11
Fourth party logistics routing problem model with fuzzy duration time and cost discount Yan Cui a,b , Min Huang a,b,, Shengxiang Yang c,b , Loo Hay Lee d,e , Xingwei Wang a,b a College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, China b State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, Liaoning 110819, China c School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK d Department of Industrial and Systems Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore 119260, Singapore e Logistics Engineering College, Shanghai Maritime University, Shanghai 201306, China article info Article history: Received 10 September 2012 Received in revised form 16 April 2013 Accepted 21 April 2013 Available online 9 May 2013 Keywords: Fourth party logistics Routing problem Chance constrained programming Memetic algorithm Local search abstract In this paper, from the viewpoint of a fourth party logistics (4PL) provider, a multi-source single-destina- tion 4PL routing problem with fuzzy duration time and cost discount (M-S 4PLRPFC) is described consid- ering the comprehensive ability of 3PL suppliers and nodes. A chance-constrained programming model is established for the M-S 4PLRPFC. Next, a memetic algorithm (MA) with a fuzzy simulation method is designed to solve the problem. Based on a set of problem instances as the test bed, experiments are per- formed to compare the performance of the proposed MA with those of the enumeration method and a standard genetic algorithm (SGA). The experimental results show that the proposed MA obtains the same results as the enumeration method and that it is than the SGA. Ó 2013 Elsevier B.V. All rights reserved. 1. Introduction With the development of science and technology, many compa- nies have outsourced their logistics to special logistics providers known as third party logistics (3PL). Trebilcock [23] showed that nearly 75% of the Fortune 500 companies have relied on 3PL ser- vices since 1996. Additionally, 83% of the top 500 manufacturers in the United States had already adopted 3PL by 2003 [16]. 3PL has been widely accepted by many companies. However, most 3PL providers only provide transportation and warehousing services. The integration, operation and monitoring of the complex resources of the supply chain and the maximization of the current and long-term benefits of the supply chain members remains an open a question. The initial concept of fourth party logistics (4PL) was introduced by Accenture, which is an integrator that assembles the resources, capability, and technology of its own organization and other organizations to design, build, and run comprehensive supply chain solutions [2]. Because the essence and core superiority of 4PL lies in its ability to integrate the supply chain resources, it encour- ages strategic alliances among 3PLs and manages the logistic process within the entire supply chain. Many articles, such as [1,3,7,19,20], have discussed this concept, revealing that 4PL will likely surpass 3PL and become the main logistics service mode in the following years. As 4PL plays an important role in modern logistics, many studies have been conducted on 4PL ever since its introduction. These stud- ies can be classified into two classes, one regarding the perspective of 4PL, which focuses on its macro-framework, such as its historical inevitability, advantages, and development prerequisites [3,11,19,22]; and one regarding the optimization of operational problems under the guidance of 4PL, such as the 4PL routing prob- lem (4PLRP) [4,12,13], the selection of 3PL suppliers [5,26], and the operational problems in the 4PL supply chain [14,15,24,25]. The routing problem is one of the most important issues in logistics and has received extensive attention from researchers over the past several decades. When studying the routing problem in 4PL, researchers found that it is more difficult than that in 3PL because more issues, such as the selection of 3PL providers, the cost and time factors, and the capacity and reputation of 3PL pro- viders, should be considered. In recent years, the 4PLRP has at- tracted increasing attention from researchers. There have been studies in the literature that apply different intelligent methods to solve the 4PLRP. Chen et al. [4] proposed a genetic algorithm (GA) for solving the 4PLRP with ten nodes. Li et al. [15] introduced some main optimization processes in the logistics operation, including routing optimization, job decomposition, and job assign- ment, and depicted the relationships between these processes. 0950-7051/$ - see front matter Ó 2013 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.knosys.2013.04.020 Corresponding author at: College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, China. Tel.: +86 24 83691272; fax: +86 24 83688608. E-mail address: [email protected] (M. Huang). Knowledge-Based Systems 50 (2013) 14–24 Contents lists available at SciVerse ScienceDirect Knowledge-Based Systems journal homepage: www.elsevier.com/locate/knosys

Fourth party logistics routing problem model with fuzzy duration time and cost discount

  • Upload
    xingwei

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Knowledge-Based Systems 50 (2013) 14–24

Contents lists available at SciVerse ScienceDirect

Knowledge-Based Systems

journal homepage: www.elsevier .com/locate /knosys

Fourth party logistics routing problem model with fuzzy duration timeand cost discount

0950-7051/$ - see front matter � 2013 Elsevier B.V. All rights reserved.http://dx.doi.org/10.1016/j.knosys.2013.04.020

⇑ Corresponding author at: College of Information Science and Engineering,Northeastern University, Shenyang, Liaoning 110819, China. Tel.: +86 24 83691272;fax: +86 24 83688608.

E-mail address: [email protected] (M. Huang).

Yan Cui a,b, Min Huang a,b,⇑, Shengxiang Yang c,b, Loo Hay Lee d,e, Xingwei Wang a,b

a College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning 110819, Chinab State Key Laboratory of Synthetical Automation for Process Industries, Northeastern University, Shenyang, Liaoning 110819, Chinac School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UKd Department of Industrial and Systems Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore 119260, Singaporee Logistics Engineering College, Shanghai Maritime University, Shanghai 201306, China

a r t i c l e i n f o a b s t r a c t

Article history:Received 10 September 2012Received in revised form 16 April 2013Accepted 21 April 2013Available online 9 May 2013

Keywords:Fourth party logisticsRouting problemChance constrained programmingMemetic algorithmLocal search

In this paper, from the viewpoint of a fourth party logistics (4PL) provider, a multi-source single-destina-tion 4PL routing problem with fuzzy duration time and cost discount (M-S 4PLRPFC) is described consid-ering the comprehensive ability of 3PL suppliers and nodes. A chance-constrained programming model isestablished for the M-S 4PLRPFC. Next, a memetic algorithm (MA) with a fuzzy simulation method isdesigned to solve the problem. Based on a set of problem instances as the test bed, experiments are per-formed to compare the performance of the proposed MA with those of the enumeration method and astandard genetic algorithm (SGA). The experimental results show that the proposed MA obtains the sameresults as the enumeration method and that it is than the SGA.

� 2013 Elsevier B.V. All rights reserved.

1. Introduction have discussed this concept, revealing that 4PL will likely surpass

With the development of science and technology, many compa-nies have outsourced their logistics to special logistics providersknown as third party logistics (3PL). Trebilcock [23] showed thatnearly 75% of the Fortune 500 companies have relied on 3PL ser-vices since 1996. Additionally, 83% of the top 500 manufacturersin the United States had already adopted 3PL by 2003 [16].

3PL has been widely accepted by many companies. However,most 3PL providers only provide transportation and warehousingservices. The integration, operation and monitoring of the complexresources of the supply chain and the maximization of the currentand long-term benefits of the supply chain members remains anopen a question. The initial concept of fourth party logistics (4PL)was introduced by Accenture, which is an integrator that assemblesthe resources, capability, and technology of its own organization andother organizations to design, build, and run comprehensive supplychain solutions [2]. Because the essence and core superiority of 4PLlies in its ability to integrate the supply chain resources, it encour-ages strategic alliances among 3PLs and manages the logistic processwithin the entire supply chain. Many articles, such as [1,3,7,19,20],

3PL and become the main logistics service mode in the followingyears.

As 4PL plays an important role in modern logistics, many studieshave been conducted on 4PL ever since its introduction. These stud-ies can be classified into two classes, one regarding the perspectiveof 4PL, which focuses on its macro-framework, such as its historicalinevitability, advantages, and development prerequisites[3,11,19,22]; and one regarding the optimization of operationalproblems under the guidance of 4PL, such as the 4PL routing prob-lem (4PLRP) [4,12,13], the selection of 3PL suppliers [5,26], and theoperational problems in the 4PL supply chain [14,15,24,25].

The routing problem is one of the most important issues inlogistics and has received extensive attention from researchersover the past several decades. When studying the routing problemin 4PL, researchers found that it is more difficult than that in 3PLbecause more issues, such as the selection of 3PL providers, thecost and time factors, and the capacity and reputation of 3PL pro-viders, should be considered. In recent years, the 4PLRP has at-tracted increasing attention from researchers. There have beenstudies in the literature that apply different intelligent methodsto solve the 4PLRP. Chen et al. [4] proposed a genetic algorithm(GA) for solving the 4PLRP with ten nodes. Li et al. [15] introducedsome main optimization processes in the logistics operation,including routing optimization, job decomposition, and job assign-ment, and depicted the relationships between these processes.

Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24 15

Huang et al. [12] considered the node-edge property with threedifferent scales and developed a mathematical model for the4PLRP. They designed an immune algorithm embedded with theDijkstra algorithm to solve the 4PLRP model developed. To enhancethe capability of seeking optimum solutions, Huang et al. [13] alsoproposed a hybrid immune algorithm by combining the memorybase with the immune operator, which was shown to be betterthan the original immune algorithm.

Many studies have been devoted to the 4PLRP, but some prob-lems remain. In the previous studies, the parameters are fixed anddeterministic, which is not realistic. In a real-world situation, thedriving conditions could be affected by many factors, such asweather and human factors. In the traditional way, researcherstend to use the stochastic optimization methods. However, undersome conditions, it is difficult to describe the parameters of theproblem as random variables because of insufficient data [17].For example, the duration time from one point to another is oftennot precise enough, e.g., ‘‘between 30 and 40 min’’, or ‘‘approxi-mately 1 h’’. Generally, we can use fuzzy variables to address theseuncertainty parameters. Additionally, all of the previous studies fo-cus on the single-source single-destination problem, while in real-world situations, such simple models are rarely or never represen-tative. Many large manufacturing enterprises need to assembleproducts with many parts, which may be made by their subsidiar-ies from different areas. Therefore, such enterprises will be moreinclined to resort to powerful logistics, such as 4PL, to serve theirneeds and integrate the supply chain resources.

Under this condition, a real-world model is developed for themulti-source single-destination 4PLRP with fuzzy duration timeand cost discount (denoted M-S 4PLRPFC) using the credibility the-ory, where the cost of 3PL suppliers or nodes is discounted whenthey undertake multiple tasks. In M-S 4PLRPFC, there is more thanone 3PL provider between two nodes, so it can be considered as aconstrained shortest path problem (CSPP) with multi-source andfuzzy parameters in a multi-graph.

The CSPP is a type of shortest path problem that includes someconstraints on the route. Although the CSPP and the fuzzy shortestpath problem (FSPP) have been studied over recent years, therehave been no attempts to study them together, not to mentionthe fuzzy constrained shortest path problem (FCSPP) in a multi-graph. The primary reason may be the difficulty in addressingthe infeasibility of a path and the comparison between fuzzy num-bers. One approach to solving the CSPP is to utilize a kth shortestpath algorithm, terminating with the first path that satisfies theconstraint [8]. This approach is impractical when the terminal va-lue of k is large. Therefore, it is not useful for solving the CSPP whenthere are many constraints.

Evolutionary algorithms are another way to solve the shortestpath problems. Haghighat et al. [10] used the genetic algorithm(GA) approach to solve the multicast routing problem. Ghoseiriand Nadjari [9] provided an ant colony algorithm for the bi-objec-tive SPP. Liu et al. [18] introduced the CSPP as an NP-hard problemand adopted an oriented spanning tree based the GA for solving themulti-criteria SPP as well as the multi-criteria CSPP. However, inour problem, there is usually more than one edge (3PL provider)that could be selected between any pair of nodes. It means thatwe need to get a shortest path in a multi-graph. Furthermore, fora multi-source SPP, the 3PL providers may be used more than once,which means that we need to determine whether a 3PL providerhas left enough available ability to be selected. Thus, our problemis more complex than the CSPP.

In this paper, a real world M-S 4PLRPFC model is built by usingthe credibility theory [17], and a GA with a double arrays encodingmethod based on the fuzzy simulation method is designed. As theGA easily falls into a local optimum, it cannot find a satisfactorysolution when the number of nodes increases to 30. Therefore,

the performance of the GA is improved by an memetic algorithm(MA) by using a local search algorithm. To test the performanceof the MA, numerical experiments are carried out to investigatethe performance of the proposed algorithm on a set of 4PLRPFC in-stances. The results show that MA obtains the same results as theenumeration method (EA) and that it is better at solving the M-S4PLRPFC than the GA is.

The rest of this paper is organized as follows. The next sectionintroduces the credibility theory and describes the M-S 4PLRPFCand the process of the fuzzy simulation. Section 3 describes theproposed MA for solving the M-S 4PLRPFC in detail. Section 4 pre-sents an experimental study investigating the performance of theproposed algorithm on some test M-S 4PLRPFC instances. Finally,Section 5 concludes this paper with some discussions on relevantfuture work.

2. Description of the M-S 4PLRPFC

In this section, the information of credibility space is first intro-duced. Then, the M-S 4PLRPFC is described. And last, fuzzy simula-tion method is developed according to the uncertainty theory.

2.1. Credibility space

Credibility theory was founded by Liu [17] as a branch of math-ematics for studying the behavior of fuzzy phenomena. Theemphasis is that credibility theory is based on following credibilitymeasure. Let H be a nonempty set, and P the power set of H. Eachelement in P is called an event. In order to present an axiomaticdefinition of credibility, it is necessary to assign to each event A anumber Cr{A} which indicates the credibility that A will occur.

Definition 1. The set function Cr is called a credibility measure if itsatisfies the following axioms:

Axiom 1. (Normality) Cr{H} = 1.Axiom 2. (Monotonicity) Cr{A} 6 Cr{B} wherever A � B.Axiom 3. (Self-Duality) Cr{A} + Cr{Ac} = 1 for any event A.Axiom 4. (Maximality) Cr{ [ iAi} = supiCr{Ai} for any event {Ai}

with supiCr{Ai} < 0.5.

Definition 2. Let H be a nonempty set, P the power set of H, andCr is a credibility measure. Then the triplet (H,P,Cr) is called acredibility space.

Definition 3. A fuzzy variable is defined as a function from a cred-ibility space (H,P,Cr) to the set of real numbers.

Definition 4. Let n be a fuzzy variable defined on the credibilityspace (H,P,Cr). Then its membership function is derived from thecredibility measure by

lðxÞ ¼ ð2Crfn ¼ xgÞ ^ 1; x 2 R

Membership function represents the degree of possibility thatthe fuzzy variable n takes some prescribed value. From credibilityinversion theorem which was proved in [6], it has followingformulation:

Crfn 2 Bg ¼ 12ðsup

x2BlðxÞ þ 1� sup

x2BclðxÞÞ

for any set of real numbers.

Definition 5. (critical value): Let n be a fuzzy variable, anda 2 (0,1]. Then

16 Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24

nsupðaÞ ¼ supfrjCrfn P rgP ag

is called the a – optimistic value to n; and

ninf ðaÞ ¼ inffrjCrfn 6 rgP ag

is called the a – pessmistic value to n.

2.2. Problem description

As shown in Fig. 1, the M-S 4PLRPFC can be represented by amulti-graph G(V,E), where V(jVj = n) is the set of nodes, which rep-resent cities or ports, and E is the set of edges, which connect pairsof nodes and represent different 3PL suppliers that are available toprovide the transportation service between connected nodes. Thevariables used in the representation of the M-S 4PLRPFC are de-fined as follows.

