OPERATIONS RESEARCH >INTERNATIONAL EDITI
OPERATIONS RESEARCH >INTERNATIONAL EDITI
4th Edition
ISBN: 9780534423629
Author: WINSTON
Publisher: CENGAGE L
Question
Book Icon
Chapter 5.2, Problem 8P

(a)

Program Plan Intro

  • Let us consider on the following Linear programming;
  • max z=9x1+8x2+5x3+4x4
  • Such that
    • x1+x4≤200
    • x2+x3≤150
    • x1+x2+x3≤350
    • 2x1+x2+x3+x4≤550
    • x1,x2,x3,x4≥0
  • The LINDO output for this Linear Programming is given below:
  • Max 9x1+8x2+5x3+4x4
  • Subject to constraints:
    • x1+x4≤200
    • x2+x3≤150
    • x1+x2+x3≤350
    • 2x1+x2+x3+x4≤550
  • End
  • LP optimum found at step 4
  • Objective function value: 3000.000
VariableValueReduced Cost
x1200.0000000.000000
x2150.0000000.000000
x30.0000003.000000
x40.0000000.000000
  • Number of iterations=4
  • Ranges in which the basis is unchanged:
VariableCurrent CoefficientObj Coefficient ranges allowable increaseAllowance Decrease
x19.0000007.0000001.000000
x28.000000Infinity3.000000
x35.0000003.000000Infinity
x44.0000000.500000Infinity
RowCurrent RHSRighthand side ranges allowable increaseAllowance decrease
2200.000000Infinity0.000000
3150.0000000.0000000.000000
4350.000000Infinity0.000000
5550.0000000.000000400.000000

(b)

Explanation of Solution

  • Here, three oddities that may occur when the optimal solution found by LINDO is degenerate.
  • Oddity 1: In the ranges in which the basis is unchanged, at least one constraint will have a 0. Allowable increase or Allowable decrease.
  • This means that for at least one constraint, the dual price can tell us about the new z-value for either an increase or decrease in the right-hand side, but not both.
  • To understand Oddity 1, consider the second constraint. Its allowable increase is 0.
  • This means that the second constraint’s dual price of 3 cannot be used to determine a new z-value resulting from any increase in the first constraint’s right-hand side.
  • Oddity 2: For a non-basic variable to become positive, its objective function coefficient may have to be improved by more than it reduced cost...

Blurred answer
Students have asked these similar questions
Information Security Risk and Vulnerability Assessment 1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset?         Please do not use AI and add refrence
Find the voltage V0 across the 4K resistor using the mesh method or nodal analysis. Note: I have already simulated it and the value it should give is -1.714V
Resolver por superposicion
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Operations Research : Applications and Algorithms
Computer Science
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Brooks Cole
Text book image
C++ for Engineers and Scientists
Computer Science
ISBN:9781133187844
Author:Bronson, Gary J.
Publisher:Course Technology Ptr
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage