What is the optimal amount of equipment

Assignment Help Other Subject
Reference no: EM131039170

Simio project

Your Message : I need to build a model in simio program. Project 572 File is the original one , and the excel file related to the original file.
I need build a model from simio, and the report in Words document about 15 pages for this.

Then after the work finish the extra work file will add it to the model and answer the questions in other document.

so, I need 1) the original model in simio
2) Reports in Words document 15 pages
3) the model in simio after add extra work
4) answer the question for the extra workPROJECT ASSIGNMENT

An airport terminal currently serves three airlines which, for simplicity, are designated as Airlines A, B, and C. The airport's management will be expanding the terminal by adding a new concourse that will serve two additional airlines, D and E, and has asked you to develop a Simio model that will help it determine how to best configure terminal's single security check-point.

Traveler Arrivals

Upon arriving to the airport, most travelers first stop at the appropriate airline's ticket counter to check luggage and obtain boarding passes; other travelers who obtained boarding passes online and have no luggage to check skip the ticketing counter and proceed directly to the security check-point. Based on projected flight schedules and aircraft capacities, the average rates at which travelers are expected to arrive to the security check-point on typical weekday are as summarized in the following table.

 

Time of Day

Airline

A

B

C

D

E

00:00 - 04:00

0

0

0

0

0

04:00 - 06:00

393

129

175

0

198

06:00 - 09:00

375

135

354

150

195

09:00 - 12:00

156

174

150

144

330

12:00 - 15:00

156

183

138

153

339

15:00 - 18:00

153

327

183

345

156

18:00 - 21:00

153

318

150

303

141

21:00 - 24:00

0

135

123

0

161

Airlines B and E cater primarily to business travelers and typically carry 30% fewer travelers on Saturdays and Sundays; airline D runs a large number of weekend excursions that typically cause their arrivals to double on Fridays.

Security Process
Before travelers can proceed to their gates, they have to pass through the security check-point. An example of a security check-point with two scanning lanes is depicted at right.

As seen in the figure, a typical security check-point contains:
- A single waiting line where travelers queue up prior to ID Check;
- A ID Check station;
- A secondary waiting line between the ID Check station and the scanning lanes;
- Multiple scanning lanes that contain both a bag scanner and a people scanner; and
- A manual search area.

The security process is as follows:

1. First, a security officer must check each passenger's boarding pass and identification at the ID Check station. If these two items are in compliance, the traveler can proceed to the next step. Studies have shown that 96% of travelers have adequate boarding passes and identification. Of the travelers who are rejected that the ID Check station, 10% have insufficient identification and, thus, and will miss their flights and leave the airport. The remaining 90% who are rejected at the ID Check station must go to their airline's ticket counter to get or fix their boarding passes; it typically takes between 1 and 4 minutes to do so at the ticket counter.

2. After ID Check, travelers pass through the secondary waiting line where, at the end of the line, a security officer will direct them to the scanning lane with the smallest number of travelers. Security concerns dictate that each scanner line can have no more than 8 people waiting. As a result, if each scanning lane is full, travelers must wait in the secondary waiting line until space becomes available.

3. When travelers enter a scanning lane, they must place all carry-on materials (bags, purses, loose clothing, metal objects from pockets, etc.) on an input conveyor leading to a bag scanner. While the amount of material to be scanned can vary quite a bit from traveler to traveler, it can be assumed for simplicity that there is room on the conveyor for the items associated with 3 people.

4. Once their bags are loaded on the bag scanner conveyor, travelers can proceed to the adjacent people scanner. The two scanning processes can occur in parallel.

5. After a traveler's carry-on items have passed through the bag scanner, they move to a delivery conveyor which also has room for the items associated with 3 people. If the delivery conveyor becomes full, the bag scanner is delayed. When the bag scanner is occupied, the input conveyor is blocked.

6. Ten percent travelers do not pass the people scanner the first time. These travelers are rescanned. Typically, all disruptive objects are found after the first re-scan.

7. After both the travelers and their carry-on materials are scanned, the travelers are reunited with their carry-on materials and travelers can collect their belongings and remove them from the delivery conveyor.

8. Following the scans, about seven percent of all travelers are required to have their carry-on materials search manually as well. These travelers must move, with their carry-on materials, to the manual search area and wait for the search to be completed before being allowed to continue to their gate. There is a separate security person (1 per security lane) that performs all manual baggage inspection.

9. Once the security process is complete, travelers may proceed to their departure gates.

The preceding security process is standard among airports and some very accurate data has already been collected and is summarized in the following table.

Activity

Processing Times (Seconds)

ID Check

Min =   7,  Mode = 15,  Max =  45

Place Items on Input Conveyor

Min = 15,  Mode = 70,  Max = 240

Bag Scanner Processing Times

Min = 10,  Mode = 15,  Max =  45

People Scanner Processing Times

Min =   4,  Mode =   6,  Max =  10

Remove Items from Delivery Conveyor

Min =   3,  Mode =   6,  Max =  12

Similar historical information about the times required to conduct manual searches was not immediately available but, instead, data from the most recent 100 searches was gathered and was determined to have a sample mean of 77 seconds and a standard deviation of 18 seconds; the entire data file is attached in the Excel workbook named Manual_Search_Data.

In addition, the airport also participates in the US Transportation Security Administration's Pre? program within which travelers who are considered low-risk can receive expedited screening. It is anticipated that18% of all passengers will qualify for this program and these travelers be routed to a separate a ID Check waiting line connected to a separate screening area with its own scanning lanes. Because screening is expedited, Pre travelers will take half the time needed by other passengers to place their items on the Input Conveyors.

Project Objectives

You have been asked to assist in designing the security check-point by suggesting alternatives and using simulation to evaluate them. The airport is particularly interested cost effectiveness and traveler satisfaction. Cost effectiveness is measured by Average Cost per Passenger over a two-year planning horizon. Traveler satisfaction is primarily measured by Security Time-the time that travelers are "inconvenienced" by security. This is measured as the time from when they first enter the ID Check waiting line to when they leave the security check-point. Current standards require that nearly all travelers should be able to pass though the security check-point in less than 45 minutes with an average time of no more than 24 minutes. In order to evaluate the design, you must answer the following questions:

1. What is the optimal amount of equipment and personnel for the security check-point? In other words, how many scanning lanes should be used (both in the normal and Pre? screening areas) and how many standard security personnel and bag scan personnel are needed to meet the current Security Time standards while keeping the average cost per passenger to its lowest possible level?

2. In addition, how much area (measured in terms of the numbers of travelers can be accommodated) should be allocated to the ID Check and secondary waiting lines at both the normal and Pre? screening areas?

3. If the cost of the security check point is passed on to the airlines, how much should each airline be charged?

Attachment:- Assignment.rar

Reference no: EM131039170

Questions Cloud

Trademark and copyright violations : a) Which one best describes the users obligation to avoid trademark and copyright violations? b) Which one includes an indemnity clause that would require the user to pay for the website's legal fees if they are sued for the user's content?
Why did you categorize the article as you did : Why did you categorize the article as you did? Do articles in your field of interest commonly fall into this category? Why or why not?
How is stem education approached or perceived : In your paper, you should discuss the key principles and skills that are taught or learned through STEM education and the degree to which they are currently addressed in your classroom, or one with which you familiar. What gaps exist? How is STEM ..
Evaluation of corporate ethics policy : Following the corporate scandals that rocked the business world in the past ten to fifteen years, many companies have adopted corporate ethics policies in an effort to change the culture of their corporation or to set standards for their suppliers..
What is the optimal amount of equipment : I need to build a model in simio program. Project 572 File is the original one , and the excel file related to the original file. What is the optimal amount of equipment and personnel for the security check-point? In other words, how many scanning ..
Corporate-owned mobile device strategy : What are the advantages and disadvantages of a corporate-owned mobile device strategy versus a BYOD mobile strategy?
Different jewish interpretations and groups : Write a few paragraphs about one of these topics- The development of different movements within Judaism:Reform, Conservative, (Modern) Orthodox, Reconstructionist
Formulating an action plan to directly compete with nike : Formulating an action plan to directly compete with Nike in their core United States marketplace and aggressively expanding UA's global revenues and market share.
Difference between entrepreneurs and inventors : What is the difference between entrepreneurs and inventors? What is the difference between entrepreneurs and inventors as defined in entrepreneurship point of view?

Reviews

Write a Review

Other Subject Questions & Answers

  Outlines the characteristics and skills you possess

Explain how you would apply these characteristics and skills to a specific position within their organization

  Computers on the motherboard changed since the late 1980s

How has the configuration for connecting input/output (I/O) devices to computers on the motherboard changed since the late 1980s?

  Relationship between patients value and her interests

Explain why Velleman believes that the proper understanding of the relationship between the patient’s value and her interests cannot justify euthanizing her even when it is her interest to die.

  What do the initials vnr stand for

What do the initials VNR stand for?

  Natural glass is not considered a mineral

Natural glass is NOT considered a mineral because it ____________.

  Completed personal portrait and developmental theories

Drawing upon your completed Personal Portrait, and developmental theories and research findings, predict potential continuities and changes in your development trajectory over the next 10 years. In other words, how do you see yourself developing?

  Post-traumatic stress disorder to adult

My cousin got post-traumatic stress disorder (PTSD) as an adult. Most of it was blamed on his childhood issues that were unresolved. I think that if there are issues that are severe and they are never dealt with then they could cause PTSD.

  Proposing and creating a set of indexes-database schema

Proposing and creating a set of indexes, based on your final database schema, that you expect to improve query running time; you must justify each proposed index by identifying which queries you expect to benefit from these indexes.

  Is rare condition in which brain fails to develop at levels

Is a rare condition in which the brain fails to develop at levels above the

  Demographics specific to proposed clientele for the program

Demographics specific to proposed clientele for the program. Information on a chronic health issue, including national statistics and effects on the individual

  Assess the governments policy regarding ethanol

Assess the government's policy regarding ethanol and make a recommendation as to whether you feel use of ethanol is a feasible approach to decreasing the amount of oil used to power vehicles

  Describe the critical considerations

Please describe the critical considerations (diversity, social change, ethics, and globalism) as they pertain to the issue of the relationship of (excessive) alcohol consumption on domestic/intimate partner violence.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd