Review of fuzzy techniques in maritime shipping operations

Jana Ries, Rosa G. González-Ramírez*, Stefan Voß

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations


Fuzzy Logic has found significant interest in the context of global shipping networks due to its applicability to uncertain decision making environments. Its use has been particularly important when solving location and equipment selection problems. While being applicable as a stand-alone technique, Fuzzy Logic has become increasingly interesting as an added feature within classic Operational Research techniques. This paper gives an outline of the methodological relevance of Fuzzy Logic at a strategic, tactical and operational level for maritime operations. In addition, a general classification of decision problems in maritime logistics is presented, extending previous classifications in the literature to the wider context of multiple port networks.

Original languageEnglish
Title of host publicationComputational Logistics - 8th International Conference, ICCL 2017, Proceedings
EditorsStefan VoB, Tolga Bektas, Stefano Coniglio, Antonio Martinez-Sykora
PublisherSpringer Verlag
Number of pages17
ISBN (Print)9783319684956
StatePublished - 2017
Event8th International Conference on Computational Logistics, ICCL 2017 - Southampton, United Kingdom
Duration: 18 Oct 201720 Oct 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10572 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference8th International Conference on Computational Logistics, ICCL 2017
Country/TerritoryUnited Kingdom

Bibliographical note

Publisher Copyright:
© 2017, Springer International Publishing AG.


  • Container terminals
  • Fuzzy logic
  • Hybrid techniques
  • Maritime shipping


Dive into the research topics of 'Review of fuzzy techniques in maritime shipping operations'. Together they form a unique fingerprint.

Cite this