Job Block Scheduling with Dual Criteria and Sequence-Dependent Setup Time Involving Transportation Times

A two-machine flowshop scheduling with sequence-dependent setup time (SDST), job block, and transportation time is considered with the objective of minimizing makespan and the rental cost of machines taken on rent under a specified rental policy. The proc

  • PDF / 10,179,709 Bytes
  • 401 Pages / 439.37 x 666.142 pts Page_size
  • 100 Downloads / 253 Views

DOWNLOAD

REPORT


G. Sai Sundara Krishnan  R. Anitha R. S. Lekshmi  M. Senthil Kumar Anthony Bonato  Manuel Graña Editors

Computational Intelligence, Cyber Security and Computational Models 3

Proceedings of ICC , 2013

Advances in Intelligent Systems and Computing Volume 246

Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: [email protected]

For further volumes: http://www.springer.com/series/11156

About this Series The series ‘‘Advances in Intelligent Systems and Computing’’ contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing. The publications within ‘‘Advances in Intelligent Systems and Computing’’ are primarily textbooks and proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results.

Advisory Board Chairman Nikhil R. Pal, Indian Statistical Institute, Kolkata, India e-mail: [email protected] Members Emilio S. Corchado, University of Salamanca, Salamanca, Spain e-mail: [email protected] Hani Hagras, University of Essex, Colchester, UK e-mail: [email protected] László T. Kóczy, Széchenyi István University, Gy} or, Hungary e-mail: [email protected] Vladik Kreinovich, University of Texas at El Paso, El Paso, USA e-mail: [email protected] Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan e-mail: [email protected] Jie Lu, University of Technology, Sydney, Australia e-mail: [email protected] Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico e-mail: [email protected] Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil e-mail: [email protected] Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland e-mail: [email protected] Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong e-mail: [email protected]

G. Sai Sundara Krishnan R. Anitha R. S. Lekshmi M. Senthil Kumar Anthony Bonato Manuel Graña •





Editors

Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013

123

Editors G. Sai Sundara Krishnan R. Anitha R. S. Lekshmi M. Senthil Kumar Applied Mathematics and Computational Sciences PSG College of Technology Coimbatore, Tamil Nadu India

Manuel Graña School of Computing University of Basque Country Paseo Manuel De Lardizalbal 1 San Sebastian Spain

Anthony Bonato Department of Mathematics Ryerson University Toronto, ON Canada

ISSN 2194-5357 ISBN 978-81-322-1679-7 DOI 10.1007/978-81-322-1680-3

ISSN 2194-5365 (electronic) ISBN 978-81-322-1680-3 (eB