SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Mathematics (IOSR-JM)
e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 11, Issue 1 Ver. VI (Jan - Feb. 2015), PP 49-54
www.iosrjournals.org
DOI: 10.9790/5728-11164954 www.iosrjournals.org 49 | Page
Critical Paths Identification on Fuzzy Network Project
Alaulden N. A.1
and Saad M. S.2
Professor, Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University,
Baghdad-Iraq1
Ass.Prof., Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University,
Baghdad-Iraq2
Abstract: In this paper, a new approach for identifying fuzzy critical path is presented, based on converting the
fuzzy network project into deterministic network project, by transforming the parameters set of the fuzzy
activities into the time probability density function PDF of each fuzzy time activity. A case study is considered as
a numerical tested problem to demonstrate our approach.
Keywords: Project network, Fuzzy Network, Defuzzification Techniques.
I. Introduction
In recent years, the range of project management applications, under uncertainty are extremely critical
for many organizations has greatly expanded. Project management concerns the scheduling and controlling of
activities (tasks) in such a way that the project can be completed in as little time as possible.
As a result, the uncertainty associated with such risky projects should be reduced. The problem of
identifying critical activities in deterministic problems is well understood. Since a project could be delayed if
these activities were not completed in the scheduled time, Standard Critical Path Method (CPM) analyses can be
used to identify the longest path(s), known as the critical path(s), in an activity network. However, there are
many cases where the activity times may not be presented in a precise manner. To deal quantitatively with
imprecise data, the (PERT) based on the probability theory can be employed, and the probability distributions of
each activities is needed, it is difficult to use in some situations when the priori data of the activity probability
distributions are absence.
Identifying critical activities in a fuzzy project is difficult problems. Several methods had been
proposed contain series draw backs which lead to identifying critical fuzzy activities incorrectly, leaving project
mangers without means to identify the most probable sources of project delays. A new direction for identifying
fuzzy critical path activities in stochastic project is based on different philosophy, than in deterministic project,
where each critical activity must correspond to zero time slack activity, while such condition need not to be
necessary. We immediately encounter difficulties developing concepts analogous to total slack and "critical"
activities for stochastic project. Such concept is a criticality index, defined as the probability that an activity
will lie on a critical path. However, an activity may lie on a critical path without introducing risk of project
delay. Based on such concept, a critical degree is constructed to schedule fuzzy critical paths, [1].
Fuzzy set theory has been proposed to handle non crisp parameters (fuzzy) by generalizing the notion
of membership in a set. Essentially, in a fuzzy set each element is associated with a point value selected from
the unit interval [0,1], which is an arbitrary grade of truth referred to as the grade of membership in the set. The
main objective in FLP is to find the best solution possible with imprecise, vague, uncertain or incomplete
information.
Many previous studies on fuzzy project management network are reviewed before. In [2], Prade (1979)
first applied fuzzy set theory into the project scheduling problem. Furthermore, in [3], [4], [5], [6] and [7],
various types of project scheduling problems with fuzzy activity duration times are discussed.
An alternative way to deal with imprecise data is to employ the concept of fuzziness; the main
advantages of methodologies based on fuzzy theory are that they do not require prior predictable regularities or
posterior frequency distributions . The problems of computing the intervals of possible values of the latest
starting times and floats of activities with imprecise durations represented by fuzzy or interval numbers, and
many solution methods have been proposed, in which most of them are straightforward extension of
deterministic CPM. In [8], a nice literature survey about this subject mentioned the works had been presented.
Most of the systems work with fuzzy values, which have to be mapped to non-fuzzy (crisp) values after
conversion processing called defuzzification. Various defuzzification methods have been proposed in [9], [10]
& [11]. Many researchers attempted to understand the logic of the defuzzification process from the perspective
of invariant transformation between different uncertainty paradigms, including basic defuzzification distribution,
semi-linear defuzzification and generalized level set defuzzification. from the perspective of invariant
transformation between different uncertainty paradigms, including basic defuzzification distribution, semi-linear
defuzzification and generalized level set defuzzification. s from the perspective of invariant transformation
Critical Paths Identification on Fuzzy Network Project
DOI: 10.9790/5728-11164954 www.iosrjournals.org 50 | Page
between different uncertainty paradigms, including basic defuzzification distribution, semi-linear defuzzification
and generalized level set defuzzification, see [12], [13], [14] & [15]. In [16] they attempt to understand the
defuzzification problem from the scope of optimal selection of an element from a fuzzy set. They used the
concepts of interaction, variability, and voting techniques to compute an optimal solution. In [17], they proposed
a fuzzy clustering based defuzzification method. In [18], they proposed a defuzzification method with most
typical values. In [19], he proposed a method for defuzzification with weighted distance. Smith [20], proposed a
dynamic switching defuzzification method for fuzzy control. In [21], he proposed a defuzzification method with
the “nearest” symmetric triangular fuzzy number of a fuzzy set. In [22], he proposed a procedure to defuzzify
fuzzy subsets and interval values by employing the concept of sensitivity analysis with a kind min-max principle.
There are also researchers who tried to build an axiomatic foundation for the defuzzification theory [23] & [24].
It should be noted that with the developments of intelligent technologies, some adaptive and parameterized
defuzzification methods that can include human knowledge have been proposed. In [25], they used neural
networks for defuzzification. Song, et al. [26], proposed an adaptive learning defuzzification technique. In [27],
he proposed a knowledge based defuzzification process become more intelligent. Although so many
defuzzification methods have been proposed so far, no one method gives a right effective defuzzified output.
The computational results of these methods often conflict, and they don’t have a uniform framework in
theoretical view. We often face difficulty in selecting appropriate defuzzification methods for some specific
application problems. Most of the existing defuzzification methods tried to make the estimation of a fuzzy set in
an objective way. However, an important aspect of the fuzzy set application is that it can represent the
subjective knowledge of the decision maker. Different decision makers may have different perception for the
defuzzification results.
In this paper, we are presented a new approach for identifying critical path based on defuzzification
parameters set of fuzzy types activities, by using the concept of the probability density function of each fuzzy
activity.. A case study is considered to explain the proposed approach.
II. Basic Concepts
In this section, we are presented basic concepts of fuzzy set theory and fuzzy network problems.
Usually the structures embedded in fuzzy set theories are less rich than the Boolean lattice of classical set theory.
Moreover, there is also some arbitrariness in the choice of the valuation set for the elements: the real interval
[0,1] is most commonly used.
Definition (1) Fuzzy Sets, [27],[28],[29]:
Let U be a universe set. A fuzzy set 𝐀 of 𝐔 is defined by a membership function µA x → [0,1], where µA x
indicatesthe degree of x in 𝐀 which defined as following:
µ =
0, −∞, a1
f1 x , a1,a2
1, a2, a3
f2 x , [a3, a4]
0, [a4,+∞)
(1)
where a1, a2, a3 and a4are real number, note that f1 x andf2 x are may be linear or convex nonlinear function.
Definition (2) Fuzzy Number, [30]:
A fuzzy number Ais a convex normalized fuzzy set Aof the real line R such that:
1. It exists exactly one x0 ∈ R with μA x0 = 1 (x0is called the mean value of A).
2. μA(x)is piecewise continuous.
III. Proposed Approach
Definition (3) Defuzzification, [31]:
Deffuzification is a mapping from space of fuzzy action defined over an output universe into a space of
nonfuzzy (crisp) actions.
In this paper we proposed a defuzzification method to obtain a Probability Density Function from
Membership Function [32]. If we considered Ai = (ai1, ai2,ai3, al4) is fuzzy trapezoidal number with
membership function defined as (1), where f1 x and f2 x are linear function, (if they are convex nonlinear
functions, we are using any approximated methods to linearized them). Let the function pAi
defined by
pAi
x = ciμAi
(x) is a probability density function associated with Ai, where ci can be obtained by the property
that pi x dx = 1
∞
−∞
as following:
ci =
2
ai4+ai3−ai2−ai1
(2)
Critical Paths Identification on Fuzzy Network Project
DOI: 10.9790/5728-11164954 www.iosrjournals.org 51 | Page
Now, we are using the following transformation called Mellin Transform to find the expected value of the
activity fuzzy duration times.
Definition (10) Mellin Transform, [33]:
The Mellin transformμX s of a probability density function f(x), where x is positive, is defined as
μX s = xs−1
f x dx
∞
0
(3)
whenever the integral exist.
Now it is possible to think of theMellin transform in terms of expected values recall that the expected value of
any function g(x) of the random variable X, whose distribution is f(x), is given by
E g x = g x f x dx
∞
−∞
(4)
There for it follows that
μX s = E[xs−1
] = xs−1
f x dx
∞
0
(5)
Hence
E xs
= MX s + 1 (6)
Thus, the expectation of random variable X is E x = MX 2 .
Now, if we let A = (a1, a2, a3,a4) an arbitrary trapizoidal fuzzy number, then the density function f(x)
corresponding to A is as follows:
pAi
x =
2(x−ai1)
(ai4+ai3−ai2−ai1)(ai2−ai1)
, ai1 ≤ x < ai2
2
ai4+ai3−ai2−ai1
, ai2 ≤ x ≤ ai3
2 ai4−x
ai4+ai3−ai2−ai1 ai4−ai3
, ai3 < x ≤ ai4
0, otherwise.
(7)
The Mellin transform is the obtained by:
ℳAi
s = xs−1
pAi
x dx
∞
0
=
2
ai4+ai3−ai2−ai1 s2+s
ai4
s+1
−ai3
s+1
ai4−ai3
−
ai2
s+1
−ai1
s+1
ai2−ai1
(8)
and
E Ai = ℳA 2 =
1
3
ai1 + a2i + ai3 + ai4 +
ai1ai2−ai3ai4
ai4+ai3−ai2−ai1
(9)
Therefore, all the fuzzy durations times are transformed into crisps values as expected values. Now, we
implemented the following proposed standard Critical Path Method "CPM. For each activity, an expected
duration time tij is calculated using (6).defined, where tij is the time required for the completion of activity (i,j).
A critical path is a longest path, and an activity on a critical path is called a critical activity. Let ESi and LFi
be the earliest start time event i, and the finish time event i, respectively. Let Dj be a set of events obtained
from event j and i< j. We then obtain ESjusing the following equations:
ESj = maxi∈Dj
ESi + tij and ES1 = LS1 = 0 (10)
Similarly, let Hi be a set of events obtained from event i and i< j . We obtain LFi using the following equations:
LFi = minj∈Hi
[LFj − tij] and LFn = EFn (11)
The interval [ ESi, LFj] is the time during which the activity (i,j) must be completed. Now, we can calculate the
float time Tij of the activity (i,j) can be computed as follows :
Tij = LFj − ESi − tij (12)
