In recent years, with the advent of robust solvers such as Cplex and Gurobi, constraint programing (CP) has been widely applied to a variety of scheduling problems. This paper presents CP models for formulating four s...
详细信息
In recent years, with the advent of robust solvers such as Cplex and Gurobi, constraint programing (CP) has been widely applied to a variety of scheduling problems. This paper presents CP models for formulating four scheduling problems with minimal makespan and complex constraints: the no-wait hybrid flow shop scheduling problem, the hybrid flow shop scheduling problem with sequence-dependent setup times, the flexible job shop scheduling problem with worker flexibility and the semiconductor final testing problem. The advantages of CP method in solving these four complex scheduling problems are explored. Finally, a set of benchmark instances are adopted to demonstrate the effectiveness and efficiency of the CP method. Experiment results show that the proposed CP models outperform existing algorithms;in particular, several best-known solutions of benchmark instances are improved by our CP method.
Reducing large electricity consumption is a primary concern for researchers and practitioners in smart buildings. Peak electricity demand is the result of temporarily correlated energy demand surges caused by uncoordi...
详细信息
ISBN:
(纸本)9781479951451
Reducing large electricity consumption is a primary concern for researchers and practitioners in smart buildings. Peak electricity demand is the result of temporarily correlated energy demand surges caused by uncoordinated operation of subsystems such as air-conditioning, heating, ventilating and so on. It might cause severe issues such as service disruption and high cost of energy production and distribution. Many buildings applied various energy saving policies with building automation system to control the behaviors of smart devices to save energy. In this paper, we propose a framework for peak electricity demand control based on constraint programing technology in smart building.
Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, for example, automotive, aerospace or industrial automation. However, many of these systems ...
详细信息
Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, for example, automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN-based distributed architecture, a set of applications with tasks and messages as well as a set of security and redundancy requirements, the authors are interested to synthesise a system configuration such that the real-time, safety and security requirements are upheld. The Timed Efficient Stream Loss-Tolerant Authentication (TESLA) low-resource multicast authentication protocol is used to guarantee the security requirements and redundant disjunct message routes to tolerate link failures. The authors consider that tasks are dispatched using a static cyclic schedule table and that the messages use the time-sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. A constraint programing-based formulation, which can be used to find an optimal solution with respect to the cost function, is proposed. Additionally, a Simulated Annealing-based metaheuristic, which can find good solution for large test cases, is proposed. The authors evaluate both approaches on several test cases.
Feature terms are a generalization of first-order terms which have recently received increased attention for their usefulness in structured machine learning, natural language processing and other artificial intelligen...
详细信息
Feature terms are a generalization of first-order terms which have recently received increased attention for their usefulness in structured machine learning, natural language processing and other artificial intelligence applications. One of the main obstacles for their wide usage is that, when set-valued features are allowed, their basic operations (subsumption, unification, and antiunification) have a very high computational cost. We present a constraint Programming formulation of these operations, which in some cases provides orders of magnitude speed-ups with respect to the standard approaches. In addition, exploiting several symmetries that often appear in feature terms databases causes substantial additional savings. We provide experimental results of the benefits of this approach. (C) 2014 Elsevier B.V. All rights reserved.
due to the fact that proper dietary planning will maintain the healthiness of patients, plus a food consumption control is an important clinical treatment of certain diseases of medical healthcare. This paper is aimed...
详细信息
ISBN:
(纸本)9781467375511
due to the fact that proper dietary planning will maintain the healthiness of patients, plus a food consumption control is an important clinical treatment of certain diseases of medical healthcare. This paper is aimed at proposing a practical solution to generate an automated schedule for both the In-Patient Department (IPD) and Out-Patient department (OPD) for a hospital. The challenges of this problem is that food to be served is required to have the right amount of nutrients for patients, also some food should not be consumed by patients who have certain diseases. Manual dietary planning is tedious, time-consuming, and requiring experience and knowledge of dietitians. This paper tackles the problem by proposing an information system implemented by an application of database and constraint Programming. The study has shown that the proposed solution has a potential to improve operations of the case study in Thailand. The developed prototype system can generate a monthly menu for several clinical treatment (i.e. diabetes, kidney diseases, and gout diseases) in a substantially quicker and sophisticate manner than human operated. An evaluation of user satisfaction suggest that the system is relatively satisfactory.
暂无评论