[1]
|
孙慧. 中外口岸通关模式的比较研究[J]. 商业研究, 2006(17): 188-191.
|
[2]
|
余波. 中国海关通关管理模式研究[D]: [博士学位论文]. 成都: 西南交通大学, 2007.
|
[3]
|
高翔. 空运进口通关效率研究[J]. 中国市场, 2009(2): 143-146.
|
[4]
|
韩露. 中国、新加坡通关模式比较及启示[J]. 物流科技, 2010(6): 78-80.
|
[5]
|
徐才. 基于福建自贸区建设的港口通关模式优化研究——以厦门片区为例[J]. 物流工程与管理, 2015(3): 7.
|
[6]
|
陈昊坚. 海关大监管体系下的查验管理中心运作模式研究[D]: [硕士学位论文]. 厦门: 厦门大学, 2014.
|
[7]
|
曾俊杰. 机场安检设置与优化[J]. 知识经济, 2009(12): 173-174.
|
[8]
|
施奇. 中国(上海)自由贸易试验区海关稽查模式优化研究[D]: [硕士学位论文]. 上海: 上海交通大学, 2014.
|
[9]
|
程晋云, 徐杨. 对国内民航机场安检管理模式的思考[J]. 中国公共安全(学术版), 2016(2): 41-44.
|
[10]
|
徐丹, 李东梅. 珠江三角洲地区陆路口岸通关模式优化研究[J]. 综合运输, 2016, 38(8): 30-34.
|
[11]
|
甘蜜. 我国港口物流中货物通关效率的模型研究[J]. 交通运输工程与信息学报, 2008, 6(4): 40-44.
|
[12]
|
胡蓉, 真虹. 基于排队Petri网的海关通关流程性能分析和优化[J]. 系统工程, 2010, 28(4): 48-53.
|
[13]
|
张戎, 艾彩娟. 基于广义随机Petri网的口岸通关流程建模与仿真——以洋山保税港区进口法检货物的通关流程为例[J]. 系统工程理论与实践, 2012, 32(7): 1568-1574.
|
[14]
|
蒋欣欣, 周航, 蔡冰青. 航站楼安检布局及流程优化研究[J]. 航空计算技术, 2015, 45(3): 25-29+34.
|
[15]
|
倪桂明, 杨东援. 机场系统计算机仿真研究的应用与发展[J]. 系统仿真学报,2002, 14(1): 112-115.
|
[16]
|
肖耀铧, 邓波, 霍浩超, 叶世绮, 胡代强. 机场安全检测的优化策略[J]. 暨南大学学报(自然科学版), 2003, 24(5): 35-42.
|
[17]
|
陆迅. 机场旅客与行李流程的规划和仿真研究[D]: [博士学位论文]. 南京: 南京航空航天大学, 2008.
|
[18]
|
赵振武, 麻建军. 民航机场安检排队系统的发展趋势与研究[J]. 综合运输, 2016, 38(10): 64-69.
|
[19]
|
顾扬, 郑敏, 周航, 李玥. 机场安检资源动态分配方法研究[J]. 航空计算技术, 2016, 46(5): 67-72.
|
[20]
|
马力行, 蒋馥, 侯立文. 海关通关风险评估系统的研究与开发[J]. 预测, 2003, 22(5): 21-24.
|
[21]
|
张捷, 陈霞, 王逸阳. 海关风险管理信息平台优化模式的构建[J]. 内蒙古农业大学学报: 社会科学版, 2011, 13(1): 126-128.
|
[22]
|
胡蓉, 陈秋琳. 海关物流通关流程优化研究[J]. 船海工程, 2009, 38(5): 166-169+176.
|
[23]
|
McLay, L.A., Jacobson, S.H. and Kobza, J.E. (2006) A Multilevel Passenger Screening Problem for Aviation Security. Naval Research Logistics, 53, 183-197. https://doi.org/10.1002/nav.20131
|
[24]
|
Lee, A.J. and Jacobson, S.H. (2012) Addressing Passenger Risk Uncertainty for Aviation Security Screening. Transportation Science, 46, 189-203. https://doi.org/10.1287/trsc.1110.0384
|
[25]
|
McLay, L.A., Jacobson, S.H. and Nikolaev, A.G. (2009) A Sequential Stochastic Passenger Screening Problem for Aviation Security. IIE Transactions, 41, 575-591. https://doi.org/10.1080/07408170802510416
|
[26]
|
McLay, L.A., Lee, A.J., and Jacobson, S.H. (2010) Risk-Based Policies for Airport Security Checkpoint Screening. Transportation Science, 44, 333-349. https://doi.org/10.1287/trsc.1090.0308
|
[27]
|
Wang, C.-H. (2016) Arena Simulation for Aviation Passenger Security-Check Systems. Advances in Intelligent Systems and Computing, 536, 95-102. https://doi.org/10.1007/978-3-319-48490-7_12
|
[28]
|
Nikolaev, A.G., Jacobson, S.H. and McLay, L.A. (2007) A Sequential Stochastic Security System Design Problem for Aviation Security. Transportation Science, 41, 182-194. https://doi.org/10.1287/trsc.1070.0198
|
[29]
|
Nie, X., Parab, G., Batta, R. and Lin, L. (2012) Simulation-Based Selectee Lane Queuing Design for Passenger Checkpoint Screening. European Journal of Operational Research, 219, 146-155.
