Next Article in Journal
Congestion Control in V2V Safety Communication: Problem, Analysis, Approaches
Next Article in Special Issue
Analysis and Design of Functional Device for Vehicular Cloud Computing
Previous Article in Journal
Effect of lateral Gate Design on the Performance of Junctionless Lateral Gate Transistors
Previous Article in Special Issue
Enabling Green Wireless Sensor Networks: Energy Efficient T-MAC Using Markov Chain Based Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fuzzy System and Time Window Applied to Traffic Service Network Problems under a Multi-Demand Random Network

1
Department of Logistics and Shipping Management, Kainan University, Taoyuan 33857, Taiwan
2
Department of Industrial Engineering and Engineering Management, National Tsing Hua University, Hsinchu 300, Taiwan
3
Integration and Collaboration Laboratory, Department of Industrial Engineering and Engineering Management, National Tsing Hua University, Hsinchu 300, Taiwan
4
College of Electronic and Information Engineering, Foshan University, Foshan 528000, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(5), 539; https://doi.org/10.3390/electronics8050539
Submission received: 19 April 2019 / Revised: 9 May 2019 / Accepted: 10 May 2019 / Published: 13 May 2019
(This article belongs to the Special Issue Vehicular Networks and Communications)

Abstract

:
The transportation network promotes key human development links such as social production, population movement and resource exchange. As cities continue to expand, transportation networks become increasingly complex. A bad traffic network design will affect the quality of urban development and cause regional economic losses. How to plan transportation routes and allocate transportation resources is an important issue in today’s society. This study uses the network reliability method to solve traffic network problems. Network reliability refers to the probability of a successful connection between the source and sink nodes in the network. There are many systems in the world that use network architecture; therefore, network reliability is widely used in various practical problems and cases. In the past, some scholars have used network reliability to solve traffic service network problems. However, the processing of time is not detailed enough to fully express the real user’s time requirements and does not consider that the route traffic will affect the reliability of the entire network. This study improves on past network reliability methods by using a fuzzy system and a time window to construct a network model. Using the concept of fuzzy systems, according to past experience, data or expert predictions to define the degree of flow, time and reliability, can also determine the relationship between these factors. The time window can be adjusted according to the time limit in reality, reaching the limit of the complete expression time. In addition, the network reliability algorithm used in this study is a direct algorithm. Compared with the past indirect algorithms, the computation time is greatly reduced and complex problems can be solved more efficiently.

1. Introduction

In recent years, with the growth of the information age and the knowledge economy, the materials and information needed for human life must be transmitted through the Internet and the Internet has become the pillar of modern advanced social progress. How to optimize the network has become one of the most important topics in modern times. Network reliability, which can assess the performance of the overall network, further identifies the symptoms of the entire system and extends the application of this topic. Network reliability is now widely used in real life such as power network design [1], mass transit networks [2], logistics networks [3], Internet of Things [4] and so forth.
In order to solve the problem by using network reliability, we must first understand the real network architecture, consider the extension of the network problem, construct a network model that matches the reality and finally calculate the network reliability under different operating conditions. For example, before applying the network reliability assessment of the transportation service industry, knowing the on-time delivery based on past data is an important condition for customers [5]. Therefore, some scholars have used the time window to represent the customer’s time constraints [6], making the model architecture more complete and closer to reality.
After constructing the model, the next step is to calculate the network reliability as a reference for solving real-world network problems. The calculation method can be divided into the minimal path set (MP) [7,8] and the minimal cut set (MC) [9,10]. The calculation process is as follows: first, find all of the solutions that satisfy the requirements (demand; d) of the MP and MC and extend them to the collection concepts of d-MP [11,12,13,14] and d-MC [15], before finally calculating the network reliability. To put it simply, the concept of network reliability is to establish a network model between the demand side and the supply side, further calculate the reliability of the network and give the user a reference indicator to measure the quality of the real network system.
The transportation network promotes key human development links such as social production, population movement and resource exchange. As cities continue to expand, transportation networks become increasingly complex. A bad traffic network design will affect the quality of urban development and cause regional economic losses. Therefore, improving the quality of the transportation network is one of the important topics of today. In the past, scholars have solved the problem of real-world traffic network with network reliability and established a random network model with reliability and transit time obeying the normal distribution [16].
In past research, each path reliability value was given in advance and finally used as the basis for calculating network reliability. This study considered that the path would have different states under different traffic such as general, congestion or smooth and so forth and different states should reflect a different reliability to meet the traffic situation. In this case, it is difficult to find the exact statistical distribution to express its state and it is impossible to use the probability to express the state of traffic. In the definition of fuzzy theory, this phenomenon has fuzziness [17] and the fuzzy set is a suitable expression.
In addition, today’s traffic users’ requirements for on-time arrival are an important part of the transportation network. How to design a network that meets the user’s time conditions is also one of the priorities that must be considered in today’s transportation network. Therefore, in addition to defining the state of each path, this study also considered limiting the tolerance of users for waiting times, dealing with more realistic and complex time conditions and improving the shortcomings of past traffic network models, therefore making the model more complete and closer to the actual network conditions.
In the eyes of the users, the reliability of the transportation service network is part of the user’s demand. Rietveld explored how to effectively assess the reliability of transportation service networks in the literature [18] and proposed several indicators in the final results such as: (1) punctuality rate; (2) difference between actual and scheduled time, that is, lag time; (3) standard deviation of arrival time; (4) total passenger delay time/travel time; (5) on-time travel time/travel time; and (6) the number of vehicles delayed. Finally, it was found that delay played a key role in the reliability assessment of the entire transportation network.
In 1985, the US Highway Capacity Manual (HCM) broadly interpreted delay as “when a driver or user travels through a road or path, deducting extra travel time outside of reasonable transit time.” [19]. Sutaria and Haynes [20] pointed out that with a delay in the proper response of the traffic network in different operating conditions, the actual traffic flow characteristics would also directly affect the reliability of traffic services. Regarding the estimation of delay time, past studies have proposed a number of estimation equations depending on the influence variable factor and the arrival type. It can be known which factors directly affect the delay time and thus affect the network performance. The following is the 1985 version of the US Highway Capacity Handbook [19], which derived the delay mode from the empirical basis and considered the delay time caused by road congestion, as shown in Equation (1):
T i m e D = 0.38 C ( 1 λ ) 2 1 y + 173 x 2 [ ( x 1 ) + ( x 1 ) 2 + 16 x Q ]
where TimeD is the average delay time (seconds/per vehicle); Q is the capacity (hourly traffic); C is the cycle length (seconds); λ is the green light ratio (effective green time/period length); and x is the saturation (vehicle flow/lane capacity).
It can be observed that the delay time of the delay formula TimeD has a direct relationship with the saturation x. When the flow rate is larger, the network delay will be more serious. In addition, traffic in the train network is more likely to affect the delay time because trains travel on tracks, so cannot arbitrarily overtake or change lanes like a road vehicle. In certain cases, when there is a delay, the continuation of the row may be affected and the delay will be further delayed, causing a sudden increase in the delay time. This phenomenon is the knock-on effect [21].
Leilich [22] proposed that under different route conditions, such as an increase in the number of trains, the average delay time of each train will rise. Huisman and Boucherie [23] developed a set of computational time models for the analysis of Dutch railway routes. The results showed that as the number of trains increased, the probability of delay and the average delay time increased simultaneously. Mattsson [24] pointed out that the lower the network capacity utilization, the higher the reliability, because when the capacity utilization is lower, more unused capacity can be used as a buffer for operation scheduling to reduce the impact of vehicle delay. Therefore, when there is a vehicle delay, it can quickly return to normal operation.
In the transportation service network, delay is the main factor affecting its reliability performance [25]. When the traffic (vehicle) travels on the route, it is disturbed by factors that cause delays in driving time. In this case, it is easy to cause accidents or technical problems, thereby reducing the overall network reliability. Many have studied the relationship between traffic flow and reliability. For example, Higgins and Kozen [26] conducted actual verification with the railroad rapid transit service network in Brisbane, Australia. The results indicated that an increase in train traffic would lead to more train delays. Pachl [27] mainly discussed the problem of train flow delay time. Their research indicated that the average delay time would increase exponentially with an increase in the train shift and the average delay time would approach infinity when the flow was close to capacity. As a result of the train’s inability to operate smoothly, the reliability of the network was greatly reduced. Many studies have also confirmed that in the transportation network, the traffic size will affect the length of the delay and therefore also affect the overall network reliability.
According to the above literature, the traffic in the actual traffic service network has a direct impact on the reliability. The larger the traffic, the more likely it is to cause a delay. Delays can affect the reliability of the entire traffic network. Therefore, this study wanted to explore this phenomenon by improving the traditional network model and establishing a conditional relationship between traffic and reliability and proposing a network model that was more similar to the actual transportation network. This study made the model more in line with the actual traffic network status.
In order to express the relationship between traffic and reliability in the traffic network, this study used the concept of fuzzy sets to express the extent to which element x belongs to set A [28]. This study set the path flow to x and defined three fuzzy set states A for each path: low load (low flow), normal load (normal flow) and high load (high flow). After defining the fuzzy set, we constructed a fuzzy system by using the fuzzy rule base, fuzzy inference and defuzzification, we used this system to find all path reliability and finally calculate the overall network reliability.
In order to handle the user’s conditions more fully for time requirements, this study used a time window to allocate time limits. The concept of a time window is to extend the condition of time from a single point in time to a time range. Originally proposed by Baker [29] in the Traveling Salesman Problem, Solomon [30] applied the time window to the vehicle routing problem (VRP), which became a vehicle routing problem with time windows (VRP with Time Windows, VRPTW). The time window is mainly divided into a soft time window and a hard time window. In the actual transportation service network, the service starts at the scheduled time. For example, the train timetable schedules the departure time. Even if the train arrives early, it must wait for the expected time to start. Therefore, the research model adopted a hard time window consistent with this condition. The lower limit of the time window was assumed to be the estimated service start time. The upper limit was assumed that the user could tolerate the delay time. If the time exceeded the upper limit, it was equivalent to failing to meet the condition of the model user, so this solution was considered an infeasible solution.
Based on the above foundation, this study proposed a model that considered the user’s requirements for service time, reliability, the concept of service on time and the relationship between network traffic and time impact reliability. Finally, a more efficient algorithm was used to calculate the network reliability. This calculation process was mainly carried out by the d-MP direct algorithm proposed by Wei-Chang Yeh [14]. The concept of calculus mainly comes from the flow conservation equation [31]. Compared with the traditional d-MP algorithm [32], this algorithm avoids complex NP-hard calculus steps and greatly improves the calculation speed, which can be applied more effectively on real network problems.
The rest of the study is as follows: Section 2 mainly introduces the research related to this thesis including fuzzy theory application, network reliability, time window and so on. Section 3 details the methods proposed in this study including model assumptions and formula derivation and introduces the operational steps of the proposed method. Section 4 is an experimental example of two practical problems: the single-time window single service network and the multi-time window multi-service network. The conclusions and future phases are introduced in Section 5.

2. Related Work

In Section 2, this study introduces all the research related work including network reliability, the concept of fuzzy theory and time windows.

2.1. Network Reliability

The basic components of the network are composed of nodes, arcs, capacity, probability, demand, source node, sink node and so on. The earliest basic concept of network reliability was proposed by Moore and Shannon [33]. This study mainly evaluated the reliability of the binary-state network between the two ends. The so-called binary-state network means that the transmission arc and the node only have the two states of success and failure. The definition of reliability assessment refers to the probability that at least a single path (Path) will be successfully transmitted from a single source node s to a single sink node t when the demand is d. In general, network reliability divides its components into binary-state networks and multi-state networks. Multi-state networks are more reasonable and closer to reality than binary-state networks. These two networks must comply with the “conservation of traffic” [31], so that traffic will not disappear or increase in the process of network transmission, the following two basic networks are introduced:
(1) Binary-state network [34]:
A binary-state network allows only two states per node: success or failure. In general, a binary-state network (Binary-state network) is a special case of a multi-state flow network. When the multi-state network has only success and failure on each node or arc, it is considered as a binary-state network.
(2) Multi-state flow network [35]:
The multi-state flow network is based on the binary state network diagram but gives each node or arc more states, so that each node or arc does not only have two definitions, rather, there is even the possibility of expanding this to hundreds of thousands of capacities. Multi-state networks are often more practical and widely used in life.
Network reliability assessment is a network model that combines supply requirements into a source node and a sink node and calculates the probability of meeting network demand. Computational feasible solutions can be divided into the minimum path (minimal path; MP) [11,12,13,14] and minimum cut set (minimal cut; MC) [15]. MP and MC are used to find the feasible solution that satisfies the minimum demand d, as the d-MP solution and d-MC solution. The calculation of network reliability can be divided into two major items: the inclusion–exclusion method and the sum-of-disjoint product method (SDP) [36,37]. Some studies have improved the network reliability calculation, for example, Zuo, Tian and Huang [38] improved the computational efficiency by improving the difference product method to deal with more complex network problems. All examples in this study used the inclusion–exclusion method to determine network reliability.

2.2. Fuzzy Theory

Fuzzy is an emerging mathematics that originated from the paper published by L.A. Zadeh [39]. Professor Zadeh first proposed “Fuzzy Sets” to deal with quantitative problems. Zadeh advocates fuzzy theory as a way to simplify the complexity of the problem in a humanistic way of thinking, thus achieving the same purpose as the traditional control method with even better effects.
Mendel [40] mentioned that the membership function will be different according to each person’s feelings and judgments, so the given function of the membership is due to people. Most studies have only used standardized membership functions in practical applications. Figure 1 shows four common membership functions: Lambda-type, S-type, Z-type and Pi-type.
The earliest fuzzy reliability was proposed by Cai, Wen and Zhang [41]. The main research focused on the reliability of evaluating the binary-state of each component. However, binary-state fuzzy reliability cannot accurately represent the state in some practical and complex systems such as network systems, power systems, manufacturing operating systems and so forth.
In order to deal with more complex systems, scholars have developed multi-state fuzzy reliability based on the basis of binary-state fuzzy reliability [42]. Multi-state fuzzy reliability divides the interval [0,1] into several subintervals and defines fuzzy sets for each degree of interval state, most of which are defined by expert experience. In order to make up for the lack of expert ability, the latter is combined with fuzzy logic and inference [43], constructing a fuzzy system [44] that can adjust parameters according to various states, strengthen their learning ability and have a better interpretation of more complex systems.
Fuzzy theory pays attention to the essence of the problem and proposes different thinking logics from traditional mathematical theory. Instead, it can obtain significant effects with traditional mathematics. As such, fuzzy applications will next become more specialized. In addition to being able to be applied to reliability such as image recognition [45], mathematical programming [46], algorithms [47] and data exploration [48] and so forth, we can see the traces of fuzzy theory and also prove it. It can also prove the success and breakthrough point of fuzzy theory.

2.3. Time Window

The time window can represent the customer’s demand for time or the service period that the servicer can order or provide. For example, the time window of mass transit indicates that the user can take or pass during certain time periods, the time when the logistics industry is scheduled to deliver the goods, the delivery limit in the production line problem and the dial a ride problem and so forth. Time windows can be applied to these problems by using the characteristics of the time window (density, position, width) to explore the results under different conditions.
When solving the Traveling Salesman Problem, Baker [29] first proposed the concept of time window constraints by establishing the earliest start service time (lower limit of time window) and end service time (upper limit of time window) conditions in each network node. Solomon [30] introduced the time window into the vehicle routing problem (VRP) and used the time window to express the range of service times the customer wanted. Chen and Lee [49] presented two additional models with penalty delays when studying parallel machine scheduling. The first type set the task expiration date to a specific range. When the task was completed on time, there was no additional cost. The second type of model set the expiration date as an interval and the lower and upper limit of the time window were the earliest expiration date and the latest expiration date. As long as the task completion time fell within this interval, there were no additional costs. The second type of model is more reasonable and closer to reality and is more widely used in practical problems.
Solomon and Desrosiers [50] proposed a variety of time window concepts when studying scheduling problems and divided the time window constraints into two categories according to the degree of elasticity: the soft time window and hard time window. The main difference is that the hard time window must fall completely within the set time window. Otherwise, the soft time window is allowed to fall outside the time window but it must be punished. The two are mixed into a comprehensive time window. Figure 2 shows the three time window types, where the X-axis is time, the Y-coordinate indicates the cost of substituting the P function and e and ι represent the lower bound and the upper bound of the time window, respectively.

3. Research Methods and Mathematical Models

This section explains in detail the network model construction process to solve the real problem of traffic network and explores how to meet the various needs of users, obtain the minimum feasible solution and calculate the overall network reliability. Section 3.1 introduces the theorem and lemma of establishing a fuzzy traffic service network and presents the problem solving method and formula deduction. Additionally, for the basic assumptions, please refer to Table A1 for a summary of the assumptions (see Appendix A).

3.1. Theorem and Lemma

In the network represented in Figure 3, node 1 represents the source node, node 4 represents the sink node, nodes 2 and 3 represent the transit nodes through which the transport process passes and is taken as an example. A summary table that explains the topics step by step has been provided on Table A2 in the Appendix A. The arc represents the transport path. The basic data of each arc, the fuzzy function of each arc flow and time and the fuzzy function value of each arc reliability are shown in Table 1, Table 2 and Table 3.

