The robustness of schedule schemes plays an important role for the smooth execution projects under uncertain conditions. This paper presents a new stochastic programming model about the bi-objective robust resource-constrained project scheduling problem with random activity durations, which aims at maximizing the robustness and the probability of timely completion project simultaneously. The robust criterion is measured by the weight sum of buffer times of all activities under resource-constrained case. The method of obtaining time buffers is clarified, and some technical operations to solve the model are carefully addressed when adopting an improved non-dominated sorting genetic algorithm.
Finally, based on a numerical example, the sets of Pareto optimal schedule policies under different combinations of contract makespan and resource limit are gained. The results show that the probability of timely delivery and robust criteria are two mutually conflictive performances under uncertain environments. Therefore, project deciders can choose a proper schedule policy according to their attitudes towards risks and judgments on the extent of uncertainty. Moreover, the model can provide deciders with the set of Pareto optimal schedule policies when they execute projects.
Continue Reading
Beamforming is a signal processing technique with numerous benefits in wireless communication. Unlike traditional omnidirectional communication, it focuses the energy of the transmitted and/or the received signal in a particular…
This paper proposes a distributed peer-to-peer data lookup technique on DHTs in order to serve range queries over multiple attributes. The scheme, MARQUES, uses space filling curves to map multi-attribute…
The use of emotions has recently been considered to improve the indexing of video contents and two different approaches are usually followed: computation of objective emotions through low-level video features…
Smartphones are programmable and equipped with a set of cheap but powerful embedded sensors, such as accelerometer, digital compass, gyroscope, GPS, microphone, and camera. These sensors can collectively monitor a…
Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of Side Channel Attack (SCA) which…
We consider the connectedness in the game of Go. This game has a graph theoretical structure and the connectedness of the stones is very important to evaluate positions. In this…
In this paper, the method of fault detection and isolation for microreactor units actuated by Peltier devices is proposed. Modeling and operator-based right coprime factorization of the nonlinear microreactor process…
To assist drivers and prevent collisions, we propose a system called OmniView that extends driver's vision in all directions, using cameras of multiple collaborating smartphones in the surrounding vehicles. OmniView…
In this paper, we describe a web-based service that visualizes sensing data in an urban public space. The sensing data obtained from multiple sensor devices are visualized with three-dimensional graphical…