Examlex
Project 5.1 ? Recruit Training
You are a military training analyst in charge of initial training for the XXX career field and must decide how to best train the new recruits to satisfy the requirements for skilled recruits.There are six different courses A,B,C,D,E,
F)used for training in the XXX career field and four different sequences of courses that can be taken to achieve the required skill level.These sequences are A-E,B,C-F,and A-D-F.The table below provides information on the six courses.
There are 100 recruits available for training and a demand for 100 skilled recruits.Assume all recruits pass each course and that you are trying to put students in classes in order to minimize the total cost of training.Assume non- integer solutions are acceptable.Further,assume each course will be held.
a.Draw a network flow diagram describing the problem.
b.Formulate the associated network flow linear program.
c.Implement a spreadsheet model and use Risk Solver Platform RSP)to obtain a solution to the problem.Use your model to answer the following questions.
What is the expected student load for each course? Should any course be expanded?
Should any course or sequence be considered for elimination?
Next,assume that not all students pass each course.In fact only 90% of the students pass courses A,E,and F and only 95% of the students pass courses B,C,and D.Each course is considered independent.The requirement for 100 skilled recruits remains.Your job is now to determine the number of recruits to place into the training program to obtain the 100 trained recruits while continuing to minimize the total cost of training.
d.Re-draw the network flow diagram describing the problem to accommodate the above changes.
e.Formulate the associated generalized network flow linear program.
Implement a spreadsheet model of this changed model and use Risk Solver Platform RSP)
f.to obtain a solution to the expanded problem.How many recruits are needed and what is the change in total training cost?
Information Resource
An information resource is any source of data and information that can be used for reference or analysis, ranging from databases and journals to informational websites.
Threat
Any potential cause of an unwanted event that may result in harm to a system or organization, encompassing a wide range of possibilities from natural disasters to cyber attacks.
Information Security Controls
Measures implemented to safeguard information by ensuring its confidentiality, integrity, and availability.
Identity Theft
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Q1: Two of the effects associated with decision
Q8: Suppose that the first goal in
Q11: The fundamental problem with intangibles<br>A) is not
Q19: The following linear programming problem has been
Q27: In a model Y=fx<sub>1</sub>,x<sub>2</sub>),Y is called:<br>A)a dependent
Q29: Refer to Exhibit 8.2.What formula would you
Q30: Which of the following is not a
Q30: Which point or points are global optima
Q49: Two approaches to clustering discussed in the
Q61: A hospital needs to determine how