Industrial Engineering Journal ›› 2017, Vol. 20 ›› Issue (5): 79-86.doi: 10.3969/j.issn.1007-7375.e17-4156

Previous Articles     Next Articles

An IT Outsourcing Schedule Risk Control Based on Improved Predatory Search

LU Fuqiang1,3, ZHU Wenjing2, BI Hualing1,3   

  1. 1. Faculty of Information Science and Engineering, Northeastern University, Shenyang 110004, China;
    2. School of Information Management, Wuhan University, Wuhan 430061, China;
    3. College of Management, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
  • Received:2017-06-30 Online:2017-10-30 Published:2017-11-17

Abstract: A two-level IT outsourcing schedule risk control model is proposed. For the two-level structure of the problem and the efficiency of Predatory Search (PS), the two-level structure and 2-opt based Tabu mechanism are introduced to propose a two-level tabu-predatory search (TLTPS) algorithm. During simulation examples, firstly, the simulation results are given. Secondly, five simulation experiments of different sizes are introduced to compare the ability of TLTPS, GA, PSO and PS, and verify the rationality and effectiveness of the improved algorithm.

Key words: IT outsourcing, schedule risk, tabu mechanism, predatory search algorithm, two-level structure

CLC Number: