MyJournals Home  

RSS FeedsEntropy, Vol. 20, Pages 446: Optimal Flow Distribution of Military Supply Transportation Based on Network Analysis and Entropy Measurement (Entropy)


14 june 2018 15:58:52

Entropy, Vol. 20, Pages 446: Optimal Flow Distribution of Military Supply Transportation Based on Network Analysis and Entropy Measurement (Entropy)

One important element of military supply transportation is concealment, especially during war preparations and warfare periods. By introducing entropy to calculate the transportation concealment degree, we investigate the issue about concealed military supply transportation on the whole road network and propose an optimal flow distribution model. This model’s objective function is to maximize the concealment of military supply transportation. After analyzing the road network, classifying different nodes, summarizing the constraint conditions based on the properties and assumptions in the transportation process, and combining the general parameter limits, the optimal flow distribution model is further transformed into a calculable non-linear programming model. Thus, based on this non-linear programming model, we can obtain the optimal distribution scheme of military supply transportation from the perspectives of network analysis and concealment measurement. Lastly, an example of military supply transportation in Jiangsu province, China is illustrated to prove the feasibility of the proposed model. The managerial implication is that by utilizing the proposed flow distribution model, military supplies can be efficiently transported to the required destinations based on maximizing the concealment degree. Not only this model can be utilized in the real military supply transportation, it can be also applied in other transportation fields which require time efficiency and concealment. Digg Facebook Google StumbleUpon Twitter
58 viewsCategory: Informatics, Physics
Entropy, Vol. 20, Pages 447: Screening Scheme Evaluation of the Assembly Process Based on the Stress-Strength Model and Defect Stream Analysis (Entropy)
Entropy, Vol. 20, Pages 445: A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform (Entropy)
blog comments powered by Disqus
The latest issues of all your favorite science journals on one page


Register | Retrieve



Use these buttons to bookmark us: Digg Facebook Google StumbleUpon Twitter

Valid HTML 4.01 Transitional
Copyright © 2008 - 2019 Indigonet Services B.V.. Contact: Tim Hulsen. Read here our privacy notice.
Other websites of Indigonet Services B.V.: Nieuws Vacatures News Tweets Travel Photos Nachrichten Indigonet Finances Leer Mandarijn