11/8/2018. Overview. PERT / CPM Part 2

Size: px
Start display at page:

Download "11/8/2018. Overview. PERT / CPM Part 2"

Transcription

1 /8/08 PERT / CPM Part BSAD 0 Dave Novak Fall 08 Source: Anderson et al., 0 Quantitative Methods for Business th edition some slides are directly from J. Loucks 0 Cengage Learning Overview Last class introduce basic CPM project management approach Today introduce uncertainty into PERT/CPM approach and the Beta distribution Estimating mean and variance for project Using the z-table to estimate project completion probabilities Activities with little variation in completion time Last class, assumed that time required to complete each activity (t i ) was known with certainty (deterministic) Common assumption used in certain industrial production planning applications, and useful in demonstrating CPM Uncertain activity times In reality, completion times associated with many project tasks are uncertain (stochastic) PERT is a project scheduling technique that treats the completion time of each activity as a random variable A common approach for estimating activity completion times is the Three Time Estimate Approach Node / activity notation Node / Activity A Time required to complete activity A A t A ES A LS A EF A LF A Instead of a fixed, known value, t A is a random variable Completion time for each activity Activity ES EF G. 8 8 E. H t LS LF

2 /8/08 approach rationale Recall that PERT was developed to manage the Polaris missile system project Most of the tasks / activities required in this project had never been performed before The time required to complete these new tasks was unknown and subject to variation approach rationale PERT focuses on estimating the probability distribution for total project time based on the uncertainty associated with the time to complete each activity in the project The three time estimate approach Three different time estimates are required for each project task / activity. a = an optimistic time to perform the activity (this is the minimum time assuming everything progresses ideally). m = most probable, average or expected activity time under normal conditions. b = a pessimistic time to perform the activity (this is the maximum time, assuming substantial delays) 0 approach We are not going to estimate these parameters (a, m, and b are our parameters) in this class they will be given In practice, where would activity time estimates for a, m, and b come from? Quick refresher A parameter estimate (or sample statistic) is a descriptive measure of a population Because we generally can t measure an entire population (i.e. the height of all males between - years old in the U.S.), we take a random sample from the population We estimate population parameters (based on the sample) along with the error associated with these estimates Quick refresher Normal distribution characterized by two parameters: mean (µ) and standard deviation (σ) Exponential distribution characterized by one parameter: mean ( ) In the PERT application, the Beta distribution is characterized by three parameters: optimal (a), expected (m), and pessimistic (b) NOTE: this is a slightly different interpretation of the Beta parameters than you will find in a statistics source

3 /8/08 approach The three time activity completion estimates can be approximated using a Beta distribution The Beta distribution has different shapes approach The fact that the Beta distribution is defined on a finite interval and can be symmetric or skewed (right or left) makes it more realistic and more flexible than the normal distribution Why? a m b a m b a m b Source: slides from unknown author Cal State Fullerton, Project Scheduling with PERT Estimating the mean and variance for activities The mean activity completion time can be estimated using a weighted average Weights are /, /, and / on a, m, and b respectively Weight optimistic estimate (a) / (or 0.7) Weight expected estimate (m) / (or 0.7) Weight pessimistic estimate (b) / (or 0.7) Weights sum to Estimating the mean and variance for activities Mean μ = a+m+b Variance σ = b a Why are we using as the denominator? The area we are concerned with is within the interval range (b a) This area is within standard deviations on either side of the mean ( standard deviations total) Assumption : We can find the critical path using the mean, or the expected completion times for each activity This implies that the expected completion time for the entire project is based only on the average completion time of the activities / tasks on the critical path Assumption : There are enough activities on the critical path so that the overall project completion time can be approximated using the normal distribution 7 8

4 /8/08 Assumption : use of Beta and Normal (Gaussian) distributions Assumption : The time required to complete each activity is independent of the time required to complete any other activity This does not imply that the sequencing of the activities within the project is independent Only that the time it takes to complete activity B, is not affected by the time it takes to complete activity A 9 0 Together, these assumptions imply that the overall project completion time follows a normal distribution with: Expected or average project completion time = the sum of all the expected / average activity times along the critical path Variance of project completion time = sum of the variances of all activities along the critical path Activity Immediate Predecessor The parameters for Beta distribution a Optimistic Time (hours) m Most Likely Time (hours) b Pessimistic Time (hours) A B C A D A E A 0.. F B, C G B, C. H E, F 7 I E, F 8 J D, H..7. K G, I 7 Estimate expected (or mean) completion time for each activity (µ i ) Estimate expected completion time for each activity (µ i )

5 /8/08 Activity Expected Time (a + m + b) µ = These are the expected or mean times that we just calculated H. J. A B C D E F G H I J K E. G. I. K. : Calculate ES and EF Early (ES) and Early (EF) are calculated on TOP ROW of each node by moving forward through the network the forward pass by setting ES = 0 for all nodes directly connected to The LARGEST EF time of the nodes connected to the FINISH (J and K) represents the project completion time Logically, the project can t be completed until the activity that is finished last is completed : Calculate ES and EF H. E. I. G. J. K. 7 8 Calculating ES and EF 0 E. 7 H. 9 J. 9 At this point, we know the estimated project completion time 9 I G. 9 K

6 /8/08 Calculating ES and EF Review: moving forward through the network calculating ES and EF If an activity has more than one precedent (i.e activities F, G, H, I, J, and K all have more than one precedent), the ES of that activity MUST be set to the MAXIMUM EF of ALL preceding activities For example, I cannot start activity I until BOTH E and F are completed. Therefore, ES I is constrained by EF F (not EF E ) 0 E. H G. 9 I. 8 J. 9 K. 8 : Calculate LS and LF Late (LS) and Late (LF) are calculated on the BOTTOM ROW by moving backwards through the network Begin the backward pass by setting the EF for all nodes directly connected to the finish equal to the estimated project completion time 0 E H. 9 I. 8 J. 9 K. 8 0 G. 9 Calculating LS and LF E H I G. 9 8 J. 9 0 K. 8 8 Review: moving backwards through the network calculating LS and LF If an activity precedes more than one activity (i.e activities F, E, C, and A) precede multiple activities, the LF of that activity MUST be set to the MINIMUM LS value of ALL activities it precedes For example, F precedes BOTH H and I. Therefore, LF F is set to the smallest value (LF H = and LF I = ), so LF F =

7 /8/08 Calculating slack E H. 9 0 I. 8 8 J. 9 0 Slack measures how much leeway or extra time each activity has between the earliest it can start and the latest it can start (or the earliest the activity can finish and the latest it can finish) without impacting the entire project G. 9 8 K. 8 8 slack = LF i EF i = LS i ES i Activities with NO SLACK are critical there is no extra time between the earliest and latest times that the activity can start (or finish) without impacting the project completion time 7 8 Calculating slack : Calculate slack (LF EF) 9 0 Activity ES EF LS LF Slack A * B 0 9 C * D 0 9 E 7 F * G H 9 0 I * J 9 0 K * : Determine the critical path The critical path is a path of activities from to node, with ZERO slack times 0 0 E. 7 0 H. 9 0 J. 9 0 The project completion time equals the maximum of all activity EF times I G K

8 /8/08 Estimate variance in completion time (σ ) for each activity on the critical path Estimate variance in completion time (σ ) for each activity on the critical path : Uncertainty calculations What is the probability that the project will be completed within hours? : Uncertainty calculations What is the probability that the project will be completed within hours? : Uncertainty calculations What is the probability that the project will be completed within hours? : Uncertainty calculations What is the probability that the project will be take more than hours to complete? 7 8 8

9 /8/08 Summary Introduce uncertainty into PERT/CPM approach and the Beta distribution Estimating mean and variance Using the z-table to estimate project completion probabilities 9 9

. Introduction to CPM / PERT Techniques. Applications of CPM / PERT. Basic Steps in PERT / CPM. Frame work of PERT/CPM. Network Diagram Representation. Rules for Drawing Network Diagrams. Common Errors

More information

A scheme developed by Du Pont to figure out

A scheme developed by Du Pont to figure out CPM Project Management scheme. A scheme developed by Du Pont to figure out Length of a normal project schedule given task durations and their precedence in a network type layout (or Gantt chart) Two examples

More information

PROGRAMMING CPM. Network Analysis. Goal:

PROGRAMMING CPM. Network Analysis. Goal: PROGRAMMING CPM 5/21/13 Network Analysis Goal: Calculate completion time Calculate start and finish date for each activity Identify critical activities Identify requirements and flows of resources (materials,

More information

Project Planning & Control Prof. Koshy Varghese Department of Civil Engineering Indian Institute of Technology, Madras

Project Planning & Control Prof. Koshy Varghese Department of Civil Engineering Indian Institute of Technology, Madras Project Planning & Control Prof. Koshy Varghese Department of Civil Engineering Indian Institute of Technology, Madras (Refer Slide Time: 00:16) Lecture - 52 PERT Background and Assumptions, Step wise

More information

Introduction to sensitivity analysis

Introduction to sensitivity analysis Introduction to sensitivity analysis BSAD 0 Dave Novak Summer 0 Overview Introduction to sensitivity analysis Range of optimality Range of feasibility Source: Anderson et al., 0 Quantitative Methods for

More information

Chapter 7 (Cont d) PERT

Chapter 7 (Cont d) PERT Chapter 7 (Cont d) PERT Project Management for Business, Engineering, and Technology Prepared by John Nicholas, Ph.D. Loyola University Chicago & Herman Steyn, PhD University of Pretoria Variability of

More information

SAMPLE STUDY MATERIAL. GATE, IES & PSUs Civil Engineering

SAMPLE STUDY MATERIAL. GATE, IES & PSUs Civil Engineering SAMPLE STUDY MATERIAL Postal Correspondence Course GATE, IES & PSUs Civil Engineering CPM & CONSTRUCTION EQUIPMENT C O N T E N T 1. CPM AND PERT... 03-16 2. CRASHING OF NETWORK... 17-20 3. ENGINEERING

More information

4. Network Calculations

4. Network Calculations Construction Project Management (CE 110401346) 4. Network Calculations Dr. Khaled Hyari Department of Civil Engineering Hashemite University Calculations On a Precedence Network I Early Activity Start

More information

Project Time Planning. Ahmed Elyamany, PhD

Project Time Planning. Ahmed Elyamany, PhD Project Time Planning Ahmed Elyamany, PhD 1 What is Planning The Development of a workable program of operations to accomplish established objectives when put into action. Done before project starts Planning

More information

MSA 640 Homework #2 Due September 17, points total / 20 points per question Show all work leading to your answers

MSA 640 Homework #2 Due September 17, points total / 20 points per question Show all work leading to your answers Name MSA 640 Homework #2 Due September 17, 2010 100 points total / 20 points per question Show all work leading to your answers 1. The annual demand for a particular type of valve is 3,500 units. The cost

More information

07/09/2011. A.AMRANI-ZOUGGAR IMS-Lab, University Bordeaux1. These products specific management

07/09/2011. A.AMRANI-ZOUGGAR IMS-Lab, University Bordeaux1. These products specific management A.AMRANI-ZOUGGAR IMS-Lab, University Bordeaux These products specific management What leads the industrialist to start projects? BENEFITS Ageing of the range Benchmarking, comparing the market and industrial

More information

Chapter 16: Program Evaluation and Review Techniques (PERT)

Chapter 16: Program Evaluation and Review Techniques (PERT) Chapter 16: Program Evaluation and Review Techniques (PERT) PERT PERT is a method for determining the length of a construction project and the probability of project completion by a specified date PERT

More information

CHAPTER 12. (The interpretation of the symbols used in the equations is given in page 3)

CHAPTER 12. (The interpretation of the symbols used in the equations is given in page 3) CHAPTER 12 The equations needed: (The interpretation of the symbols used in the equations is given in page 3) 1. ATI = t D 35 4. ws = I average weekly CU 2. I turn = CU I average 5. ds = I average daily

More information

SOLVING STOCHASTIC PERT NETWORKS EXACTLY USING HYBRID BAYESIAN NETWORKS

SOLVING STOCHASTIC PERT NETWORKS EXACTLY USING HYBRID BAYESIAN NETWORKS SOLVING STOCHASTIC PERT NETWORKS EXACTLY USING HYBRID BAYESIAN NETWORKS Esma Nur Cinicioglu and Prakash P. Shenoy School of Business University of Kansas, Lawrence, KS 66045 USA esmanur@ku.edu, pshenoy@ku.edu

More information

Network analysis. A project is a temporary endeavor undertaken to create a "unique" product or service

Network analysis. A project is a temporary endeavor undertaken to create a unique product or service Network analysis Introduction Network analysis is the general name given to certain specific techniques which can be used for the planning, management and control of projects. One definition of a project

More information

Project management model for constructing a renewable energy plant

Project management model for constructing a renewable energy plant Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 74 (207 ) 45 54 206 Global Congress on Manufacturing and Management Project management model for constructing a renewable energy

More information

Network Techniques - I. t 5 4

Network Techniques - I. t 5 4 Performance:Slide.doc Network Techniques - I. t s v u PRT time/cost : ( Program valuation & Review Technique ) vent-on-node typed project-model with probabilistic (stochastic) data set as weights (inp)

More information

Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management

Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Mai Mohamed 1* Department of Operations Research Faculty of Computers and Informatics Zagazig University Sharqiyah Egypt

More information

Neutrosophic Sets, Project, Project Management, Gantt chart, CPM, PERT, Three-Time Estimate.

Neutrosophic Sets, Project, Project Management, Gantt chart, CPM, PERT, Three-Time Estimate. Using Neutrosophic Sets to Obtain PERT Three-Times Estimates in Project Management Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset,

More information

Operation management

Operation management Operation management Vigneron Loic December 3, 2008 1 Operations and productivity 1.1 Productivity Productivity = Units produced Imput used Units produced Labor productivity = Labor hours used One resource

More information

Project Management Prof. Raghunandan Sengupta Department of Industrial and Management Engineering Indian Institute of Technology Kanpur

Project Management Prof. Raghunandan Sengupta Department of Industrial and Management Engineering Indian Institute of Technology Kanpur Project Management Prof. Raghunandan Sengupta Department of Industrial and Management Engineering Indian Institute of Technology Kanpur Module No # 07 Lecture No # 35 Introduction to Graphical Evaluation

More information

M.SC. MATHEMATICS - II YEAR

M.SC. MATHEMATICS - II YEAR MANONMANIAM SUNDARANAR UNIVERSITY DIRECTORATE OF DISTANCE & CONTINUING EDUCATION TIRUNELVELI 627012, TAMIL NADU M.SC. MATHEMATICS - II YEAR DKM24 - OPERATIONS RESEARCH (From the academic year 2016-17)

More information

Time Planning and Control

Time Planning and Control Time Planning and ontrol Precedence iagram G44 NGINRING MNGMNT 1 Precedence iagramming S ctivity I LS T L n important extension to the original activity-on-node concept appeared around 14. The sole relationship

