Student Suite Cd-rom For Winston's Operations Research: Applications And Algorithms
Student Suite Cd-rom For Winston's Operations Research: Applications And Algorithms
4th Edition
ISBN: 9780534423551
Author: Wayne L. Winston
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 4.16, Problem 11P

Explanation of Solution

Using preemptive goal programming to achieve the goal:

Consider the case of building recreational facilities at Gotham city. Goal course, Swimming pool, Gymnasiums and Tennis Courts are the recreational facilities under consideration. The facilities can be built at any of the 6 locations.

Lets,

xij={1  If facility, i is built in location j2  otherwise

Since, Golf course can only be built at site 1 or 6, so

x11+x16=1

Since each facility can be built at only one site, add the following constraints.

x22+x23+x24=1x32+x33+x34=1x42+x43+x44=1x52+x53+x54=1

The land available at site 2,3,4,5 is 70,80,95, and 120 respectively. Land required, building annual maintenance cost is tabulated below,

SiteConstruction costMaintenance costLand required
Golf34080Not relevant
Swimming3003629
Gymnasium8405038
Tennis curt851745
Site123456
Golf31NANANANA27
SwimmingNA25213232NA
GymnasiumNA37292838NA
Tennis courtNA20232220NA

a.

Priority set are given below,

Priority 1: Limit land use at each site to the land available. Thus the following constraints are added.

29x22+38x32+45x427029x23+38x33+45x438029x24+38x34+45x449529x25+38x35+45x45120

Priority 2: Construction costs should not exceed $1.2 million. Thus the following constraints are added.

340x11+340x16+300x22+300x23+300x24+300x25840x32+840x33+840x44+840x3585x42+85x43+85x44+85x451200

Priority 3: User days should exceed 200,000. Thus the following constraints are added.

31x11+27x16+25x22+21x23+32x24+32x2537x32+29x33+28x44+38x3520x42+23x43+22x44+20x45200

Priority 4: Annual maintenance cost should not exceed $200,000. Thus the following constraints are added.

80x11+80x16+36x22+36x23+36x24+36x2550x32+50x33+50x3517x42+17x43+17x44+17x45200

From the above equations it is found that these set of constraints there is no feasible region. That is all constraints cannot be met. So assign a cost value incurred if any of the priorities or goal is not met.

So, introduce the following deviational variables.

Si= Amount by which numerically under the ith goal

Si+= Amount by which numerically exceed the ith goal

Therefore, the constraints become,

29x22+38x32+45x42+S1+S1=7029x23+38x33+45x43+S2+S2=8029x24+38x34+45x44+S3+S3=9529x25+38x35+45x45+S4+S4=120

340x11+340x16+300x22+300x23+300x24+300x25840x32+840x33+840x44+840x3585x42+85x43+85x44+85x45+S5+S5=1200

31x11+27x16+25x22+21x23+32x24+32x2537x32+29x33+28x44+38x3520x42+23x43+22x44+20x45+S6+S6=200

80x11+80x16+36x22+36x23+36x24+36x2550x32+50x33+50x3517x42+17x43+17x44+17x45+S7+S7=200

Now, the goal is to minimize the deviation from each goal. Hence if the left side of constraint was less than right hand side than Si is included in minimization equation. If left hand side is more than right hand side, then Si+ is included in minimizations equation.

Hence the minimization equation is,

Minimize, z=P1S1+P1S2+P1S3+P1S4+P2S5+P3S6++P4S7

For each Priority assign a value of P1=4,P2=3,P3=2,P1=1 for priority 1,2,3,4 respectively

Blurred answer
Students have asked these similar questions
The next problem concerns the following C code: /copy input string x to buf */ void foo (char *x) { char buf [8]; strcpy((char *) buf, x); } void callfoo() { } foo("ZYXWVUTSRQPONMLKJIHGFEDCBA"); Here is the corresponding machine code on a Linux/x86 machine: 0000000000400530 : 400530: 48 83 ec 18 sub $0x18,%rsp 400534: 48 89 fe mov %rdi, %rsi 400537: 48 89 e7 mov %rsp,%rdi 40053a: e8 di fe ff ff callq 400410 40053f: 48 83 c4 18 add $0x18,%rsp 400543: c3 retq 400544: 0000000000400544 : 48 83 ec 08 sub $0x8,%rsp 400548: bf 00 06 40 00 mov $0x400600,%edi 40054d: e8 de ff ff ff callq 400530 400552: 48 83 c4 08 add $0x8,%rsp 400556: c3 This problem tests your understanding of the program stack. Here are some notes to help you work the problem: ⚫ strcpy(char *dst, char *src) copies the string at address src (including the terminating '\0' character) to address dst. It does not check the size of the destination buffer. • You will need to know the hex values of the following characters:
1234 3. Which line prevents compiler optimization? Circle one: 1234 Suggested solution: Store strlen(str) in a variable before the if statement. ⚫ Remove the if statement. Replace index 0 && index < strlen(str)) { 5 } } = str [index] = val;
Character Hex value | Character Hex value Character Hex value 'A' 0x41 'J' Ox4a 'S' 0x53 'B' 0x42 'K' 0x4b "T" 0x54 0x43 'L' Ox4c 'U' 0x55 0x44 'M' 0x4d 'V' 0x56 0x45 'N' Ox4e 'W' 0x57 0x46 '0' Ox4f 'X' 0x58 0x47 'P' 0x50 'Y' 0x59 0x48 'Q' 0x51 'Z' Ox5a 'T' 0x49 'R' 0x52 '\0' 0x00 Now consider what happens on a Linux/x86 machine when callfoo calls foo with the input string "ZYXWVUTSRQPONMLKJIHGFEDCBA". A. On the left draw the state of the stack just before the execution of the instruction at address Ox40053a; make sure to show the frames for callfoo and foo and the exact return address, in Hex at the bottom of the callfoo frame. Then, on the right, draw the state of the stack just after the instruction got executed; make sure to show where the string "ZYXWVUTSRQPONMLKJIHGFEDCBA" is placed and what part, if any, of the above return address has been overwritten. B. Immediately after the ret instruction at address 0x400543 executes, what is the value of the program counter register %rip?…

Chapter 4 Solutions

Student Suite Cd-rom For Winston's Operations Research: Applications And Algorithms

Ch. 4.5 - Prob. 1PCh. 4.5 - Prob. 2PCh. 4.5 - Prob. 3PCh. 4.5 - Prob. 4PCh. 4.5 - Prob. 5PCh. 4.5 - Prob. 6PCh. 4.5 - Prob. 7PCh. 4.6 - Prob. 1PCh. 4.6 - Prob. 2PCh. 4.6 - Prob. 3PCh. 4.6 - Prob. 4PCh. 4.7 - Prob. 1PCh. 4.7 - Prob. 2PCh. 4.7 - Prob. 3PCh. 4.7 - Prob. 4PCh. 4.7 - Prob. 5PCh. 4.7 - Prob. 6PCh. 4.7 - Prob. 7PCh. 4.7 - Prob. 8PCh. 4.7 - Prob. 9PCh. 4.8 - Prob. 1PCh. 4.8 - Prob. 2PCh. 4.8 - Prob. 3PCh. 4.8 - Prob. 4PCh. 4.8 - Prob. 5PCh. 4.8 - Prob. 6PCh. 4.10 - Prob. 1PCh. 4.10 - Prob. 2PCh. 4.10 - Prob. 3PCh. 4.10 - Prob. 4PCh. 4.10 - Prob. 5PCh. 4.11 - Prob. 1PCh. 4.11 - Prob. 2PCh. 4.11 - Prob. 3PCh. 4.11 - Prob. 4PCh. 4.11 - Prob. 5PCh. 4.11 - Prob. 6PCh. 4.12 - Prob. 1PCh. 4.12 - Prob. 2PCh. 4.12 - Prob. 3PCh. 4.12 - Prob. 4PCh. 4.12 - Prob. 5PCh. 4.12 - Prob. 6PCh. 4.13 - Prob. 2PCh. 4.14 - Prob. 1PCh. 4.14 - Prob. 2PCh. 4.14 - Prob. 3PCh. 4.14 - Prob. 4PCh. 4.14 - Prob. 5PCh. 4.14 - Prob. 6PCh. 4.14 - Prob. 7PCh. 4.16 - Prob. 1PCh. 4.16 - Prob. 2PCh. 4.16 - Prob. 3PCh. 4.16 - Prob. 5PCh. 4.16 - Prob. 7PCh. 4.16 - Prob. 8PCh. 4.16 - Prob. 9PCh. 4.16 - Prob. 10PCh. 4.16 - Prob. 11PCh. 4.16 - Prob. 12PCh. 4.16 - Prob. 13PCh. 4.16 - Prob. 14PCh. 4.17 - Prob. 1PCh. 4.17 - Prob. 2PCh. 4.17 - Prob. 3PCh. 4.17 - Prob. 4PCh. 4.17 - Prob. 5PCh. 4.17 - Prob. 7PCh. 4.17 - Prob. 8PCh. 4 - Prob. 1RPCh. 4 - Prob. 2RPCh. 4 - Prob. 3RPCh. 4 - Prob. 4RPCh. 4 - Prob. 5RPCh. 4 - Prob. 6RPCh. 4 - Prob. 7RPCh. 4 - Prob. 8RPCh. 4 - Prob. 9RPCh. 4 - Prob. 10RPCh. 4 - Prob. 12RPCh. 4 - Prob. 13RPCh. 4 - Prob. 14RPCh. 4 - Prob. 16RPCh. 4 - Prob. 17RPCh. 4 - Prob. 18RPCh. 4 - Prob. 19RPCh. 4 - Prob. 20RPCh. 4 - Prob. 21RPCh. 4 - Prob. 22RPCh. 4 - Prob. 23RPCh. 4 - Prob. 24RPCh. 4 - Prob. 26RPCh. 4 - Prob. 27RPCh. 4 - Prob. 28RP
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr