11/8/2018. Overview. PERT / CPM Part 2
|
|
- Amos Phillips
- 5 years ago
- Views:
Transcription
1 /8/08 PERT / CPM Part BSAD 0 Dave Novak Fall 08 Source: Anderson et al., 0 Quantitative Methods for Business th edition some slides are directly from J. Loucks 0 Cengage Learning Overview Last class introduce basic CPM project management approach Today introduce uncertainty into PERT/CPM approach and the Beta distribution Estimating mean and variance for project Using the z-table to estimate project completion probabilities Activities with little variation in completion time Last class, assumed that time required to complete each activity (t i ) was known with certainty (deterministic) Common assumption used in certain industrial production planning applications, and useful in demonstrating CPM Uncertain activity times In reality, completion times associated with many project tasks are uncertain (stochastic) PERT is a project scheduling technique that treats the completion time of each activity as a random variable A common approach for estimating activity completion times is the Three Time Estimate Approach Node / activity notation Node / Activity A Time required to complete activity A A t A ES A LS A EF A LF A Instead of a fixed, known value, t A is a random variable Completion time for each activity Activity ES EF G. 8 8 E. H t LS LF
2 /8/08 approach rationale Recall that PERT was developed to manage the Polaris missile system project Most of the tasks / activities required in this project had never been performed before The time required to complete these new tasks was unknown and subject to variation approach rationale PERT focuses on estimating the probability distribution for total project time based on the uncertainty associated with the time to complete each activity in the project The three time estimate approach Three different time estimates are required for each project task / activity. a = an optimistic time to perform the activity (this is the minimum time assuming everything progresses ideally). m = most probable, average or expected activity time under normal conditions. b = a pessimistic time to perform the activity (this is the maximum time, assuming substantial delays) 0 approach We are not going to estimate these parameters (a, m, and b are our parameters) in this class they will be given In practice, where would activity time estimates for a, m, and b come from? Quick refresher A parameter estimate (or sample statistic) is a descriptive measure of a population Because we generally can t measure an entire population (i.e. the height of all males between - years old in the U.S.), we take a random sample from the population We estimate population parameters (based on the sample) along with the error associated with these estimates Quick refresher Normal distribution characterized by two parameters: mean (µ) and standard deviation (σ) Exponential distribution characterized by one parameter: mean ( ) In the PERT application, the Beta distribution is characterized by three parameters: optimal (a), expected (m), and pessimistic (b) NOTE: this is a slightly different interpretation of the Beta parameters than you will find in a statistics source
3 /8/08 approach The three time activity completion estimates can be approximated using a Beta distribution The Beta distribution has different shapes approach The fact that the Beta distribution is defined on a finite interval and can be symmetric or skewed (right or left) makes it more realistic and more flexible than the normal distribution Why? a m b a m b a m b Source: slides from unknown author Cal State Fullerton, Project Scheduling with PERT Estimating the mean and variance for activities The mean activity completion time can be estimated using a weighted average Weights are /, /, and / on a, m, and b respectively Weight optimistic estimate (a) / (or 0.7) Weight expected estimate (m) / (or 0.7) Weight pessimistic estimate (b) / (or 0.7) Weights sum to Estimating the mean and variance for activities Mean μ = a+m+b Variance σ = b a Why are we using as the denominator? The area we are concerned with is within the interval range (b a) This area is within standard deviations on either side of the mean ( standard deviations total) Assumption : We can find the critical path using the mean, or the expected completion times for each activity This implies that the expected completion time for the entire project is based only on the average completion time of the activities / tasks on the critical path Assumption : There are enough activities on the critical path so that the overall project completion time can be approximated using the normal distribution 7 8
4 /8/08 Assumption : use of Beta and Normal (Gaussian) distributions Assumption : The time required to complete each activity is independent of the time required to complete any other activity This does not imply that the sequencing of the activities within the project is independent Only that the time it takes to complete activity B, is not affected by the time it takes to complete activity A 9 0 Together, these assumptions imply that the overall project completion time follows a normal distribution with: Expected or average project completion time = the sum of all the expected / average activity times along the critical path Variance of project completion time = sum of the variances of all activities along the critical path Activity Immediate Predecessor The parameters for Beta distribution a Optimistic Time (hours) m Most Likely Time (hours) b Pessimistic Time (hours) A B C A D A E A 0.. F B, C G B, C. H E, F 7 I E, F 8 J D, H..7. K G, I 7 Estimate expected (or mean) completion time for each activity (µ i ) Estimate expected completion time for each activity (µ i )
5 /8/08 Activity Expected Time (a + m + b) µ = These are the expected or mean times that we just calculated H. J. A B C D E F G H I J K E. G. I. K. : Calculate ES and EF Early (ES) and Early (EF) are calculated on TOP ROW of each node by moving forward through the network the forward pass by setting ES = 0 for all nodes directly connected to The LARGEST EF time of the nodes connected to the FINISH (J and K) represents the project completion time Logically, the project can t be completed until the activity that is finished last is completed : Calculate ES and EF H. E. I. G. J. K. 7 8 Calculating ES and EF 0 E. 7 H. 9 J. 9 At this point, we know the estimated project completion time 9 I G. 9 K
6 /8/08 Calculating ES and EF Review: moving forward through the network calculating ES and EF If an activity has more than one precedent (i.e activities F, G, H, I, J, and K all have more than one precedent), the ES of that activity MUST be set to the MAXIMUM EF of ALL preceding activities For example, I cannot start activity I until BOTH E and F are completed. Therefore, ES I is constrained by EF F (not EF E ) 0 E. H G. 9 I. 8 J. 9 K. 8 : Calculate LS and LF Late (LS) and Late (LF) are calculated on the BOTTOM ROW by moving backwards through the network Begin the backward pass by setting the EF for all nodes directly connected to the finish equal to the estimated project completion time 0 E H. 9 I. 8 J. 9 K. 8 0 G. 9 Calculating LS and LF E H I G. 9 8 J. 9 0 K. 8 8 Review: moving backwards through the network calculating LS and LF If an activity precedes more than one activity (i.e activities F, E, C, and A) precede multiple activities, the LF of that activity MUST be set to the MINIMUM LS value of ALL activities it precedes For example, F precedes BOTH H and I. Therefore, LF F is set to the smallest value (LF H = and LF I = ), so LF F =
7 /8/08 Calculating slack E H. 9 0 I. 8 8 J. 9 0 Slack measures how much leeway or extra time each activity has between the earliest it can start and the latest it can start (or the earliest the activity can finish and the latest it can finish) without impacting the entire project G. 9 8 K. 8 8 slack = LF i EF i = LS i ES i Activities with NO SLACK are critical there is no extra time between the earliest and latest times that the activity can start (or finish) without impacting the project completion time 7 8 Calculating slack : Calculate slack (LF EF) 9 0 Activity ES EF LS LF Slack A * B 0 9 C * D 0 9 E 7 F * G H 9 0 I * J 9 0 K * : Determine the critical path The critical path is a path of activities from to node, with ZERO slack times 0 0 E. 7 0 H. 9 0 J. 9 0 The project completion time equals the maximum of all activity EF times I G K
8 /8/08 Estimate variance in completion time (σ ) for each activity on the critical path Estimate variance in completion time (σ ) for each activity on the critical path : Uncertainty calculations What is the probability that the project will be completed within hours? : Uncertainty calculations What is the probability that the project will be completed within hours? : Uncertainty calculations What is the probability that the project will be completed within hours? : Uncertainty calculations What is the probability that the project will be take more than hours to complete? 7 8 8
9 /8/08 Summary Introduce uncertainty into PERT/CPM approach and the Beta distribution Estimating mean and variance Using the z-table to estimate project completion probabilities 9 9
. Introduction to CPM / PERT Techniques. Applications of CPM / PERT. Basic Steps in PERT / CPM. Frame work of PERT/CPM. Network Diagram Representation. Rules for Drawing Network Diagrams. Common Errors
More informationA scheme developed by Du Pont to figure out
CPM Project Management scheme. A scheme developed by Du Pont to figure out Length of a normal project schedule given task durations and their precedence in a network type layout (or Gantt chart) Two examples
More informationPROGRAMMING CPM. Network Analysis. Goal:
PROGRAMMING CPM 5/21/13 Network Analysis Goal: Calculate completion time Calculate start and finish date for each activity Identify critical activities Identify requirements and flows of resources (materials,
More informationProject Planning & Control Prof. Koshy Varghese Department of Civil Engineering Indian Institute of Technology, Madras
Project Planning & Control Prof. Koshy Varghese Department of Civil Engineering Indian Institute of Technology, Madras (Refer Slide Time: 00:16) Lecture - 52 PERT Background and Assumptions, Step wise
More informationIntroduction to sensitivity analysis
Introduction to sensitivity analysis BSAD 0 Dave Novak Summer 0 Overview Introduction to sensitivity analysis Range of optimality Range of feasibility Source: Anderson et al., 0 Quantitative Methods for
More informationChapter 7 (Cont d) PERT
Chapter 7 (Cont d) PERT Project Management for Business, Engineering, and Technology Prepared by John Nicholas, Ph.D. Loyola University Chicago & Herman Steyn, PhD University of Pretoria Variability of
More informationSAMPLE STUDY MATERIAL. GATE, IES & PSUs Civil Engineering
SAMPLE STUDY MATERIAL Postal Correspondence Course GATE, IES & PSUs Civil Engineering CPM & CONSTRUCTION EQUIPMENT C O N T E N T 1. CPM AND PERT... 03-16 2. CRASHING OF NETWORK... 17-20 3. ENGINEERING
More information4. Network Calculations
Construction Project Management (CE 110401346) 4. Network Calculations Dr. Khaled Hyari Department of Civil Engineering Hashemite University Calculations On a Precedence Network I Early Activity Start
More informationProject Time Planning. Ahmed Elyamany, PhD
Project Time Planning Ahmed Elyamany, PhD 1 What is Planning The Development of a workable program of operations to accomplish established objectives when put into action. Done before project starts Planning
More informationMSA 640 Homework #2 Due September 17, points total / 20 points per question Show all work leading to your answers
Name MSA 640 Homework #2 Due September 17, 2010 100 points total / 20 points per question Show all work leading to your answers 1. The annual demand for a particular type of valve is 3,500 units. The cost
More information07/09/2011. A.AMRANI-ZOUGGAR IMS-Lab, University Bordeaux1. These products specific management
A.AMRANI-ZOUGGAR IMS-Lab, University Bordeaux These products specific management What leads the industrialist to start projects? BENEFITS Ageing of the range Benchmarking, comparing the market and industrial
More informationChapter 16: Program Evaluation and Review Techniques (PERT)
Chapter 16: Program Evaluation and Review Techniques (PERT) PERT PERT is a method for determining the length of a construction project and the probability of project completion by a specified date PERT
More informationCHAPTER 12. (The interpretation of the symbols used in the equations is given in page 3)
CHAPTER 12 The equations needed: (The interpretation of the symbols used in the equations is given in page 3) 1. ATI = t D 35 4. ws = I average weekly CU 2. I turn = CU I average 5. ds = I average daily
More informationSOLVING STOCHASTIC PERT NETWORKS EXACTLY USING HYBRID BAYESIAN NETWORKS
SOLVING STOCHASTIC PERT NETWORKS EXACTLY USING HYBRID BAYESIAN NETWORKS Esma Nur Cinicioglu and Prakash P. Shenoy School of Business University of Kansas, Lawrence, KS 66045 USA esmanur@ku.edu, pshenoy@ku.edu
More informationNetwork analysis. A project is a temporary endeavor undertaken to create a "unique" product or service
Network analysis Introduction Network analysis is the general name given to certain specific techniques which can be used for the planning, management and control of projects. One definition of a project
More informationProject management model for constructing a renewable energy plant
Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 74 (207 ) 45 54 206 Global Congress on Manufacturing and Management Project management model for constructing a renewable energy
More informationNetwork Techniques - I. t 5 4
Performance:Slide.doc Network Techniques - I. t s v u PRT time/cost : ( Program valuation & Review Technique ) vent-on-node typed project-model with probabilistic (stochastic) data set as weights (inp)
More informationUsing Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management
Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Mai Mohamed 1* Department of Operations Research Faculty of Computers and Informatics Zagazig University Sharqiyah Egypt
More informationNeutrosophic Sets, Project, Project Management, Gantt chart, CPM, PERT, Three-Time Estimate.
Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset,
More informationOperation management
Operation management Vigneron Loic December 3, 2008 1 Operations and productivity 1.1 Productivity Productivity = Units produced Imput used Units produced Labor productivity = Labor hours used One resource
More informationProject Management Prof. Raghunandan Sengupta Department of Industrial and Management Engineering Indian Institute of Technology Kanpur
Project Management Prof. Raghunandan Sengupta Department of Industrial and Management Engineering Indian Institute of Technology Kanpur Module No # 07 Lecture No # 35 Introduction to Graphical Evaluation
More informationM.SC. MATHEMATICS - II YEAR
MANONMANIAM SUNDARANAR UNIVERSITY DIRECTORATE OF DISTANCE & CONTINUING EDUCATION TIRUNELVELI 627012, TAMIL NADU M.SC. MATHEMATICS - II YEAR DKM24 - OPERATIONS RESEARCH (From the academic year 2016-17)
More informationTime Planning and Control
Time Planning and ontrol Precedence iagram G44 NGINRING MNGMNT 1 Precedence iagramming S ctivity I LS T L n important extension to the original activity-on-node concept appeared around 14. The sole relationship
More informationSolving Fuzzy PERT Using Gradual Real Numbers
Solving Fuzzy PERT Using Gradual Real Numbers Jérôme FORTIN a, Didier DUBOIS a, a IRIT/UPS 8 route de Narbonne, 3062, Toulouse, cedex 4, France, e-mail: {fortin, dubois}@irit.fr Abstract. From a set of
More informationSample Chapter. Basic Hard Systems. Engineering: Part I
Basic Hard Systems 10 Engineering: Part I 10.1 Introduction: Hard Systems Analysis In Chapter 1 we dealt briefly with the rudiments of the systems approach to problem solving. In this chapter, we begin
More informationMEI Decision Mathematics 1
Chapter assessment MEI Decision Mathematics Critical Path Analysis. The diagram below shows a precedence network for a particular project. 9 A() D(4) I(8) Durations are in days B() E() H(5) J(4) L() 5
More informationA Critical Path Problem Using Triangular Neutrosophic Number
A Critical Path Problem Using Triangular Neutrosophic Number Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset, Dr. Yongquan Zhou.
More informationA Critical Path Problem in Neutrosophic Environment
A Critical Path Problem in Neutrosophic Environment Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset, Dr. Yongquan Zhou. Foreword
More informationThere are three priority driven approaches that we will look at
Priority Driven Approaches There are three priority driven approaches that we will look at Earliest-Deadline-First (EDF) Least-Slack-Time-first (LST) Latest-Release-Time-first (LRT) 1 EDF Earliest deadline
More informationTime Planning and Control. Time-Scaled Network
Time Planning and Control Time-Scaled Network Processes of Time Planning and Control 1.Visualize and define the activities..sequence the activities (Job Logic). 3.stimate the activity duration. 4.Schedule
More informationEstimating Project Makespan for Multi-critical Paths Networks
Estimating Project Makespan for Multi-critical Paths Networks Amnon Gonen Management of Technology Faculty, Holon Institute of Technology H.I.T, Israel agonen@hit.ac.il Abstract- In this study,we concentrate
More informationa. See the textbook for examples of proving logical equivalence using truth tables. b. There is a real number x for which f (x) < 0. (x 1) 2 > 0.
For some problems, several sample proofs are given here. Problem 1. a. See the textbook for examples of proving logical equivalence using truth tables. b. There is a real number x for which f (x) < 0.
More informationST. JOSEPH S COLLEGE OF ARTS & SCIENCE (AUTONOMOUS) CUDDALORE-1
ST. JOSEPH S COLLEGE OF ARTS & SCIENCE (AUTONOMOUS) CUDDALORE-1 SUB:OPERATION RESEARCH CLASS: III B.SC SUB CODE:EMT617S SUB INCHARGE:S.JOHNSON SAVARIMUTHU 2 MARKS QUESTIONS 1. Write the general model of
More informationBenefits of PERT/CPM. 2018, Jayant Rajgopal
Project: ny set of complex, interrelated activities aimed at some specific goal. Typically, characterized by a clear starting point and a clear end point. Examples: onstruction (buildings, roads, bridges,
More informationMathematics (JUN13MD0201) General Certificate of Education Advanced Level Examination June Unit Decision TOTAL.
Centre Number Candidate Number For Examiner s Use Surname Other Names Candidate Signature Examiner s Initials Mathematics Unit Decision 2 Thursday 13 June 2013 General Certificate of Education Advanced
More informationDirect Methods for Solving Linear Systems. Matrix Factorization
Direct Methods for Solving Linear Systems Matrix Factorization Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011
More informationm~bmslnr.rmruu1nlw~~~unaiuaa"u~'u4au ~n'onsruioudl#~u~ubba::b$z t.4 CI
t.4 CI m~bmslnr.rmruu1nlw~~~unaiuaa"u~'u4au ~n'onsruioudl#~u~ubba::b$z d3uln"~iiuadu2u"~.riiuauuin ~1n1rdii~u'um~d~ul~d~uw~dnwmnv~a~i$i8o:d~e1anr::w d-ru8uq i5uqnlirn::1wnwa~duuin~~iuwiuui ah kiuquntnii.rud~::uitu
More informationDiscrete probability distributions
Discrete probability s BSAD 30 Dave Novak Fall 08 Source: Anderson et al., 05 Quantitative Methods for Business th edition some slides are directly from J. Loucks 03 Cengage Learning Covered so far Chapter
More informationEmbedded Systems 14. Overview of embedded systems design
Embedded Systems 14-1 - Overview of embedded systems design - 2-1 Point of departure: Scheduling general IT systems In general IT systems, not much is known about the computational processes a priori The
More informationQUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost
ANSWER QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost Q = Number of units AC = 7C MC = Q d7c d7c 7C Q Derivation of average cost with respect to quantity is different from marginal
More informationSimulation. Stochastic scheduling example: Can we get the work done in time?
Simulation Stochastic scheduling example: Can we get the work done in time? Example of decision making under uncertainty, combination of algorithms and probability distributions 1 Example study planning
More informationEmbedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i
Embedded Systems 15-1 - REVIEW: Aperiodic scheduling C i J i 0 a i s i f i d i Given: A set of non-periodic tasks {J 1,, J n } with arrival times a i, deadlines d i, computation times C i precedence constraints
More informationSingle Machine Models
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING Lecture 8 Single Machine Models 1. Dispatching Rules 2. Single Machine Models Marco Chiarandini DM87 Scheduling, Timetabling and Routing 2 Outline Dispatching
More informationCompletion Time of Fuzzy GERT-type Networks with Loops
Completion Time of Fuzzy GERT-type Networks with Loops Sina Ghaffari 1, Seyed Saeid Hashemin 2 1 Department of Industrial Engineering, Ardabil Branch, Islamic Azad university, Ardabil, Iran 2 Department
More informationQueuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe
Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What
More informationFood delivered. Food obtained S 3
Press lever Enter magazine * S 0 Initial state S 1 Food delivered * S 2 No reward S 2 No reward S 3 Food obtained Supplementary Figure 1 Value propagation in tree search, after 50 steps of learning the
More informationStochastic Analogues to Deterministic Optimizers
Stochastic Analogues to Deterministic Optimizers ISMP 2018 Bordeaux, France Vivak Patel Presented by: Mihai Anitescu July 6, 2018 1 Apology I apologize for not being here to give this talk myself. I injured
More informationA Critical Path Problem Using Triangular Neutrosophic Number
A ritical Path Problem Using Triangular Neutrosophic Number Mai Mohamed 1 Department of Operations Research Faculty of omputers and Informatics Zagazig University, Sharqiyah, Egypt Yongquan Zhou 2 ollege
More information= (, ) V λ (1) λ λ ( + + ) P = [ ( ), (1)] ( ) ( ) = ( ) ( ) ( 0 ) ( 0 ) = ( 0 ) ( 0 ) 0 ( 0 ) ( ( 0 )) ( ( 0 )) = ( ( 0 )) ( ( 0 )) ( + ( 0 )) ( + ( 0 )) = ( + ( 0 )) ( ( 0 )) P V V V V V P V P V V V
More informationAlgorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling.
Algorithm Design Scheduling Algorithms Part 2 Parallel machines. Open-shop Scheduling. Job-shop Scheduling. 1 Parallel Machines n jobs need to be scheduled on m machines, M 1,M 2,,M m. Each machine can
More informationFuzzy Numerical Results Derived From Crashing CPM/PERT Networks of Padma Bridge in Bangladesh
Fuzzy Numerical Results Derived From Crashing CPM/PERT Networks of Padma Bridge in Bangladesh Md. Mijanoor Rahman 1, Mrinal Chandra Barman 2, Sanjay Kumar Saha 3 1 Assistant Professor, Department of Mathematics,
More information(1) The starting point is the precedence table (aka dependence table) Immediately preceding activities
Critical Path Analysis (10 pages; 1/5/16) fmng.uk (1) The starting point is the precedence table (aka dependence table) Example Activity Duration Immediately preceding activities A 4 - B 5 - C 6 A,B D
More informationRecoverable Robustness in Scheduling Problems
Master Thesis Computing Science Recoverable Robustness in Scheduling Problems Author: J.M.J. Stoef (3470997) J.M.J.Stoef@uu.nl Supervisors: dr. J.A. Hoogeveen J.A.Hoogeveen@uu.nl dr. ir. J.M. van den Akker
More informationEmbedded Systems - FS 2018
Institut für Technische Informatik und Kommunikationsnetze Prof. L. Thiele Embedded Systems - FS 2018 Sample solution to Exercise 3 Discussion Date: 11.4.2018 Aperiodic Scheduling Task 1: Earliest Deadline
More informationQi Jian-xun,Sun Dedong
Physics Procedia 24 (2012) 1530 1540 2012 International Conference on Applied Physics and Industrial Engineering One Improvement Method of Reducing Duration Directly to Solve Time-Cost Tradeoff Problem
More informationA mathematical model for assembly line balancing model to consider disordering sequence of workstations
A mathematical model for assembly line balancing model to consider disordering sequence of workstations William Ho,* and Ali Emrouznejad Operations and Information Management Group Aston Business School,
More informationToward the Resolution of Resource Conflict in a MPL-CCPM Representation Approach
Toward the Resolution of Resource Conflict in a MPL-CCPM Representation Approach MUNENORI KASAHARA Nagaoka University of Technology Nagaoka, Niigata 940-2188 JAPAN s063349@ics.nagaokaut.ac.jp HIROTAKA
More informationTractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations
Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations Rafael Rumí, Antonio Salmerón Department of Statistics and Applied Mathematics University of Almería,
More informationChapter Learning Objectives. Probability Distributions and Probability Density Functions. Continuous Random Variables
Chapter 4: Continuous Random Variables and Probability s 4-1 Continuous Random Variables 4-2 Probability s and Probability Density Functions 4-3 Cumulative Functions 4-4 Mean and Variance of a Continuous
More informationCS 374: Algorithms & Models of Computation, Spring 2017 Greedy Algorithms Lecture 19 April 4, 2017 Chandra Chekuri (UIUC) CS374 1 Spring / 1
CS 374: Algorithms & Models of Computation, Spring 2017 Greedy Algorithms Lecture 19 April 4, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 1 Part I Greedy Algorithms: Tools and Techniques Chandra
More informationReinforcement Learning
Reinforcement Learning Temporal Difference Learning Temporal difference learning, TD prediction, Q-learning, elibigility traces. (many slides from Marc Toussaint) Vien Ngo Marc Toussaint University of
More informationProactive Algorithms for Job Shop Scheduling with Probabilistic Durations
Journal of Artificial Intelligence Research 28 (2007) 183 232 Submitted 5/06; published 3/07 Proactive Algorithms for Job Shop Scheduling with Probabilistic Durations J. Christopher Beck jcb@mie.utoronto.ca
More informationA comparison of sequencing formulations in a constraint generation procedure for avionics scheduling
A comparison of sequencing formulations in a constraint generation procedure for avionics scheduling Department of Mathematics, Linköping University Jessika Boberg LiTH-MAT-EX 2017/18 SE Credits: Level:
More informationTHE NONSIMULTANEITY CONSTRAINT IN NETWORK-BASED PROJECT MANAGEMENT SYSTEMS A THESIS. The Faculty of the Graduate Division. J.
In presenting the dissertation as a partial fulfillment of the requirements for an advanced degree from the Georgia Institute of Technology, I agree that the Library of the Institute shall make it available
More informationCritical Paths Identification on Fuzzy Network Project
IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 11, Issue 1 Ver. VI (Jan - Feb. 2015), PP 49-54 www.iosrjournals.org Critical Paths Identification on Fuzzy Network Project
More informationCompletion Time in Dynamic PERT Networks 57 job are nished, as well as that the associated service station has processed the same activity of the prev
Scientia Iranica, Vol. 14, No. 1, pp 56{63 c Sharif University of Technology, February 2007 Project Completion Time in Dynamic PERT Networks with Generating Projects A. Azaron 1 and M. Modarres In this
More informationProbabilistic Planning. George Konidaris
Probabilistic Planning George Konidaris gdk@cs.brown.edu Fall 2017 The Planning Problem Finding a sequence of actions to achieve some goal. Plans It s great when a plan just works but the world doesn t
More informationSingle Machine Problems Polynomial Cases
DM204, 2011 SCHEDULING, TIMETABLING AND ROUTING Lecture 2 Single Machine Problems Polynomial Cases Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline
More informationStatistical Distribution Assumptions of General Linear Models
Statistical Distribution Assumptions of General Linear Models Applied Multilevel Models for Cross Sectional Data Lecture 4 ICPSR Summer Workshop University of Colorado Boulder Lecture 4: Statistical Distributions
More informationRCPSP Single Machine Problems
DM204 Spring 2011 Scheduling, Timetabling and Routing Lecture 3 Single Machine Problems Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. Resource
More informationCASE STUDY: EXTINCTION OF FAMILY NAMES
CASE STUDY: EXTINCTION OF FAMILY NAMES The idea that families die out originated in antiquity, particilarly since the establishment of patrilineality (a common kinship system in which an individual s family
More informationDeduction by Daniel Bonevac. Chapter 3 Truth Trees
Deduction by Daniel Bonevac Chapter 3 Truth Trees Truth trees Truth trees provide an alternate decision procedure for assessing validity, logical equivalence, satisfiability and other logical properties
More informationReal-Time Systems. Event-Driven Scheduling
Real-Time Systems Event-Driven Scheduling Hermann Härtig WS 2018/19 Outline mostly following Jane Liu, Real-Time Systems Principles Scheduling EDF and LST as dynamic scheduling methods Fixed Priority schedulers
More informationLinear Model Selection and Regularization
Linear Model Selection and Regularization Recall the linear model Y = β 0 + β 1 X 1 + + β p X p + ɛ. In the lectures that follow, we consider some approaches for extending the linear model framework. In
More information1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument
1 Basic Definitions A Problem is a relation from input to acceptable output. For example, INPUT: A list of integers x 1,..., x n OUTPUT: One of the three smallest numbers in the list An algorithm A solves
More informationState Estimation of Linear and Nonlinear Dynamic Systems
State Estimation of Linear and Nonlinear Dynamic Systems Part I: Linear Systems with Gaussian Noise James B. Rawlings and Fernando V. Lima Department of Chemical and Biological Engineering University of
More informationECE 5775 (Fall 17) High-Level Digital Design Automation. Scheduling: Exact Methods
ECE 5775 (Fall 17) High-Level Digital Design Automation Scheduling: Exact Methods Announcements Sign up for the first student-led discussions today One slot remaining Presenters for the 1st session will
More informationIntroduction to Computational Stochastic Differential Equations
Introduction to Computational Stochastic Differential Equations Gabriel J. Lord Catherine E. Powell Tony Shardlow Preface Techniques for solving many of the differential equations traditionally used by
More informationRobust Optimization for Risk Control in Enterprise-wide Optimization
Robust Optimization for Risk Control in Enterprise-wide Optimization Juan Pablo Vielma Department of Industrial Engineering University of Pittsburgh EWO Seminar, 011 Pittsburgh, PA Uncertainty in Optimization
More informationCS 161: Design and Analysis of Algorithms
CS 161: Design and Analysis of Algorithms Greedy Algorithms 3: Minimum Spanning Trees/Scheduling Disjoint Sets, continued Analysis of Kruskal s Algorithm Interval Scheduling Disjoint Sets, Continued Each
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 6 Greedy Algorithms Interval Scheduling Interval Partitioning Scheduling to Minimize Lateness Sofya Raskhodnikova S. Raskhodnikova; based on slides by E. Demaine,
More informationParameterized Expectations Algorithm
Parameterized Expectations Algorithm Wouter J. Den Haan London School of Economics c by Wouter J. Den Haan Overview Two PEA algorithms Explaining stochastic simulations PEA Advantages and disadvantages
More information2 Structures, Graphs and Networks
2 Structures, Graphs and Networks 2.1 Directed Graphs An important graph in process technology is the directed graph (Gozinto graph) that specifies the interconnection of components, assemblies and modules
More informationPaper Presentation. Amo Guangmo Tong. University of Taxes at Dallas January 24, 2014
Paper Presentation Amo Guangmo Tong University of Taxes at Dallas gxt140030@utdallas.edu January 24, 2014 Amo Guangmo Tong (UTD) January 24, 2014 1 / 30 Overview 1 Tardiness Bounds under Global EDF Scheduling
More informationMachine Learning for Large-Scale Data Analysis and Decision Making A. Neural Networks Week #6
Machine Learning for Large-Scale Data Analysis and Decision Making 80-629-17A Neural Networks Week #6 Today Neural Networks A. Modeling B. Fitting C. Deep neural networks Today s material is (adapted)
More informationReasoning in Uncertain Situations
9 Reasoning in Uncertain Situations 9.0 Introduction 9.1 Logic-Based Abductive Inference 9.2 Abduction: Alternatives to Logic 9.3 The Stochastic Approach to Uncertainty 9.4 Epilogue and References 9.5
More informationAperiodic Task Scheduling
Aperiodic Task Scheduling Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 12 Germany Springer, 2010 2017 年 11 月 29 日 These slides use Microsoft clip arts. Microsoft copyright
More informationA rules-based production scheduling approach allowing multiple scenarios to be generated to test the impact of advance rate variability
LANE, G.R., KRAFFT, G., CAMBITSIS, A., DAYA, K., and VAN DER WESTHUIZEN, A. A rules-based production scheduling approach allowing multiple scenarios to be generated to test the impact of advance rate variability.
More informationSchedule Table Generation for Time-Triggered Mixed Criticality Systems
Schedule Table Generation for Time-Triggered Mixed Criticality Systems Jens Theis and Gerhard Fohler Technische Universität Kaiserslautern, Germany Sanjoy Baruah The University of North Carolina, Chapel
More informationIntelligent Systems (AI-2)
Intelligent Systems (AI-2) Computer Science cpsc422, Lecture 19 Oct, 23, 2015 Slide Sources Raymond J. Mooney University of Texas at Austin D. Koller, Stanford CS - Probabilistic Graphical Models D. Page,
More information15.1 Elimination of Redundant States
15.1 Elimination of Redundant States In Ch. 14 we tried not to have unnecessary states What if we have extra states in the state graph/table? Complete the table then eliminate the redundant states Chapter
More information2. Project management
2. Project management In what follows, we consider production processes where only a single item of a specific product is produced in the planning horizon In this case specific instruments for planning
More informationENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Topics) Winter 2011 Lecture 10: Extra Material M.G. Lipsett University of Alberta http://www.ualberta.ca/~mlipsett/engm541/engm541.htm
More information56:171 Operations Research Final Exam December 12, 1994
56:171 Operations Research Final Exam December 12, 1994 Write your name on the first page, and initial the other pages. The response "NOTA " = "None of the above" Answer both parts A & B, and five sections
More informationLinear Models for Regression
Linear Models for Regression Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr
More informationEE115C Winter 2017 Digital Electronic Circuits. Lecture 19: Timing Analysis
EE115C Winter 2017 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-
More informationwe first add 7 and then either divide by x - 7 = 1 Adding 7 to both sides 3 x = x = x = 3 # 8 1 # x = 3 # 4 # 2 x = 6 1 =?
. Using the Principles Together Applying Both Principles a Combining Like Terms a Clearing Fractions and Decimals a Contradictions and Identities EXAMPLE Solve: An important strategy for solving new problems
More informationComputer Science CPSC 322. Lecture 23 Planning Under Uncertainty and Decision Networks
Computer Science CPSC 322 Lecture 23 Planning Under Uncertainty and Decision Networks 1 Announcements Final exam Mon, Dec. 18, 12noon Same general format as midterm Part short questions, part longer problems
More informationHow much oil? Gordon J. Aubrecht, II OSU at Marion
How much oil? Gordon J. Aubrecht, II OSU at Marion In the 1960s, M. K. Hubbert 1 used a logisticgaussian model to predict the year of maximum energy production in the lower 48 states, and got is just about
More informationChance Constrained Programming
IE 495 Lecture 22 Chance Constrained Programming Prof. Jeff Linderoth April 21, 2003 April 21, 2002 Stochastic Programming Lecture 22 Slide 1 Outline HW Fixes Chance Constrained Programming Is Hard Main
More information