Flow-between matrix layout problem, Computer Engineering

Assignment Help:

Solve the problem in page 346 of the paper on cell formation by Boctor using the MIP method.  Use 4 cells and no more than 3 machines per cell.

Solve the problem using the MIP method and report the flow-distance score of the layout.  There are no building restrictions.  Assume the following dimensions for the departments.

Dept

Area (squares)

X-Dimension

Y-Dimension

A

24

4

6

B

16

4

4

C

36

9

4

D

24

6

4

Solve problem 9 again and report the flow-distance score of the layout, now assuming that the X- and Y- dimensions of department C are interchangeable, as necessary.

You are given the following flow-between matrix for a six department layout problem:

Dept

A

B

C

D

E

F

A

--

0

8

0

4

0

B

 

--

0

5

0

2

C

 

 

--

0

1

0

D

 

 

 

--

6

0

E

 

 

 

 

--

4

F

 

 

 

 

 

--

Solve the problem using the MIP method.  Assume that departments A and F have to be 2 x 2.  Departments C and D could either be 2 x 3 or 3 x 2.  Departments B and E may be 2 x 4 or 4 x 2.  Draw the optimal layout and find the resulting flow-distance score.


Related Discussions:- Flow-between matrix layout problem

What is system-software, What is System-software? System-software is co...

What is System-software? System-software is collection of system programs which perform a variety of functions, name are: file editing, IO management, recourse accounting and s

Define atomic directive in fortan, Q. Define Atomic Directive in FORTAN? ...

Q. Define Atomic Directive in FORTAN? Atomic directive guarantees a specific storage location is updated atomically rather than exposing it to odds of multiple simultaneous wri

Types of security features employed in client server network, What are the ...

What are the types of security features employed in client server kinds of network? Security features employed in Client-Server types of network are as illustrated below: a)

Write a program to input an address, Write a program to input an address i....

Write a program to input an address i.e. 20 Hex and read the byte (char) contents of that address   Answer   include void main() { char prompt; Date: 26th August 2012

Implementation and testing, In this stage of the project you are required t...

In this stage of the project you are required to create a Design document, the Design document must contain the following:  Structure chart Pseudo-code Data Dictionary

Implementing protection with virtual memory, Implementing Protection with V...

Implementing Protection with Virtual Memory - computer architecture: To enable the operating system to implement protection in the VM system, the HW have to: I. Support at

Dbms, write er diagram for company database

write er diagram for company database

Explain the edge-triggered j-k flip-flop, Explain the Edge-triggered J-K fl...

Explain the Edge-triggered J-K flip-flop? The J-K flip-flop works extremely similar to S-R flip-flop. The merely difference is that this flip-flop has NO invalid state.

Which term is associated with snmp, Which term is associated with SNMP? ...

Which term is associated with SNMP? MIB is related with SNMP.

Implementing new technologies, There is a free internet access to all their...

There is a free internet access to all their customers they also ensure 24 hours security and for the post of chief information officer when the candidate has come for an interview

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd