Dragonfly Network Diagram Analysis

2024-02-21 09:12

本文主要是介绍Dragonfly Network Diagram Analysis,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!


Page 1 of 2 Assignment 03--Dragonfly Network Diagram Analysis 
ENGINEERING 2125, Spring 2024
Engineering Management & Decision Making
Written Assignment Guidelines
“Dragonfly Network Diagram”
NOTE: Please submit general questions about this assignment to the Ed Discussion area on Canvas.
That will allow other students to see answers that we provide.
GENERAL INSTRUCTIONS
Access and read the Dragonfly case from the HBS coursepack.
Submit a .pdf report in which you respond to the writing prompts and the analysis prompts.
IMPORTANT NOTE: Use the duration and cost tables provided in this assignment, rather than those
provided in the case.
WRITING PROMPTS
The Dragonfly case follows an unmanned aerial vehicle (UAV) project. For each of the prompts, provide a
brief answer (2–3 sentences).
Writing Prompt 1: When the project being described in the case is completed, does it result in (a) a
new UAV design and prototype, or (b) a plan for a project to create a new UAV design and prototype?
Cite evidence from the case that supports your conclusion.
Writing Prompt 2: Would you say that Table 1 in the case represents an RBS or a WBS? Why?
Writing Prompt 3: With data in Table 1 and Table 4, compute the projected cost per day for each of the
activities. Which activity has the highest cost per day? Why do you think this task is particularly expensive
per day? (On the basis of the limited information provided, this may be somewhat of a guess!)
Writing Prompt 4: What information in the case suggests that this firm, IACo, is well positioned to carry
out this project?
Writing Prompt 5: What information in the case suggests that this firm is perhaps not especially
experienced in performing a project like this?
ANALYSIS PROMPTS
1) For the proposed project, draw a network diagram of the sort shown in Figure 7.15 of the Wysocki
textbook. Base your diagram on the “activities” shown in Table 1 and the “design structure matrix”
shown in Table 2 of the case. (See the “hint” below on how to interpret Table 2.)
Ignore the dependency shown between activity A9 and A4 that is shown in Table 2.
To draw the network diagram, you can use any method: hand sketch, graphics software, presentation
software, project software, etc.
2) Using the substitute duration data provided below for the “Expected Durations (days)” in Table 1,
calculate the total number of days required to complete the project. Provide the “task path”
through the network diagram that sets the total project duration (the “critical path”).
Page 2 of 2 Assignment 03--Dragonfly Network Diagram & Analysis (2024).docx
3) Using the substitute duration data provided below for the “Best case time estimates per activity” in
Table 3, calculate the best case total numbers of days to finish the project. Provide the “task
path” through the network diagram that sets the total project duration.
4) Using the substitute duration data provided below for the “Worst case time estimates per activity” in
Table 3, calculate the worst case total number of days, to finish the project. Provide the “task
path” through the network diagram that sets the total project duration.
5) Using the substitute cost data provided below, and the additional information provided in the
paragraph immediately following (top of page 5 of the case), compute the cost to complete the
project for the Base Case, Best Case, and Worst Case scenarios. You will provide a different
answer for each of the different scenarios.
HINT FOR INTERPRETING TABLE 2
Table 2 provides the “predecessor” information for
the activities described in Table 1. To determine the
predecessors for any given activity, go to the
corresponding row (“Dependent Activity”) and read
across the row looking for “tick marks” (a vertical bar
in a table cell) that indicate a predecessor activity
(“Input Providing Activity”). For example,
A2 has predecessor A1
A3 has predecessors A1 and A2
A4 has predecessors A1 and A2
A5 has predecessors A1 and A4
SUBSTITUTE DATA
Use the data provided here for durations and costs, rather than those provided in the case.
WX:codehelp 

这篇关于Dragonfly Network Diagram Analysis的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/731253

相关文章

poj 2349 Arctic Network uva 10369(prim or kruscal最小生成树)

题目很麻烦,因为不熟悉最小生成树的算法调试了好久。 感觉网上的题目解释都没说得很清楚,不适合新手。自己写一个。 题意:给你点的坐标,然后两点间可以有两种方式来通信:第一种是卫星通信,第二种是无线电通信。 卫星通信:任何两个有卫星频道的点间都可以直接建立连接,与点间的距离无关; 无线电通信:两个点之间的距离不能超过D,无线电收发器的功率越大,D越大,越昂贵。 计算无线电收发器D

图神经网络框架DGL实现Graph Attention Network (GAT)笔记

参考列表: [1]深入理解图注意力机制 [2]DGL官方学习教程一 ——基础操作&消息传递 [3]Cora数据集介绍+python读取 一、DGL实现GAT分类机器学习论文 程序摘自[1],该程序实现了利用图神经网络框架——DGL,实现图注意网络(GAT)。应用demo为对机器学习论文数据集——Cora,对论文所属类别进行分类。(下图摘自[3]) 1. 程序 Ubuntu:18.04

深度学习--对抗生成网络(GAN, Generative Adversarial Network)

对抗生成网络(GAN, Generative Adversarial Network)是一种深度学习模型,由Ian Goodfellow等人在2014年提出。GAN主要用于生成数据,通过两个神经网络相互对抗,来生成以假乱真的新数据。以下是对GAN的详细阐述,包括其概念、作用、核心要点、实现过程、代码实现和适用场景。 1. 概念 GAN由两个神经网络组成:生成器(Generator)和判别器(D

Neighborhood Homophily-based Graph Convolutional Network

#paper/ccfB 推荐指数: #paper/⭐ #pp/图结构学习 流程 重定义同配性指标: N H i k = ∣ N ( i , k , c m a x ) ∣ ∣ N ( i , k ) ∣ with c m a x = arg ⁡ max ⁡ c ∈ [ 1 , C ] ∣ N ( i , k , c ) ∣ NH_i^k=\frac{|\mathcal{N}(i,k,c_{

Versioned Staged Flow-Sensitive Pointer Analysis

VSFS 1.Introduction2.Approach2.1.相关概念2.2.VSFS 3.Evaluation参考文献 1.Introduction 上一篇blog我介绍了目前flow-sensitive pointer analysis常用的SFS算法。相比IFDS-based方法,SFS显著通过稀疏分析提升了效率,但是其内部依旧有许多冗余计算,留下了很大优化空间。 以

F12抓包05:Network接口测试(抓包篡改请求)

课程大纲         使用线上接口测试网站演示操作,浏览器F12检查工具如何进行简单的接口测试:抓包、复制请求、篡改数据、发送新请求。         测试地址:https://httpbin.org/forms/post ① 抓包:鼠标右键打开“检查”工具(F12),tab导航选择“网络”(Network),输入前3项点击提交,可看到录制的请求和返回数据。

OpenSNN推文:神经网络(Neural Network)相关论文最新推荐(九月份)(一)

基于卷积神经网络的活动识别分析系统及应用 论文链接:oalib简介:  活动识别技术在智能家居、运动评估和社交等领域得到广泛应用。本文设计了一种基于卷积神经网络的活动识别分析与应用系统,通过分析基于Android搭建的前端采所集的三向加速度传感器数据,对用户的当前活动进行识别。实验表明活动识别准确率满足了应用需求。本文基于识别的活动进行卡路里消耗计算,根据用户具体的活动、时间以及体重计算出相应活

deepcross network(DCN)算法 xdeepfm是DCN的进阶

揭秘 Deep & Cross : 如何自动构造高阶交叉特征 https://zhuanlan.zhihu.com/p/55234968 Deep & Cross Network总结 Deep和Cross不得不说的秘密 [深度模型] Deep & Cross Network (DCN) https://mp.weixin.qq.com/s/Xp_xTmcx56tJqfjMhFsArA

F12抓包04:(核心功能)Network接口抓包、定位缺陷

课程大纲 一、录制请求 ① tab导航选择“网络”(Network),即可进入网络抓包界面,进入界面默认开启录制模式,显示浏览器当前标签页的请求列表。 ② 查看请求列表,包含了当前标签页执行的所有请求和下载的资源,列表显示每条请求的相应内容。 还可以在字段行单击右键,勾选想要查看的字段。 ③ 单击列表项的“名称”,可以查看请求的详细内容。接口请

DS简记1-Real-time Joint Object Detection and Semantic Segmentation Network for Automated Driving

创新点 1.更小的网络,更多的类别,更复杂的实验 2. 一体化 总结 终于看到一篇检测跟踪一体化的文章 网络结构如下: ResNet10是共享的Encoder,yolov2 是检测的Deconder,FCN8 是分割的Deconder。 其实很简单,论文作者也指出:Our work is closest to the recent MultiNet. We differ by focus