scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A Combinatorial Benders' decomposition for the lock scheduling problem

TL;DR: The results indicate that the decomposition approach significantly outperforms other exact approaches presented in the literature, in terms of solution quality and computation time.
About: This article is published in Computers & Operations Research.The article was published on 2015-02-01 and is currently open access. It has received 50 citations till now. The article focuses on the topics: Generalized assignment problem & Optimization problem.

Summary (4 min read)

1. Introduction

  • It is a major hub for both inland and intercontinental cargo traffic.
  • These locks entail a complex optimization problem: the vast number of ships entering and leaving the harbour every day have to be assigned to lock chambers, their exact position inside the locks need to be determined, and the lockages have to be scheduled.
  • Experiments are conducted on a large number of instances based on data obtained from different Belgian locks.

2. Problem Outline

  • The Lock Scheduling Problem consists of three interconnected sub problems: an assignment, a packing and a scheduling problem.
  • Each problem comes with a large number of constraints, mainly resulting from safety and nautical regulations.
  • The problem has been described in detail by Verstichel et al. (2014a); here the authors only sketch the general outline.
  • The main lock scheduling specific terms used throughout this paper are elucidated in Figure 1, which shows a lock with two identical parallel chambers.

2.1. Scheduling, Assignment and Packing

  • A lock consists of one or more chambers, which can perform lockage operations independently of each other.
  • The ships must be grouped into a number of batches (i.e. lockages), where each batch contains the ships that are transferred in a single lockage operation.
  • A chamber is always in one of it’s two possible states, which handle either downstream or upstream transfer.
  • A first-come-firstserved (FCFS) policy is often enforced by the lock authorities.
  • Therefore ship i must depart from the lock no later than ship j should ship i arrive at the lock before ship j.

3. Literature review

  • LSP was first introduced in an inland setting by Verstichel and Vanden Berghe (2009), who presented a heuristic approach.
  • Due to the complex nature of LSP, only relatively small instances were solved to optimality.
  • In more recent work, e.g. Geoffrion (1972) and Hooker and Ottoson (2003), the Benders’ decomposition approach has been generalized to a broader class of problems, no longer requiring the sub problem to be linear.
  • Stronger Combinatorial cuts may be obtained by identifying small subsets of variables responsible for the infeasibility of the sub problem, and expressing cuts in terms of these variables.
  • Tran and Beck (2012) solve a Parallel Machine Scheduling Problem (PMSP) with machine and sequence dependent setup times through Logic Based Benders’ decomposition.

4. A Combinatorial Benders’ Decomposition

  • Verstichel et al. (2014a) attempted to solve the LSP via a single, large, Mixed Integer Linear Programming problem.
  • In addition, efficient dedicated algorithms can be employed to solve the master and sub problem, whereas there may not exist an algorithm capable of tackling the entire problem at once.
  • The presented method is based on Codato and Fischetti (2006)’s original algorithm.
  • Subsequently, the sub problem verifies, for each subset, whether the ships in this set can be transferred simultaneously, i.e. whether they fit to- gether inside the lock chamber.
  • The LSP is solved whenever an optimal MP schedule is determined in which each subset satisfies the packing constraints of the sub problem.

4.1. Master problem

  • The following Mixed Integer Linear Programming problem defines the master problem.
  • The parameters are defined in Table 1; the variables (marked in bold) are discussed below the model.
  • Other values would favor, for example, the number of lockages, maximum waiting time, etc. Constraints (2)-(4) assign ships to lockage operations.
  • Constraints (9), (10) describe the actual scheduling restrictions on the lockages per chamber.
  • A lockage cannot commence before all ships have arrived at the lock (Constraints (11)).

4.2. Sub problem

  • Once the master problem has assigned the ships to a number of lockages, the feasibility of these lockages needs to be verified.
  • Whenever a configuration is considered infeasible, a combinatorial cut will be generated and added to the master problem.
  • The latter will be elaborated in the next section.
  • Nk are located within the chamber’s dimensions.
  • The remaining constraints ensure that the ships do not overlap.

