo port,” Industrial Control Computer, vol. 33, no. 06, pp. 126–128, 2020. [Google Scholar]

29. Z. B. Zhang, “Joint scheduling optimization of berths and quay cranes at container terminals based on improved bat algorithm,” Master Dissertation, Dalian Maritime University, China, 2020. [Google Scholar]

30. L. Ren, “Research on scheduling optimization of dynamic continuous berths and quay cranes in container terminals based on genetic algorithm,” Master Dissertation, Chongqing University, China, 2020. [Google Scholar]

images This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.