More information

Solving Fuzzy PERT Using Gradual Real Numbers

Solving Fuzzy PERT Using Gradual Real Numbers Solving Fuzzy PERT Using Gradual Real Numbers Jérôme FORTIN a, Didier DUBOIS a, a IRIT/UPS 8 route de Narbonne, 3062, Toulouse, cedex 4, France, e-mail: {fortin, dubois}@irit.fr Abstract. From a set of

More information

Sample Chapter. Basic Hard Systems. Engineering: Part I

Sample Chapter. Basic Hard Systems. Engineering: Part I Basic Hard Systems 10 Engineering: Part I 10.1 Introduction: Hard Systems Analysis In Chapter 1 we dealt briefly with the rudiments of the systems approach to problem solving. In this chapter, we begin

More information

MEI Decision Mathematics 1

MEI Decision Mathematics 1 Chapter assessment MEI Decision Mathematics Critical Path Analysis. The diagram below shows a precedence network for a particular project. 9 A() D(4) I(8) Durations are in days B() E() H(5) J(4) L() 5

More information

A Critical Path Problem Using Triangular Neutrosophic Number

A Critical Path Problem Using Triangular Neutrosophic Number A Critical Path Problem Using Triangular Neutrosophic Number Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset, Dr. Yongquan Zhou.

More information

A Critical Path Problem in Neutrosophic Environment

A Critical Path Problem in Neutrosophic Environment A Critical Path Problem in Neutrosophic Environment Excerpt from NEUTROSOPHIC OPERATIONAL RESEARCH, Volume I. Editors: Prof. Florentin Smarandache, Dr. Mohamed Abdel-Basset, Dr. Yongquan Zhou. Foreword

More information

There are three priority driven approaches that we will look at

There are three priority driven approaches that we will look at Priority Driven Approaches There are three priority driven approaches that we will look at Earliest-Deadline-First (EDF) Least-Slack-Time-first (LST) Latest-Release-Time-first (LRT) 1 EDF Earliest deadline

More information

Time Planning and Control. Time-Scaled Network

Time Planning and Control. Time-Scaled Network Time Planning and Control Time-Scaled Network Processes of Time Planning and Control 1.Visualize and define the activities..sequence the activities (Job Logic). 3.stimate the activity duration. 4.Schedule

More information

Estimating Project Makespan for Multi-critical Paths Networks

Estimating Project Makespan for Multi-critical Paths Networks Estimating Project Makespan for Multi-critical Paths Networks Amnon Gonen Management of Technology Faculty, Holon Institute of Technology H.I.T, Israel agonen@hit.ac.il Abstract- In this study,we concentrate

More information

a. See the textbook for examples of proving logical equivalence using truth tables. b. There is a real number x for which f (x) < 0. (x 1) 2 > 0.

a. See the textbook for examples of proving logical equivalence using truth tables. b. There is a real number x for which f (x) < 0. (x 1) 2 > 0. For some problems, several sample proofs are given here. Problem 1. a. See the textbook for examples of proving logical equivalence using truth tables. b. There is a real number x for which f (x) < 0.

More information

ST. JOSEPH S COLLEGE OF ARTS & SCIENCE (AUTONOMOUS) CUDDALORE-1

ST. JOSEPH S COLLEGE OF ARTS & SCIENCE (AUTONOMOUS) CUDDALORE-1 ST. JOSEPH S COLLEGE OF ARTS & SCIENCE (AUTONOMOUS) CUDDALORE-1 SUB:OPERATION RESEARCH CLASS: III B.SC SUB CODE:EMT617S SUB INCHARGE:S.JOHNSON SAVARIMUTHU 2 MARKS QUESTIONS 1. Write the general model of

More information

Benefits of PERT/CPM. 2018, Jayant Rajgopal

Benefits of PERT/CPM. 2018, Jayant Rajgopal Project: ny set of complex, interrelated activities aimed at some specific goal. Typically, characterized by a clear starting point and a clear end point. Examples: onstruction (buildings, roads, bridges,

More information

Mathematics (JUN13MD0201) General Certificate of Education Advanced Level Examination June Unit Decision TOTAL.

Mathematics (JUN13MD0201) General Certificate of Education Advanced Level Examination June Unit Decision TOTAL. Centre Number Candidate Number For Examiner s Use Surname Other Names Candidate Signature Examiner s Initials Mathematics Unit Decision 2 Thursday 13 June 2013 General Certificate of Education Advanced

More information

Direct Methods for Solving Linear Systems. Matrix Factorization

Direct Methods for Solving Linear Systems. Matrix Factorization Direct Methods for Solving Linear Systems Matrix Factorization Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011

More information

m~bmslnr.rmruu1nlw~~~unaiuaa"u~'u4au ~n'onsruioudl#~u~ubba::b$z t.4 CI

m~bmslnr.rmruu1nlw~~~unaiuaau~'u4au ~n'onsruioudl#~u~ubba::b$z t.4 CI t.4 CI m~bmslnr.rmruu1nlw~~~unaiuaa"u~'u4au ~n'onsruioudl#~u~ubba::b$z d3uln"~iiuadu2u"~.riiuauuin ~1n1rdii~u'um~d~ul~d~uw~dnwmnv~a~i$i8o:d~e1anr::w d-ru8uq i5uqnlirn::1wnwa~duuin~~iuwiuui ah kiuquntnii.rud~::uitu

More information

Discrete probability distributions

Discrete probability distributions Discrete probability s BSAD 30 Dave Novak Fall 08 Source: Anderson et al., 05 Quantitative Methods for Business th edition some slides are directly from J. Loucks 03 Cengage Learning Covered so far Chapter

More information

Embedded Systems 14. Overview of embedded systems design

Embedded Systems 14. Overview of embedded systems design Embedded Systems 14-1 - Overview of embedded systems design - 2-1 Point of departure: Scheduling general IT systems In general IT systems, not much is known about the computational processes a priori The

More information

QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost

QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost ANSWER QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost Q = Number of units AC = 7C MC = Q d7c d7c 7C Q Derivation of average cost with respect to quantity is different from marginal

More information

Simulation. Stochastic scheduling example: Can we get the work done in time?

Simulation. Stochastic scheduling example: Can we get the work done in time? Simulation Stochastic scheduling example: Can we get the work done in time? Example of decision making under uncertainty, combination of algorithms and probability distributions 1 Example study planning

More information

Embedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i

Embedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i Embedded Systems 15-1 - REVIEW: Aperiodic scheduling C i J i 0 a i s i f i d i Given: A set of non-periodic tasks {J 1,, J n } with arrival times a i, deadlines d i, computation times C i precedence constraints

More information

Single Machine Models

Single Machine Models Outline DM87 SCHEDULING, TIMETABLING AND ROUTING Lecture 8 Single Machine Models 1. Dispatching Rules 2. Single Machine Models Marco Chiarandini DM87 Scheduling, Timetabling and Routing 2 Outline Dispatching

More information

Completion Time of Fuzzy GERT-type Networks with Loops

Completion Time of Fuzzy GERT-type Networks with Loops Completion Time of Fuzzy GERT-type Networks with Loops Sina Ghaffari 1, Seyed Saeid Hashemin 2 1 Department of Industrial Engineering, Ardabil Branch, Islamic Azad university, Ardabil, Iran 2 Department

More information

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What

More information

Food delivered. Food obtained S 3

Food delivered. Food obtained S 3 Press lever Enter magazine * S 0 Initial state S 1 Food delivered * S 2 No reward S 2 No reward S 3 Food obtained Supplementary Figure 1 Value propagation in tree search, after 50 steps of learning the

More information

Stochastic Analogues to Deterministic Optimizers

Stochastic Analogues to Deterministic Optimizers Stochastic Analogues to Deterministic Optimizers ISMP 2018 Bordeaux, France Vivak Patel Presented by: Mihai Anitescu July 6, 2018 1 Apology I apologize for not being here to give this talk myself. I injured

More information

A Critical Path Problem Using Triangular Neutrosophic Number

A Critical Path Problem Using Triangular Neutrosophic Number A ritical Path Problem Using Triangular Neutrosophic Number Mai Mohamed 1 Department of Operations Research Faculty of omputers and Informatics Zagazig University, Sharqiyah, Egypt Yongquan Zhou 2 ollege

More information

= (, ) V λ (1) λ λ ( + + ) P = [ ( ), (1)] ( ) ( ) = ( ) ( ) ( 0 ) ( 0 ) = ( 0 ) ( 0 ) 0 ( 0 ) ( ( 0 )) ( ( 0 )) = ( ( 0 )) ( ( 0 )) ( + ( 0 )) ( + ( 0 )) = ( + ( 0 )) ( ( 0 )) P V V V V V P V P V V V

More information

Algorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling.

Algorithm Design. Scheduling Algorithms. Part 2. Parallel machines. Open-shop Scheduling. Job-shop Scheduling. Algorithm Design Scheduling Algorithms Part 2 Parallel machines. Open-shop Scheduling. Job-shop Scheduling. 1 Parallel Machines n jobs need to be scheduled on m machines, M 1,M 2,,M m. Each machine can

More information

Fuzzy Numerical Results Derived From Crashing CPM/PERT Networks of Padma Bridge in Bangladesh

Fuzzy Numerical Results Derived From Crashing CPM/PERT Networks of Padma Bridge in Bangladesh Fuzzy Numerical Results Derived From Crashing CPM/PERT Networks of Padma Bridge in Bangladesh Md. Mijanoor Rahman 1, Mrinal Chandra Barman 2, Sanjay Kumar Saha 3 1 Assistant Professor, Department of Mathematics,

More information

(1) The starting point is the precedence table (aka dependence table) Immediately preceding activities

(1) The starting point is the precedence table (aka dependence table) Immediately preceding activities Critical Path Analysis (10 pages; 1/5/16) fmng.uk (1) The starting point is the precedence table (aka dependence table) Example Activity Duration Immediately preceding activities A 4 - B 5 - C 6 A,B D

More information

Recoverable Robustness in Scheduling Problems

Recoverable Robustness in Scheduling Problems Master Thesis Computing Science Recoverable Robustness in Scheduling Problems Author: J.M.J. Stoef (3470997) J.M.J.Stoef@uu.nl Supervisors: dr. J.A. Hoogeveen J.A.Hoogeveen@uu.nl dr. ir. J.M. van den Akker

More information

Embedded Systems - FS 2018

Embedded Systems - FS 2018 Institut für Technische Informatik und Kommunikationsnetze Prof. L. Thiele Embedded Systems - FS 2018 Sample solution to Exercise 3 Discussion Date: 11.4.2018 Aperiodic Scheduling Task 1: Earliest Deadline

More information

Qi Jian-xun,Sun Dedong

Qi Jian-xun,Sun Dedong Physics Procedia 24 (2012) 1530 1540 2012 International Conference on Applied Physics and Industrial Engineering One Improvement Method of Reducing Duration Directly to Solve Time-Cost Tradeoff Problem

More information

A mathematical model for assembly line balancing model to consider disordering sequence of workstations

A mathematical model for assembly line balancing model to consider disordering sequence of workstations A mathematical model for assembly line balancing model to consider disordering sequence of workstations William Ho,* and Ali Emrouznejad Operations and Information Management Group Aston Business School,

More information

Toward the Resolution of Resource Conflict in a MPL-CCPM Representation Approach

Toward the Resolution of Resource Conflict in a MPL-CCPM Representation Approach Toward the Resolution of Resource Conflict in a MPL-CCPM Representation Approach MUNENORI KASAHARA Nagaoka University of Technology Nagaoka, Niigata 940-2188 JAPAN s063349@ics.nagaokaut.ac.jp HIROTAKA

More information

Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations

Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations Tractable Inference in Hybrid Bayesian Networks with Deterministic Conditionals using Re-approximations Rafael Rumí, Antonio Salmerón Department of Statistics and Applied Mathematics University of Almería,

More information

Chapter Learning Objectives. Probability Distributions and Probability Density Functions. Continuous Random Variables

Chapter Learning Objectives. Probability Distributions and Probability Density Functions. Continuous Random Variables Chapter 4: Continuous Random Variables and Probability s 4-1 Continuous Random Variables 4-2 Probability s and Probability Density Functions 4-3 Cumulative Functions 4-4 Mean and Variance of a Continuous

More information

CS 374: Algorithms & Models of Computation, Spring 2017 Greedy Algorithms Lecture 19 April 4, 2017 Chandra Chekuri (UIUC) CS374 1 Spring / 1

CS 374: Algorithms & Models of Computation, Spring 2017 Greedy Algorithms Lecture 19 April 4, 2017 Chandra Chekuri (UIUC) CS374 1 Spring / 1 CS 374: Algorithms & Models of Computation, Spring 2017 Greedy Algorithms Lecture 19 April 4, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 1 Part I Greedy Algorithms: Tools and Techniques Chandra

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning Temporal Difference Learning Temporal difference learning, TD prediction, Q-learning, elibigility traces. (many slides from Marc Toussaint) Vien Ngo Marc Toussaint University of

More information

Proactive Algorithms for Job Shop Scheduling with Probabilistic Durations

Proactive Algorithms for Job Shop Scheduling with Probabilistic Durations Journal of Artificial Intelligence Research 28 (2007) 183 232 Submitted 5/06; published 3/07 Proactive Algorithms for Job Shop Scheduling with Probabilistic Durations J. Christopher Beck jcb@mie.utoronto.ca

More information

A comparison of sequencing formulations in a constraint generation procedure for avionics scheduling

A comparison of sequencing formulations in a constraint generation procedure for avionics scheduling A comparison of sequencing formulations in a constraint generation procedure for avionics scheduling Department of Mathematics, Linköping University Jessika Boberg LiTH-MAT-EX 2017/18 SE Credits: Level:

More information

THE NONSIMULTANEITY CONSTRAINT IN NETWORK-BASED PROJECT MANAGEMENT SYSTEMS A THESIS. The Faculty of the Graduate Division. J.

THE NONSIMULTANEITY CONSTRAINT IN NETWORK-BASED PROJECT MANAGEMENT SYSTEMS A THESIS. The Faculty of the Graduate Division. J. In presenting the dissertation as a partial fulfillment of the requirements for an advanced degree from the Georgia Institute of Technology, I agree that the Library of the Institute shall make it available

More information

Critical Paths Identification on Fuzzy Network Project

Critical Paths Identification on Fuzzy Network Project IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 11, Issue 1 Ver. VI (Jan - Feb. 2015), PP 49-54 www.iosrjournals.org Critical Paths Identification on Fuzzy Network Project

More information

Completion Time in Dynamic PERT Networks 57 job are nished, as well as that the associated service station has processed the same activity of the prev

Completion Time in Dynamic PERT Networks 57 job are nished, as well as that the associated service station has processed the same activity of the prev Scientia Iranica, Vol. 14, No. 1, pp 56{63 c Sharif University of Technology, February 2007 Project Completion Time in Dynamic PERT Networks with Generating Projects A. Azaron 1 and M. Modarres In this

More information

Probabilistic Planning. George Konidaris

Probabilistic Planning. George Konidaris Probabilistic Planning George Konidaris gdk@cs.brown.edu Fall 2017 The Planning Problem Finding a sequence of actions to achieve some goal. Plans It s great when a plan just works but the world doesn t

More information

Single Machine Problems Polynomial Cases

Single Machine Problems Polynomial Cases DM204, 2011 SCHEDULING, TIMETABLING AND ROUTING Lecture 2 Single Machine Problems Polynomial Cases Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline

More information

Statistical Distribution Assumptions of General Linear Models

Statistical Distribution Assumptions of General Linear Models Statistical Distribution Assumptions of General Linear Models Applied Multilevel Models for Cross Sectional Data Lecture 4 ICPSR Summer Workshop University of Colorado Boulder Lecture 4: Statistical Distributions

More information

RCPSP Single Machine Problems

RCPSP Single Machine Problems DM204 Spring 2011 Scheduling, Timetabling and Routing Lecture 3 Single Machine Problems Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. Resource

More information

CASE STUDY: EXTINCTION OF FAMILY NAMES

CASE STUDY: EXTINCTION OF FAMILY NAMES CASE STUDY: EXTINCTION OF FAMILY NAMES The idea that families die out originated in antiquity, particilarly since the establishment of patrilineality (a common kinship system in which an individual s family

More information

Deduction by Daniel Bonevac. Chapter 3 Truth Trees

Deduction by Daniel Bonevac. Chapter 3 Truth Trees Deduction by Daniel Bonevac Chapter 3 Truth Trees Truth trees Truth trees provide an alternate decision procedure for assessing validity, logical equivalence, satisfiability and other logical properties

More information

Real-Time Systems. Event-Driven Scheduling

Real-Time Systems. Event-Driven Scheduling Real-Time Systems Event-Driven Scheduling Hermann Härtig WS 2018/19 Outline mostly following Jane Liu, Real-Time Systems Principles Scheduling EDF and LST as dynamic scheduling methods Fixed Priority schedulers

More information

Linear Model Selection and Regularization

Linear Model Selection and Regularization Linear Model Selection and Regularization Recall the linear model Y = β 0 + β 1 X 1 + + β p X p + ɛ. In the lectures that follow, we consider some approaches for extending the linear model framework. In

More information

1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument

1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument 1 Basic Definitions A Problem is a relation from input to acceptable output. For example, INPUT: A list of integers x 1,..., x n OUTPUT: One of the three smallest numbers in the list An algorithm A solves

More information

State Estimation of Linear and Nonlinear Dynamic Systems

State Estimation of Linear and Nonlinear Dynamic Systems State Estimation of Linear and Nonlinear Dynamic Systems Part I: Linear Systems with Gaussian Noise James B. Rawlings and Fernando V. Lima Department of Chemical and Biological Engineering University of

More information

ECE 5775 (Fall 17) High-Level Digital Design Automation. Scheduling: Exact Methods

ECE 5775 (Fall 17) High-Level Digital Design Automation. Scheduling: Exact Methods ECE 5775 (Fall 17) High-Level Digital Design Automation Scheduling: Exact Methods Announcements Sign up for the first student-led discussions today One slot remaining Presenters for the 1st session will

More information

Introduction to Computational Stochastic Differential Equations

Introduction to Computational Stochastic Differential Equations Introduction to Computational Stochastic Differential Equations Gabriel J. Lord Catherine E. Powell Tony Shardlow Preface Techniques for solving many of the differential equations traditionally used by

More information

Robust Optimization for Risk Control in Enterprise-wide Optimization

Robust Optimization for Risk Control in Enterprise-wide Optimization Robust Optimization for Risk Control in Enterprise-wide Optimization Juan Pablo Vielma Department of Industrial Engineering University of Pittsburgh EWO Seminar, 011 Pittsburgh, PA Uncertainty in Optimization

More information

CS 161: Design and Analysis of Algorithms

CS 161: Design and Analysis of Algorithms CS 161: Design and Analysis of Algorithms Greedy Algorithms 3: Minimum Spanning Trees/Scheduling Disjoint Sets, continued Analysis of Kruskal s Algorithm Interval Scheduling Disjoint Sets, Continued Each

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 6 Greedy Algorithms Interval Scheduling Interval Partitioning Scheduling to Minimize Lateness Sofya Raskhodnikova S. Raskhodnikova; based on slides by E. Demaine,

More information

Parameterized Expectations Algorithm

Parameterized Expectations Algorithm Parameterized Expectations Algorithm Wouter J. Den Haan London School of Economics c by Wouter J. Den Haan Overview Two PEA algorithms Explaining stochastic simulations PEA Advantages and disadvantages

More information

2 Structures, Graphs and Networks

2 Structures, Graphs and Networks 2 Structures, Graphs and Networks 2.1 Directed Graphs An important graph in process technology is the directed graph (Gozinto graph) that specifies the interconnection of components, assemblies and modules

More information

Paper Presentation. Amo Guangmo Tong. University of Taxes at Dallas January 24, 2014

Paper Presentation. Amo Guangmo Tong. University of Taxes at Dallas January 24, 2014 Paper Presentation Amo Guangmo Tong University of Taxes at Dallas gxt140030@utdallas.edu January 24, 2014 Amo Guangmo Tong (UTD) January 24, 2014 1 / 30 Overview 1 Tardiness Bounds under Global EDF Scheduling

More information

Machine Learning for Large-Scale Data Analysis and Decision Making A. Neural Networks Week #6

Machine Learning for Large-Scale Data Analysis and Decision Making A. Neural Networks Week #6 Machine Learning for Large-Scale Data Analysis and Decision Making 80-629-17A Neural Networks Week #6 Today Neural Networks A. Modeling B. Fitting C. Deep neural networks Today s material is (adapted)

More information

Reasoning in Uncertain Situations

Reasoning in Uncertain Situations 9 Reasoning in Uncertain Situations 9.0 Introduction 9.1 Logic-Based Abductive Inference 9.2 Abduction: Alternatives to Logic 9.3 The Stochastic Approach to Uncertainty 9.4 Epilogue and References 9.5

More information

Aperiodic Task Scheduling

Aperiodic Task Scheduling Aperiodic Task Scheduling Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 12 Germany Springer, 2010 2017 年 11 月 29 日 These slides use Microsoft clip arts. Microsoft copyright

More information

A rules-based production scheduling approach allowing multiple scenarios to be generated to test the impact of advance rate variability

A rules-based production scheduling approach allowing multiple scenarios to be generated to test the impact of advance rate variability LANE, G.R., KRAFFT, G., CAMBITSIS, A., DAYA, K., and VAN DER WESTHUIZEN, A. A rules-based production scheduling approach allowing multiple scenarios to be generated to test the impact of advance rate variability.

More information

Schedule Table Generation for Time-Triggered Mixed Criticality Systems

Schedule Table Generation for Time-Triggered Mixed Criticality Systems Schedule Table Generation for Time-Triggered Mixed Criticality Systems Jens Theis and Gerhard Fohler Technische Universität Kaiserslautern, Germany Sanjoy Baruah The University of North Carolina, Chapel

More information

Intelligent Systems (AI-2)

Intelligent Systems (AI-2) Intelligent Systems (AI-2) Computer Science cpsc422, Lecture 19 Oct, 23, 2015 Slide Sources Raymond J. Mooney University of Texas at Austin D. Koller, Stanford CS - Probabilistic Graphical Models D. Page,

More information

15.1 Elimination of Redundant States

15.1 Elimination of Redundant States 15.1 Elimination of Redundant States In Ch. 14 we tried not to have unnecessary states What if we have extra states in the state graph/table? Complete the table then eliminate the redundant states Chapter

More information

2. Project management

2. Project management 2. Project management In what follows, we consider production processes where only a single item of a specific product is produced in the planning horizon In this case specific instruments for planning

More information

ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Topics) Winter 2011 Lecture 10: Extra Material M.G. Lipsett University of Alberta http://www.ualberta.ca/~mlipsett/engm541/engm541.htm

More information

56:171 Operations Research Final Exam December 12, 1994

56:171 Operations Research Final Exam December 12, 1994 56:171 Operations Research Final Exam December 12, 1994 Write your name on the first page, and initial the other pages. The response "NOTA " = "None of the above" Answer both parts A & B, and five sections

More information

Linear Models for Regression

Linear Models for Regression Linear Models for Regression Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr

More information

EE115C Winter 2017 Digital Electronic Circuits. Lecture 19: Timing Analysis

EE115C Winter 2017 Digital Electronic Circuits. Lecture 19: Timing Analysis EE115C Winter 2017 Digital Electronic Circuits Lecture 19: Timing Analysis Outline Timing parameters Clock nonidealities (skew and jitter) Impact of Clk skew on timing Impact of Clk jitter on timing Flip-flop-

More information

we first add 7 and then either divide by x - 7 = 1 Adding 7 to both sides 3 x = x = x = 3 # 8 1 # x = 3 # 4 # 2 x = 6 1 =?

we first add 7 and then either divide by x - 7 = 1 Adding 7 to both sides 3 x = x = x = 3 # 8 1 # x = 3 # 4 # 2 x = 6 1 =? . Using the Principles Together Applying Both Principles a Combining Like Terms a Clearing Fractions and Decimals a Contradictions and Identities EXAMPLE Solve: An important strategy for solving new problems

More information

Computer Science CPSC 322. Lecture 23 Planning Under Uncertainty and Decision Networks

Computer Science CPSC 322. Lecture 23 Planning Under Uncertainty and Decision Networks Computer Science CPSC 322 Lecture 23 Planning Under Uncertainty and Decision Networks 1 Announcements Final exam Mon, Dec. 18, 12noon Same general format as midterm Part short questions, part longer problems

More information

How much oil? Gordon J. Aubrecht, II OSU at Marion

How much oil? Gordon J. Aubrecht, II OSU at Marion How much oil? Gordon J. Aubrecht, II OSU at Marion In the 1960s, M. K. Hubbert 1 used a logisticgaussian model to predict the year of maximum energy production in the lower 48 states, and got is just about

More information

Chance Constrained Programming

Chance Constrained Programming IE 495 Lecture 22 Chance Constrained Programming Prof. Jeff Linderoth April 21, 2003 April 21, 2002 Stochastic Programming Lecture 22 Slide 1 Outline HW Fixes Chance Constrained Programming Is Hard Main

More information