4.3. Combinatorial Benders’ cuts

  • When an infeasible sub problem is encountered, one or more combinatorial Benders’ cuts are generated and added to the master problem, effectively preventing the master problem from assigning specific ships to the same lockage.
  • The strongest cuts are based on minimum infeasible subsets (MIS).
  • It would require solving the sub problem from Section 4.2 for every possible subset of N ′. Section 4.4 presents approaches to computing strong cuts requiring far less computational effort.
  • Combinatorial Benders’ cuts can be generated at different times in the process: Initial cuts are added to strengthen the MP before the first MPSP iteration.
  • Applying initial cuts reduces the number of infeasible MP lockages generated.

4.4. Cut separation

  • The different cut separation methods are clarified using the example from Figure 2, where the MP proposes a solution in which ships 1 through 7 are assigned to a single lockage.
  • The feasible lockages for this example (under a first-come-first-served policy) are displayed on the right side of this figure.
  • For the example from Figure 2, the following weak cut is generated: 7∑ i=1 fik ≤ 6, ∀k (21) Minimal infeasible subsets (MIS) can be found by applying the following constructive procedure.
  • An efficient approach to identifying small infeasible subsets of ships is based on surface calculations: any set of ships having a combined surface that exceeds the total surface of the lock chamber is infeasible.
  • Whenever surface calculations are used to identify infeasible subsets, it will be denoted as follows: ‘subsurf’ (subset based) and ‘surf’ (order based).

5. Experiments

  • To assess the quality of the combinatorial Bender’s approach, a number of experiments have been conducted on instances based on real-world data originating from the Albertkanaal in Belgium (Verstichel, 2013).
  • The characteristics of the locks, also known as 2. lock data.
  • The ship inter arrival times have been selected from a uniform distribution between 0 and 2σ (Table 2).
  • A comparison of the Benders’ procedure and the monolithic approach from Verstichel et al. (2014a) is presented.

5.1. FCFS single chamber lock

  • The first series of experiments is performed on a single chamber lock with a first-come-first served policy for the ships.
  • The x-axis of each figure displays the different instances, which are ordered, from left to right, based on (1) increasing number of ships (2) increasing inter arrival time and (3) traffic ratio (first 70/30, then 50/50).
  • A slightly larger variation in the number of required iterations and cuts for equal instance size can be observed compared to the small chamber settings.
  • The difference between generated cuts for the initial order cuts and the order feasibility cuts is also more significant.
  • Finally, for the 48 instances consisting of 70 to 90 ships, the decomposition method solves 21 instances to optimality while for the remaining instances, feasible solutions were found.

5.2. No FCFS single chamber lock

  • The second series of experiments is conducted on the same instances, but without the FCFS policy.
  • Figures 6 (c) and (d) compare the performance of various methods.
  • For the small chamber lock, initial subset cuts appear to be the best approach.
  • The subship+order cut method on the other hand needed 27 cuts for the same instance, while computing only 12 seconds.
  • From the above results, it is apparent that the absence of the FCFS rule has a significant impact on the computation times.

5.3. FCFS parallel identical chamber lock

  • For the identical parallel chamber instances, the results for instances with 10 and ≥ 30 ships were omitted.
  • The difference between the initial cuts is limited for a lock with two small parallel chambers ).
  • The decomposition method is almost always faster for the other instances, with a total computation time of 6.5 for the monolithic approach and only 2 hours for the feasibility subset cuts.
  • Applying one of the other methods (no initial cuts, subset based surface initial cuts or subset based ship placement initial cuts) results in an average of 570− 1007 cuts per instace.
  • While the monolithic approach is the best choice when facing large inter arrival times.

5.4. FCFS multi chamber type lock

  • The results for the multi chamber type lock are summarized in Figure 9.
  • Here only the ≥ 30 ship instances were omitted.
  • Similar to the SSC results it appears that, aside from the number of ships, the ship inter arrival time has the largest influence on the required computation time.
  • Applying feasibility subset cuts combined with initial subset based surface cuts (subship+subsurf) appears to be the best way of solving LSP for this multi chamber type setting.
  • This result is noteworthy, as the subship+subsurf method produces significantly more cuts than the other approaches ).

5.5. Heuristic sub problem approach

  • The last experiment considers the effects of applying the multi-order bestfit heuristic for the ship placement problem (Verstichel et al., 2014b) to the SP.
  • For the larger cases the heuristic approach matched the exact results on all but one instance, where a gap of 0.03% remained after 12 hours of computation time.
  • For the single large chamber lock, the average gap for the heuristic approach on the instances with less than 60 ships was 0.10%, with a maximum of 1.19%.
  • By increasing the computation time limit for these 12 instances, the authors were able to determine that in 3 cases the exact results could be matched by the heuristic approach.
  • All PSC instances were solved to optimality by the heuristic decomposition method when applying initial subset cuts.

5.6. Summary of the experiments

  • The experimental results show that the proposed Combinatorial Benders’ decomposition is very effective for the lock scheduling problem.
  • This is especially the case for instances with a complex packing aspect, i.e. where several ships can be transferred in a single lockage operation, and (very) large instances.
  • Indeed, for the single large chamber experiments, the authors find the largest decrease in computation time for the instances with short inter arrival times, with computation time differences of several orders of magnitude on several instances.
  • Furthermore, the decomposition approach was able to produce feasible solutions, and often attest optimality, on a large number of instances that could not be tackled by the existing ‘monolithic’ approach.
  • The same advantages are seen when applying a heuristic method to the sub problem.

6. Conclusion

  • An exact Combinatorial Benders’ decomposition to the lock scheduling problem was proposed.
  • The scheduling and assignment problems, whereas the packing problem is dealt with in the sub problem.
  • Especially instances having ships that can be transferred simultaneously in a single lockage operation benefit from the new approach, as is shown in the experiments where the ship inter arrival times are short.
  • Finally, applying a heuristic to the sub problem instead of an exact algorithm results in high quality solutions on all instances, with a maximal optimality gap of 2.93%, while the maximal time spent in the sub problem is reduced from 527 to 0.5 seconds.

Did you find this useful? Give us your feedback

Citations
More filters
Journal ArticleDOI
TL;DR: In this paper, the Multiple Multidimensional Knapsack Problem with Family-Split Penalties (MMdKFSP) is introduced, where items belonging to the same family can be assigned to different knapsacks; however, in this case, split penalties are incurred.

11 citations

Journal ArticleDOI
TL;DR: Two different decomposition-based exact algorithms are implemented as well as a list scheduling (LS)-based heuristic method, and the results demonstrate the efficiency of the proposed combinatorial Benders decomposition approach.

10 citations

Journal ArticleDOI
TL;DR: In this article , a branch-and-cut procedure was proposed to solve the problem of parallel discrete machine scheduling and location, where the objective is to minimize the maximum completion time of all jobs, that is, the makespan.
Abstract: We investigate the discrete parallel machine scheduling and location problem, which consists of locating multiple machines to a set of candidate locations, assigning jobs from different locations to the located machines, and sequencing the assigned jobs. The objective is to minimize the maximum completion time of all jobs, that is, the makespan. Though the problem is of theoretical significance with a wide range of practical applications, it has not been well studied as reported in the literature. For this problem, we first propose three new mixed-integer linear programs that outperform state-of-the-art formulations. Then, we develop a new logic-based Benders decomposition algorithm for practical-sized instances, which splits the problem into a master problem that determines machine locations and job assignments to machines and a subproblem that sequences jobs on each machine. The master problem is solved by a branch-and-cut procedure that operates on a single search tree. Once an incumbent solution to the master problem is found, the subproblem is solved to generate cuts that are dynamically added to the master problem. A generic no-good cut is first proposed, which is later improved by some strengthening techniques. Two optimality cuts are also developed based on optimality conditions of the subproblem and improved by strengthening techniques. Numerical results on small-sized instances show that the proposed formulations outperform state-of-the-art ones. Computational results on 1,400 benchmark instances with up to 300 jobs, 50 machines, and 300 locations demonstrate the effectiveness and efficiency of the algorithm compared with current approaches. Summary of Contribution: This paper employs operations research methods and computing techniques to address an NP-hard combinatorial optimization problem: the parallel discrete machine scheduling and location problem. The problem is of practical significance but has not been well studied in the literature. For the problem, we formulate three novel mixed-integer linear programs that outperform state-of-the-art formulations and develop a new logic-based Benders decomposition algorithm. Extensive computational experiments on 1,400 benchmark instances with up to 300 jobs, 50 machines, and 300 locations are conducted to evaluate the performance of the proposed models and algorithms.

10 citations

05 Dec 2014
TL;DR: This dissertation encompasses the development of decomposition approaches for a variety of both real-world and fundamental optimization problems, focusing on analyzing and identifying problem components to decompose a problem into multiple, easier-to-solve, subproblems.
Abstract: This dissertation encompasses the development of decomposition approaches for a variety of both real-world and fundamental optimization problems. Many optimization problems comprise of multiple interconnected subproblems, often rendering them too large or too complicated to solve as a single integral problem. Decomposition approaches are required to deal with these problems efficiently. By decomposing a problem into multiple subproblems, efficient dedicated procedures can be employed to solve the subproblems independently. Furthermore, often strong bounds on the optimal solutions can be derived by exploiting structures in the underlying subproblems. This work primarily focuses on analyzing and identifying problem components to decompose a problem into multiple, easier-to-solve, subproblems. The actual decompositions are obtained through mathematical techniques such as Column Generation and Benders decomposition, thereby relying on Integer Programming, Constraint Programming, heuristic and combinatorial procedures to solve the resulting subproblems. Each solution method is developed with scalability and extendability in mind, while simultaneously making the methods sufficiently robust to account for changes to the original problem definitions. Moreover the decomposition strategies are designed to preserve a notion of optimality, thereby providing insight into the quality of a solution. From an application point of view, the present work is centered around four routing and scheduling problems: the School Bus Routing Problem (SBRP), the Concrete Delivery problem (CDP), the Time-Dependent TSP (TD-TSP) and the Balanced TSP (BTSP). For each of these problems, decomposition strategies have been developed. The SBRP and BTSP are solved via a branch-and-price framework; lower bounds on the SBRP are derived through Lagrangian Relaxation. A Benders decomposition is developed for the CDP. The subproblems resulting from the Benders decomposition are efficiently solved through Integer and Constraint programming, in combination with a fast scheduling heuristic. Finally, a generic, robust Constraint Programming approach, strengthened with Multivariate Decision Diagrams, is implemented for

8 citations


Cites background from "A Combinatorial Benders' decomposit..."

  • ...Applications include Round Robin Tournament Scheduling (Rasmussen and Trick, 2007), Tollbooth Allocation (Bai and Rubin, 2009), Parallel Machine Scheduling (Tran and Beck, 2012), Lock Scheduling (Verstichel et al., 2013) and Strip Packing (Côté et al....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: In this paper, the extremal value of the linear program as a function of the parameterizing vector and the set of values of the parametric vector for which the program is feasible were derived using linear programming duality theory.
Abstract: J. F. Benders devised a clever approach for exploiting the structure of mathematical programming problems withcomplicating variables (variables which, when temporarily fixed, render the remaining optimization problem considerably more tractable). For the class of problems specifically considered by Benders, fixing the values of the complicating variables reduces the given problem to an ordinary linear program, parameterized, of course, by the value of the complicating variables vector. The algorithm he proposed for finding the optimal value of this vector employs a cutting-plane approach for building up adequate representations of (i) the extremal value of the linear program as a function of the parameterizing vector and (ii) the set of values of the parameterizing vector for which the linear program is feasible. Linear programming duality theory was employed to derive the natural families ofcuts characterizing these representations, and the parameterized linear program itself is used to generate what are usuallydeepest cuts for building up the representations.

2,133 citations

Journal ArticleDOI
J. F. Benders1
TL;DR: This paper presented to the 8th International Meeting of the Institute of Management Sciences, Brussels, August 23-26, 1961 presents a meta-analyses of the determinants of infectious disease in eight operation rooms of the immune system and its consequences.
Abstract: Paper presented to the 8th International Meeting of the Institute of Management Sciences, Brussels, August 23-26, 1961.

1,750 citations


"A Combinatorial Benders' decomposit..." refers methods in this paper

  • ...Benders’ decomposition is an efficient and popular exact decomposition method introduced by Benders (1962)....

