Short Communication
Problem F2∥Cmax with forbidden jobs in the first or last position is easy

https://doi.org/10.1016/j.ejor.2006.01.018Get rights and content

Abstract

Saadani et al. [N.E.H. Saadani, P. Baptiste, M. Moalla, The simple F2∥Cmax with forbidden tasks in first or last position: A problem more complex that it seems, European Journal of Operational Research 161 (2005) 21–31] studied the classical n-job flow shop scheduling problem F2∥Cmax with an additional constraint that some jobs cannot be placed in the first or last position. There exists an optimal job sequence for this problem, in which at most one job in the first or last position is deferred from its position in Johnson’s [S.M. Johnson, Optimal two- and three-stage production schedules with setup times included, Naval Research Logistics Quarterly 1 (1954) 61–68] permutation. The problem was solved in O(n2) time by enumerating all candidate job sequences. We suggest a simple O(n) algorithm for this problem provided that Johnson’s permutation is given. Since Johnson’s permutation can be obtained in O(n log n) time, the problem in Saadani et al. (2005) can be solved in O(n log n) time as well.

Section snippets

Acknowledgement

This research was supported in part by INTAS under grant number 03-51-5501.

References (3)

  • S.M. Johnson

    Optimal two- and three-stage production schedules with setup times included

    Naval Research Logistics Quarterly

    (1954)
There are more references available in the full text version of this article.

Cited by (1)

  • No-idle parallel-machine scheduling of unit-time jobs with a small number of distinct release dates and deadlines

    2021, Computers and Operations Research
    Citation Excerpt :

    An essential loss of profit or efficiency can happen in workforce timetabling if the idle times between successive working periods are useless for the business and for the workers. The bibliography of the scheduling research considering no-idling machines include Kovalyov and Shafransky (1998), Narain and Bagga (2005), El Houda Saadani et al. (2005), Kalczynski and Kamburowski (2007), Kovalyov and Werner (2007), Valente and Alves (2008), Chrétienne (2008, 2014, 2016), Carlier et al. (2010), Jouglet (2012), Quilliot et al. (2013), Kacem and Kellerer (2014), Yazdania and Naderi (2017), Pempera (2017), Wang et al. (2018), Cheng et al. (2019), Nagano et al. (2019), Shao et al. (2018), Billaut et al. (2019), and Antoniadis et al. (2019). Preliminary results of this study are presented at the conference CoDIT’2019 (Brauner et al., 2019).

View full text