3.1.1. Needs Processing of Various User

User demand for services of more than one type in the same network is set to different demand dc. We assumed that the user had two requirements for the transportation network (d1, d2) = (1, 1).
Theorem 1.
When the vector X = (x1, x2, …, xm) is D = (d1, d2, …, ds)-MP, the following two conditions must be met:
  • This vector meets various user needs D = (d1, d2, …, ds).
  • Test by the comparison algorithm
Theorem 1 illustrates the problems of multiple demand in this study. The following uses Lemma 1 to explain how to find the demand of various users in each path.
Lemma 1.
The transportation network must meet the demand of various users. Here, Equation (2) is used to indicate that the flow of the source node is equal to the flow of the sink node and is also equal to the demand:
xc1,1 = xcn,n = dc, for all c = 1, 2, …, s
The total number of traffic services of item c on each path cannot exceed the upper limit of the path capacity Mk (max capacity), as shown in Equation (3):
c = 1 s α k c x i , j c M k   f o r   a l l   i = 1 , 2 , , n ; j = 1 , 2 , , n
The flow must comply with flow conservation. The sum of the incoming flow of each node to class c must be equal to the sum of the outgoing flow, as shown in Equation (4):
j = 1 n x i , j c = k = 1 n x k , i c ,   f o r   a l l   x i , j c , x k , i c E , i 1   o r   n
i = 2 n x 1 , i c = j = 1 n 1 x j , n c = d c , f o r   a l l   x 1 , i c , x j , n c E
In Equation (2), the sum of the shipments must meet the demand of each user. This model uses xc1,1 to indicate the source node to provide the sum of the requirements of the cth user. Equation (3) is an important part of this section, which means that each demand will correspond to different weights. The shipments of each flow multiplied by this flow weight in each path cannot exceed the upper capacity of each path (arc). Equation (4) shows that the sum of the inflows of class c in the ith node is equal to the sum of the outflows. Equation (5) indicates that the flow for the source and sink nodes must be the same and must be equal to the demand.
From Equations (2) to (5), we can find the transportable quantity (X1, X2,…, Xs) which satisfies the demand of each user (d1, d2, …,ds) and find the D = (d1, d2, …,ds)-MP candidate solution.
Lemma 2.
Equation (6) multiplies the sum of the number of c-class users of each arc by the weight of the c-class in each arc to find the sum of all of the user’s transport amount X on each path (arc) and find the D-MP candidate solution.
c = 1 s α k c x i , j c   f o r   a l l   I =   1 , 2 ,   ,   n ;   j =   1 , 2 ,   ,   n   a n d   x i , j c = x k c
The above equation indicates that the user’s transport amount on each path (arc) cannot exceed the upper limit of the capacity set for each path (arc). In order to facilitate the expression of all solutions, this is denoted by the symbol Ω : Ω ≡ {X | X meet all categories of user demand D = (d1, d2, …,ds)}. In set Ω, when a vector X is smaller than the vector Y and the vector X satisfies all kinds of user requirements d1, d2, …, ds, the vector Y is an infeasible solution and must be eliminated. In simple terms, the D-MP solution must be the smallest and most feasible solution to meet the demand. Here, the set of D-MP solutions is represented by Ωmin and the reliability that satisfies all user requirements d1, d2, …, ds is obtained, which is expressed by Equation (7):
Rd1, d2, …,ds = Pr{Ω} = Pr{Y∈Ω | YX for a (d1, d2, …,ds) -MP }
In order to obtain more accurate network reliability, all D-MP solutions must be found in all D-MP candidate solutions. The next section will detail the process and method.

3.1.2. Check the D-MP Candidate Solution

Among all of the D-MP candidate solutions, there may be a non-minimum feasible solution that satisfies the requirements. In the following study, the comparison algorithm was used to check the solutions in the Ω set, these non-minimum feasible solutions were deleted and finally D-MP solutions were obtained. The steps and methods for checking the D-MP candidate solutions are described in detail in Corollary 1.
Corollary 1.
This step uses the comparison algorithm to check the D-MP candidate solution. The following is a detailed description of the calculation procedure of the comparison algorithm:
Step 1:
Set all of the previous D-MP candidate solution sets as P = (X1, X2, …, Xo), representing a total of o candidate solutions, then, it is necessary to check whether each D-MP candidate solution is a D-MP solution.
Step 2:
In addition, this study set up another set, I =∅. This set does not have a solution at the beginning, so it is an empty set. This set stores the solution that is found by the comparison algorithm to not satisfy the minimum requirement.
Step 3:
Checking from the first candidate solution X1, compare with the remaining candidate solutions X2 to Xo. If the solution is checked, all solutions are greater than or equal to the solutions of the other solution and then placed in set I, otherwise it is the D-MP solution.
Step 4:
After checking the first candidate solution, X1, X2 to Xo are sequentially calculated. If the solution to be checked is larger than the remaining one, it will be placed in set I.
Step 5:
After checking the final solution Xo, end the inspection cycle.

3.1.3. Time Window Limit Processing

After the D-MP solution is obtained, this step uses the time window to process the user’s time requirements. This study used the limitation of the hard time window. When the time exceeds the maximum tolerable range of the user, this solution is regarded as an infeasible solution. If someone arrives early, they must wait until the lower limit of the time window to start the next service. The detailed calculation process is explained below.
Theorem 2.
When vector X = (x1, x2, …, xm) is the standard (quasi) D-MP solution, the following two conditions must be met.
  • Vector X satisfies the comparison algorithm Test
  • Vector X must satisfy the requirement D = (d1, d2, …, ds) before considering the time window.
Lemma 3.
In order to define the time windows of all paths separately, before the time for calculating each solution, all the time window routes in each solution are proposed for calculation and they are arranged in v routes, as shown in Figure 4. In the time window, the time includes the lead time, transit time, process time and arrival time. This study set the process time to Cva,b, which means the current accumulated time. Equation (8) is the assumed time of the source node; here we set the starting time as 0.
Cv1,1 = 0
In order to clearly indicate the time before and after the time window processing, this study defined two kinds of time: arrival time A and process time C. Equation (9) represents the arrival time that has not been processed by the time window and Equation (10) represents the process time after this time window has been processed.
Ava,b = Cv(a−1),a + Ft ( wa,b xa,ba,b), for 0 ≤ an, 0 ≤ bn, v = 1, 2,…, w
C a , b v   = { A a , b v i f   e t b A a , b v l t b e t b i f   A a , b v < e t b n o t   e x i s t o t h e r w i s e
Below is a detailed description of the processing of the time window. Equation (9) is the arrival time from the a node to the next node b in the vth route. This step is the previous site process time Cv(a−1),a plus the time before the flow into the node (wa,b xa,b) plus the transit time λa,b. Due to the limitation of applying the hard time window, in the early arrival, one must wait until the lower limit of the time window to move to the next step, which means that arrival time A does not necessarily equal the next departure time. Equation (10) performs the subsequent processing for arrival time A: when the arrival time is within the time window e t b A a , b v l t b , then arrival time A is equal to the departure time Cva,b = Ava,b; if the arrival time A is earlier than the lower limit of the time window A a , b v < e t b , one must wait until the lower limit of the time window e t b for the next step of service processing; if the time exceeds the upper limit of the time window l t b , this solution will be considered as an infeasible solution. Figure 5 is a graph of the time relationships of the time windows.
This study used the concept of fuzzy theory to define each path fuzzy set, indicating the state of the path under different flow and time. Finally, the fuzzy system was used to derive the reliability. Lemma 4 will be explained in detail.
Lemma 4.
After finding the D-MP solution, the user can use the function value in the past data to establish a membership function to define each path state. Next, fuzzy inference, fuzzy rule base and defuzzification are used to establish the fuzzy system and the reliability of each arc is calculated.

3.1.4. Fuzzy System Construction

This step uses the fuzzy function to process the previous section to obtain the flow of each arc. First, we had to define the input and output variables. In addition to the flow fuzzy function as the fuzzy system input variable, we took the transit time Ft of each arc as another input variable and finally used the reliability function as the output variable. This model had a two-input and single-output control system architecture and used Z-type incremental fuzzy function (Z function), triangular fuzzy function (triangular function) and Z-type decreasing fuzzy number (S function) to represent low, medium and high states. Figure 6, Figure 7 and Figure 8 are fuzzy function definition diagrams for input and output.
The next step is to establish the fuzzy rule base. The main purpose of the fuzzy rule base is to define the relationship between the output and input. Here, the rule library was used to express the relationship between time, flow and reliability as the basis for subsequent inference. Table 4 is used here to represent this example of rule library architecture.
The next part is fuzzy inference, using the rules derived from experience or related knowledge, in the form of the premise (If) and the conclusion (Then), which are divided into the premise (If), the conclusion (Then) and the integration operation. We used the minimum inference method and Figure 9 shows the inference mode representation for this method.
As the center of area method is a well-known and continuously adopted method of research [51,52], we used it to conduct the defuzzification step and to defuzzify the value of the previous step into the value of the problem. The center of area method is a weighted average calculation method. In the center of area method, we used the continuous integral type of the center of area method. Suppose that the domain of the output attribution function C falls between the intervals a to b, the model is as shown in Equation (11).
y = a b C ( y ) y d y a b C ( y ) d y
After knowing the reliability of each arc, we finally applied the fuzzy intersection arithmetic formula (t-norm class) to the displacement principle to calculate the network reliability. Equation (12) is a mathematical expression representing fuzzy network reliability.
RFinal = uRk(X) = t(uR1(x1), uR2(x2),…, uRk(xk) )

4. Experiments

Section 4 introduces how the study solved two practical problems: a single-time window and single service network and a multi-time window and multi-service network. The above actual situation was to explore practical issues such as traffic impact path reliability and time window limits.

