This document discusses flow shop scheduling, which involves sequencing jobs through a set of machines or processes where each job must visit the machines in the same order. It defines flow shop scheduling and provides examples of its applications in industries that require a strict production order. The document then describes two common methods for flow shop scheduling - preemptive and non-preemptive - and provides an example to illustrate the difference. Finally, it discusses algorithms for solving flow shop scheduling problems, focusing on Johnson's algorithm, which provides an optimal solution for problems with two machines.
Introduction to Dynamic Programming, Principle of OptimalityBhavin Darji
Introduction
Dynamic Programming
How Dynamic Programming reduces computation
Steps in Dynamic Programming
Dynamic Programming Properties
Principle of Optimality
Problem solving using Dynamic Programming
Introduction to Dynamic Programming, Principle of OptimalityBhavin Darji
Introduction
Dynamic Programming
How Dynamic Programming reduces computation
Steps in Dynamic Programming
Dynamic Programming Properties
Principle of Optimality
Problem solving using Dynamic Programming
Deadlocks-An Unconditional Waiting Situation in Operating System. We must make sure of This concept well before understanding deep in to Operating System. This PPT will understands you to get how the deadlocks Occur and how can we Detect, avoid and Prevent the deadlocks in Operating Systems.
The solution to the single-source shortest-path tree problem in graph theory. This slide was prepared for Design and Analysis of Algorithm Lab for B.Tech CSE 2nd Year 4th Semester.
with today's advanced technology like photoshop, paint etc. we need to understand some basic concepts like how they are cropping the image , tilt the image etc.
In our presentation you will find basic introduction of 2D transformation.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
Deadlocks-An Unconditional Waiting Situation in Operating System. We must make sure of This concept well before understanding deep in to Operating System. This PPT will understands you to get how the deadlocks Occur and how can we Detect, avoid and Prevent the deadlocks in Operating Systems.
The solution to the single-source shortest-path tree problem in graph theory. This slide was prepared for Design and Analysis of Algorithm Lab for B.Tech CSE 2nd Year 4th Semester.
with today's advanced technology like photoshop, paint etc. we need to understand some basic concepts like how they are cropping the image , tilt the image etc.
In our presentation you will find basic introduction of 2D transformation.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
flow shop sequencing, job shop sequencing,
Types of sequencing problems
Case 1: Processing of ‘n’ jobs through one machine
Case 2: Processing of n jobs and two machines A and B, all jobs processed in the order AB.
Case 3: Processing of n jobs and three machines A, B and C all jobs processed in the order ABC
Case 4: Processing of n jobs and m machines.
Case 5: Processing of 2 jobs m machine
A case study on Machine scheduling and sequencing using Meta heuristicsIJERA Editor
Modern manufacturing systems are constantly increasing in complexity and become more agile in nature such
system has become more crucial to check feasibility of machine scheduling and sequencing because effective
scheduling and sequencing can yield increase in productivity due to maximum utilization of available resources
but when number of machine increases traditional scheduling methods e.g. Johnson‟s ,rule is becomes in
effective Due to the limitations involved in exhaustive enumeration, for such problems meta-heuristics has
become greater choice for solving NP hard problems because of their multi solution and strong neighbourhood
search capability in a reasonable time.
A case study on Machine scheduling and sequencing using Meta heuristicsIJERA Editor
Modern manufacturing systems are constantly increasing in complexity and become more agile in nature such
system has become more crucial to check feasibility of machine scheduling and sequencing because effective
scheduling and sequencing can yield increase in productivity due to maximum utilization of available resources
but when number of machine increases traditional scheduling methods e.g. Johnson‟s ,rule is becomes in
effective Due to the limitations involved in exhaustive enumeration, for such problems meta-heuristics has
become greater choice for solving NP hard problems because of their multi solution and strong neighbourhood
search capability in a reasonable time.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
4. Definition
• Flow shop scheduling problems, are a class
of scheduling problems with a workshop in which the
flow control shall enable an appropriate sequencing for
each job and for processing on a set of machines or with
other resources 1,2,...,m in compliance with given
processing orders.
• For an operating system – we have many task to be done.
Especially the maintaining of a continuous flow of
processing tasks is desired with a minimum of idle
time and a minimum of waiting time.
4
6. Example
Practical application :
As we have seen strict order of all operations to be
performed on all jobs. Flow shop scheduling may apply as
well to production facilities as to computing designs.
• It is used in processing industry where a strict order of
production should be done
• In can be used in construction work.
• In medical observation
In space technology, agricultural processing basically in
every (multiprograming + strict order job).
6
7. Application
It works in following case in steps :
i. we should have multiprogramming environment
ii. input and then executed
iii. Job queued for O/P
iv. O/P printed/used
• Suppose there are 1 to n job and there are m processor and we
have some more information like for task T3i for processor 3.
And it takes tj time.
Note - m >= n
• No more then 1 task for any processor at a time.
• N jobs requiring m tasks and each to be scheduled in m
processor. 7
8. Application
So in diagram view situation is like this.
Assume we have 4 jobs and each jobs can have 5 tasks.
Jobs J1 J2 J3 J4
Tasks
t1
t2
t3
t4
t5
3
1
4
2
2
2
0
3
2
2
0
1
4
2
1
1
1
3
2
1
8
9. Usefuldata:
The finish time of fi(S) of job i is the time at
which all task of job i has been completed in
schedule S.
• The finish time F(S) of a schedule S is :
F(S) = max {fi(S)}
• The mean flow time MFT(S) is :
MFT(S) = (1/n). ∑ fi(S)
We try to get optimal finish time i.e. minimal
finish time. 9
11. Above scheduling problem is done by two method
Two possible solution : i) pre-emptive
ii) non preemptive.
11
12. i) pre-emptive Job
In it we do permits preemption (halting) of
tasks, from a cooperative multitasking system
wherein processes/tasks must be explicitly
programmed to yield when they do not need
system resources.
Rules :
a) tji cannot start unit tj-1,i finishes.
b) Task ti of any job will go to processor i only.
12
14. Example
First task T1 is coming from two jobs we have.
t11 = 2 and t12 = 0
Both will be processed sequentially ;
all task-1 will complete in 2 sec.
14
15. Example
Now Task-2 comes ;
T21 = 3 and T22 = 3
Task-2 of Job-1 cannot start as it’s first Task-1 needed to
be completed. So Task-2 of Job-2 starts.
15
16. Example
Now Task-3 comes ;
T31 = 5 and T32 = 2
Task-3 of Job-1 cannot start as it’s first Task-2 needed
to be completed.
So is Task-3 of Job-2 which require Task-2 to complete.
16
17. Example
Finish time = Max (F1 , F2) = max (5,11) = 11
5 and 11 are finish time of respective jobs.
Mean flow time = ½ .(5+11) = 8
17
18. Example
ii) pre-emptive Job
Preemptive Scheduling is a CPU scheduling technique
that works by dividing time slots of CPU to a given
process.
When the burst time of the process is greater than CPU
cycle, it is placed back into the ready queue and will
execute in the next chance. This scheduling is used when
the process switch to ready state.
Rules :
a) tji cannot start unit tj-1,i finishes.
b) Task ti of any job will go to processor i only.
18
20. Example
First task T1 is coming from two jobs we have.
t11 = 2 and t12 = 0,
It donot have any conflict job in machine. So execute
normally.
20
21. Example
Task T2 comes.
t21 = 3 and t22 = 3,
• t21 , t22 comes. As t11 not complete. So t21 goes into
queue. And t22 starts.
• After t22 finishes t21 again complete it’s remaining cycle.
21
22. Example
Task-3 comes.
t31 = 5 and t32 = 2,
• t31 , t32 comes. As t21 not complete. So t31 goes into
queue. Also same with t32 .
• t31 starts after 5 unit time. Then t32 completes.
22
23. Example
Finish time = Max (F1 , F2) = max (10,12) = 12
10 and 12 are finish time of respective jobs.
Mean flow time = ½ .(10+12) = 11
23
25. Algorithms
• The machine sequence of all jobs is the same. The
problem is to find the job sequences on the machines
which minimize the makespan , i.e. the maximum of the
completion times of all tasks.
• It is similar to 2-machine problem with 2 machines to
solve different burst jobs. It is well known that in case of
real time situations - the problem is NP-hard.
• There are some optimized algorithms which uses
Dynamic algorithm, Branch and Bound and Heuristic
algorithm such as genetic algorithm.
25
26. Algorithms
Popular algorithms are :
• Johnson algorithm – nlogn
• GS algorithm (Gonzalez and sahni)
• Genetic algorithm
n.Logn is most optimized solution for finite no. of tasks.
We will see Johnson algorithm.
26
27. Algorithms
Johnson's Algorithm for 2 machine
Step 1 : Form set1 containing all the jobs with p1j < p2j -- (nlogn)
Step 2 : Form set2 containing all the jobs with p1j > p2j, the jobs with
p1j=p2j may be put in either set. -- (n)
Step 3 :
Form the sequence as follows:
(i) The job in set1 go first in the sequence and they go in increasing
order of p1j(SPT) – shortest process time -- O.(c)
(ii) The jobs in set2 follow in decreasing order of p2j (LPT). Ties are
broken arbitrarily. – longest process time -- O.(c) 27
28. Example
Let’s try Johnson's algorithm in our example :
We remember it had took us 11 unit for non-preemptive
and 12 unit for pre-emptive scheduling using naive
process.
Our job sequence was :
28
J1 J2
29. Example
t1 t2 t3
J1 2 3 5
J2 0 3 2
step 1 – find least among all
• 0 is ans.
• cut that column and put in array from left or right
according to job1 or job2.
• 0 task is of J2. So choose from right
29
J1 J2
30. Example
t2 t3 (task-1 removed)
J1 3 5
J2 3 2
step 1 – find least among all now
• 2 is ans.
• cut that column and put in array from left or right
according to job1 or job2.
• 0 task is of J2. So choose from right
30
J1 J2
31. Example
t2 (task-3 removed)
J1 3
J2 3
step 1 – find least among all now
• 3 is ans.
• cut that column and put in array from left or right
according to job1 or job2.
• 0 task is of J2. So choose from right
31
J1 J2
32. Example
Above is job sequence for algorithm
Now make table including 2 machines
So, 10 is execution time of give sequence of task using
johnson algorithm which is better from earlier.
32
J1 J2
34. Conclusion
• We got to know about popular scheduling algorithm of
tasks in multiprogramming environment.
• A lot of work is being done in GS and genetic algorithm.
Also it is tried with many other field then scheduling.
34