Genetic algorithm application to a production-inventory model of imperfect process with deteriorating items under two dispatching policies

Yu Su Shen*, June Chung Sung, Dah Chuan Gong

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

First-In-First-Out (FIFO) and the Last-In-First-Out (LIFO) are general presumption policies of inventory management. In this paper, the genetic algorithm is applied to solve an imperfect production-inventory problem under two inventory dispatching policies, FIFO and LIFO. Referred to mathematical models presented in (Sung et al.2008) and (Lin and Gong 2007), the cell reference function of Excel 2003 is firstly adopted to setup the corresponding objective functions. Sensitivity analyses with various combinations of parameters are further studies. Obtained results show that when a deteriorating item is produced by an imperfect process, the LIFO policy generally dominates the FIFO. However, there exists a cross point when the deterioration rate a under the in-control state is 0.03 and the minimum total cost presents a point of the break-even.

Original languageEnglish
Title of host publicationProceedings of the 2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009
Pages913-917
Number of pages5
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009 - Sanya, Hainan, China
Duration: 24 04 200926 04 2009

Publication series

NameProceedings of the 2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009
Volume2

Conference

Conference2009 International Joint Conference on Computational Sciences and Optimization, CSO 2009
Country/TerritoryChina
CitySanya, Hainan
Period24/04/0926/04/09

Fingerprint

Dive into the research topics of 'Genetic algorithm application to a production-inventory model of imperfect process with deteriorating items under two dispatching policies'. Together they form a unique fingerprint.

Cite this