HEAL DSpace

Building ontologies for production scheduling systems: Towards a unified methodology

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Metaxiotis, KS en
dc.contributor.author Psarras, JE en
dc.contributor.author Askounis, D en
dc.date.accessioned 2014-03-01T01:16:12Z
dc.date.available 2014-03-01T01:16:12Z
dc.date.issued 2001 en
dc.identifier.issn 09685227 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/13974
dc.subject Information systems en
dc.subject Production en
dc.subject Scheduling en
dc.subject.other Problem solving en
dc.subject.other Production control en
dc.subject.other Real time systems en
dc.subject.other Scheduling en
dc.subject.other Production scheduling en
dc.subject.other Information technology en
dc.title Building ontologies for production scheduling systems: Towards a unified methodology en
heal.type journalArticle en
heal.identifier.primary 10.1108/09685220110366803 en
heal.identifier.secondary http://dx.doi.org/10.1108/09685220110366803 en
heal.publicationDate 2001 en
heal.abstract In this paper we consider the use of ontologies as the basis for structuring and simplifying the process of constructing real-time problem-solving tools, focusing specifically on the task of production scheduling. In spite of the commonality in production scheduling system requirements and design, different scheduling environments invariably present different challenges (e.g. different constraints, different objectives, different domain structure, etc.). The proposed methodology for building ontologies used for production scheduling systems represents a synthesis of extensive work in developing constraint-based scheduling models for a wide range of applications in manufacturing and production planning. Since the effective modeling is one of the most important and difficult steps in the development of reliable information systems, and taking into consideration the fact that the general problem of the production scheduling in the industries is very difficult and still unsolved, one can easily estimate the merit of this methodology. en
heal.journalName Information Management and Computer Security en
dc.identifier.doi 10.1108/09685220110366803 en
dc.identifier.volume 9 en
dc.identifier.issue 1 en
dc.identifier.spage 44 en
dc.identifier.epage 50 en


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record