Use of Fuzzy Logic Approaches in Scheduling of FMS: A Review
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 4
Abstract
Scheduling in an flexible manufacturing systems(FMS) environment is more complex and difficult than a conventional manufacturing environment. Therefore, determining an optimal schedule and controlling an FMS is considered a difficult task. To achieve high performance for an FMS, a good scheduling system should make a right decision at a right time according to system conditions. Fuzzy logic approaches easily deal with uncertain and incomplete information, and human experts knowledge can be easily coded into fuzzy rules. Due to these reasons, fuzzy logic approaches are very effective for scheduling of flexible manufacturing systems. This work presents a review on use of fuzzy logic approaches in scheduling of flexible manufacturing systems.
Authors and Affiliations
Hamesh babu Nanvala
Facets of Software Component Repository
The software repository is used for storing, managing, and retrieving large numbers of software components. Repositories should be designed to meet the growing and changing needs of the software development organizations...
IP Address Blocking System
Hosting a site on the Internet makes it available everywhere. There are certain sites that are just meant for local use like local shopping marts that do not provide products for purchase in other countries. Also, there...
MRI Brain Image Segmentation Algorithm Using Watershed Transform and Kernel Fuzzy C-Means Clustering on Level Set Method
A new method for image segmentation is proposed in this paper, which combines the watershed transform, KFCM and level set method. The watershed transform is first used to presegment the image so as to get the initial par...
MOEMS Ring Resonators and Waveguides an Optical Approach
WDM networks use high speed MOEMS ring resonators. Due to the substrate loss the regular tuning of the rings is not possible, hence we need a specialized tuning element for the same. As the advantages increases so does t...
Performance Evaluation of Modified Signcryption Scheme
Before a message is sent out, the sender of the message would sign it using a digital signature scheme and then encrypt the message (and the signature) use a private key encryption algorithm under a randomly chosen messa...