What is the optimal amount of equipment

Assignment Help Other Subject
Reference no: EM131039170

Simio project

Your Message : I need to build a model in simio program. Project 572 File is the original one , and the excel file related to the original file.
I need build a model from simio, and the report in Words document about 15 pages for this.

Then after the work finish the extra work file will add it to the model and answer the questions in other document.

so, I need 1) the original model in simio
2) Reports in Words document 15 pages
3) the model in simio after add extra work
4) answer the question for the extra workPROJECT ASSIGNMENT

An airport terminal currently serves three airlines which, for simplicity, are designated as Airlines A, B, and C. The airport's management will be expanding the terminal by adding a new concourse that will serve two additional airlines, D and E, and has asked you to develop a Simio model that will help it determine how to best configure terminal's single security check-point.

Traveler Arrivals

Upon arriving to the airport, most travelers first stop at the appropriate airline's ticket counter to check luggage and obtain boarding passes; other travelers who obtained boarding passes online and have no luggage to check skip the ticketing counter and proceed directly to the security check-point. Based on projected flight schedules and aircraft capacities, the average rates at which travelers are expected to arrive to the security check-point on typical weekday are as summarized in the following table.

 

Time of Day

Airline

A

B

C

D

E

00:00 - 04:00

0

0

0

0

0

04:00 - 06:00

393

129

175

0

198

06:00 - 09:00

375

135

354

150

195

09:00 - 12:00

156

174

150

144

330

12:00 - 15:00

156

183

138

153

339

15:00 - 18:00

153

327

183

345

156

18:00 - 21:00

153

318

150

303

141

21:00 - 24:00

0

135

123

0

161

Airlines B and E cater primarily to business travelers and typically carry 30% fewer travelers on Saturdays and Sundays; airline D runs a large number of weekend excursions that typically cause their arrivals to double on Fridays.

Security Process
Before travelers can proceed to their gates, they have to pass through the security check-point. An example of a security check-point with two scanning lanes is depicted at right.

As seen in the figure, a typical security check-point contains:
- A single waiting line where travelers queue up prior to ID Check;
- A ID Check station;
- A secondary waiting line between the ID Check station and the scanning lanes;
- Multiple scanning lanes that contain both a bag scanner and a people scanner; and
- A manual search area.

The security process is as follows:

1. First, a security officer must check each passenger's boarding pass and identification at the ID Check station. If these two items are in compliance, the traveler can proceed to the next step. Studies have shown that 96% of travelers have adequate boarding passes and identification. Of the travelers who are rejected that the ID Check station, 10% have insufficient identification and, thus, and will miss their flights and leave the airport. The remaining 90% who are rejected at the ID Check station must go to their airline's ticket counter to get or fix their boarding passes; it typically takes between 1 and 4 minutes to do so at the ticket counter.

2. After ID Check, travelers pass through the secondary waiting line where, at the end of the line, a security officer will direct them to the scanning lane with the smallest number of travelers. Security concerns dictate that each scanner line can have no more than 8 people waiting. As a result, if each scanning lane is full, travelers must wait in the secondary waiting line until space becomes available.

3. When travelers enter a scanning lane, they must place all carry-on materials (bags, purses, loose clothing, metal objects from pockets, etc.) on an input conveyor leading to a bag scanner. While the amount of material to be scanned can vary quite a bit from traveler to traveler, it can be assumed for simplicity that there is room on the conveyor for the items associated with 3 people.

4. Once their bags are loaded on the bag scanner conveyor, travelers can proceed to the adjacent people scanner. The two scanning processes can occur in parallel.

5. After a traveler's carry-on items have passed through the bag scanner, they move to a delivery conveyor which also has room for the items associated with 3 people. If the delivery conveyor becomes full, the bag scanner is delayed. When the bag scanner is occupied, the input conveyor is blocked.

6. Ten percent travelers do not pass the people scanner the first time. These travelers are rescanned. Typically, all disruptive objects are found after the first re-scan.

7. After both the travelers and their carry-on materials are scanned, the travelers are reunited with their carry-on materials and travelers can collect their belongings and remove them from the delivery conveyor.

8. Following the scans, about seven percent of all travelers are required to have their carry-on materials search manually as well. These travelers must move, with their carry-on materials, to the manual search area and wait for the search to be completed before being allowed to continue to their gate. There is a separate security person (1 per security lane) that performs all manual baggage inspection.

9. Once the security process is complete, travelers may proceed to their departure gates.

The preceding security process is standard among airports and some very accurate data has already been collected and is summarized in the following table.

Activity

Processing Times (Seconds)

ID Check

Min =   7,  Mode = 15,  Max =  45

Place Items on Input Conveyor

Min = 15,  Mode = 70,  Max = 240

Bag Scanner Processing Times

Min = 10,  Mode = 15,  Max =  45

People Scanner Processing Times

Min =   4,  Mode =   6,  Max =  10

Remove Items from Delivery Conveyor

Min =   3,  Mode =   6,  Max =  12

Similar historical information about the times required to conduct manual searches was not immediately available but, instead, data from the most recent 100 searches was gathered and was determined to have a sample mean of 77 seconds and a standard deviation of 18 seconds; the entire data file is attached in the Excel workbook named Manual_Search_Data.

In addition, the airport also participates in the US Transportation Security Administration's Pre? program within which travelers who are considered low-risk can receive expedited screening. It is anticipated that18% of all passengers will qualify for this program and these travelers be routed to a separate a ID Check waiting line connected to a separate screening area with its own scanning lanes. Because screening is expedited, Pre travelers will take half the time needed by other passengers to place their items on the Input Conveyors.

Project Objectives

You have been asked to assist in designing the security check-point by suggesting alternatives and using simulation to evaluate them. The airport is particularly interested cost effectiveness and traveler satisfaction. Cost effectiveness is measured by Average Cost per Passenger over a two-year planning horizon. Traveler satisfaction is primarily measured by Security Time-the time that travelers are "inconvenienced" by security. This is measured as the time from when they first enter the ID Check waiting line to when they leave the security check-point. Current standards require that nearly all travelers should be able to pass though the security check-point in less than 45 minutes with an average time of no more than 24 minutes. In order to evaluate the design, you must answer the following questions:

1. What is the optimal amount of equipment and personnel for the security check-point? In other words, how many scanning lanes should be used (both in the normal and Pre? screening areas) and how many standard security personnel and bag scan personnel are needed to meet the current Security Time standards while keeping the average cost per passenger to its lowest possible level?

2. In addition, how much area (measured in terms of the numbers of travelers can be accommodated) should be allocated to the ID Check and secondary waiting lines at both the normal and Pre? screening areas?

3. If the cost of the security check point is passed on to the airlines, how much should each airline be charged?

Attachment:- Assignment.rar

Reference no: EM131039170

Questions Cloud

Trademark and copyright violations : a) Which one best describes the users obligation to avoid trademark and copyright violations? b) Which one includes an indemnity clause that would require the user to pay for the website's legal fees if they are sued for the user's content?
Why did you categorize the article as you did : Why did you categorize the article as you did? Do articles in your field of interest commonly fall into this category? Why or why not?
How is stem education approached or perceived : In your paper, you should discuss the key principles and skills that are taught or learned through STEM education and the degree to which they are currently addressed in your classroom, or one with which you familiar. What gaps exist? How is STEM ..
Evaluation of corporate ethics policy : Following the corporate scandals that rocked the business world in the past ten to fifteen years, many companies have adopted corporate ethics policies in an effort to change the culture of their corporation or to set standards for their suppliers..
What is the optimal amount of equipment : I need to build a model in simio program. Project 572 File is the original one , and the excel file related to the original file. What is the optimal amount of equipment and personnel for the security check-point? In other words, how many scanning ..
Corporate-owned mobile device strategy : What are the advantages and disadvantages of a corporate-owned mobile device strategy versus a BYOD mobile strategy?
Different jewish interpretations and groups : Write a few paragraphs about one of these topics- The development of different movements within Judaism:Reform, Conservative, (Modern) Orthodox, Reconstructionist
Formulating an action plan to directly compete with nike : Formulating an action plan to directly compete with Nike in their core United States marketplace and aggressively expanding UA's global revenues and market share.
Difference between entrepreneurs and inventors : What is the difference between entrepreneurs and inventors? What is the difference between entrepreneurs and inventors as defined in entrepreneurship point of view?

Reviews

Write a Review

Other Subject Questions & Answers

  Define federal system of territorial integration

Define and explain what an ideology is by using our discussion in class and your textbook as well as any intemet source you like. When we use the term "liberal" in our country we mean something special. What is it? Explain using some examples.

  Describe the purposes for creating art

Discusses a wide variety of reasons or purposes for creating art. Explain any four of these reasons and provide an artistic example of each.

  Development of science-enlightenment

The Eyecan Writetoo Publishing Company has asked you to write a book about the development of science and reason from the ancient world to the early years of the Enlightenment. You will need at least five chapters.

  Why does churchill argue that these other mascots

At least on the surface, the names, "Braves", "Indians", and "Chiefs" would not seem to be as insulting to Native American as the "Redskins" mascot. Why does Churchill argue that these other mascots, too, are examples of "blatant racism", and to..

  Dakota reliant was in the nal stages of planning a takeover

dakota. reliant was in the ?nal stages of planning a takeover of dakota gasworks inc. a natural gas distributor that

  Detailing the findings of discussion

Prepare a 350- to 1,050-word paper detailing the findings of your discussion. Format your paper consistent with APA guidelines.

  What criteria would you use to rate their performance

Should healthcare providers be paid (reimbursed) according to the quality of care as incentive to improve their performance (known as pay for performance)? Explain why or why no.

  Describing the issues in case

In your own words, briefly summarize the case and describe the issues in this case. In reviewing the Wyeth case, discuss the legal duties that were breached. Include in your initial post, the parties to this case and possible defenses to the alleg..

  Explain difference between idea and opportunity

Explain the differences between criminal justice and criminology. Explain the differences between classical criminology and positivism and Summarize one strategy of criminological research.

  Metacognitive writing assignment

Explain key steps you took as you initially designed your research question/topic and then conducted the research and chose the source material for it.

  What constitutional checks and balances mediate

What constitutional checks and balances mediate the relationship between Congress and the President? Second, what other methods does each branch employ to gain advantage over the other. ( explain how each of these work "check" on the other branch)

  Case study approach to classroom management

According to the textbook "Case Study Approach to Classroom Management" by Richard Scarpaci, In the classroom seting, a teacher gains the child's compliance by using positive controlling behaviors such as complimenting, encouraging, and overextending..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd