FORMALIZATION OF THE PROBLEM OF TRANSPORT LOGISTICS OPTIMIZATION NETWORKS AT THE STAGE OF REENGINEERING
DOI:
https://doi.org/10.30837/ITSSI.2022.20.005Keywords:
logistics network, design technology, optimization, reengineering, multi-criteria evaluation, decision supportAbstract
The subject of research in the article is the process of supporting decision-making in the tasks of optimizing closed logistics networks at the stage of reengineering. The goal of the work is to improve the efficiency of technologies for the automated design of closed logistics networks due to the improvement of mathematical models of multi-criteria problems of reengineering their topological structures. The following tasks are solved in the article: review and analysis of the current state of the problem of supporting decision-making in the tasks of optimizing logistics networks at the stage of their reengineering; decomposition of the problem of optimization of logistics networks at the main stages of their life cycles; selection of a logical scheme of the reengineering process of the logistics network as a territorially distributed object; development of a mathematical model of the general problem of multi-criteria optimization of logistics networks according to indicators of economy, efficiency, reliability and survivability; selection of models for scalar multi-criteria evaluation of reengineering options, taking into account factors that are difficult to formalize, knowledge and experience of the decision-maker. The following methods are used: system approach, theories of systems, theories of usefulness, theories of decision-making, system design, optimization and operations research. Results. Decomposition of the reengineering problem was carried out on the following tasks: determination of the purpose of reengineering and the principles of network reconstruction; network structure optimization; optimization of the topology of network elements; selection of functioning technology; determination of parameters of elements and vehicles; assessment and selection of the best network construction option. The general mathematical model of the multi-criteria task of reengineering the topological structures of centralized three-level logistics networks based on the indicators of costs, cargo delivery time, reliability and survivability has been improved. Universal functions of general utility and utility of local criteria are proposed to obtain scalar estimates for multiple indicators. Exclusion of part of local criteria and restrictions from the general model allows obtaining models of practically all interesting problems of optimization of logistics networks. Conclusions. The developed complex of mathematical models expands the methodological principles of automating the processes of designing logistics networks, allows for the correct reduction of a set of effective options for their construction for the final choice, taking into account factors that are difficult to formalize, the knowledge and experience of designers. The practical use of the proposed complex of mathematical models will reduce the time and capacity complexity of project decision-making support technologies, and due to the use of the proposed options selection procedures, increase their quality based on a number of functional and cost indicators.
References
Horbenko, I. D., Horbenko, Yu. I. (2012), Applied cryptology: monograph [Prykladna kryptolohiia: monohrafiia], Kharkiv: Kharkiv National University of Radio Electronics, LLC "Fort", 868 p.
Bevz, O. M., Kvєtnii, R. N. (2010), Data Encryption Based on Highly Nonlinear Boolean Functions and Maximum Distance Codes: monograph [Shyfruvannia danykh na osnovi vysoko neliniinykh bulevykh funktsii ta kodiv z maksymalnoiu vidstanniu: monohrafiia], Vinnytsia: Vinnytsia National University of Technology, 96 p.
Manifavas, C., Hatzivasilis, G., Fysarakis, K., Rantos, K. (2012), "Lightweight cryptography for embedded systems a comparative analysis", In: 6th International Workshop on Autonomous and Spontaneous Security SETOP 2012, Springer, LNCS, 8247, Р. 333–349. DOI: https://doi.org/10.1007/978-3-642-54568-9_21
Gildas Avoine, Julio Hernandez-Castro (2021), "Security of Ubiquitous Computing Systems", Selected Topics. Springer, Р. 265 DOI: https://doi.org/10.1007/978-3-030-10591-4
Biryukov Alex and Perrin Leo (2017), "State of the art in lightweight symmetric cryptography", Cryptology ePrint Archive, Report 2017/511, available at: http://eprint.iacr.org/2017/511, https://eprint.iacr.org/2017/511.pdf
Mitsuru Matsui (1997), "New block encryption algorithm MISTYС", In Eli Biham, editor, Fast Software Encryption – FSE’97, pringer, volume 1267 of Lecture Notes in Computer Science, Haifa, Israel, January 20–22, Р. 54–68, available at: https://link.springer.com/chapter/10.1007/BFb0052334
Hatzivasilis George, Fysarakis Konstantinos, Ioannis (2018), "Papaefstathiou, and Charalampos Manifavas. A review of lightweight block ciphers", Cryptographic Engineering, No. 8 (2), Р. 141–184. DOI: https://doi.org/10.1007/s13389-017-0160-y
Kerry A. McKay, Larry Bassham, Meltem Sоnmez Turan, and Nicky Mouha (2016), "Nistir 8114 - report on lightweight cryptography". DOI: https://doi.org/10.6028/NIST.IR.8114
Rudnytsky, V. M., Lada, N. V., Babenko, V. G. (2018), Cryptographic coding: synthesis of stream encryption operations with accuracy to permutation: monograph [Kryptohrafichne koduvannia: syntez operatsii potokovoho shyfruvannia z tochnistiu do perestanovky: monohrafiia], Monograph, Kharkiv: LLC "DISA PLUS", 184 р.
