Bounding the search space of the Population Harvest Cutting Problem with Multiple Size Stock Selection

Loading...
Thumbnail Image
Files
lion16.pdf(505.03 KB)
Accepted version
Date
2016-12-01
Authors
Climent, Laura
O'Sullivan, Barry
Prestwich, Steven D.
Journal Title
Journal ISSN
Volume Title
Publisher
Springer
Research Projects
Organizational Units
Journal Issue
Abstract
In this paper we deal with a variant of the Multiple Stock Size Cutting Stock Problem (MSSCSP) arising from population harvesting, in which some sets of large pieces of raw material (of different shapes) must be cut following certain patterns to meet customer demands of certain product types. The main extra difficulty of this variant of the MSSCSP lies in the fact that the available patterns are not known a priori. Instead, a given complex algorithm maps a vector of continuous variables called a values vector into a vector of total amounts of products, which we call a global products pattern. Modeling and solving this MSSCSP is not straightforward since the number of value vectors is infinite and the mapping algorithm consumes a significant amount of time, which precludes complete pattern enumeration. For this reason a representative sample of global products patterns must be selected. We propose an approach to bounding the search space of the values vector and an algorithm for performing an exhaustive sampling using such bounds. Our approach has been evaluated with real data provided by an industry partner
Description
Keywords
Population harvesting , Global production patterns , Vector values , Cutting Stock Problem (CSP) , Valued search space
Citation
Climent L., O’Sullivan B., Prestwich S.D. (2016) 'Bounding the Search Space of the Population Harvest Cutting Problem with Multiple Size Stock Selection', in Festa P., Sellmann M. and Vanschoren J. (eds)., Learning and Intelligent Optimization, LION 2016, Lecture Notes in Computer Science, vol 10079, pp. 75-90. doi: 10.1007/978-3-319-50349-3_6
Copyright
© Springer International Publishing AG 2016. This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-319-50349-3_6