
Concept explainers
Explanation of Solution
Consider the LP problem of HAL computer considering the projects that should be started. Data related to each of the project tabulated.
Consider the following variables x1,x2,........,x7,
xi={1 If project i is undertaken0 otherwise
HAL has the following goals
Goal 1:
The total NPV of all chosen should be at least $200 million. Thus the constraint becomes,
40x1+30x2+60x3+45x4+55x5+40x6+90x7≥200
Goal 2:
The average probability of success for all projects chosen should be at least 0.75. Thus the constraint becomes,
0.75x1+0.70x2+0.75x3+0.90x4+0.65x5+0.60x6+0.65x7≥0.75
Goal 3:
The average growth rate of all projects chosen should be at least 15%. Thus the constraint becomes,
20x1+16x2+12x3+8x4+18x5+18x6+19x7≥15
Goal 4:
The total cost of all chosen project should be at most $1billion. Thus the constraint becomes,
220x1+140x2+280x3+240x4+300x5+200x6+440x7≤1000
Hence the LP is formulated as given below
Minimize, 0x1+0x2+0x3+0x4+0x5+0x6+0x7
Subjected to the constraints,
40x1+30x2+60x3+45x4+55x5+40x6+90x7≥2000.75x1+0.70x2+0.75x3+0.90x4+0.65x5+0.60x6+0.65x7≥0.7520x1+16x2+12x3+8x4+18x5+18x6+19x7≥15220x1+140x2+280x3+240x4+300x5+200x6+440x7≤1000
xi=0 or 1
From the above equations it is found that these set of constraints there is no feasible region. That is all constraints cannot be met. So assign a cost value incurred if any of the priorities or goal is not met. So, introduce the following deviational variables.
Si−= Amount by which numerically under the ith goal
Si+= Amount by which numerically exceed the ith goal
Hence the constraints become,
40x1+30x2+60x3+45x4+55x5+40x6+90x7+S1+−S1−=2000.75x1+0.70x2+0.75x3+0.90x4+0.65x5+0.60x6+0.65x7+S2+−S2−=0.7520x1+16x2+12x3+8x4+18x5+18x6+19x7+S3+−S3−=15220x1+140x2+280x3+240x4+300x5+200x6+440x7+S4+−S4−=1000
Giving lowest priority to goal 4 and highest priority to goal 1, assign weight to each goal
P1>>P2>>P3>>P4
Now, the goal is to minimize the deviation from each goal
Trending nowThis is a popular solution!

Chapter 4 Solutions
Operations Research : Applications and Algorithms
- In javaarrow_forwardKeanPerson #keanld:int #keanEmail:String #firstName:String #lastName: String KeanAlumni -yearOfGraduation: int - employmentStatus: String + KeanPerson() + KeanPerson(keanld: int, keanEmail: String, firstName: String, lastName: String) + getKeanld(): int + getKeanEmail(): String +getFirstName(): String + getLastName(): String + setFirstName(firstName: String): void + setLastName(lastName: String): void +toString(): String +getParkingRate(): double + KeanAlumni() + KeanAlumni(keanld: int, keanEmail: String, firstName: String, lastName: String, yearOfGraduation: int, employmentStatus: String) +getYearOfGraduation(): int + setYearOfGraduation(yearOfGraduation: int): void +toString(): String +getParkingRate(): double In this question, write Java code to Create and Test the superclass: Abstract KeanPerson and a subclass of the KeanPerson: KeanAlumni. Task 1: Implement Abstract Class KeanPerson using UML (10 points) • Four data fields • Two constructors (1 default and 1 constructor with all…arrow_forwardPlz correct answer by best experts...??arrow_forward
- Q3) using the following image matrix a- b- 12345 6 7 8 9 10 11 12 13 14 15 1617181920 21 22 23 24 25 Using direct chaotic one dimension method to convert the plain text to stego text (hello ahmed)? Using direct chaotic two-dimension method to convert the plain text to stego text?arrow_forward: The Multithreaded Cook In this lab, we'll practice multithreading. Using Semaphores for synchronization, implement a multithreaded cook that performs the following recipe, with each task being contained in a single Thread: 1. Task 1: Cut onions. a. Waits for none. b. Signals Task 4 2. Task 2: Mince meat. a. Waits for none b. Signals Task 4 3. Task 3: Slice aubergines. a. Waits for none b. Signals Task 6 4. Task 4: Make sauce. a. Waits for Task 1, and 2 b. Signals Task 6 5. Task 5: Finished Bechamel. a. Waits for none b. Signals Task 7 6. Task 6: Layout the layers. a. Waits for Task 3, and 4 b. Signals Task 7 7. Task 7: Put Bechamel and Cheese. a. Waits for Task 5, and 6 b. Signals Task 9 8. Task 8: Turn on oven. a. Waits for none b. Signals Task 9 9. Task 9: Cook. a. Waits for Task 7, and 8 b. Signals none At the start of each task (once all Semaphores have been acquired), print out a string of the task you are starting, sleep for 2-11 seconds, then print out a string saying that you…arrow_forwardProgramming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4.…arrow_forward
- using r languagearrow_forwardProgramming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4.…arrow_forwardusing r languagearrow_forward
- Write a function to compute a Monte Carlo estimate of the Beta(3, 3) cdf, and use the function to estimate F(x) for x = 0.1,0.2,...,0.9. Compare the estimates with the values returned by the pbeta function in R.arrow_forwardWrite a function to compute a Monte Carlo estimate of the Gamma(r = 3, λ = 2) cdf, and use the function to estimate F(x) for x = 0.2, 0.4, . . . , 2.0. Compare the estimates with the values returned by the pgamma function in R.arrow_forwardusing r languagearrow_forward
- Operations Research : Applications and AlgorithmsComputer ScienceISBN:9780534380588Author:Wayne L. WinstonPublisher:Brooks ColeNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageC++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology Ptr
- C++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage LearningCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LA Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology Ptr