    [...]

Journal ArticleDOI
TL;DR: The aim of this paper is to generalize the linear programming dual used in the classical method to an ``inference dual'' that takes the form of a logical deduction that yields Benders cuts.
Abstract: Benders decomposition uses a strategy of ``learning from one's mistakes.'' The aim of this paper is to extend this strategy to a much larger class of problems. The key is to generalize the linear programming dual used in the classical method to an ``inference dual.'' Solution of the inference dual takes the form of a logical deduction that yields Benders cuts. The dual is therefore very different from other generalized duals that have been proposed. The approach is illustrated by working out the details for propositional satisfiability and 0-1 programming problems. Computational tests are carried out for the latter, but the most promising contribution of logic-based Benders may be to provide a framework for combining optimization and constraint programming methods.

500 citations


"A Combinatorial Benders' decomposit..." refers background in this paper

  • ...Hooker and Ottoson (2003) extends the application of Benders’ decomposition even further through the introduction of inference duals and a logic-based Benders’ decomposition method....

    [...]

Journal ArticleDOI
TL;DR: Computational results on two specific classes of hard-to-solve MIPs indicate that the new method produces a reformulation which can be solved some orders of magnitude faster than the original MIP model.
Abstract: Mixed-integer programs (MIPs) involving logical implications modeled through big-M coefficients are notoriously among the hardest to solve. In this paper, we propose and analyze computationally an automatic problem reformulation of quite general applicability, aimed at removing the model dependency on the big-M coefficients. Our solution scheme defines a master integer linear problem (ILP) with no continuous variables, which contains combinatorial information on the feasible integer variable combinations that can be “distilled” from the original MIP model. The master solutions are sent to a slave linear program (LP), which validates them and possibly returns combinatorial inequalities to be added to the current master ILP. The inequalities are associated to minimal (or irreducible) infeasible subsystems of a certain linear system, and can be separated efficiently in case the master solution is integer. The overall solution mechanism closely resembles the Benders' one, but the cuts we produce are purely co...

364 citations


"A Combinatorial Benders' decomposit..." refers background or methods in this paper

  • ...The main differences are that we work with a integer programming sub problem instead of a linear one, and that we apply a constructive algorithm for determining minimal infeasible subsets, whereas Codato and Fischetti (2006) determined MIS through an LP....

    [...]

  • ...Codato and Fischetti (2006) introduce a similar solution approach for mixed-integer programming (MIP) problems involving logical implications (big M constraints), but instead of generating cuts through solving the dual of the linear programming sub problem they rely on the generation of minimal…...

    [...]

  • ...Finally, Section 6 offers the conclusions....

    [...]

  • ...The presented method is very similar to that of Codato and Fischetti (2006)....

    [...]

Journal ArticleDOI
TL;DR: This paper proposes a new exact method that solves a large number of the open benchmark instances within a limited computational effort and shows that the proposed algorithm provides a substantial breakthrough with respect to previously published algorithms.
Abstract: We study the strip packing problem, in which a set of two-dimensional rectangular items has to be packed in a rectangular strip of fixed width and infinite height, with the aim of minimizing the height used. The problem is important because it models a large number of real-world applications, including cutting operations where stocks of materials such as paper or wood come in large rolls and have to be cut with minimum waste, scheduling problems in which tasks require a contiguous subset of identical resources, and container loading problems arising in the transportation of items that cannot be stacked one over the other. The strip packing problem has been attacked in the literature with several heuristic and exact algorithms, nevertheless, benchmark instances of small size remain unsolved to proven optimality. In this paper we propose a new exact method that solves a large number of the open benchmark instances within a limited computational effort. Our method is based on a Benders' decomposition, in whi...

89 citations

Frequently Asked Questions (2)
Q1. What contributions have the authors mentioned in the paper "A combinatorial benders’ decomposition for the lock scheduling problem" ?

In this paper, the authors proposed a new exact approach to the lock scheduling problem ( LSP ) based on a combinatorial Benders ' decomposition approach. 

Future work may be aimed at improving the MP ’ s procedure, which is currently the main bottleneck of the decomposition approach.