4.1. Single-Time Window and Single Service Network

Here, we discuss the first real situation: a single-time window and single service network. This issue explores the network from a user perspective. After the user decides to use a single service, in addition to the overall network reliability, the user will want to know which route arrives at the sink node and has a high degree of reliability among the many routes to the destination. The network model is shown in Figure 10. This network diagram has a source node, a sink node and four paths (arcs). The user demand is D = 3. Table 5 shows the upper limit of the transportable capacity of each arc and the corresponding probability value, operation lead time, transit time and commodity ratio. This study developed the fuzzy sets as shown in Table 6 (fuzzy function value of flow and time for each arc) and Table 7 (fuzzy function value of reliability for each arc) according to the rule based on the description in Section 2.2. In order to deal with more complex systems, scholars have developed multi-state fuzzy reliability based on the basis of binary-state fuzzy reliability [42]. Multi-state fuzzy reliability divides the interval [0,1] into several subintervals and defines fuzzy sets for each degree of interval state, most of which are defined by expert experience. In order to make up for the lack of expert ability, the latter is combined with fuzzy logic and inference [43], constructing a fuzzy system [44], which can adjust parameters according to various states, strengthen their learning ability and have a better interpretation of more complex systems.
Step 1. The amount of transport on each path must not exceed the upper limit of transport (M1, M2, M3, M4) = (3, 4, 3, 3) for each path (arc). For the convenience of representation, let X = (x1,2, x2,4, x1,3, x3,4) = (x11, x21, x31, x41).
0 ≤ x11 ≤ 3
0 ≤ x21 ≤ 4
0 ≤ x31 ≤ 3
0 ≤ x41 ≤ 3
This network must meet customer demand D = 3:
x11 + x31 = 3
x21 + x41 = 3
According to the flow conservation theory, the sum of the inflow and outflow of node 2 and node 3 must be the same:
x11 = x21
x31 = x41
Find all feasible solutions X1 = (x11, x21, x31, x41) by the exhaustive method (as shown in Table 8) through Equations (13)–(20). This process is shown in Table 8:
Through the exhaustive process, we can obtain the results of the feasible solution, as shown in Table 9:
Step 2. Find all possible D-MP candidate solutions from the feasible transport mode X obtained in Step 1.
{ x 1 = x 1 1 x 2 = x 2 1 x 3 = x 3 1 x 4 = x 4 1
We bring in Equation (6) to find the D-MP candidate solution: X1 = (3, 3, 0, 0), X2 = (0, 0, 3, 3), X3 = (2, 2, 1, 1) and X4 = (1, 1, 2, 2).
Step 3. This step uses the comparison algorithm to check whether the D-MP candidate solution obtained in Step 2 is a real D-MP solution. The final test results are shown in Table 10.
Step 4. In the actual transportation service network, not only must the user successfully reach the sink node but must also arrive under the users’ condition of time, so the time limit must be considered. This step uses the time window as a time limit, where the upper limit of the time window represents the user’s tolerance for a delayed arrival. When the time is exceeded, the solution is an infeasible solution. The lower limit of the time window represents the time at which the estimated service start time. If it arrives early, it must wait until the node’s departure time to continue moving.
Here, we assumed that the time window of the sink node (node 4) was { e t 4 , l t 4 } = {0, 25} (the sink node was the last stop, so there was no lower limit). In order to facilitate the expression and calculation time, we listed the D-MP solutions processed by the comparison algorithm in Table 11.
Check X1 = (3, 3, 0, 0) as an example:
This D-MP solution only has the {e1, e2} route, so only this route needed to be checked. The following is the detailed flow of the calculation:
At the start time of node 1, C11,1 = 0 and the arrival time of the second station (node 2) is calculated as A11,2:
A11,2 = C11,1 + Ft(w1,2 x1,2+λ1,2 ) = 0 + 2 × 3 + 4 =10
After calculating the arrival time, the next step is to calculate the process time after the time window processing C11,2. However, node 2 does not assume a time window, so C11,2 = A11,2 = 10.
The flow time at node 2 is C11,2 = 10, then the arrival time A12,3 of the third station (node 4) is calculated:
A12,3 = C11,2 + Ft(w2,3 x2,3+λ2,3 ) = 10 + 3 × 3 + 4 = 26
After calculating the arrival time, the next step is to calculate the process time C12,4 after the time window processing:
C 1 , 3 1 = { A 2 , 3 1 i f   0 A 2 , 3 1 25 0 i f   A 2 , 3 1 < 0 n o t   e x i s t o t h e r w i s e
Substituting A12,4 = 26, we found that the process time exceeded the upper limit of the time window of 25, so was unable to complete the service in time, which means that this solution is an infeasible solution under the consideration of the time window conditions.
Finally, the results are shown in Table 12.
Step 5. In the actual traffic service network, the path state will affect the reliability. In this step, the reliability of each arc is obtained by means of a fuzzy system. First, we established a fuzzy rule base and fuzzy set for each flow, time and reliability. Table 13 presents the sample fuzzy rule library and Table 14 shows the time and flow of each path in each set of solutions.
In this study, the reliability of each arc was determined by the fuzzy system constructed. Table 15 shows the reliability results calculated using the fuzzy system.
Step 6. First, find the reliability of each D-MP solution, as shown in Equations (24)–(26):
X2 = 1 × 1 × 0.25 × 0.25 = 0.0625
X3 = 0.558 × 0.529 × 0.92 × 0.92 = 0.2498
X4 = 0.92 × 0.92 × 0.558 × 0.409 = 0.1932
We used fuzzy intersection calculations to satisfy customer demand and time windows and finally obtained the overall network reliability by using the algebraic intersection formula to calculate:
Rfinal = Pr{X2X3X4 }
    = [Pr{X2} + Pr{X3} + Pr{X4}] − [Pr{X2X3} + Pr{X2X4} + Pr{X3X4}] + [Pr{ X2X3X4}]
    = [Pr{X2} + Pr{X3} + Pr{X4}] − [t(X2,X3) + t(X2,X4) + t(X3,X4)] + t(X2,X3,X4)
    = 0.0625 + 0.2498 + 0.1932 − (0.0625 × 0.2498 + 0.0625 × 0.1932 + 0.2498 × 0.1932) +
         (0.0625 × 0.2498 × 0.1932)
    = 0.4326
Considering the fuzzy state and time window constraints, the network had a 43.26% reliability of meeting the user demand.

4.2. Multi-Time Window and Multi-Service Network

We also present a second reality of a multi-time window and multi-service network. This issue explores the network from a server perspective. In a complex network, there is more than one demand, source node and sink node. The network model is shown in Figure 11, which has two source nodes, two sink nodes and eight paths (arcs). The first sink node (node 7) has two service requirements (d1, d2) = (1, 2); and the second sink node (node 8) has two service requirements (d1, d2) = (2, 1).
Table 16 shows the upper limit of the transportable capacity of each arc and the corresponding probability value, operation lead time, transit time and commodity ratio. This study developed the fuzzy sets as shown in Table 17 (the fuzzy function values of flow and time for each arc) and Table 18 (the fuzzy function values of reliability for each arc), according to the rule based on the description in Section 2.2. In order to deal with more complex systems, scholars have developed multi-state fuzzy reliability based on the basis of binary-state fuzzy reliability [42]. Multi-state fuzzy reliability divides the interval [0,1] into several subintervals and defines fuzzy sets for each degree of interval state, most of which are defined by expert experience. In order to make up for the lack of expert ability, later combined with fuzzy logic and inference [43], constructing a fuzzy system [44], can adjust parameters according to various states, strengthen their learning ability and have a better interpretation of more complex systems.
Step 1. The amount of transport on each path must not exceed the upper limit of transport (M1, M2, M3, M4, M5, M6, M7, M8) = (3, 3, 3, 4, 4, 3, 3, 3) for each path (arc). For the convenience of representation, let X = (x1,3, x2,4, x3,5, x3,6, x4,5, x4,6, x5,7, x6,8) = (x1, x2, x3, x4, x5, x6, x7, x8).
0 ≤ x11 + x12 ≤ 3
0 ≤ x21 + x22 ≤ 3
0 ≤ x31 + x32 ≤ 3
0 ≤ x41 + x42 ≤ 3
0 ≤ x51 + x52 ≤ 3
0 ≤ x61 + x62 ≤ 3
0 ≤ x71 + x72 ≤ 3
0 ≤ x81 + x82 ≤ 3
This network must meet the customer demand of the first sink node (Node 7) (d1, d2) = (1, 2) and the second sink node (Node 8) (d1, d2) = (2, 1):
x31 + x51 = 1
x52 + x72 = 2
x41 + x61 = 2
x42 + x62 = 1
According to the flow conservation theory, the sum of the inflow and outflow of nodes 3–6 must be the same:
x11 + x12 = x31 + x32 + x41 + x42
x21 + x22 = x51 + x52 + x61 + x62
x31 + x32 + x51 + x52 = x71 + x72
x41 + x42 + x61 + x62 = x81 + x82
This process is shown in Table 19 to find all feasible solutions X1 = (x11, x21, x31, x41, x51, x61, x71, x81) and X2 = (x12, x22, x32, x42, x52, x62, x72, x82) by the exhaustive method (as shown in Table 20) through Equations (27)–(42):
Step 2. Find all possible D-MP candidate solutions from the feasible transport mode X obtained in step 1.
x1 = x11 + x12
x2 = x21 + x22
x3 = x31 +2 x32
x4 = x41 + x42
x5 = x51 + x52
x6 = x61 +2 x62
x7 = x71 + x72
x8 = x81 + x82
We found the D-MP candidate solution: (3, 3, 2, 2, 2, 2, 3, 3), (3, 3, 3, 1, 1, 2, 3, 3), (3, 3, 1, 3, 1, 3, 3, 3), (3, 3, 2, 2, 2, 2, 3, 3), (3, 3, 0, 3, 2, 2, 3, 3), (3, 3, 2, 2, 2, 2, 3, 3). Among them, it was found that there were duplicate solutions and after deletion, the solution was solved as X1 = (3, 3, 2, 2, 2, 2, 3, 3), X2 = (3, 3, 3, 1, 1, 2, 3, 3), X3 = (3, 3, 1, 3, 1, 3, 3, 3) and X4 = (3, 3, 0, 3, 2, 2, 3, 3).
Step 3. This step uses the comparison algorithm to check whether the D-MP candidate solution obtained in Step 2 is a real D-MP solution. The final test results are shown in Table 21.
Next, the user’s time limit is processed and a fuzzy system is established to determine the reliability of each path and finally the overall network reliability is obtained.
Step 4. This step establishes multiple time windows on multiple nodes as a constraint on the network model, where the upper limit of the time window represents the user’s tolerance for a delayed arrival. When the time is exceeded, the solution is an infeasible solution. The lower limit of the time window represents the time at which the estimated service start time. If it arrives early, it must wait until the node’s departure time to continue moving. In order to facilitate the expression and calculation time, we list the D-MP solutions processed by the comparison algorithm, as shown in Table 22.
Before the calculation, we proposed the D-MP solution as four routes of {e1, e3, e7}, {e2, e5, e7}, {e1, e4, e8} and {e2, e6, e8}. Here we use X1 = (3, 3, 2, 2, 2, 2, 3, 3) as an example to directly use Table 23 to express the detailed process of checking the solution.
The arrival time is as Equation (43):
Ava,b = Cv(a−1),a + Ft(wa,b xa,b +λa,b), for 0 ≤ an, 0 ≤ bn, v = 1, 2,…, w
The process time is as Equation (44):
C a , b v   = { A a , b v i f   e t b A a , b v l t b e t b i f   A a , b v < e t b n o t   e x i s t o t h e r w i s e
Table 24 shows the time window test D-MP solution results in Step 4.
Step 5. In this step, the reliability of each arc is obtained by means of a fuzzy system. First, establish a fuzzy rule base and fuzzy set for each flow, time and reliability. Table 25 presents the sample fuzzy rule library and Table 26 shows the time and flow of each path in each set of solutions.
In this study, the reliability of each arc was determined by the fuzzy system constructed. The reliability calculation results of each path in are shown in Table 27.
Step 6. First, find the reliability of each D-MP solution, as shown in Equations (45) and (46):
X2 = 0.25 × 0.25 × 0.25 × 0.75 × 0.92 × 0.558 × 0.25 × 0.25
X3 = 0.25 × 0.25 × 0.75 × 0.191 × 0.92 × 0.25 × 0.25 × 0.25
The final result was X2 = 0.000376, X3 = 0.000129
We used fuzzy intersection calculations to satisfy customer demand and time windows and finally obtained the overall network reliability by using the Algebraic intersection formula to calculate:
Rfinal = Pr{X2X3}
    = [Pr{X2}+Pr{X3} − [Pr{X2X3}
    = Pr{X2}+Pr{X3}− t(X2,X3)
    = 0.000376 + 0.000129 − 0.000376 · 0.000129
    = 0.000504
Considering the fuzzy state and the time window, this network can hardly meet all of the user demand. Compared with the first example, this example has more paths belonging to the high traffic and high load state. For the definition of time fuzzification, most of them were long-term states and more time window limits were set up. The above two points suggest that users have more and higher requirements on the service. Therefore, the network cannot meet the demand of users and it is necessary to discover the crux of the problem for immediate improvements.

5. Conclusions

This study used the two focuses of time window and fuzzy theory to improve the traditional reliability network regarding the lack of expression of the time and reliability of the traffic service network. In the past, with a traditional network, the time limit was often only limited to the overall time, and the processing time was not delicate enough as in the actual traffic service network, so the user will experience a different duration because of the route length. Due to different perceptions in time, during the construction of the network model, it is necessary to set different time limits for different routes. The hard time window characteristics only matched the characteristics of the transportation service network—there will not be an early outbound time from the station due to early pit stops and the vehicles entering the station early must wait until the scheduled outbound time to depart. In addition to the conditions for setting up time at the sink node, it may be necessary to set time limits on some sites such as the transfer node. The above can use the time window to express the characteristics of the network. On the assumption of reliability, in traditional networks, the reliability of each arc is assumed at the beginning, but this study considered there would be different reliabilities due to the different conditions of the arc. For example, when a road is in a traffic jam state, accidents are more likely to occur, and reliability is reduced. Therefore, this study used fuzzy theory to define a set of states with different arcs, so that the arc would have different reliabilities due to different current flows.
Based on the above improvements to the traditional network, our network model could fully express the real network used in real-world networks about traffic or in networks that require more detail on time, as reliability can change due to different state changes. These networks can be applied to this research model. After comparing two different examples, we finally found that because several paths of the network were in a high load state, this resulted in a significant decline in overall network reliability.
The main issues discussed in this study were fuzzy theory and network reliability and these have increased the limitations of many realities. The current research results will be used to establish a prototype and successfully solve the real problem. This paper has some limitations, which will be strengthened in future research. First, more factors will be considered to strengthen the transportation network to be more in line with the real situation; for example, by considering which path or under what demand there will be poor network performance to improve these symptoms and improve the critical path to increase the reliability of the network. Moreover, in the fuzzy function hypothesis, we used the general triangular fuzzy function and the Z function to define the flow, time and reliability and then established the reliability of each path by the fuzzy law library inference. We can further study and analyze past data and transform them into fuzzy functions of each state to establish a fuzzy rule base, which will more accurately infer the reliability of reality and effectively provide a more complete model as a reference for future improvement.

Author Contributions

The conceptualization, methodology and software are completed by C.-L.H., S.-Y.H. and W.-C.Y. C.-L.H., W.-C.Y. and J.W. have done the job of validation. The formal analysis is done by C.-L.H., S.-Y.H. and W.-C.Y. C.-L.H. and W.-C.Y. contribute in the writing-original draft preparation and writing-review & editing. The visualization and supervision are directed by C.-L.H., W.-C.Y. and J.W. W.-C.Y. instructs the project administration. W.-C.Y. and J.W. responses the funding acquisition.

Funding

This research was supported in part by the National Science Council of Taiwan, R.O.C. under grant MOST 105-2221-E-424-003 and MOST 106-2221-E-424-002.

Acknowledgments

The authors really appreciate the editor and the anonymous referees for all of the precious words, meaningful comments and constructive recommendations to advance the quality of this paper. This research was supported in part by the National Science Council of Taiwan, R.O.C. under grant MOST 105-2221-E-424-003 and MOST 106-2221-E-424-002.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

MPMinimal paths, a path that can go from the source node to the sink node.
MFNMultistate flow network
d-MPMeet the demand d’s minimum path set (d-minimal path)
(d1, d2, …, dp)-MPThe minimum set of paths that meet the needs of p users

Notations

G(V,E,W)In the multi-demand stochastic traffic network graph set, V denotes the node set V = {vi | 1 ≤ in}, E denotes the arc set E = {ei | 1 ≤ km}, node 1 is the source node and node n is sink node; W represents the maximum capacity of each arc
cUser category collection is (c = 1, 2, …, s)
n, mNumber of nodes and arcs
ek, ei,jek represents the kth arc in the network, ei,j represents the amount of transport of node i to node j, where k = 1, 2,…, m
XX = (x1, x2, …,xm) represents a vector in the multi-flow random traffic network graph set that satisfies all user needs
X(ek) = xkIn the network state X = (x1, x2, …,xm), the arc ek’s shipping level
xi,j, xkIn the case of i = 1, …, n, j = 1, …, n, xi,j represents the user flow of the arc ai,j (ij); xk is the user flow on the arc ak, in this study xi,j = xk
MkMax capacity of the arc ek
sThe maximum number of users in the multi-flow random traffic network map
αkcThe class c user c (c = 1, 2, …, s) takes the weight of the capacity on the path k (arc), expressed as a real number
xkcNumber of class c users (c = 1, 2, …, s) on path k (arc)
XcClass c requirements (c = 1, 2, …, s) feasible solutions in multi-demand stochastic traffic network diagrams
dcUser demand for class c services
DD = (d1, d2, …, ds), where D represents the collection of all user transport needs in the system
ΩFeasible solution set that satisfies user needs
ΩminFeasible solution set with the lowest and satisfying user needs
PCandidate solution set that satisfies the demand, P = {Pq | 1 ≤ qo}
PCAD-MP solution set that satisfies the requirements and is verified by the comparison algorithm
vNumber of routes through the time window
Ava,bIn the vth route, the time when it reaches the next node b from node a; this time has not been processed by the time window, 1 ≤ an, 1 ≤ bn
Cva,bIn the vth route, the current accumulated time when it reaches the next node b from node a, this time has been processed by this time window, 1 ≤ an, 1 ≤ bn
λa,bDelivery time from the ath node to the bth node
wa,bThe weight of processing lead time per unit user from the ath node to the bth node
e t a , l t a The earliest service time e t a and users can tolerate time at the latest l t a of the ath node
bFunction value constituting a fuzzy function
uRk(X)Finally, the reliability of the feasible solution X is obtained.
Rd1, d2,…, dsNetwork reliability that satisfies all users’ demand ds units
RFinalFuzzy reliability that meets user demand ds units and meets the transportation time limit of time window

Proper Nouns

Network reliabilityNetwork reliability: Traditionally defined as the probability of the successful delivery of the quantity from the source node to the sink node, this study adds the concept of on-time, defined as the probability of success in successfully delivering customer demand and punctuality from the source node to the sink node.
MP (minimal path)Minimum path set—refers to a path that can go from the source node to the sink node. If any arc in the path is removed, the set of the path set cannot be connected from the source node to the sink node.
Membership functionMembership function: A function used in a fuzzy set whose range is any value between 0 and 1. The closer the degree of fuzzy is to the target value, the closer the value is to 1. The decision of the membership function is basically based on subjective judgments or based on expert experience and knowledge.
Comparison AlgorithmThis algorithm is used to check whether the D-MP candidate solution is the least feasible solution that satisfies the requirement D = (d1, d2, …, ds)
D-MP candidateD-MP candidate solution: the solution can successfully satisfy all users’ requirements D = (d1, d2, …, ds). This solution also needs to use the comparison algorithm to check whether it is the minimum feasible solution to meet the demand.
D-MPAfter the comparison algorithm is verified, the D-MP candidate solution that conforms to the inspection process is the D-MP solution.
Flow conservation lawFlow conservation law: In a single node, incoming flow will equal the output flow
Capacity level DUsually a non-negative integer and able to satisfy the problem’s needs D = (d1, d2, …, ds), which is usually determined by past statistics in practice

Appendix A

Table A1. Summary table of the assumptions.
Table A1. Summary table of the assumptions.
EntryAssumption
1.Users must be transported from the source node s to the sink node t
2.Meet the law of conservation of flow
3.Each node is absolutely reliable
4.The capacity of the arcs does not affect each other and is independent of each other
5.The capacity on each arc is random and given a corresponding probability assignment
6.The state of the arc can be defined by the fuzzy function
Table A2. Summary table explain topics step by step.
Table A2. Summary table explain topics step by step.
Begin.
STEP 1.
Input a network.
STEP 2.
The basic data of each arc, the fuzzy function of each arc flow and time and the fuzzy function value of each arc reliability are provided.
STEP 3.
Calculate the amount of each type of user per path (arc) and make the total delivery volume meet the demand of individual users and not greater than the upper limit of the transportable capacity of each path (arc).
STEP 4.
Find out D = (d1, d2, …, ds)-MP candidate solutions by the feasible transport amount of the various types of users, which is described in Theorem 1, Lemma 1, Lemma 2 and Equation (7), in the path obtained in Step 3.
STEP 5.
Obtain D-MP solutions using the comparison algorithm to check whether the D-MP candidate solution obtained in Step 4 is a D-MP solution by Corollary 1.
STEP 6.
Consider the effect of time window on D-MP solution by Theorem 2, Lemma 3 and Equations (9) and (10).
STEP 7.
Use the fuzzy system to obtain the reliability of each arc as described in the Section 3.1.4.
STEP 8.
Substituting fuzzy set operations into the principle of displacement to find the network reliability that satisfies the time window by Equation (12).
STEP 9.
Output RFinal.
End.

References

  1. Papakammenos, D.J.; Dialynas, E.N. Reliability and cost assessment of power transmission networks in the competitive electrical energy market. IEEE Trans. Power Syst. 2004, 19, 390–398. [Google Scholar] [CrossRef]
  2. Dhillon, B.S. Transportation Systems Reliability and Safety; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
  3. Lin, Y.K. Performance evaluation for the logistics system in case that capacity weight varies from arcs and types of commodity. Int. J. Prod. Econ. 2007, 107, 572–580. [Google Scholar] [CrossRef]
  4. Yeh, W.C.; Lin, J.S. New parallel swarm algorithm for smart sensor systems redundancy allocation problems in the Internet of Things. J. Supercomput. 2018, 74, 4358–4384. [Google Scholar] [CrossRef]
  5. Grout, J.R. Influencing a Supplier Using Delivery Windows: Its Effect on the Variance of Flow Time and On-Time Delivery. Decis. Sci. 1998, 29, 747–764. [Google Scholar] [CrossRef]
  6. Zhang, J.; Lam, W.H.; Chen, B.Y. On-time delivery probabilistic models for the vehicle routing problem with stochastic demands and time windows. Eur. J. Oper. Res. 2016, 249, 144–154. [Google Scholar] [CrossRef]
  7. Shen, Y. A new simple algorithm for enumerating all minimal paths and cuts of a graph. Microelectron. Reliab. 1995, 35, 973–976. [Google Scholar] [CrossRef]
  8. Yeh, W.C. A simple heuristic algorithm for generating all minimal paths. IEEE Trans. Reliab. 2007, 56, 488–494. [Google Scholar] [CrossRef]
  9. Yeh, W.C. Search for all MCs in networks with unreliable nodes and arcs. Reliab. Eng. Syst. Saf. 2003, 79, 95–101. [Google Scholar] [CrossRef]
  10. Yeh, W.C. A simple algorithm to search for all MCs in networks. Eur. J. Oper. Res. 2006, 174, 1694–1705. [Google Scholar] [CrossRef]
  11. Yeh, W.C. A revised layered-network algorithm to search for all d-minpaths of a limited-flow acyclic network. IEEE Trans. Reliab. 1998, 47, 436–442. [Google Scholar]
  12. Yeh, W.C. A simple algorithm to search for all d-MPs with unreliable nodes. Reliab. Eng. Syst. Saf. 2001, 73, 49–54. [Google Scholar] [CrossRef]
  13. Yeh, W.C. A simple method to verify all d-minimal path candidates of a limited-flow network and its reliability. Int. J. Adv. Manuf. Technol. 2002, 20, 77–81. [Google Scholar] [CrossRef]
  14. Yeh, W.C. A novel method for the network reliability in terms of capacitated-minimum-paths without knowing minimum-paths in advance. J. Oper. Res. Soc. 2005, 56, 1235–1240. [Google Scholar] [CrossRef]
  15. Yeh, W.C. Search for MC in modified networks. Comput. Oper. Res. 2001, 28, 177–184. [Google Scholar] [CrossRef]
  16. Iida, Y. Basic concepts and future directions of road network reliability analysis. J. Adv. Transp. 1999, 33, 125–134. [Google Scholar] [CrossRef]
  17. Yager, R.R. On the measure of fuzziness and negation part I: Membership in the unit interval. International J. General Syst. 2008, 5, 221–229. [Google Scholar] [CrossRef]
  18. Rietveld, P.; Bruinsma, F.R.; Vuuren, D.J.V. Coping with unreliability in public transport chains: A case study for Netherlands. Transp. Res. Part A Policy Pract. 2001, 35, 539–559. [Google Scholar] [CrossRef]
  19. Highway Capacity Manual; Transportation Research Board: Washington, DC, USA, 2000.
  20. Sutaria, T.; Haynes, J. Level of service at signalized intersections. In Proceedings of the 56th Annual Meeting of the Transportation Research Board, Washington, DC, USA, 24–28 January 1977; pp. 107–113. [Google Scholar]
  21. Carey, M.; Kwieciński, A. Stochastic approximation to the effects of headways on knock-on delays of trains. Transp. Res. Part B: Methodol. 1994, 28, 251–267. [Google Scholar] [CrossRef]
  22. Leilich, R.H. Application of simulation models in capacity constrained rail corridors. In Proceedings of the 30th Conference on Winter Simulation, Washington, DC, USA, 13–16 December 1998. [Google Scholar]
  23. Huisman, T.; Boucherie, R.J. Running times on railway sections with heterogeneous train traffic. Transp. Res. Part B Methodol. 2001, 35, 271–292. [Google Scholar] [CrossRef]
  24. Mattson, L. Train Service Reliability a Survey of Methods for Deriving Relationships for Train Delays; Swedish Institute for Transport and Communications Analysis: Tockholm, Sweden, 2004. [Google Scholar]
  25. Nelson, D.; O’Neil, K. Commuter rail service reliability: On-time performance and causes for delays. Transp. Res. Rec. J. Transp. Res. Board 2000, 1704, 42–50. [Google Scholar] [CrossRef]
  26. Higgins, A.; Kozan, E. Modeling train delays in urban networks. Transp. Sci. 1998, 32, 346–357. [Google Scholar] [CrossRef]
  27. Pachl, J. Railway Operation and Control; VTD Rail Publishing: Mountlake Terrace, WA, USA, 2002. [Google Scholar]
  28. Zadeh, L.A. Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybern. 1973, SMC-3, 28–44. [Google Scholar] [CrossRef]
  29. Baker, E.K. An exact algorithm for the time-constrained traveling salesman problem. Oper. Res. 1983, 31, 938–945. [Google Scholar] [CrossRef]
  30. Solomon, M.M. Algorithms for the vehicle routing and scheduling problems with time window constraints. Oper. Res. 1987, 35, 254–265. [Google Scholar] [CrossRef]
  31. Aggarwal, K.; Gupta, J.; Misra, K. A simple method for reliability evaluation of a communication system. IEEE Trans. Commun. 1975, 23, 563–566. [Google Scholar] [CrossRef]
  32. Colbourn, C.J.; Colbourn, C. The Combinatorics of Network Reliability; Oxford University Press: New York, NY, USA, 1987. [Google Scholar]
  33. Moore, E.F.; Shannon, C.E. Reliable Circuits Using Less Reliable Relays. J. Frank. Inst. 1956, 262, 191–208. [Google Scholar] [CrossRef]
  34. Yeh, W.C.; Lin, C.H. A squeeze response surface methodology for finding symbolic network reliability functions. IEEE Trans. Reliab. 2009, 58, 374–382. [Google Scholar]
  35. Yeh, W.C. Multistate network reliability evaluation under the maintenance cost constraint. Int. J. Prod. Econ. 2004, 88, 73–83. [Google Scholar] [CrossRef]
  36. Heidtmann, K. Statistical comparison of two sum-of-disjoint-product algorithms for reliability and safety evaluation. Lect. Notes Comput. Sci. 2002, 2434, 70–81. [Google Scholar]
  37. Yeh, W.C. An improved sum-of-disjoint-products technique for the symbolic network reliability analysis with known minimal paths. Reliabil. Eng. Syst. Saf. 2007, 92, 260–268. [Google Scholar] [CrossRef]
  38. Zuo, M.J.; Tian, Z.; Huang, H.Z. An efficient method for reliability evaluation of multistate networks given all minimal path vectors. IIE Trans. 2007, 39, 811–817. [Google Scholar] [CrossRef]
  39. Zadeh, L.A. Fuzzy sets. Inf. Control. 1965, 8, 338–353. [Google Scholar] [CrossRef]
  40. Mendel, J.M. Fuzzy logic systems for engineering: A tutorial. Proc. IEEE 1995, 83, 345–377. [Google Scholar] [CrossRef]
  41. Cai, K.Y.; Wen, C.Y.; Zhang, M.L. Fuzzy states as a basis for a theory of fuzzy reliability. Microelectron. Reliab. 1993, 33, 2253–2263. [Google Scholar] [CrossRef]
  42. Li, Z.; Kapur, K.C. Continuous-state reliability measures based on fuzzy sets. IIE Trans. 2012, 44, 1033–1044. [Google Scholar] [CrossRef]
  43. Klir, G.; Yuan, B. Fuzzy Sets and Fuzzy Logic; Prentice Hall: Upper Saddle River, NJ, USA, 1995. [Google Scholar]
  44. Kosko, B. Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence/Book and Disk; Prentice Hall: Upper Saddle River, NJ, USA, 1992; Volume 1. [Google Scholar]
  45. Dave, R.N. Fuzzy shell-clustering and applications to circle detection in digital images. Int. J. General Syst. 1990, 16, 343–355. [Google Scholar] [CrossRef]
  46. Fullér, R.; Zimmermann, H.J. Fuzzy reasoning for solving fuzzy mathematical programming problems. Fuzzy Sets Syst. 1993, 60, 121–133. [Google Scholar] [CrossRef]
  47. Zadeh, L.A. On fuzzy algorithms. In Fuzzy Sets, Fuzzy Logic and Fuzzy Systems: Selected Papers by Lotfi A Zadeh; World Scientific Pub Co Inc.: Singapore, 1996; pp. 127–147. [Google Scholar]
  48. Bridges, S.M.; Vaughn, R.B. Fuzzy data mining and genetic algorithms applied to intrusion detection. In Proceedings of the National Information Systems Security Conference (NISSC), Baltimore, MD, USA, 16–19 October 2000; pp. 109–122. [Google Scholar]
  49. Chen, Z.L.; Lee, C.Y. Parallel machine scheduling with a common due window. Eur. J. Oper. Res. 2002, 136, 512–527. [Google Scholar] [CrossRef]
  50. Solomon, M.M.; Desrosiers, J. Survey paper—time window constrained routing and scheduling problems. Transp. Sci. 1988, 22, 1–13. [Google Scholar] [CrossRef]
  51. Broekhoven, E.V.; Baets, B.D. Fast and accurate center of gravity defuzzification of fuzzy system outputs defined on trapezoidal fuzzy partitions. Fuzzy Sets Syst. 2006, 157, 904–918. [Google Scholar] [CrossRef]
  52. Anandan, V.; Uthra, G. Defuzzification by Area of Region and Decision Making Using Hurwicz Criteria for Fuzzy Numbers. Appl. Math. Sci. 2014, 8, 3145–3154. [Google Scholar] [CrossRef]
Figure 1. Standard membership functions.
Figure 1. Standard membership functions.
Electronics 08 00539 g001
Figure 2. Hard, soft and comprehensive time windows.
Figure 2. Hard, soft and comprehensive time windows.
Electronics 08 00539 g002
Figure 3. Network diagram example.
Figure 3. Network diagram example.
Electronics 08 00539 g003
Figure 4. X1 Path solution.
Figure 4. X1 Path solution.
Electronics 08 00539 g004
Figure 5. A graph of the time relationships of the time windows.
Figure 5. A graph of the time relationships of the time windows.
Electronics 08 00539 g005
Figure 6. Flow fuzzy function.
Figure 6. Flow fuzzy function.
Electronics 08 00539 g006
Figure 7. Time fuzzy function.
Figure 7. Time fuzzy function.
Electronics 08 00539 g007
Figure 8. Reliability fuzzy function.
Figure 8. Reliability fuzzy function.
Electronics 08 00539 g008
Figure 9. The minimum inference method.
Figure 9. The minimum inference method.
Electronics 08 00539 g009
Figure 10. Single-time window and single service network.
Figure 10. Single-time window and single service network.
Electronics 08 00539 g010
Figure 11. Multi-time window and multi-service network.
Figure 11. Multi-time window and multi-service network.
Electronics 08 00539 g011
Table 1. Basic data of each arc.
Table 1. Basic data of each arc.
ArcCapacityProbability rkShipping Time λαk1αk2
e100.01511
10.02
20.02
30.95
e200.01511
10.01
20.01
30.97
e300.01511
10.02
20.05
30.92
e400.01511
10.01
20.01
30.97
e500.01511
10.04
20.05
30.9
e600.01511
10.03
20.03
30.92
Note: Assume that the user has two requirements for the transportation network, that is, c = 1, 2, αk1 and αk2 represents the weight of demand for the first type of user and the second type of user, respectively.
Table 2. Fuzzy function of flow and time for each arc.
Table 2. Fuzzy function of flow and time for each arc.
Function Valueb1kb2kb3kb4kb5kb6k
Arc
e11357911
e21386811
e31397911
e41257911
e51356912
e61457913
Table 3. Fuzzy function value of reliability for each arc.
Table 3. Fuzzy function value of reliability for each arc.
Function Valueb7kb8kb9kb10kb11k
Arc
e100.250.50.751
e200.250.50.751
e300.250.50.751
e400.250.50.751
e500.250.50.751
e600.250.50.751
Table 4. Example of fuzzy rule library.
Table 4. Example of fuzzy rule library.
ReliabilityTime
ShortNormalLong
FlowLowVery HighHighHigh
NormalHighNormalLow
HighHighLowVery Low
Table 5. Basic information of each arc.
Table 5. Basic information of each arc.
ArcCapacityReliabilityOperation Lead Time/Unit Passenger Transit Timeαk1
e100.01241
10.02
20.02
30.95
e200.01341
10.01
20.005
30.005
40.97
e300.01231
10.05
20.06
30.88
e400.01351
10.02
20.03
30.94
Table 6. Fuzzy function value of flow and time for each arc.
Table 6. Fuzzy function value of flow and time for each arc.
Function Valueb1kb2kb3kb4kb5kb6k
Arc
e111.5391113
e211.5391113
e30.51391113
e40.51391113
Table 7. Fuzzy function value of reliability for each arc.
Table 7. Fuzzy function value of reliability for each arc.
Function Valueb7kb8kb9kb10kb11k
Arc
e100.250.50.751
e200.250.50.751
e300.250.50.751
e400.250.50.751
Table 8. The process of the exhaustive method.
Table 8. The process of the exhaustive method.
0 ≤ x11 ≤ 30 ≤ x21 ≤ 40 ≤ x31 ≤ 30 ≤ x41 ≤ 3
0000
1000
0100
0010
0001
::::
::::
::::
::::
::::
3333
Table 9. The results of the feasible solution.
Table 9. The results of the feasible solution.
Feasible Delivery Method of Group IServicex11x21x31x41
1X13300
2X20033
3X32211
4X41122
Table 10. The results of Step 3.
Table 10. The results of Step 3.
Tested XWhether It Is a D-MP Solution
X1 = (3, 3, 0, 0)Yes
X2 = (0, 0, 3, 3)Yes
X3 = (2, 2, 1, 1)Yes
X4 = (1, 1, 2, 2)Yes
Table 11. The results of Step 3.
Table 11. The results of Step 3.
D-MPProcessing RouteThe Time of Source Node for This MPTime Window of this MP
X1{e1, e2}C11,1 = 0{ e t 4 , l t 4 } = {0, 25}
X2{e3, e4}C21,1 = 0{ e t 4 , l t 4 } = {0, 25}
X3{e1, e2}, {e3, e4}C31,1 = 0, C41,1 = 0{ e t 4 , l t 4 } = {0, 25}
X4{e1, e2}, {e3, e4}C51,1 = 0, C61,1 = 0{ e t 4 , l t 4 } = {0, 25}
Table 12. The results of Step 4.
Table 12. The results of Step 4.
Whether to Meet the Time Window Limit
X1No
X2Yes
X3Yes
X4Yes
Table 13. Fuzzy rule library.
Table 13. Fuzzy rule library.
ReliabilityTime
ShortNormalLong
FlowLowVery HighHighHigh
NormalHighNormalLow
HighHighLowVery Low
Table 14. Transport time and flow for each arc.
Table 14. Transport time and flow for each arc.
x1x2x3x4
FlowTimeFlowTimeFlowTimeFlowTime
X20000310311
X3282101618
X4161727211
Table 15. Fuzzy reliability of each arc.
Table 15. Fuzzy reliability of each arc.
x1x2x3x4
X20.920.920.250.25
X30.5580.5290.920.92
X40.920.920.5580.409
Table 16. Basic information of each arc.
Table 16. Basic information of each arc.
ArcCapacityReliabilityOperation Lead Time/Unit PassengerTransit Timeαk1αk2
e100.021411
10.02
20.03
40.93
e200.011.5411
10.02
20.02
30.95
e300.011312
10.04
20.06
30.89
e400.012511
10.01
20.01
30.01
40.96
e500.012611
10.01
20.02
30.01
40.95
e600.051312
10.05
20.05
30.85
e700.011311
10.03
20.06
30.9
e800.011.5411
10.02
20.02
30.02
40.94
Table 17. Fuzzy function values of flow and time for each arc.
Table 17. Fuzzy function values of flow and time for each arc.
Function Valueb1kb2kb3kb4kb5kb6k
Arc
e111.5391113
e211.5391113
e30.51391113
e40.51391115
e511.5391115
e611.5391113
e70.51391113
e80.51391113
Table 18. Fuzzy function values of reliability for each arc.
Table 18. Fuzzy function values of reliability for each arc.
Function Valueb7kb8kb9kb10kb11k
Arc
e100.250.50.751
e200.250.50.751
e300.250.50.751
e400.250.50.751
e500.250.50.751
e600.250.50.751
e700.250.50.751
e800.250.50.751
Table 19. The process of the exhaustive method.
Table 19. The process of the exhaustive method.
0   x 1 1 4 0 x 2 1 4 0 x 3 1 3 0 x 4 1 4 0 x 5 1 4 0 x 6 1 3 0 x 7 1 3 0 x 8 1 3 0 x 1 2 4 0 x 2 2 4 0 x 3 2 3 0 x 4 2 4 0 x 5 2 4 0 x 6 2 3 0 x 7 2 3 0 x 8 2 3
0000000000000000
0000000000000010
0000000000000100
::::::::::::::::
::::::::::::::::
::::::::::::::::
4434433344344333
Table 20. Feasible solutions.
Table 20. Feasible solutions.
Feasible SolutionsServicex1cx2cx3cx4cx5cx6cx7cx8c
1x1112011112
x1221111021
2x2121110112
x2212101121
3x3121110112
x3212011121
4x4121021012
x4212101121
5x5121021012
x5212011121
6x6130120012
x6203002121
Table 21. The results of Step 3.
Table 21. The results of Step 3.
Tested XWhether It Is a D-MP Solution
X1= (3, 3, 2, 2, 2, 2, 3, 3)Yes
X2= (3, 3, 3, 1, 1, 2, 3, 3)Yes
X3= (3, 3, 1, 3, 1, 3, 3, 3)Yes
X4 = (3, 3, 0, 3, 2, 2, 3, 3)Yes
Table 22. The test results of Step 4.
Table 22. The test results of Step 4.
D-MPSplit PathStarting Time
X1{e1, e3, e7},{e2, e5, e7},{e1, e4, e8},{e2, e6, e8}0
X2{e1, e3, e7},{e2, e5, e7},{e1, e4, e8},{e2, e6, e8}0
X3{e1, e3, e7},{e2, e5, e7},{e1, e4, e8},{e2, e6, e8}0
X4{e2, e5, e7},{e1, e4, e8},{e2, e6, e8}0
Table 23. Time window inspection process of X1.
Table 23. Time window inspection process of X1.
Node & Time WindowNode & Time WindowNode & Time Window
Arrival TimeProcess TimeArrival TimeProcess TimeArrival TimeProcess Time
{e1, e3, e7} = {3, 2, 3}Node 3, {6, 9}Node 5, no setNode 7, {0, 23}
0 + 1 × 3 + 477 + 1 × 2 + 31212 + 1 × 3 + 318 (O)
{e2, e5, e7} = {3, 2, 3}Node 4, {6, 9}Node 5, no setNode 7, {0, 23}
0 + 1.5 × 3 + 48.58.5 + 2 × 2 + 618.518.5 + 1 × 3 + 324.5 (X)
{e1, e4, e8} = {3, 2, 3}Node 3, {6, 9}Node 6, no setNode 8, {0, 27}
0 + 1 × 3 + 477 + 2 × 2 + 51616 + 1.5 × 3 + 424.5 (O)
{e2, e6, e8} = {3, 2, 3}Node 4, {6, 9}Node 6, no setNode 8, {0, 23}
0 + 1.5 × 3 + 48.58.5 + 1 × 2 + 313.513.5 + 1.5 × 3 + 422 (O)
Table 24. The results of Step 4.
Table 24. The results of Step 4.
D-MP SolutionsWhether to Meet the Time Window Limit
X1No
X2Yes
X3Yes
X4Yes
Table 25. Fuzzy rule library.
Table 25. Fuzzy rule library.
ReliabilityTime
ShortNormalLong
FlowLowVery HighHighHigh
NormalHighNormalLow
HighHighLowVery Low
Table 26. Transport time and flow for each arc.
Table 26. Transport time and flow for each arc.
X2x1x2x3x4
flowtimeflowtimeflowtimeflowtime
3738.53617
x5x6x7x8
flowtimeflowtimeflowtimeflowtime
18253638.5
X3x1x2x3x4
flowtimeflowtimeflowtimeflowtime
3738.514311
x5x6x7x8
flowtimeflowtimeflowtimeflowtime
18363638.5
Table 27. Fuzzy reliability of each arc.
Table 27. Fuzzy reliability of each arc.
X2x1x2x3x4
0.250.250.250.75
x5x6x7x8
0.920.5580.250.25
X3x1x2x3x4
0.250.250.750.191
x5x6x7x8
0.920.250.250.25

Share and Cite

MDPI and ACS Style

Huang, C.-L.; Huang, S.-Y.; Yeh, W.-C.; Wang, J. Fuzzy System and Time Window Applied to Traffic Service Network Problems under a Multi-Demand Random Network. Electronics 2019, 8, 539. https://doi.org/10.3390/electronics8050539

AMA Style

Huang C-L, Huang S-Y, Yeh W-C, Wang J. Fuzzy System and Time Window Applied to Traffic Service Network Problems under a Multi-Demand Random Network. Electronics. 2019; 8(5):539. https://doi.org/10.3390/electronics8050539

Chicago/Turabian Style

Huang, Chia-Ling, Sin-Yuan Huang, Wei-Chang Yeh, and Jinhai Wang. 2019. "Fuzzy System and Time Window Applied to Traffic Service Network Problems under a Multi-Demand Random Network" Electronics 8, no. 5: 539. https://doi.org/10.3390/electronics8050539

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop