We present in this paper the Model Based System Synthesis (MBSS) approach for the design of complex systems that are correct by construction. Where the usual Model Based System Engineering (MBSE) approach offers forma...
详细信息
We present in this paper the Model Based System Synthesis (MBSS) approach for the design of complex systems that are correct by construction. Where the usual Model Based System Engineering (MBSE) approach offers formalisms and tools to represent a candidate system, to analyze it, to simulate it and even to optimize it, MBSS proposes to represent the global design problem using a problem representation language and then to solve it by using adapted synthesis tools producing one or several solutions necessarily satisfying the expressed requirements. The two approaches are therefore complementary; the MBSS being more adapted to the preliminary design and system integration stages. After presenting the different categories of problems encountered in system design (sizing, configuration, allocation, architecture generation), MBSS and MBSE will be positioned in relation to each other. The main concepts of MBSS will be detailed in order to understand the specific representation needs of the approach. The structural and behavioral notions related to the sub-definite systems will be explained as well as the links to be established with the functional and non-functional requirements. The approach is illustrated using the DEPS design problem specification language and the DEPS Studio modeling and solving tool on a system design case study. The DEPS language combines structural modeling features specific to object-oriented principles and ontology definition capabilities for engineers with problem specification features from constraint programming. DEPS Studio is an integrated modeling and solving environment designed to model and resolve system synthesis problems. It allows the engineer to edit, compile, debug and solve problems expressed in DEPS. It integrates a mixed constraint programming solver. The approach can be applied on physical systems, software intensive or mixed systems (embedded or cyber-physical).
Across the world, cardiovascular diseases (CVD) are among the leading causes of death. In Iran, it is estimated that about 46% of all the reported deaths is related to CVD. This article focuses on the patient scheduli...
详细信息
Across the world, cardiovascular diseases (CVD) are among the leading causes of death. In Iran, it is estimated that about 46% of all the reported deaths is related to CVD. This article focuses on the patient scheduling practices of a private cardiology clinic in Iran. Several complaints from the patients and staff members of the clinic are reviewed. The study shows that the patients in the clinic are classified into six major groups; the steps each group must undergo in the clinic as well as the time related to each operation is measured. A constraint programming model is developed to schedule the patients and rectify the complaints. Computational results based on 30 days of actual data from the clinic reveals that the proposed model manages to significantly improve the efficiency measures and is successful in resolving the causes of complaints. Furthermore, the developed constraint programming generates optimum solutions in a rather short amount of time.
String processing is ubiquitous across computer science, and arguably more so in web programming - where it is also a critical part of security issues such as injection attacks. In recent years, a number of string sol...
详细信息
String processing is ubiquitous across computer science, and arguably more so in web programming - where it is also a critical part of security issues such as injection attacks. In recent years, a number of string solvers have been developed to solve combinatorial problems involving string variables and constraints. We examine the dashed string approach to string constraint solving, which represents an unknown string as a sequence of blocks of characters with bounds on their cardinalities. The solving approach relies on propagation of information about the blocks of characters that arise from reasoning about the constraints in which they occur. This approach shows promising performance on many benchmarks involving constraints like string length, equality, concatenation, and regular expression membership. In this paper, we formally review the definition, the properties and the use of dashed strings for string constraint solving, and we provide an empirical validation that confirms the effectiveness of this approach. (C) 2020 Elsevier B.V. All rights reserved.
Given the growing importance of cold chains and the need to promote sustainable processes, energy efficiency in refrigerated transports is investigated at operational level. The Refrigerated Routing Problem is defined...
详细信息
Given the growing importance of cold chains and the need to promote sustainable processes, energy efficiency in refrigerated transports is investigated at operational level. The Refrigerated Routing Problem is defined, involving multi-drop deliveries of palletised unit loads of frozen food from a central depot to clients. The objective is to select the route with minimum fuel consumption for both traction and refrigeration. The problem formulation considers speed variation due to traffic congestion phenomena, as well as decreasing load on board along the route as successive clients are visited. Transmission load for exposure of the vehicle to outdoor temperatures and infiltration load at door opening are modelled, taking into account outdoor conditions varying along the day and the year. The resulting multi-period problem is modelled and solved by means of constraint programming. Test scenarios come from a real local network for frozen bread dough distributed to supermarkets. Results show how fuel minimisation leads to the selection of different routes in comparison to the traditional total travel distance or time objectives. Energy savings are affected by demand distribution among the clients, departure time, number of visits per tour, seasonality and location of the delivery network.
This paper addresses a variant of two-dimensional cutting problems in which rectangular small pieces are obtained by cutting a rectangular object through guillotine cuts. The characteristics of this variant are (i) th...
详细信息
This paper addresses a variant of two-dimensional cutting problems in which rectangular small pieces are obtained by cutting a rectangular object through guillotine cuts. The characteristics of this variant are (i) the object contains some defects, and the items cut must be defective-free;(ii) there is an upper bound on the number of times an item type may appear in the cutting pattern;(iii) the number of guillotine stages is not restricted. This problem commonly arises in industrial settings that deal with defective materials, e.g. either by intrinsic characteristics of the object as in the cutting of wooden boards with knotholes in the wood industry, or by the manufacturing process as in the production of flat glass in the glass industry. We propose a compact integer linear programming (ILP) model for this problem based on the discretisation of the defective object. As solution methods for the problem, we develop a Benders decomposition algorithm and a constraint-programming (CP) based algorithm. We evaluate these approaches through computational experiments, using benchmark instances from the literature. The results show that the methods are effective on different types of instances and can find optimal solutions even for instances with dimensions close to real-size.
Integrated process planning and scheduling (IPPS) problems are one of the most important flexible planning functions for a job shop manufacturing. In a manufacturing order to produce n jobs (parts) on m machines in a ...
详细信息
Integrated process planning and scheduling (IPPS) problems are one of the most important flexible planning functions for a job shop manufacturing. In a manufacturing order to produce n jobs (parts) on m machines in a flexible manufacturing environment, an IPPS system intends to generate the process plans for all n parts and the overall job-shop schedule concurrently, with the objective of optimizing a manufacturing objective such as make-span. The optimization of the process planning and scheduling will be applied through an integrated approach based on Fuzzy Inference System (FIS), to provide for flexibilities of the given components and consider the qualitative parameters. The FIS, constraint programming (CP) and Simulated Annealing (SA) algorithms are applied in this design. The objectives of the proposed model consist of maximization of processes utility, minimization of make-span and total production costs including costs of flexible tools, machines, process and TADs. The proposed approach indicates that The CP and SA algorithms are able to resolve the IPPS problem with multiple objective functions. The experiments and related results indicate that the CP method outperforms the SA algorithm.
Intelligent scheduling covers various tools and techniques for successfully and efficiently solving the scheduling problems. In this paper, we provide a survey of intelligent scheduling systems by categorizing them in...
详细信息
Intelligent scheduling covers various tools and techniques for successfully and efficiently solving the scheduling problems. In this paper, we provide a survey of intelligent scheduling systems by categorizing them into five major techniques containing fuzzy logic, expert systems, machine learning, stochastic local search optimization algorithms and constraint programming. We also review the application case studies of these techniques.
Attack trees are considered a useful tool for security modelling because they support qualitative as well as quantitative analysis. The quantitative approach is based on values associated to each node in the tree, exp...
详细信息
Attack trees are considered a useful tool for security modelling because they support qualitative as well as quantitative analysis. The quantitative approach is based on values associated to each node in the tree, expressing, for instance, the minimal cost or probability of an attack. Current quantitative methods for attack trees allow the analyst to, based on an initial assignment of values to the leaf nodes, derive the values of the higher nodes in the tree. In practice, however, it shows to be very difficult to obtain reliable values for all leaf nodes. The main reasons are that data is only available for some of the nodes, that data is available for intermediate nodes rather than for the leaf nodes, or even that the available data is inconsistent. We address these problems by developing a generalisation of the standard bottom-up calculation method in three ways. First, we allow initial attributions of non-leaf nodes. Second, we admit additional relations between attack steps beyond those provided by the underlying attack tree semantics. Third, we support the calculation of an approximative solution in case of inconsistencies. We illustrate our method, which is based on constraint programming, by a comprehensive case study. (C) 2019 Elsevier Ltd. All rights reserved.
We consider a spectrum of geometric optimization problems motivated by contexts such as satellite communication and astrophysics. In the problem Minimum Scan Cover with Angular Costs, we are given a graph G that is em...
详细信息
In this work, the operational production scheduling problem of a manufacturer in the automotive sector, producing injection molded parts, is presented. In order to meet all requirements, including alternative resource...
详细信息
In this work, the operational production scheduling problem of a manufacturer in the automotive sector, producing injection molded parts, is presented. In order to meet all requirements, including alternative resources, release dates, due dates and sequence dependent setup times, a schedule classification and a related integer programming formulation for this flexible job-shop scheduling real-world problem is presented. Since the combinatorial complexity of the problem does not allow an efficient optimization for the company partner, a constraint programming approach is proposed, solving the real-world case to optimality within a few seconds of runtime.
暂无评论