Rudnitsky, V. M., Milchevich, V. Ya., Babenko, V. G., Melnyk, R. Р., Rudnitsky, S. V., Melnyk O. G. (2014), Cryptographic coding: methods and means of implementation (part 2): monograph [Kriptograficheskoe kodirovanie: metody i sredstva realizacii (chast' 2): monografiya], Monograph, Kharkov: Publishing house "Shchedra sadyba plius", 223р.
Rudnytsky, V. M., ed. (2018), Cryptographic coding: information processing and protection: collective monograph [Kryptohrafichne koduvannia: obrobka ta zakhyst informatsii: kolektyvna monohrafiia], Monograph, Kharkiv: LLC "DISA PLUS", 139р.
Sysoienko, S., Myronets, I., Babenko, V. (2019), "Practical Implementation Effectiveness of the Speed Increasing Method of Group Matrix Cryptographic Transformation", Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), CEUR Workshop Proceedings 2353, CEUR-WS.org, Р. 402–412. (Scopus) available at: http://ceur-ws.org/Vol-2353/, http://ceur-ws.org/Vol-2353/paper32.pdf
Rudnitsky, V., Berdibayev, R., Breus, R., Lada, N. and Pustovit, M. (2019), "Synthesis of reverse two-bit dual-operated strictly straight cryptographic coding on the basis of another operation", Advanced Information Systems, Kharkiv: NTU "KhPI", No. 3 (4), Р. 109–114. DOI: http://doi.org/10.20998/2522-9052.2019.4.16
Lada, N. V., Kozlovska, S. G., Rudnitsky, S. V. (2019), " The symmetric operations’ mathematical group constructing based on module-2 addition " ["Pobudova matematy`chnoyi grupy` sy`metry`chny`x operacij na osnovi dodavannya za modulem dva"]. Modern special technics: scientific and practical journal. Kyiv, No 4 (59), Р.33–41.
Lada, N. V., Kozlovska, S. G. and Rudnitskaya, Y. V. (2019), "Researching and Synthesizing a Group of Symmetric Modified Modulo-4 Addition Operations" ["Doslidzhennia i syntez hrupy symetrychnykh modyfikovanykh operatsii dodavannia za modulem chotyry "], Central Ukrainian Scientific Bulletin. Technical Sciences, No. 2 (33), Р. 181–189. DOI: http://doi.org/10.32515/2664-262x. 2019.2(33)
Lada, N. V., Rudnitsky, S. V., Zazhoma, V. M. and Rudnytska, Y. V. (2020), " Research and synthesis of a group of symmetric modified operations of right-handed addition by module four" ["Doslidzhennia i syntez hrupy symetrychnykh modyfikovanykh operatsii pravostoronnoho dodavannia za modulem chotyry"], Control, Navigation and Communication Systems. Academic Journal. Poltava: PNTU, No. 1 (59), Р. 93–96. DOI: https://doi.org/10.26906/SUNZ.2020.1.093
Rudnitsky, V. M., Babenko, V. G., Rudnitsky, S. V. (2012), " Method of synthesis of matrix models of operations of cryptographic recoding of information" ["Metod syntezu matrychnykh modelei operatsii kryptohrafichnoho perekoduvannia informatsii"], Ukrainian Information Security Research Journal, Vol 14, No. 3 (56), Р. 50–56. DOI: https://doi.org/10.18372/2410-7840.14.3360
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.