首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 491 毫秒
1.
This paper deals with the optimal selection of m out of n facilities to first perform m   given primary jobs in Stage-I followed by the remaining (n-m)(n-m) facilities performing optimally the (n-m)(n-m) secondary jobs in Stage-II. It is assumed that in both the stages facilities perform in parallel. The aim of the proposed study is to find that set of m   facilities performing the primary jobs in Stage-I for which the sum of the overall completion times of jobs in Stage-I and the corresponding optimal completion time of the secondary jobs in Stage-II by the remaining (n-m)(n-m) facilities is the minimum. The developed solution methodology involves solving the standard time minimizing and cost minimizing assignment problems alternately after forbidding some facility-job pairings and suggests a polynomially bound algorithm. This proposed algorithm has been implemented and tested on a variety of test problems and its performance is found to be quite satisfactory.  相似文献   

2.
This paper addresses a batch delivery single-machine scheduling problem in which jobs have an assignable common due window. Each job will incur an early (tardy) penalty if it is early (tardy) with respect to the common due window under a given schedule. There is no capacity limit on each delivery batch, and the cost per batch delivery is fixed and independent of the number of jobs in the batch. The objective is to find the optimal size and location of the window, the optimal dispatch date for each job, as well as an optimal job sequence to minimize a cost function based on earliness, tardiness, holding time, window location, window size, and batch delivery. We show that the problem can be optimally solved in O(n8)O(n8) time by a dynamic programming algorithm under a reasonable assumption on the relationships among the cost parameters. A computational experiment is also conducted to evaluate the performance of the proposed algorithm. We also show that some special cases of the problem can be optimally solved by lower order algorithms.  相似文献   

3.
The procedure developed by Muckstadt and Roundy is generalized. In a multi-echelon inventory system with a single warehouse and multi-retailers, some di erent items with constant demand rates are distributed. Considering set-up and holding costs as well as the cost of joint shipment of items from the warehouse to any retailer, the objective is to minimize the total costs of the system. In the proposed algorithm the assumption of nested policies is relaxed. The procedure introduced works for both nested and non-nested policies.  相似文献   

4.
This paper investigates cyclical inventory replenishment for a company's regional distribution center that supplies, distributes, and manages inventory of carbon dioxide (CO2)(CO2) at over 900 separate customer sites in Indiana. The company previously experienced high labor costs with excessive overtime and maintained a regular back-log of customers experiencing stockouts. To address these issues we implemented a three-phase heuristic for the cyclical inventory routing problem encountered at one of the company's distribution centers. This heuristic determines regular routes for each of three available delivery vehicles over a 12-day delivery horizon while improving four primary performance measures: delivery labor cost, stockouts, delivery regularity, and driver–customer familiarity. It does so by first determining three sets of cities (one for each delivery vehicle) that must be delivered to each day based on customer requirements. Second, the heuristic assigns the remaining customers in other cities to one of the three “backbone routes” determined in phase 1. And third, it balances customer deliveries on each daily route over the schedule horizon. Through our methodology, we were able to significantly reduce overtime, driving time, and labor costs while improving customer service.  相似文献   

5.
Despite their diverse applications in many domains, the variable precision rough sets (VPRS) model lacks a feasible method to determine a precision parameter (β)(β) value to control the choice of ββ-reducts. In this study we propose an effective method to find the ββ-reducts. First, we calculate a precision parameter value to find the subsets of information system that are based on the least upper bound of the data misclassification error. Next, we measure the quality of classification and remove redundant attributes from each subset. We use a simple example to explain this method and even a real-world example is analyzed. Comparing the implementation results from the proposed method with the neural network approach, our proposed method demonstrates a better performance.  相似文献   

6.
7.
8.
9.
10.
This article models flood occurrence probabilistically and its risk assessment. It incorporates atmospheric parameters to forecast rainfall in an area. This measure of precipitation, together with river and ground parameters, serve as parameters in the model to predict runoff and subsequently inundation depth of an area. The inundation depth acts as a guide for predicting flood proneness and associated hazard. The vulnerability owing to flood has been analyzed as social vulnerability ( V S ) , vulnerability to property ( V P ) , and vulnerability to the location in terms of awareness ( V A ) . The associated risk has been estimated for each area. The distribution of risk values can be used to classify every area into one of the six risk zones—namely, very low risk, low risk, moderately low risk, medium risk, high risk, and very high risk. The prioritization regarding preparedness, evacuation planning, or distribution of relief items should be guided by the range on the risk scale within which the area under study falls. The flood risk assessment model framework has been tested on a real‐life case study. The flood risk indices for each of the municipalities in the area under study have been calculated. The risk indices and hence the flood risk zone under which a municipality is expected to lie would alter every day. The appropriate authorities can then plan ahead in terms of preparedness to combat the impending flood situation in the most critical and vulnerable areas.  相似文献   

11.
12.
13.
14.
Acceptance sampling plans are practical tools for quality control applications, which involve quality contracting on product orders between the vendor and the buyer. Those sampling plans provide the vendor and the buyer rules for lot sentencing while meeting their preset requirements on product quality. In this paper, we introduce a variables sampling plan for unilateral processes based on the one-sided process capability indices CPUCPU (or CPL)CPL), to deal with lot sentencing problem with very low fraction of defectives. The proposed new sampling plan is developed based on the exact sampling distribution rather than approximation. Practitioners can use the proposed sampling plan to determine accurate number of product items to be inspected and the corresponding critical acceptance value, to make reliable decisions. We also tabulate the required sample size nn and the corresponding critical acceptance value C0C0 for various αα-risks, ββ-risks, and the levels of lot or process fraction of defectives that correspond to acceptable and rejecting quality levels.  相似文献   

15.
In recent years, there have been growing concerns regarding risks in federal information technology (IT) supply chains in the United States that protect cyber infrastructure. A critical need faced by decisionmakers is to prioritize investment in security mitigations to maximally reduce risks in IT supply chains. We extend existing stochastic expected budgeted maximum multiple coverage models that identify “good” solutions on average that may be unacceptable in certain circumstances. We propose three alternative models that consider different robustness methods that hedge against worst‐case risks, including models that maximize the worst‐case coverage, minimize the worst‐case regret, and maximize the average coverage in the ( 1 ? α ) worst cases (conditional value at risk). We illustrate the solutions to the robust methods with a case study and discuss the insights their solutions provide into mitigation selection compared to an expected‐value maximizer. Our study provides valuable tools and insights for decisionmakers with different risk attitudes to manage cybersecurity risks under uncertainty.  相似文献   

16.
17.
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号