https://doi.org/10.1016/j.ejor.2011.12.012
|
[30]
|
Sewell, E.C., Attagara, J., Kobza, J.E. and Jacobson, S.H. (2012) Allocating Explosive Screening Devices for Aviation Security. Journal of Transportation Security, 5, 141-155. https://doi.org/10.1007/s12198-012-0087-6
|
[31]
|
Sewell, E.C., Lee, A.J. and Jacobson, S.H. (2013) Optimal Allocation of Aviation Security Screening Devices. Journal of Transportation Security, 6, 103-116. https://doi.org/10.1007/s12198-013-0106-2
|
[32]
|
Lee, A.J. and Jacobson, S.H. (2012) Identifying Changing Aviation Threat Environments within an Adaptive Homeland Security Advisory System. Risk Analysis, 32, 319-329. https://doi.org/10.1111/j.1539-6924.2010.01656.x
|
[33]
|
McLay, L.A., Jacobson, S.H. and Kobza, J.E. (2007) Integer Programming Models and Analysis for a Multilevel Passenger Screening Problem. IIE Transactions, 39, 73-81. https://doi.org/10.1080/07408170600729200
|
[34]
|
Zhang, Z.G., Luh, H.P. and Wang, C.H. (2011) Modeling Security-Check Queue. Management Science, 57, 1979-1995.
https://doi.org/10.1287/mnsc.1110.1399
|
[35]
|
Lin, L., Wang, Q. and Sadek, A.W. (2014) Border Crossing Delay Prediction Using Transient Multi-Server Queueing Models. Transportation Research Part A, 64, 65-91. https://doi.org/10.1016/j.tra.2014.03.013
|
[36]
|
Lee, A.J. and Jacobson, S.H. (2011) Evaluating the Effectiveness of Sequential Aviation Security Screening Policies. IIE Transactions, 43, 547-565. https://doi.org/10.1080/0740817X.2010.550909
|
[37]
|
Matsika, E., O'Neill, C., Battista, U., Khosravi, M., de Santiago Laporte, A. and Munoz, E. (2016) Development of Risk Assessment Specifications for Analysing Terrorist Attacks Vulnerability on Metro and Light Rail Systems. Transportation Research Procedia, 14, 1345-1354. https://doi.org/10.1016/j.trpro.2016.05.207
|
[38]
|
Wong, S. and Brooks, N. (2015) Evolving Risk-Based Security: A Review of Current Issues and Emerging Trends Impacting Security Screening in the Aviation Industry. Journal of Air Transport Management, 48, 60-64.
https://doi.org/10.1016/j.jairtraman.2015.06.013
|
[39]
|
Shafieezadeh, A., Cha, E.J. and Ellingwood, B.R. (2015) A Decision Framework for Managing Risk to Airports from Terrorist Attack. Risk Analysis, 35, 292-306. https://doi.org/10.1111/risa.12266
|
[40]
|
Mabrouki, C., Bentaleb, F. and Mousrij, A. (2014) A Decision Support Methodology for Risk Management within a Port Terminal. Safety Science, 63, 124-132. https://doi.org/10.1016/j.ssci.2013.09.015
|
[41]
|
Nikoofal, M.E. and Gümüs, M. (2015) On the Value of Terrorist’s Private Information in a Government’s Defensive Resource Allocation Problem. IIE Transactions, 47, 533-555. https://doi.org/10.1080/0740817X.2014.938844
|
[42]
|
Maoh, H.F., Khan, S.A. and Anderson, W.P. (2016) Truck Movement across the Canada-US Border: The Effects of 9/11 and Other Factors. Journal of Transport Geography, 53, 12-21. https://doi.org/10.1016/j.jtrangeo.2016.04.002
|
[43]
|
Zhao, X., Yan, H. and Zhang, J. (2017) A Critical Review of Container Security Operations. Maritime Policy & Management, 44, 170-186. https://doi.org/10.1080/03088839.2016.1253883
|
[44]
|
Papa, P. (2013) US and EU Strategies for Maritime Transport Security: A Comparative Perspective. Transport Policy, 28, 75-85. https://doi.org/10.1016/j.tranpol.2012.08.008
|
[45]
|
Nikolaev, A.G., Lee, A.J. and Jacobson, S.H. (2012) Optimal Aviation Security Screening Strategies with Dynamic Passenger Risk Updates. IEEE Transactions on Intelligent Transportation Systems, 13, 203-212.
https://doi.org/10.1109/TITS.2011.2167230
|
[46]
|
Virta, J.E., Jacobson, S.H. and Kobza, J.E. (2003) Analyzing the Cost of Screening Selectee and Non-Selectee Baggage. Risk Analysis, 23, 897-908. https://doi.org/10.1111/1539-6924.00367
|
[47]
|
Wang, X. and Zhuang, J. (2011) Balancing Congestion and Security in the Presence of Strategic Applicants with Private Information. European Journal of Operational Research, 212, 100-111. https://doi.org/10.1016/j.ejor.2011.01.019
|
[48]
|
Ruiz-Aguilar, J.J., Turias, I.J. and Jiménez-Come, M.J. (2015) A Two-Stage Procedure for Forecasting Freight Inspections at Border Inspection Posts Using SOMs and Support Vector Regression. International Journal of Production Research, 53, 2119-2130. https://doi.org/10.1080/00207543.2014.965852
|
[49]
|
Luh, H., Zhang, Z.G. and Wang, C.-H. (2013) A Computing Approach to Two Competing Services with a Finite Buffer Effect. Proceedings of the 8th International Conference on Queueing Theory and Network Applications (QTNA2013), Taichung, 31 July-2 August 2013, 15-21.
|
[50]
|
Wang, C.-H., Luh, H.P. and Zhang, Z.G. (2012) Secure and Efficient Global Supply Chain Management: A Queueing Analysis. Lecture Notes in Operations Research and Decision Science, 28-36.
|
[51]
|
Wang, C.-H., Wu, M.-E. and Chen, C.-M. (2015) Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints. Proceedings of the Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2015), Adelaide, 23-25 September 2015, 211-214.
https://doi.org/10.1109/IIH-MSP.2015.29
|
[52]
|
Wang, C.-H. (2015) A Modelling Framework for Managing Risk-Based Checkpoint Screening Systems with Two-Type Inspection Queues, Proceedings of the Third International Conference on Robot, Vision and Signal Processing (RVSP 2015), Kaohsiung, 18-20 November 2015, 220-223. https://doi.org/10.1109/RVSP.2015.59
|
[53]
|
Gillen, D. and Morrison, W.G. (2015) Aviation Security: Costing, Pricing, Finance and Performance. Journal of Air Transport Management, 48, 1-12. https://doi.org/10.1016/j.jairtraman.2014.12.005
|
[54]
|
Jacobson, S.H., Karnani, T., Kobza, J.E. and Ritchie, L. (2006) A Cost-Benefit Analysis of Alternative Device Configurations for Aviation Checked Baggage Security Screening. Risk Analysis, 26, 297-310.
https://doi.org/10.1111/j.1539-6924.2006.00736.x
|
[55]
|
Feng, Q. (2007) On Determining Specifications and Selections of Alternative Technologies for Airport Checked-Baggage Security Screening. Risk Analysis, 27, 1299-1310. https://doi.org/10.1111/j.1539-6924.2007.00966.x
|
[56]
|
Dreiding, R.A. and McLay, L.A. (2013) An Integrated Model for Screening Cargo Containers. European Journal of Operational Research, 230, 181-189. https://doi.org/10.1016/j.ejor.2013.04.001
|
[57]
|
Bagchi, A. and Paul, J.A. (2014) Optimal Allocation of Resources in Airport Security: Profiling vs. Screening. Operations Research, 62, 219-233. https://doi.org/10.1287/opre.2013.1241
|
[58]
|
Chang, C.-H., Xu, J. and Song, D.-P. (2014) An Analysis of Safety and Security Risks in Container Shipping Operations: A Case Study of Taiwan. Safety Science, 63, 168-178. https://doi.org/10.1016/j.ssci.2013.11.008
|
[59]
|
Kierzkowski, A. and Kisiel, T. (2017) Evaluation of a Security Control Lane with the Application of Fuzzy Logic. Procedia Engineering, 187, 656-663. https://doi.org/10.1016/j.proeng.2017.04.427
|
[60]
|
Sekine, J., Campos-Nán ̃ez, E., Harrald, J.R. and Abeledo, H. (2006) A Simulation-Based Approach to Trade-Off Analysis of Port Security. Proceedings of the 2006 Winter Simulation Conference, Monterey, 2-6 December 2006, 521-528. https://doi.org/10.1109/WSC.2006.323125
|
[61]
|
de Lange, R., Samoilovich, I. and van der Rhee, B. (2013) Virtual Queuing at Airport Security Lanes. European Journal of Operational Research, 225, 153-165. https://doi.org/10.1016/j.ejor.2012.09.025
|
[62]
|
Boekhold, J.V., Faghri, A. and Li, M. (2014) Evaluating Security Screening Checkpoints for Domestic Flights Using a General Microscopic Simulation Model. Journal of Transportation Security, 7, 45-67.
https://doi.org/10.1007/s12198-013-0129-8
|
[63]
|
Seidl, A., Kaplan, E.H., Caulkins, J.P., Wrzaczek, S. and Feichtinger, G. (2016) Optimal Control of a Terror Queue. European Journal of Operational Research, 248, 246-256. https://doi.org/10.1016/j.ejor.2015.07.010
|
[64]
|
Wilson, D., Roe, E.K. and So, S.A. (2006) Security Checkpoint Optimizer (SCO)—An Application for Simulating the Operations of Airport Security Checkpoints. Proceedings of the 2006 Winter Simulation Conference, Monterey, 2-6 December 2006, 529-535. https://doi.org/10.1109/WSC.2006.323126
|
[65]
|
Dorton, S.L. (2011) Analysis of Airport Security Screening Checkpoints Using Queuing Networks and Discrete Event Simulation: A Theoretical and Empirical Approach. Dissertations and Theses, Embry-Riddle Aeronautical University, Paper 47.
|
[66]
|
Kierzkowski, A. and Kisiel, T. (2017) Simulation Model of Security Control System Functioning: A Case Study of the Wroclaw Airport Terminal. Journal of Air Transport Management, 64, 173-185.
https://doi.org/10.1016/j.jairtraman.2016.09.008
|
[67]
|
Alodhaibi, S., Burdett, R.L. and Yarlagadda, P.K.D.V. (2017) Framework for Airport Outbound Passenger Flow Modelling. Procedia Engineering, 174, 1100-1109. https://doi.org/10.1016/j.proeng.2017.01.263
|
[68]
|
Perboli, G., Musso, S., Perfetti, F. and Trapani, P. (2014) Simulation of New Policies for the Baggage Check in the Security Gates of the Airports: The Logiscan Case Study. Procedia—Social and Behavioral Sciences, 111, 58-67.
https://doi.org/10.1016/j.sbspro.2014.01.038
|
[69]
|
Huang, P., Luh, H. and Zhang, Z.G. (2016) A Queueing Model for Tiered Inspection Lines in Airports. International Journal of Information and Management Sciences, 27, 147-177.
|
[70]
|
Weiss, W.E. (2008) Dynamic Security: An Agent-Based Model for Airport Defense. Proceedings of the 2008 Winter Simulation Conference, Miami, 7-10 December 2008, 1320-1325. https://doi.org/10.1109/WSC.2008.4736205
|
[71]
|
Roanes-Lozano, E., Laita, L.M. and Roanes-Macías, E. (2004) An Accelerated-Time Simulation of Departing Passengers' Flow in Airport Terminals. Mathematics and Computers in Simulation, 67, 163-172.
https://doi.org/10.1016/j.matcom.2004.05.016
|
[72]
|
Popa, A. and Strer, J. (2016) Analysis of Passenger and Vehicle Flows with Microscopic Simulations as a Result of Security Checks at Ferry Terminals. Transportation Research Procedia, 14, 1384-1393.
https://doi.org/10.1016/j.trpro.2016.05.211
|
[73]
|
Zhang, Z.G. (2009) Performance Analysis of a Queue with Congestion-Based Staffing Policy. Management Science, 55, 240-251. https://doi.org/10.1287/mnsc.1080.0914
|
[74]
|
McLay, L.A. and Dreiding, R. (2012) Multilevel, Threshold-Based Policies for Cargo Container Security Screening Systems. European Journal of Operational Research, 220, 522-529. https://doi.org/10.1016/j.ejor.2012.01.060
|
[75]
|
Wang, C.-H. and Lan, J. (2017) Performance Evaluation of a Risk-Based Three-Tier Inspection System. Proceedings of the 2nd International Conference on Computational Modeling, Simulation and Applied Mathematics (CMSAM2017), Beijing, 22-23 October 2017.
|
[76]
|
The World Bank Open Data. https://data.worldbank.org/
|