Decision variables

xs

ijk

1 if the kth edge between node i and node j(i, j = 1,2, . . . ,n; k = 1,2, . . . ,rij) is selected for thecorresponding task; 0 otherwise

ysi

1 if node i undertakes the corresponding task; 0

otherwise

Parameters

Cijk(Q) The unit cost quoted by the kth 3PL supplier between

node i and node j for transportation if it undertakes Qtasks for the 4PL

C0iðQ0Þ

The unit cost quoted by node i if it undertakes Q0 tasks

for the 4PL

Bs The total number of goods transported from the sth

source node

rij The number of 3PL suppliers (edges) between node i

and node j(i, j = 1,2, . . . ,n)

nijk The fuzzy duration time of the kth 3PL supplier

between node i and node j

gi The fuzzy duration time of node i, such as

processing, loading and unloading, changing vehicles,and storage

Ts

The due date of the task transported from the sthsource required by the customer

bsi

The number of goods received by node i when

transported from the sth node, which is defined asfollows:

bsi ¼

�Bs; if i is a source nodeBs; if i is the destination node0; otherwise:

8><>:

Pijk The transportation capacity of the kth 3PL supplier

between node i and node j

P0i The processing capacity of node i AAs The reputation that the selected 3PL suppliers are

required by the customer when goods are transportedfrom the sth source node

Aijk

The reputation of the kth 3PL supplier between node iand node j

A0i

The reputation of node i

Using the definition of variables above, the mathematical modelfor the M-S 4PLRPFC can be constructed. The objective of this prob-lem is to find routes from sources to the destination with the

minimum cost and is subject to constraints on the due date, 3PLsupplier’s reputation, and load requirement given by the customer.The mathematical model can be presented as follows:

Z ¼ minXS

s¼1

Xn

i¼1

Xn

j¼1

Xrij

k¼1

CijkðQÞBsxsijk þ

Xn

i¼1

C 0iðQ0ÞBsys

i

" #( )ð1Þ

s.t.

CrXn

i¼1

Xn

j¼1

Xrij

k¼1

nijkxsijkþ

Xn

i¼1

giysi 6 Ts

( )Pa; s2f1;2; . . . ;Sg ð2Þ

Xrij

k¼1

Xn

i¼1

Bsxsijk�

Xrij

k¼1

Xn

i¼1

Bsxsjik¼ bs

j ; j2f1;2; . . . ;ng; s2f1;2; . . . ;Sg ð3Þ

Xn

i¼1

Xrij

k¼1

xsijk¼ ys

j ; j2f2;3; . . . ;ng; s2f1;2; . . . ;Sg ð4Þ

Xn

j¼1

Xrij

k¼1

xsijk¼ ys

i ; i2f1;2; . . . ;n�1g; s2f1;2; . . . ;Sg ð5Þ

XS

s¼1

Bsxsijk6 Pijk; i; j2f1;2; . . . ;ng; k2f1;2; . . . ;rijg ð6Þ

XS

s¼1

Bsysi 6 P0i; i2f1;2; . . . ;ng ð7Þ

AAsxsijk6Aijk; i; j2f1;2; . . . ;ng; k2f1;2; . . . ;rijg; s2f1;2; . . . ;Sg ð8Þ

AAsysi 6A0i; i2f1;2; . . . ;ng; s2f1;2; . . . ;Sg ð9Þ

xsijk¼0 or 1; i; j2f1;2; . . . ;ng; k2f1;2; . . . ;rijg; s2f1;2; . . . ;Sg ð10Þ

ysi ¼0 or 1; i2f1;2; . . . ;ng; s2f1;2; . . . ;Sg ð11Þ

In the formulation, Eq. (1) is the objective function, i.e., mini-mizing the sum of the cost over the entire transportation job,whereQ ¼

PSs¼1xs

ijk ði; j 2 f1;2; . . . ;ng; k 2 f1;2; . . . ; rijgÞ; Q 0 ¼PS

s¼1ysi ði 2

f1;2; . . . ;ngÞ. Eq. (2) ensures that the credibility that the timeneeded on the route is not more than the due date Ts required bythe customer is not less than a, where a is a defined confidence le-vel (0 < a 6 1). Eq. (3) maintains a balance of the network flow. Eqs.(4) and (5) ensure that the selected nodes and edges are made upof routes from s source nodes. Eq. (6) ensures that the capacity con-straint of the selected 3PL supplier is not less than the transporta-tion capacity Bs required by the customer. Eq. (7) ensures that thecapacity of any node on the route is not less than Bs, which is re-quired by the customer. Eq. (9) ensures that the reputation of theselected 3PL supplier is not less than AAs, which is required bythe customer. Eq. (10) ensures that the reputation of any node isnot less than AAs, which is required by the customer. Finally, Eqs.(11) and (12) define xs

ijk and ysi , respectively, as 0–1 decision

variables.

2.3. Fuzzy simulation

In our problem, the constraint in Eq. (2) contains fuzzy param-eters. In this subsection, we use fuzzy simulation [17] to estimateit, which is given as follows:

Suppose xs and ys are two decision vectors, which are composedof xs

ijk and ysi ði; j 2 f1;2; . . . ;ng; k 2 f1;2; . . . ; rijg; s ¼ 1;2; . . . ; SÞ

respectively.Let

f ðxs; ys; n;gÞ ¼Xn

i¼1

Xn

j¼1

Xrij

k¼1

nijkxsijk þ

Xn

i¼1

giysi ð12Þ

where n and g are fuzzy vectors composed of nijk and gi

(i, j 2 {1,2, . . . , n},k 2 {1,2, . . . ,rij},s = 1,2, . . . ,S) respectively. And we

Fig. 2. Encoding structure of a solution.

Fig. 1. Multi-graph of the M-S 4PLRPFC.

Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24 17

denote that lnijkis the membership function of nijk and lgi

is themembership function of gi, respectively.

In the following we will show how to simulate the followingfuzzy function:

U : ðxs; ysÞ�!minf�f s j Crff sðxs; ys; n;gÞ 6 �f sgP ag ð13Þ

where 0 < a 6 1, s = 1,2, . . . ,S.Firstly, generate hq

ijk and rqi from the e-level sets of fuzzy

variables nijk and gi (i, j 2 {1,2, . . . ,n},k 2 {1,2, . . . ,rij})respectively, where e is a sufficiently small positive number,q = 1,2, . . . ,N, and N is a sufficiently large number. Set

mq ¼mini;j;k lnijkhq

ijk

� �n oVminiflgi

rqi

� �g ðq ¼ 1;2; . . . ;NÞ. Accord-

ing to the concept of credibility measure, for any number r, weset[17]

LsðrÞ ¼ 12

max16q6N

mqjf sq ðxs; ysÞ 6 r

n oþ min

16q6N1� mqjf s

q ðxs; ysÞ > rn o� �

It follows from monotonicity that we may employ bisection searchto find the maximal value r such that Ls(r) P a. This value is an esti-mation of �f s. The process can be run as follows:

Step 1: Set s :¼ 1.Step 2: Generate hq

ijk and rqi from the e-level sets of fuzzy variables

nijk and gi (i, j 2 {1,2, . . . ,n},k 2 {1,2, . . . , rij}) respectively,where e is a sufficiently small positive number, andq = 1,2, . . . ,N.

Step 3: Set mq ¼mini;j;kflnijkðhq

ijkÞgV

miniflgiðrq

i Þg ðq ¼ 1;2; . . . ;NÞfor q = 1,2, . . . ,N.

Step 4: Find the minimal value r such that Ls(r) P a.Step 5: Set �f s :¼ r.Step 6: If s P S, output �f s (s = 1,2, . . . ,S), otherwise s :¼ s + 1 and

return to Step 2.

Then Eq. (2) could be rewritten as follows:

�f s6 Ts ð14Þ

where s = 1,2, . . . ,S.

3. Proposed memetic algorithm for the M-S 4PLRPFC

In this section, the memetic algorithm based on the fuzzy sim-ulation is designed to solve the M-S 4PLRPFC. In the following, wefirst describe the MA in detail and then introduce an enumerationalgorithm, which is used to check the quality of the solutions ob-tained by the MA.

3.1. The memetic algorithm

MAs are improved GAs in which a local search is used to inten-sify the search [21]. In this paper, an MA with a double arraysencoding method is proposed. In the main loop of the algorithm,the selection, crossover, mutation, and local search operators areindependently applied to each individual in the current population.The major components of the proposed MA will be described in de-tail in the corresponding sub-sections.

18 Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24

3.1.1. Adaptive double arrays encodingAccording to the characteristics of the M-S 4PLRPFC, an

encoding based on two ordered arrays is adopted to representa chromosome in the MA (see Fig. 2), where the first array con-sists of cities (nodes) encoded by natural numbers and the sec-ond array consists of 3PL suppliers (edges) encoded byintegers. The chromosome length is variant. For the multi-sourceproblem, there will be multiple routes representing the wholejob. The paths (s = 1,2, . . . ,S) array is a permutation of the citieson the route starting from the sth source node, and v1s andvms are the sth source node and the destination, respectively.v2s ; . . . ;v ðm�1Þs are the intermediate cities between v1s and vms .This array means that transporting goods from v1s to vms re-quires v2s ; . . . ;v ðm�1Þs as ports. The PLs array is a list of 3PL pro-viders for the above transportation. For example, if ev1s v2s k1 ¼ 2,then if we start from the sth source node v1s and transportgoods from city v1s to city v2s , the 3PL supplier with index 2 be-tween the two cities is selected. Additionally, ki

(i = 1,2, . . . ,m � 1) means that the ith 3PL supplier on the routeselected for the transportation from node v is to v ðiþ1Þs .

The two arrays together form an individual on which geneticoperators will be applied. Each individual corresponds to Spaths as a solution. However, not all the combinations are fea-sible because we may not find a 3PL provider to connect tworandomly chosen cities [15]. To avoid infeasible individualsusing the above encoding method, a corresponding adjacentmatrix is constructed in the initialization phase, as describedbelow.

3.1.2. InitializationThe initialization process involves the selection nodes and

edges on the route. Taking Fig. 1 as an example, the correspondingadjacent matrix D with node v1s ¼ 1 as the sth source node andnode vms ¼ 8 as the destination is given as follows:

Fig. 3. Route g

D ¼ ðdijÞ8�8 ¼

0 3 4 0 0 0 0 00 0 2 3 0 2 2 00 2 0 3 3 2 2 00 3 3 0 2 3 2 00 0 3 2 0 2 3 00 2 2 3 2 0 2 30 2 2 2 3 2 0 30 0 0 0 0 0 0 0

266666666666664

377777777777775ð15Þ

where dij 2 D represents whether node i is linked to node j directlyin the multi-graph G(V,E). If there is no edge between node i andnode j, dij is set to zero; otherwise, dij is set to the number of edgesbetween node i and node j. Furthermore, during the transportationprocess, goods are not allowed to return to the source city afterleaving and do not continue to travel after arriving at thedestination.

The multi-graph G(V,E) can be converted into a simple graph asfollows. An edge is randomly selected from available edges be-tween any adjacent nodes in the multi-graph so that a sub-graphG0(V0,E0), where V0 = V and E0 is the set of edges in the sub-graph,is obtained, which can be described as a matrix F (F = (fij)n�n).Fig. 3a is a simple graph generated as above. For example, the ele-ment f12 = 2 indicates that in the simple graph G0, when goods aretransported between city 1 and city 2, the second 3PL supplier ischosen to complete the task.

A feasible solution is generated based on the simple graph. Westart from the source node v1s and choose an adjacent node ran-domly as the second node (v2s ) (using Fig. 3a as an example,v2s ¼ 2). If v1s and the 3PL supplier represented by fv1s v2s satisfythe capacity and reputation required by the customer, we usefv1s v2s to perform the transportation between node v1s and v2s ,and set P0i :¼ P0i � Bs, Pijk :¼ Pijk � Bs; Fð�;v2s Þ :¼ 0 (where Fð�;v2s Þdenotes all elements in the v2s th column of F); otherwise, we set

eneration.

Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24 19

fv1s v2s :¼ 0 and choose another adjacent node to examine as above.During this process, if Fðv is ; �Þ ¼ 0, which means that there is nonode adjacent to the current node v is , we generate a new simplegraph and repeat the above process until we reach the destination,which means a route is generated. This process is repeated for Stimes starting from each of the S source nodes. Then, an initialsolution is generated. We record the used time of the nodes andedges and calculate the cost of the S routes. From Fig. 3, we cansee that v3s ¼ 7 (Fig. 3b), v4s ¼ 4 (Fig. 3c), v5s ¼ 5 (Fig. 3d),v6s ¼ 6 (Fig. 3e) and v7s ¼ 8 (Fig. 3f).

3.1.3. Fitness functionA fitness function is usually designed according to the objective

function and constraints of the problem. In this paper, the timeconstraint is used as a penalty added to the objective function.(The capacity and reputation constraints are adjusted after thecrossover operation in Section 3.1.6). Thus, the objective functionof a chromosome is represented as follows:

f ðRÞ ¼XS

s¼1

Xn

i¼1

Xn

j¼1

Xrij

k¼1

CijkEsxsijk þ

XS

s¼1

Xn

i¼1

C 0iEsys

i þ b �XS

s¼1

maxð0;�f s � TsÞ ð16Þ

where b (b P 1) is a penalty factor, which can be set according to aparticular problem. Usually, b is set to be a given value and it is de-fined in Section 4.2.

To calculate the fitness of individuals, we first sort the popula-tion size (PS) individuals in the population in the order of decreas-ing objective value (i.e., the better the chromosome is, the smallerthe ordinal number it has). Supposing that the parameter c 2 (0,1)is given, the rank-based evaluation function for calculating the fit-ness of each chromosome Ii is given as follows:

evalðIiÞ ¼ cð1� cÞi�1; i ¼ 1; . . . ; PS ð17Þ

3.1.4. Selection mechanismThe selection process is based on the roulette wheel selection

scheme, which is a fitness-proportional selection. We spin the rou-lette wheel PS times. Each time we select a single individual intothe mating pool to undergo crossover and mutation. The selectionprocess is as follows:

Step 1 : Calculate the cumulative probability qi for each individ-ual Ii (i = 1, . . . ,PS):

q0 ¼ 0; qi ¼Xj¼i

j¼1

evalðIjÞ; i ¼ 1; . . . ; PS ð18Þ

Step 2 : Generate a random number r 2 (0,qPS].Step 3 : Select the individual Ii such that qi�1 < r 6 qi

(i 2 {1, . . . ,PS}).Step 4 : Repeat Step 2 and Step 3 PS times to select PS individuals.

3.1.5. Crossover operationIn every generation, crossover is applied to parents with a cross-

over probability Pc. Due to the characteristics of the encodingmethod, an individual represents multiple routes. The crossoveroperation occurs separately on every route. Suppose that A and Bare two individuals, as shown in Fig. 4, to be exchanged as follows.

Let us take A1s ðA

1s ¼ path1

s Þ and B2s ðB

2s ¼ path2

s Þ as an example toshow how crossover is operated. Firstly, we determine the numberof nodes on path1

s and path2s , and record the smaller value as L. Sec-

ondly, we generate a random crossover point h between 2 andL � 2. Thirdly, two children are generated by exchanging the genet-ic materials of pathi

s and PLis (i = 1,2), after the crossover point h.

The crossover process for the node array and the 3PL suppliers ar-ray are as shown in Figs. 5 and 6, respectively. Finally, we must

examine the legality of the children using the following rule. Ifthere are two nodes that are the same on the route, we deletethe part between them, keep one of the two nodes, and calculatethe time and cost for the new route; otherwise, if the new childis still a route from the source to the destination, quit with success.If not, we examine whether the node before the crossover point isconnected with the one behind it. If so, we delete the part betweenthem and randomly add a corresponding 3PL supplier; otherwise,quit with failure. If the child is infeasible, we use the correspondingparent to replace it.

3.1.6. Adjustment to infeasible 3PL providersDue to the multiple sources in the problem, after the crossover

operation, some genes of the individual (some nodes (intermediatecites) or 3PL providers on the route) may not have enough capacity,may have undertaken more tasks, or may have a reputation that can-not satisfy the customer’s requirement. To address the problem thatsome genes cannot meet the requirements of capacity or reputation,which is caused by the crossover operation, we redistribute thecapacity and examine the reputation of all the genes as follows.

Firstly, we redistribute the capacity used by nodes and edges andset Pijk and P0i to their initial values. For each route, e.g., the sth(s 2 {1,2, . . . ,S}) route, we examine whether the capacity or reputa-tion remaining on both the nodes and edges can satisfy the cus-tomer’s requirement. For nodes, if both the capacity andreputation meet the customer’s requirement, we set P0i :¼ P0i � Bs;otherwise, we generate a corresponding route again using the meth-od mentioned in Section 3.1.2. For each edge, if both its capacity andreputation meet the customer’s requirement, we set Pijk :¼ Pijk � Bs;otherwise, we examine whether there are any other 3PL providersthat can satisfy the requirement. Such 3PL providers exist, we ran-domly select one and set Pijk :¼ Pijk � Bs; otherwise, we generate acorresponding route again using the method mentioned inSection 3.1.2.

When a new feasible solution is obtained, we calculate the timeand cost for nodes and edges for this solution.

3.1.7. Mutation operationMutation is carried out on the PL array of individuals according

to a probability Pm as follows:

Step 1 : Calculate the total number of nodes in the path array ofan individual, denoted as P1.

Step 2 : Generate an integer p randomly between 1 and P1 � 1.Step 3 : Choose another 3PL supplier k0 randomly from those that

have sufficient capacity and reputation to replace the one(k) between node p and node p + 1 of the individual. SetPp,p+1,k :¼ Pp,p+1,k + Bs and Pp,p+1,k0 :¼ Pp,p+1,k0 � Bs.

3.1.8. Local searchConsidering the cost discount for multi-task, local search (LS) is

employed to adjust routes by re-organizing some nodes or 3PLsuppliers. Here, two LS operators are designed: one edge-basedLS operator and one node-based LS operator. For the edge-basedLS operator, the usage of each edge on an individual is checked.If the edge is only used once, we check whether other routes fromdifferent sources have used some edges with the same end nodesas those of this edge. If so, we calculate the number of such edgesand check whether any of them satisfy the capacity and reputationrequirement of the customer. If there are such edges, we chooseone of them randomly to replace the original edge and changethe capacity and usage of relevant two 3PL providers; otherwise,we make no change. We check all the edges of an individual thatare only used once and perform the edge exchanging operationas above to obtain a better multi-task discount and hence an im-proved solution.

Fig. 7. Physical map of an M-S 4PLRPFC.

Fig. 6. Crossover operation for edges.

Fig. 5. Crossover operation for nodes.

Fig. 4. Two individuals waiting for crossover.

20 Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24

For the node-based LS scheme, we take a chromosome I as anexample. We choose two routes randomly from I, denoted as I1

and I2. We take the first route as a template and find the commonnodes (vv1, . . . ,vvo, o is the number of common nodes) between I1

and I2. If o P 2, we try to change the route of I2 between vvi andvvi+1 (i = 1, . . . ,o � 1) as follows:

Step 1 : Set i :¼ 0.Step 2 : i :¼ i + 1. If i < o, go to Step 3; otherwise, go to Step 5.Step 3 : If there is any node between vvi and vvi+1, go to Step 4;

otherwise, check whether the edge between vvi and vvi+1

used by I1 still has the capacity and reputation that cansatisfy the requirement given by the customer for I2. Ifnot, go to Step 2; otherwise, we use that edge to replacethe edge between vvi and vvi+1 in I2, update the capacityand reputation of the two involved edges in I1 and I2, andthen go to Step 2.

Step 4 : Check whether each node between vvi and vvi+1 in I1 hasenough remaining capacity and reputation to satisfy therequirement given by the customer for I2. If there is anynode that cannot satisfy the requirement, go to Step 2;otherwise, check whether each edge between vvi andvvi+1 used by I1 can satisfy the requirement of I2.

Step 4.1 : If so, we replace the nodes and edges between vvi andvvi+1 on I2 by the corresponding nodes and edgesbetween vvi and vvi+1 on I1, renew the correspondingcapacity and reputation of involved nodes and edges,and then go to Step 2.

Step 4.2 : Otherwise, for each edge between vvi and vvi+1 on I1

that cannot satisfy the requirement of I2, check whetherthere is any other 3PL provider with the same end nodesas those of this edge that can satisfy the requirement ofI2. If there is no such 3PL provider, go to Step 2; other-wise, we use such a 3PL provider instead for that edge.

Eventually, we form a new sub-route between vvi andvvi+1 in I1 that can satisfy the requirement of I2. Use thissub-route to replace the nodes and edges between vvi

and vvi+1 on I2, renew the capacity and reputation ofinvolved nodes and edges, and then go to Step 2.

Step 5 : Calculate the fitness of the newly created solution,denoted I0. If I0 is better than the original solution I, wereplace I with I0.

For each individual, we can randomly select the edge-based LSoperator or the node-based LS operator to improve its fitness value

Table 1The data of nodes for the 8-node problem.

Node Cost Time Capacity Reputation

1 6 (1.0,1.5,2.0) – 42 3 (0.4,0.6,0.7) 10 33 3 (0.5,0.6,0.7) 8 44 5 (0.8,1.2,1.5) 7 25 10 (2.0,4.0,6.0) 6 26 9 (1.0,2.0,3.0) 9 37 8 (1.0,1.5,3.0) 6 48 7 (0.5,1.0,2.0) – 3

Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24 21

and update the individual if a better solution arises according tothe fitness value.

3.1.9. Framework of the proposed MAThe framework of the proposed MA can be summarized as

follows:

Step 1 : Initialize the adjacent matrix according to the modelgraph.

Step 2 : Generate the initial population of PS individuals, wherePS denotes the population size.

Step 3 : Select individuals by the roulette wheel selectionscheme.

Step 4 : Perform crossover operations on pairs of selected indi-viduals with a crossover probability Pc.

Step 5 : Update the capacity infeasible 3PL providers with feasi-ble ones.

Step 6 : Perform mutation operations to individuals with amutation probability Pm.

Step 7 : Perform local search operations to each individual andupdate happens when a better solution arises accordingto the fitness value.

Step 8 : Calculate the fitness value of each solution and updatethe elitism if a better solution arises.

Step 9 : Check whether the maximum allowable number of gen-erations, denoted NG, is reached. If not, go to Step 3;otherwise, go to Step 10.

Step 10 : Stop the process and output the best solution.

Table 2The data of edges for the 8-node problem, where ‘‘S’’ and ‘‘E’’ mean the start and end nodesand ‘‘A’’ are respectively the cost, transportation capacity, and reputation of the correspon

S E E0 C P A Time

1 2 1 1 7 2 (0.2,0.3,0.4)1 2 2 2 6 3 (0.1,0.25,0.3)1 2 3 3 8 5 (0.1,0.15, 0.3)1 3 1 3 5 3 (1.3,1.5,1.6)1 3 2 5 7 2 (1.1,1.3,1.5)1 3 3 4 6 3 (1.2,1.4,1.6)1 3 4 6 8 4 (1.1,1.2,1.3)2 3 1 5 5 5 (2,2.2,2.5)2 3 2 6 7 7 (1.8,2,2.3)2 4 1 10 8 5 (2,3,4)2 4 2 8 8 3 (2,4,6)2 4 3 6 6 4 (2,5,7)2 6 1 10 7 3 (18,20,21)2 6 2 11 4 6 (18,19,22)2 7 1 11 6 5 (20,22,24)2 7 2 12 5 4 (18,20,23)3 4 1 5 3 4 (1.2,1.5,1.8)3 4 2 4 4 5 (1.5,1.8,2)3 4 3 3 5 2 (1.4,1.6,1.7)3 5 1 9 8 4 (9,11,14)3 5 2 7 7 3 (10,13,15)3 5 3 8 8 4 (9,12,14)3 6 1 9 8 3 (14,16,18)

3.2. The enumeration method

To check the quality of the solutions obtained by the MA, theenumeration method (EM) is used. Because the solution space isvery large, the enumeration method is described as follows:

Firstly, produce all the routes from the first source to the desti-nation on a simple graph generated in Section 3.1.2 that satisfy therequirements of capacity and reputation. Find all the routes fromthe first source on the original multi-graph by exchanging the3PL supplier with all the other legal ones and record the usage ofthe nodes and edges. Secondly, for the route generated from thefirst step, we remove the 3PL suppliers and nodes’ capacity infor-mation on G and produce all the routes from the second sourcenode to the destination. This process continues until all the routesfrom the S source nodes are generated. Finally, all the combina-tions of S routes are checked and ordered according to the fitnessfunction. The combination with the lowest fitness function valueis the best solution.

4. Numerical experiments

In this section, we present experiments used to investigate theperformance of the proposed MA for the M-S 4PLRPFC. The exper-iments are based on two kinds of 4PLRPFC instances as the test bedto compare the solution quality of the proposed MA against the EMand a standard GA (SGA). All the investigated algorithms were en-coded in Matlab 7.0 and run on a Core 2 2.83 GHz PC.

4.1. The M-S 4PLRPFC examples

We use two kinds of M-S 4PLRPFCs as the test examples in thisstudy. For the first 8-node M-S 4PLRPFC, we assume that a 4PLcompany undertakes transnational transportation from Beijing,Tianjin and Shanghai (the source cities) to Canberra (the destina-tion city) and the intermediate cities between them are Hong Kong,Darwin, Brisbane, and Sydney. If there is any business between twocities, an edge is added (see Fig. 7), where each city has the prop-erties of cost, time, and capacity. Because several 3PL supplier com-panies may exist for transportation between any two cities, there

, respectively, and ‘‘E’ ’’ means the edge between the start and end nodes, and ‘‘C’’, ‘‘P’’,ding 3PL supplier.

S E E0 C P A Time

3 6 2 8 6 4 (16,17,21)3 7 1 9 7 2 (16,19,20)3 7 2 10 5 5 (15,17,19)4 5 1 6 7 3 (9,10,14)4 5 2 7 8 2 (8,9,12)4 6 1 13 7 6 (19,22,24)4 6 2 14 9 3 (18,20,23)4 6 3 12 6 4 (21,23,25)4 7 1 14 5 3 (22,24,26)4 7 2 15 7 3 (24,26,28)5 6 1 8 8 4 (3,3.5,4)5 6 2 7 7 5 (2.9,3.2,3.7)5 7 1 10 7 2 (3.5,3.8,4)5 7 2 8 6 3 (3.8,4.1,4.4)5 7 3 11 8 3 (3.2,3.5,3.8)6 7 1 2 5 4 (0.8,1.1,1.2)6 7 2 3 8 6 (0.7,0.9,1.0)6 8 1 1 7 4 (0.5,0.6,0.7)6 8 2 2 6 3 (0.4,0.5,0.7)6 8 3 3 8 3 (0.3,0.4,0.6)7 8 1 3 5 4 (0.2,0.3,0.4)7 8 2 1 7 5 (0.3,0.5,0.6)7 8 3 2 8 3 (0.3,0.4,0.6)

Table 4Comparison of cost in non-discount and discount, where ‘‘4’’ means cost1 � cost2.

Non-discount DiscountNodes Path PL Cost1 Path PL Cost2 D

8 [1,3,6,8;2,5,8;3,6,8] [1,2,2;3,1;1,1] 101 [1,3,6,8;2,6,8;3,6,8] [1,1,2;1,1;1,1] 86 15[1,5,9,13,16,19,23, [1,3,3,1,1,3, [1,5,9,13,16,19,23, [1,3,2,1,3,2,

30 26,30;2,4,7,11,14, 3,1;1,1,4,1, 564 26,30;2,5,8,11,15, 1,1;1,1,2,1, 507 5718,22,26,30;3,5,9, 1,2,3,3;2,1, 19,22,26,30;3,8, 1,2,3,1;2,2,13,16,19,23,26,30] 2,2,1,1,3,1] 11,16,19,23,26,30] 1,3,1,1,1][1,5,9,14,17,22,26, [2,4,2,2,3,2 [1,5,9,14,17,22,26, [2,4,2,2,3,2,30,34,39,43,48,50 2,1,1,2,1,3 30,34,37,41,45,50 2,1,2,1,2,1

50 ;2,4,8,13,18,22,26, ;3,2,1,1,4,3,1, 743 ;2,5,9,13,18,22,26, ;1,4,3,1,2,2, 653 9030,33,38,42,47,50 1,3,4,1,2 30,33,37,41,45,50 2,1,3,1,2,1;3,7,11,16,19,23,28, ;3,2,2,4,1,2,3, ;3,5,9,13,18,23,26, ;4,2,3,2,1,4,32,34,38,41,45,50] 2,1,3,2,4] 30,34,37,41,46,50] 2,1,1,2,2,3]

Table 3Comparison of MA with different a, where ‘‘(s = 1,2,3)’’, ‘‘n’’ means the number of nodes, and ‘‘C’’ means the cost of the best solution, whose Path and 3PL arrays are as shown.

a n Bs Ts C Path 3PL

0.8 8 2,3,4 26,25,24 86[1,3,6,8..

.2,6,8..

.3,6,8] [1,1,2..

.1,1..

.1,1]

0.7 8 2,3,4 26,25,24 84[1,2,6,8..

.2,6,8..

.3,6,8] [1,1,1..

.1,2..

.2,1]

0.6 8 2,3,4 26,25,24 75[1,2,6,8..

.2,6,8..

.2,6,8] [1,1,2..

.2,1..

.1,1]

[1,5,9,13,16,19,23,26,30 [1,3,2,1,3,2,1,10.8 30 3,3,4 136,133,125 507 ..

.2,5,8,11,15,19,22,26,30 ..

.1,1,2,1,1,2,3,1

..

.3,8,11,16,19,23,26,30] ..

.2,2,1,3,1,1,1]

[1,5,9,13,16,19,23,26,30 [1,1,3,3,3,2,3,10.7 30 3,3,4 136,133,125 481 ..

.2,5,9,14,18,22,26,30 ..

.1,1,3,1,2,3,2

..

.3,5,9,13,16,19,23,26,30] ..

.2,1,3,3,2,2,3,1]

[1,5,9,13,16,19,23,26,30 [2,1,3,3,3,3,3,10.6 30 3,3,4 136,133,125 469 ..

.2,5,9,14,18,22,26,30 ..

.1,2,3,2,1,1,1

..

.3,5,9,13,16,19,23,26,30] ..

.1,1,3,3,3,2,3,1]

[1,5,9,14,187,22,26,30,34,37,41,45,50 [2,4,2,2,3,2,2,1,2,1,2,10.8 50 3,5,3 252,250,245 653 ..

.2,5,9,13,18,22,26,30,33,37,41,45,50 ..

.1,4,3,1,2,2,2,1,3,1,2,1

..

.3,5,9,13,18,23,26,30,34,37,41,46,50] ..

.4,2,3,2,1,4,2,1,1,2,2,3]

[1,5,9,13,18,23,26,30,34,37,41,45,50 [2,4,3,2,1,4,2,1,1,2,2,10.7 50 3,5,3 252,250,245 644 ..

.2,5,9,13,18,22,26,30,33,37,41,45,50 ..

.3,4,3,2,3,1,2,1,3,2, 2,1

..

.3,5,9,14,18,23,26,30,34,37,41,46,50] ..

.4,2,2,1,1,4,2,1,1,1,2,1]

[1,5,9,14,18,23,26,30,34,37,41,45,50 [2,4,1,2,1,4,2,1,1,2,2,10.6 50 3,5,3 252,250,245 637 ..

.2,4,9,13,18,22,26,34,37,41,45,50 ..

.2,4,1,2,1,4,2,1,1,1,2,1

..

.3,5,9,13,18,23,26,30,33,37,41,46,50] ..

.3,2,2,1,1,4,2,3,3,2,2,1]

22 Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24

may be multiple edges between them (one edge stands for a 3PLsupplier). This results in a multi-graph, where each edge and nodehas properties of cost, time, capacity, and reputation. Here, themulti-graph for the M-S 4PLRPFC shown in Fig. 7 is shown inFig. 1, where each city is assigned an index. Suppose the fuzzy timeis represented by triangular fuzzy numbers and assume the follow-ing definition:

cijk: the unit cost quoted by the kth 3PL supplier between node iand node j for transportation, if it only undertakes one task for the4PL.

c0i: the unit cost quoted by node i for processing, inventory, load-ing, unloading, etc., if it only undertakes one task for the 4PL.

Additionally,

CijkðQÞ ¼cijk; Q ¼ 0or10:9 � cijk; Q ¼ 20:8 � cijk; Q P 3

8><>: ; C 0iðQ0Þ ¼

c0i; Q 0 ¼ 0or10:9 � c0i; Q 0 ¼ 20:8 � c0i; Q 0 P 3

8><>:The node and edge data are given in Table 1 and Table 2,

respectively.

The other M-S 4PLRPFCs are small scale M-S 4PLRPFCs with 30and 50 nodes and large scale M-S 4PLRPs with 100, 500, 1000,1500 and 2000 nodes. All of them are generated randomly. We useH :¼ [a,b] to mean that H is an integer number randomly generatedbetween a and b. Supposing the fuzzy times used in these examplesare also triangular fuzzy numbers, the parameters are set as follows:

rij :¼ ½2;5�; if ji� jj65; i – n; and ði – j; otherwise; rij :¼0:Cij1 :¼ ½2;30�; Cijk :¼Cijðk�1Þ þ ½1;3�; k P 2:

nMij1 :¼ ½4;20�; nL

ij1 :¼ nMij1�½1;3�;n

Uij1 :¼ nM

ij1þ½1;3�:nL

ijk :¼ nLijðk�1Þ � ½1;3�; nM

ijk :¼ nMijðk�1Þ � ½1;3�;

nUijk :¼ nU

ijðk�1Þ � ½1;3�; k P 2: Bs :¼ ½3;6�:g0Mi :¼ ½4;9�; g0Li :¼g0Mi �½1;3�; g0Ui :¼g0Mi þ½1;3�:Aijk :¼ ½2;7�: Pijk :¼ ½5;9�: ðAs :¼ ½2;5�: Ps :¼ ½2;5�:C 0i :¼ ½6;15�: P0i :¼ ½6;12�:

The data are generated using the above method with n = 30, 50, 100,500, 1000, 1500 and 2000. Set S = 3, i, j = 1,2, . . . ,n, k = 1,2, . . . , rij, and

Table 5Comparison of Two Algorithms with Different Sizes.

Algorithm Nodes Edges Ts (s = 1,2,3) PS NG Best Bad Arg msd Time

SGA 8 46 26,25,24 30 30 86 90 87 1.1 <1MA 8 46 26,25,24 30 30 86 88 86 0.5 <1EM 8 46 26,25,24 – – 86 86 86 - 5221SGA 30 766 136,133,125 80 40 507 523 515 7.2 2MA 30 766 136,133,125 50 40 507 514 510 1.8 4EM 30 766 136,133,125 - - - - - - -SGA 50 1414 252,250,245 100 60 653 678 662 10.6 10MA 50 1414 252,250,245 80 60 653 663 657 3.4 19EM 50 1414 252,250,245 - - - - - - -SGA 100 3104 600,610,620 200 100 2049 2105 2188 52.6 62MA 100 3104 1800,1900,2000 100 100 2049 2131 2085 14.2 130EM 100 3104 1800,1900,2000 - - - - - - -SGA 500 15700 1800,1900,2000 1000 200 3862 4415 4119 87.3 137MA 500 15700 1800,1900,2000 400 200 3862 4077 3963 23.6 246EM 500 15700 1800,1900,2000 - - - - - - -SGA 1000 31345 3000,3100,3200 1500 400 8264 8631 8411 131.9 526MA 1000 31345 3000,3100,3200 600 400 8264 8341 8308 31.7 953EM 1000 31345 3000,3100,3200 - - - - - - -SGA 1500 47119 4900,5000,5100 2000 600 17392 18153 17622 195.2 1291MA 1500 47119 4900,5000,5100 800 600 17313 17449 17392 40.5 2137EM 1500 47119 4900,5000,5100 - - - - - - -SGA 2000 63250 7000,7100,7200 2500 800 25602 27006 26549 327.7 1905MA 2000 63250 7000,7100,7200 1000 800 25488 25653 25554 53.1 2911EM 1500 47119 4900,5000,5100 - - - - - - -

Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24 23

s = 1,2, . . . ,S. The nodes indexed 1, 2 and 3 are the sources and thenodes indexed 30, 50, 100, 500, 1000, 1500, and 2000 are respec-tively as the destination node.

4.2. Performance analysis

4.2.1. Effect of a on the decisionIn this section, the effect of a on the decision is tested with the

small scale examples, which have 8, 30 and 50 nodes, respectively.Record the average time taken by the algorithm for one run. Theparameters considered are the number of generations (NG), PS, K,Pc, and Pm. The algorithms were run 100 times and the best solu-tion (Best), the worst solution (Bad), the average value (Avg), andthe mean square deviation of TðmsdÞ were recorded. Avg and msdwere computed by

AvgðTÞ ¼ 1II

XII

i¼1

Ti

and

msdðTÞ ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi

1II � 1

XII

i¼1ðTi � AvgðTÞÞ22

rwhere II is the number of runs and Ti is the best solution in the ithrun.

The parameters are set as follows:

b ¼ 20; c ¼ 0:05; PS ¼ 20; NG ¼ 30; Pc ¼ 0:5; Pm ¼ 0:2

The experimental results are shown in Table 3. Using 8-node M-S4PLRPFC as an example, if the due date is set to 26, 25, or 24 days,the capacity is set to be 2, 3, and 4 and the reputation is 2, 3, and 3for each source node. When the credibility parameter a is set to 0.8,the total cost is 85.8 (�86) and CrfeT 6 Tg ¼ 0:8. In the 4PL opera-tion, this means that when goods are to be transported from Beijingto Canberra within 26 days with a credibility 0.8, the best choice isto use Shanghai and Brisbane as interim ports, and the 3PL supplierswith indexes 1, 1, and 2 are chosen for the three links from Beijingto Shanghai, Shanghai to Brisbane, and Brisbane to Canberra,respectively. In the same way, when goods are to be transportedfrom Tianjin and Shanghai to Canberra within 25 and 24 days,respectively, Brisbane is used as the interim port, and the 3PL

suppliers with the same index 1, 1 and 1, 1 are chosen for the cor-responding links from Tianjin to Brisbane, Brisbane to Canberra,Shanghai to Brisbane, and Brisbane to Canberra, respectively. Itcosts the 4PL company 86 to finish the entire job.

From Table 3, it can also be seen that given a due date (Ts) foreach route, when a is changed, the most suitable routes are differ-ent. Given the same due date, the cost needed on the routes will beless with the requirement of a lower credibility level. Therefore,the customers could select which a is the best considering theirtime requirements.

4.2.2. Effect of the cost discount on the decisionThe results of cost in non-discount and discount with n = 8, 30

and 50 are tested. From Table 4 we can see that, as the 3PL provid-ers and transit nodes contribute a cost discount when they under-take multiple tasks, 4PL providers would prefer to select a 3PLprovider or node to perform multiple jobs to reduce the total costand accelerate the transfer links, allowing them to gain more profit.

4.2.3. Effect of the problem scale on the algorithmThe purpose of the experiments in this section is to evaluate the

efficiency of the designed MA for solving M-S 4PLRPFC with differ-ent scale examples.

The experiments include the above three small scale problemsand five randomly generated large scale problems with the numberof (nodes, edges) equal to (100,3104), (500,15,700), (1000,31,345),(1500,47,119), and (2000,63,250), requiring 1, 2, 12, 38 and 89s,respectively, to generate the large networks. The parameters ofthe test algorithms were set based on the balance between theoperator Avg and msd.

The first four examples are executed for 50 runs, and the otherexamples are executed for 20 runs. To compare the running time ofeach algorithm, the time values computed in the following do notinclude the time required to generate the network.

In Table 5, ‘‘ � ’’ means that a solution could not be obtainedwithin in an acceptable time. According to the EM designed in Sec-tion 3.2, for the 8-node problem, there are approximately 189800combinations in one simple graph and over 6.0 � 1010 combina-tions in the multi-graph, and its optimal result is the same as thatobtained by MA and SGA. When EM is used in problems with more

24 Y. Cui et al. / Knowledge-Based Systems 50 (2013) 14–24

nodes, i.e., the 30- and 50-node problems, it cannot produce anoptimal result within an acceptable time. With a credibility level0.8, from Table 5, it can be seen that the solution obtained byMA and SGA is optimal and that MA and SGA use much less timethan EM.

For the relatively large scale problems, from Table 5, it can beseen that SGA can obtain the same best solution as the MA forthe problems with 100, 500, and 1000 nodes. However, the averagequality of the obtained solutions and the deviations, even the badsolution obtained by the designed MA are better than those ob-tained by SGA. When the number of nodes increases to 1500,SGA cannot find the same best solution as MA. Therefore, the pro-posed MA can achieve an optimal solution with a higher probabil-ity. In summary, the EM can guarantee the optimum solution whenthe problem size is small, but it cannot obtain the solution withinan acceptable time when the problem size is larger. Although SGAcan solve the larger problem quickly, it can only produce a poor-quality optimal solution. When we add a local search operator inthe proposed algorithm, the MA is able to efficiently improve theperformance of complex combinatorial optimization problems.

5. Conclusion

With the increasing intensity of market competition and rapiddevelopment of science and technology, an increasing number ofenterprises have begun to realize the importance of the fourthparty logistics (4PL) and have dedicated increased attention tothe 4PL routing problem (4PLRP). In this paper, the multi-sourcesingle destination 4PLRP with fuzzy duration time and cost dis-count (M-S 4PLRPFC) was discussed, which can be described as aselection of the shortest path problem with constraints of fuzzyvariants in a multi-graph. A fuzzy programming model was builtfor this problem based on the fuzzy theory, and a fuzzy simulationmethod is provided to solve it.

Based on the fuzzy simulation method, an memetic algorithm(MA) is proposed. A double arrays encoding method is used forthe representation of the solutions. A standard GA is then em-ployed to search for satisfactory solutions, and a local search algo-rithm is employed by integrating 3PL suppliers and nodes to obtainbetter solutions.

Numerical experiments were carried out to investigate the per-formance of the proposed MA. The numerical experiments showthat the proposed MA yields the same results as the enumerationmethod and that the MA is a better algorithm for solving the M-S4PLRPFC than the standard GA. The experimental results indicatethat the proposed MA is an efficient method for solving the M-S4PLRPFC.

For the future work, other fuzzy factors, such as fuzzy cost maybe handled. Moreover, more realistic problem such as multi-desti-nation problem may be taken into consideration.

Acknowledgements

This work is supported by the National Natural Science Founda-tion of China under Grant Nos. 71071028, 71021061, 70931001and 61070162, the National Science Foundation for DistinguishedYoung Scholars of China under Grant No. 61225012; theSpecialized Research Fund of the Doctoral Program of HigherEducation for the Priority Development Areas under GrantNo.20120042130003; Specialized Research Fund for the DoctoralProgram of Higher Education under Grant Nos. 20110042110024

and 20100042110025; the Specialized Development Fund for theInternet of Things from the ministry of industry and informationtechnology of the P.R. China; the Fundamental Research Fundsfor the Central Universities under Grant Nos. N110204003 andN120104001; the Program for Professor of Special Appointment(Eastern Scholar) at Shanghai Institutions of Higher Learning.

References

[1] D. Bade, New for the millennium: 4L trademark, Transportation andDistribution 52 (11–12) (2010) 1957–1965.

[2] D.N. Bauknight, J.R. Miller, Fourth party logistics: the evolution of supply chainoutsourcing, CALM Supply Chain and Logistics Journal (1999).

[3] J. Bumstead, C. Kempton, From 4PL to managed supply-chain operations,Logistics and Transport Focus 1 (4) (2002) 18–24.

[4] J.Q. Chen, W.H. Liu, X. Li, Directed graph optimization model and its solvingmethod based on genetic algorithm in fourth party logistics, in: Proc. of the2003 IEEE Int. Conf. on Systems, Man and Cybernetics, vol. 2, 2003, pp. 1961–1966.

[5] K.H. Chen, C.T. Su, Activity assigning of fourth party logistics by particle swarmoptimization-based preemptive fuzzy integer goal programming, ExpertSystems with Applications 37 (2010) 3630–3637.

[6] A.A. Eliman, D. Kohler, Two engineering applications of a constrained shortest-path model, European Journal of Operational Research 103 (3) (1997) 426–438.

[7] T. Foster, 4PLs: The next generation for supply chain outsourcing?, LogisticsManagement and Distribution Report 38 (4) (1999) 35

[8] Y.H. Gabriel, Z. Israel, A dual algorithm for the constrained shortest pathproblem, Networks 10 (1980) 293–310.

[9] K. Ghoseiri, B. Nadjari, An ant colony optimization algorithm for the bi-objective shortest path problem, Applied Soft Computing 10 (4) (2010) 1237–1246.

[10] A.T. Haghighat, K. Faez, M. Dehghan, A. Mowlaei, Y. Ghahremani, GA-basedheuristic algorithms for QoS based multicast routing, Knowledge-BasedSystems 16 (5) (2003) 305–312.

[11] L.Q. Han, Outsourcing supply chain integration and the fourth party logistic,Quantitative and Technical Economics (7) (2003) 154–157.

[12] M. Huang, W. Tong, Q. Wang, X. Xu, X.W. Wang, Immune algorithm basedrouting optimization in fourth-party logistics, in: Proc. of the 2006 IEEECongress on Evol. Comput., 2006, pp. 3029–3034.

[13] M. Huang, G.H. Bo, W. Tong, W.H. Ip, X.W. Wang, A hybrid immune algorithmfor solving fourth-party logistics routing optimizing problem, in: Proc. of the2008 IEEE Congress on Evol. Comput., 2008, pp. 286–291.

[14] H.C. Lau, Y.G. Goh, An intelligent brokering system to support multi-agent webbased 4th-party logistics, in: Proc. of the 14th Int. Conf. on Tools with ArtificialIntelligence, 2002, pp. 154–164.

[15] X. Li, W.Y. Ying, W.H. Liu, J.Q. Chen, B.Q. Huang, The decision optimizationmodel of 4PL, in: Proc. of the 2003 IEEE Int. Conf. on Systems, Man andCybernetics, vol. 2, 2003, pp. 1241–1245.

[16] R. Lieb, B.A. Bentz, The use of third party logistics services by large Americanmanufacturers: the 2003 survey, Transportation Journal 44 (2) (2004) 5–15.

[17] B.D. Liu, Uncertainty Theory, third ed., Uncertainty Theory Laboratory,Tsinghua University, 2009. <http://www.orsc.edu.cn/utlab>.

[18] L.Z. Liu, H.B. Mu, X.F. yang, R.C. he, Y.Z. Li, An oriented spanning tree basedgenetic algorithm for multi-criteria shortest path problems, Applied SoftComputing 12 (1) (2012) 506–515.

[19] J. Love, 3PL/4PL—where next?, Logistics and Transport Focus 6 (3) (2004) 18–21

[20] G. Marino, The ABCs of 4PLs, Industrial Management 44 (5) (2002) 23.[21] J.E. Mendoza, B. Castanier, C. Guret, A. Medaglia, N. Velascob, A memetic

algorithm for the multi-compartment vehicle routing problem with stochasticdemands, Computers and Operations Research 37 (11) (2010) 1886–1898.

[22] S. Tierney, Now there are real 4PL possibilities, Supply Chain Europe 1 (13)(2004) 16–18.

[23] B. Trebilcock, Third party solutions take charge, Modern Material Handling 57(11) (2002) 33–37.

[24] Y. Wang, F.F. Luo, L. Lin, Fourth party logistics’ efforts-influenced subcontractincentive mechanism, Chinese Journal of Management Science 14 (2) (2006)136–140.

[25] J.M. Yao, Decision optimization analysis on supply chain resource integrationin fourth party logistics, Journal of Manufacturing Systems 29 (4) (2010) 121–129.

[26] H. Zhang, X. Li, W.H. Liu, B. Li, Z.H. Zhang, An application of the AHP in 3PLvendor selection of a 4PL system, in: Proc. of the 2004 IEEE Int. Conf. onSystems, Man and Cybernetics, vol. 2, 2004, pp. 1255–1260.