Hence we can obtain the earliest event time, latest event time, and the total float of every activity by using the
above last three equations, and the critical events are identified corresponding to their zeros values of total float
times.
IV. Case Study
We are considering a project network, figure (1), taken from [34] as a case study.As shown in table (1); the 30
activities are listed with their fuzzy operation times.
In order to solve such problem, the proposed method is implemented to convert the fuzzy time number to crisp
time number, explained in the table (2). Performed the standard critical path method CPM, to obtain the
following critical path 1⇒2⇒3⇒4⇒5⇒6⇒7⇒9⇒10⇒11⇒12⇒16⇒24 of the fuzzy network project.
Critical Paths Identification on Fuzzy Network Project
DOI: 10.9790/5728-11164954 www.iosrjournals.org 52 | Page
Figure (1): Project Network
Table (1): ProjectConstruction
ActivityItem Activity Description PrecedenceItem Fuzzy Operation Time (per day)
P1 Concrete works foundation - (25,28,30,35)
P2 Insulation works P1 (3,4,4,5)
P3 Parking area + Roads + Landscape P2 (25,29,30,35)
P4 Back filling works P3 (3,7,12,15)
P5 Sub-base P4 (5,6,6,10)
P6 Steel structure erection P5 (26,30,35,40)
P7 Under ground drainage system P5 (7,10,10,13)
P8 Water tank - civil works - (15,21,21,25)
P9 Steel structure testing P6 (2,3,4,5)
P10 Roofing works P6 (9,10,12,15)
P11 Water tank – finishing P8 (6,7,8,10)
P12 HVAC works - 1st
fix P9 (12,14,14,16)
P13 Fire fighting works 1st
fix P9 (7,9,11,12)
P14 Electrical system works - 1st
fix P12, P13 (5,6,7,10)
P15 Flooring P14 (7,9,11,12)
P16 HVAC work-2nd
fix P9 (12,14,14,16)
P17 Fire fighting works – 2nd
fix P9 (7,9,11,12)
P18 Cladding works P9 (15,24,25,30)
P19 Electrical system works - 2nd
fix P16,P17 (5,6,7,10)
P20 Water tank – MEP P11 (9,11,12,14)
P21 Finishing works P15 (15,18,18,20)
P22 HVAC works - 3rd
P9 (12,14,14,16)
P23 Fire fighting work - 3rd
fix P9 (7,9,11,12)
P24 Electrical system works -3rd
fix P22,P23 (5,6,7,10)
P25 Plumbing works - 1st
fix P14 (5,6,6,8)
P26 Plumbing works – 2nd
fix P19 (5,6,6,8)
P27 Plumbing works - 3rd
fix P24 (5,6,6,8)
P28 Water tank testing P20 (1,2,2,3)
P29 Testing and commissioning P28 (1,2,2,3)
P30 Snag list and Initial handling P29 (5,7,7,9)
Table (2): Corresponding crisps expected duration times
Activity Item Crisp Duration Time (in days)
P1 27
P2 4
P3 28.625
P4 11.125
P5 5.625
Critical Paths Identification on Fuzzy Network Project
DOI: 10.9790/5728-11164954 www.iosrjournals.org 53 | Page
P6 30.625
P7 10
P8 22.5
P9 3.5
P10 10
P11 7.375
P12 14
P13 10.375
P14 6
P15 10.375
P16 14
P17 10.375
P18 26
P19 6
P20 10.75
P21 16.875
P22 14
P23 10.375
P24 6
P25 6.125
P26 6.125
P27 6.125
P28 2
P29 2
P30 7
References
[1]. Alauldin N. A. and Saad M. S. 2014; "Scheduling Algorithm of fuzzy critical paths in project network". Jr. of Eng. & Technology,
Iraq. To be appeared.
[2]. Prade H., 1979; Using fuzzy set theory in a scheduling problem: a case study, Fuzzy Sets and Systems, 2, 153-165.
[3]. Chanas S. and Kamburowski J., 1981; The use of fuzzy variables in PERT, Fuzzy Sets and Systems, 5, 11-19.
[4]. Dubios D. and Prade H., 1979; Decision-making under fuzziness, Advances in Fuzzy Set Theory and Applications, North-Holland,
Amsterdam, 279-302.
[5]. Hapke M. and Slowinski R., 1993; A DSS for resource-constrained project scheduling under uncertainty, Journal of Decision
Systems, 2, 111-128.
[6]. Kaufmann A. and Gupta M.M., 1988; Fuzzy Mathematical Models in Engineering and Management Science, North-Holland,
Amsterdam, 1988.
[7]. Ke H. and Liu B.D.,2010; Fuzzy project scheduling problem and its hybrid intelligent algorithm, Applied Mathematical Modelling,
34, 301-308.
[8]. ghoseirl k. A.R. Moghadam (2012): "Continuous fuzzy longest path problem in project networks ". mhtml:file//c:users21 desktop
fuzzy documents fz17 .mht
[9]. Roychowdhury, S., W. Pedrycz, 2001. A survey of defuzzification strategies, International Journal of Intelligent systems, 16: 679-
695.
[10]. Leekwijck, W.V., E.E. Kerre, 1999. Defuzzification criteria an classification, Fuzzy Sets and Systems, 108:159-178.
[11]. Kosko, B., 1992. Neural Networks and Fuzzy Systems, Prentice Hall, NJ.
[12]. Filev, D.P., R.R. Yager, 1991. A generalized defuzzification method via BADD distribution, International Journal of Intelligence
Systems, 6: 687-697.
[13]. Yager, R.R., D.P. Filev, 1994. Parameterized and-like and or-like OWA operators, International Journal of General Systems, 22:
297-316.
[14]. Yager, R.R., D.P. Filev, 1993. SLIDE: A simple adaptive defuzzification method, IEEE Transaction on Fuzzy systems, 1: 69-78.
[15]. Filev, D.P., R.R. Yager, 1993. An adaptive approach to defuzzification based on level sets, Fuzzy Sets and Systems, 53: 355-360.
[16]. Roychowdhury, S., B.H. Wang, 1996. Cooperative neighbors in defuzzification, Fuzzy Sets and Systems, 78: 37-49.J. Appl. Sci.
Res., 7(2): 102-110, 2011 110
[17]. Genther, H., T. Runkler, M. Glenser, 1994. Defuzzification based on fuzzy clustering, Third IEEE Conference on fuzzy Systems,
1646-1648.
[18]. Ezzati, R., R. Saneifard, 2010. A new approach for ranking of fuzzy numbers with continuous weighted quasiarithmetic means,
Mathematical Sciences, 4: 143-158.
[19]. Saneifard, R., 2009. A method for defuzzification by weighted distance , International Journal of Industrial Mathematics., 3: 209-
217.
[20]. Smith, M., 1994. Tuning membership functions, tuning AND and OR operations, tuning defuzzification: which is best?, Proceeding
of the 1st International Joint Conference of the North American, 347-351.
[21]. Ming, M., A. Kandel, M. Friedman, 2000. A new approach for defuzzification, Fuzzy Sets and Systems, 111: 351-356.
[22]. Mabuchi, S., 1993. A proposal for a defuzzification strategy by the concept of the sensitivity analysis, Fuzzy Sets and Systems, 55:
1-14.
[23]. Runkler, T.A., M. Glesner, 1993. A set of axioms for defuzzification strategies-towards a theory of rational defuzzification
operators, Proceeding of the 2nd IEEE Internat. Conf. on fuzzy Systems, San Francisco, 1161-1166.
[24]. Thiele, H., 1998. Towards axiomatic foundations for defuzzification theory, 2nd International Conference on Knowledge-Based
Intelligent Electronic Systems, 2: 243-250.
[25]. Halgamuge, S., T. Runkler, M. Glesner, 1996. On the neural defuzzification methods, Proceeding of the 5th IEEE International
Conference on Fuzzy Systems, 463-469.
[26]. Song, Q., R.P. Leland, 1996. Adaptive learning defuzzification techniques and applications, Fuzzy Sets and Systems, 81: 321-329.
Critical Paths Identification on Fuzzy Network Project
DOI: 10.9790/5728-11164954 www.iosrjournals.org 54 | Page
[27]. Saneifared R., 2009; Ranking L-R Fuzzy Number with Weighted Averaging Based on Levels, International Journal of Industrial
Mathematics, 2: 163-173.
[28]. Heilpern S., 1992; The Expected Value of a Fuzzy Number, Fuzzy Sets and Systems, 47: 81-86.
[29]. Kauffman A., Gupta M.M., 1991; Introduction to Fuzzy Arithmetic: Theory and Application, Van Nostrand Reinhold, New York.
[30]. Dubios D. and Prade H.,1980; Fuzzy Sets and Systems: Theory and Applications. Fuzzy Sets, 9.
[31]. D. H. Rao, S. S. Saraf., 1995; Study of DefuzzificationMethodes of Fuzzy Logic Controller for Speed Control of a DC Motor. IEEE
Transactions, pp. 782-787.
[32]. Rahim S. and Rasul S., 2011; A Modified Method for Defuzzification by probability density function. Jor. Of Appl. Sci. Res. 7(2),
pp. 102-110.
[33]. Yoon, K.P., 1996; A probabilistic approach to rank complex fuzzy numbers, Fuzzy Sets and Systems, 80: 167-176, 1996.
[34]. Mohamed F., 2011; El-Santawy, Soha M. Abd-Alla, The Longest Path Problem in Fuzzy Project Networks: A Case Study. Gen.
Math. Notes, Vol. 3, No 2, pp. 97-107.
Biography
Prof.Dr.Alaulden N. Ahmed is specialist in different areas of Operation Researches. He
received his Ph.D in 1986 from UK. He supervised of more than 50 M.Sc. students and 5
Ph.D students.
Mr.Saad M. Salman,published more than 10 papers in optimization field.

More Related Content

What's hot

On average case analysis through statistical bounds linking theory to practice
On average case analysis through statistical bounds  linking theory to practiceOn average case analysis through statistical bounds  linking theory to practice
On average case analysis through statistical bounds linking theory to practicecsandit
 
ON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICE
ON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICEON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICE
ON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICEcscpconf
 
A Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data MiningA Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data Miningijdmtaiir
 
A h k clustering algorithm for high dimensional data using ensemble learning
A h k clustering algorithm for high dimensional data using ensemble learningA h k clustering algorithm for high dimensional data using ensemble learning
A h k clustering algorithm for high dimensional data using ensemble learningijitcs
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving dataiaemedu
 
Medical diagnosis classification
Medical diagnosis classificationMedical diagnosis classification
Medical diagnosis classificationcsandit
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringIDES Editor
 
A Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsA Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsIJMER
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1bPRAWEEN KUMAR
 
All pair shortest path--SDN
All pair shortest path--SDNAll pair shortest path--SDN
All pair shortest path--SDNSarat Prasad
 
Ch 9-1.Machine Learning: Symbol-based
Ch 9-1.Machine Learning: Symbol-basedCh 9-1.Machine Learning: Symbol-based
Ch 9-1.Machine Learning: Symbol-basedbutest
 
A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...
A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...
A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...ijsrd.com
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel basedIJITCA Journal
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...IRJET Journal
 
Expandable bayesian
Expandable bayesianExpandable bayesian
Expandable bayesianAhmad Amri
 
Towards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationTowards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationIDES Editor
 

What's hot (18)

On average case analysis through statistical bounds linking theory to practice
On average case analysis through statistical bounds  linking theory to practiceOn average case analysis through statistical bounds  linking theory to practice
On average case analysis through statistical bounds linking theory to practice
 
ON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICE
ON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICEON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICE
ON AVERAGE CASE ANALYSIS THROUGH STATISTICAL BOUNDS : LINKING THEORY TO PRACTICE
 
A Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data MiningA Novel Approach to Mathematical Concepts in Data Mining
A Novel Approach to Mathematical Concepts in Data Mining
 
A h k clustering algorithm for high dimensional data using ensemble learning
A h k clustering algorithm for high dimensional data using ensemble learningA h k clustering algorithm for high dimensional data using ensemble learning
A h k clustering algorithm for high dimensional data using ensemble learning
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving data
 
Medical diagnosis classification
Medical diagnosis classificationMedical diagnosis classification
Medical diagnosis classification
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means Clustering
 
A Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text DocumentsA Novel Clustering Method for Similarity Measuring in Text Documents
A Novel Clustering Method for Similarity Measuring in Text Documents
 
84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b84cc04ff77007e457df6aa2b814d2346bf1b
84cc04ff77007e457df6aa2b814d2346bf1b
 
All pair shortest path--SDN
All pair shortest path--SDNAll pair shortest path--SDN
All pair shortest path--SDN
 
Ch 9-1.Machine Learning: Symbol-based
Ch 9-1.Machine Learning: Symbol-basedCh 9-1.Machine Learning: Symbol-based
Ch 9-1.Machine Learning: Symbol-based
 
A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...
A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...
A Novel Penalized and Compensated Constraints Based Modified Fuzzy Possibilis...
 
Data clustering using kernel based
Data clustering using kernel basedData clustering using kernel based
Data clustering using kernel based
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...
 
Expandable bayesian
Expandable bayesianExpandable bayesian
Expandable bayesian
 
Ai inductive bias and knowledge
Ai inductive bias and knowledgeAi inductive bias and knowledge
Ai inductive bias and knowledge
 
Towards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationTowards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key Generation
 

Viewers also liked

Presentation draft 3
Presentation draft 3Presentation draft 3
Presentation draft 3mainagement
 
Sosialisasi uu-no-22-th-2009
Sosialisasi uu-no-22-th-2009Sosialisasi uu-no-22-th-2009
Sosialisasi uu-no-22-th-2009sujarnodimejo
 
variational bayes in biophysics
variational bayes in biophysicsvariational bayes in biophysics
variational bayes in biophysicschris wiggins
 
Social Media-integrated Collaboration Systems for Business Use
Social Media-integrated Collaboration Systems for Business UseSocial Media-integrated Collaboration Systems for Business Use
Social Media-integrated Collaboration Systems for Business UseChristian Ochsenkühn
 
Fundamental Report Sadbhav 18 August
Fundamental Report Sadbhav 18 AugustFundamental Report Sadbhav 18 August
Fundamental Report Sadbhav 18 AugustSwastika Investmart
 
Nfc e, a nova aliada na redução de custos do varejo
Nfc e, a nova aliada na redução de custos do varejoNfc e, a nova aliada na redução de custos do varejo
Nfc e, a nova aliada na redução de custos do varejoGabriela Bornhausen Branco
 

Viewers also liked (11)

QEHSM 1
QEHSM 1QEHSM 1
QEHSM 1
 
Law 1 The Field Of Play
Law 1   The Field Of PlayLaw 1   The Field Of Play
Law 1 The Field Of Play
 
Presentation draft 3
Presentation draft 3Presentation draft 3
Presentation draft 3
 
Sosialisasi uu-no-22-th-2009
Sosialisasi uu-no-22-th-2009Sosialisasi uu-no-22-th-2009
Sosialisasi uu-no-22-th-2009
 
sreeja profile
sreeja profilesreeja profile
sreeja profile
 
Newbie: How to Start Running
Newbie: How to Start RunningNewbie: How to Start Running
Newbie: How to Start Running
 
Critical Thinking
Critical ThinkingCritical Thinking
Critical Thinking
 
variational bayes in biophysics
variational bayes in biophysicsvariational bayes in biophysics
variational bayes in biophysics
 
Social Media-integrated Collaboration Systems for Business Use
Social Media-integrated Collaboration Systems for Business UseSocial Media-integrated Collaboration Systems for Business Use
Social Media-integrated Collaboration Systems for Business Use
 
Fundamental Report Sadbhav 18 August
Fundamental Report Sadbhav 18 AugustFundamental Report Sadbhav 18 August
Fundamental Report Sadbhav 18 August
 
Nfc e, a nova aliada na redução de custos do varejo
Nfc e, a nova aliada na redução de custos do varejoNfc e, a nova aliada na redução de custos do varejo
Nfc e, a nova aliada na redução de custos do varejo
 

Similar to Critical Paths Identification on Fuzzy Network Project

Fault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curvesFault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curveseSAT Journals
 
Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...
Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...
Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...IJERA Editor
 
Detection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed ApproachDetection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed ApproachEditor IJMTER
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andeSAT Publishing House
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Editor IJARCET
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Editor IJARCET
 
MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...
MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...
MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...cscpconf
 
Principle Component Analysis Based on Optimal Centroid Selection Model for Su...
Principle Component Analysis Based on Optimal Centroid Selection Model for Su...Principle Component Analysis Based on Optimal Centroid Selection Model for Su...
Principle Component Analysis Based on Optimal Centroid Selection Model for Su...ijtsrd
 
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...Wireilla
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...ijfls
 
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach IJECEIAES
 
EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...
EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...
EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...ijscmcj
 
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...Md Kafiul Islam
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 

Similar to Critical Paths Identification on Fuzzy Network Project (20)

Fault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curvesFault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curves
 
Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...
Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...
Comparison of Cost Estimation Methods using Hybrid Artificial Intelligence on...
 
Detection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed ApproachDetection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed Approach
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932
 
Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932Volume 2-issue-6-1930-1932
Volume 2-issue-6-1930-1932
 
ME Synopsis
ME SynopsisME Synopsis
ME Synopsis
 
MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...
MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...
MEDICAL DIAGNOSIS CLASSIFICATION USING MIGRATION BASED DIFFERENTIAL EVOLUTION...
 
Research Proposal
Research ProposalResearch Proposal
Research Proposal
 
Principle Component Analysis Based on Optimal Centroid Selection Model for Su...
Principle Component Analysis Based on Optimal Centroid Selection Model for Su...Principle Component Analysis Based on Optimal Centroid Selection Model for Su...
Principle Component Analysis Based on Optimal Centroid Selection Model for Su...
 
AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30
 
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
 
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach
 
EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...
EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...
EDGE DETECTION IN SEGMENTED IMAGES THROUGH MEAN SHIFT ITERATIVE GRADIENT USIN...
 
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
EMBC'13 Poster Presentation on "A Bio-Inspired Cooperative Algorithm for Dist...
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
Fuzzy set
Fuzzy set Fuzzy set
Fuzzy set
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2John Carlo Rollon
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)DHURKADEVIBASKAR
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsHajira Mahmood
 

Recently uploaded (20)

Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
 

Critical Paths Identification on Fuzzy Network Project

  • 1. IOSR Journal of Mathematics (IOSR-JM) e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 11, Issue 1 Ver. VI (Jan - Feb. 2015), PP 49-54 www.iosrjournals.org DOI: 10.9790/5728-11164954 www.iosrjournals.org 49 | Page Critical Paths Identification on Fuzzy Network Project Alaulden N. A.1 and Saad M. S.2 Professor, Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University, Baghdad-Iraq1 Ass.Prof., Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University, Baghdad-Iraq2 Abstract: In this paper, a new approach for identifying fuzzy critical path is presented, based on converting the fuzzy network project into deterministic network project, by transforming the parameters set of the fuzzy activities into the time probability density function PDF of each fuzzy time activity. A case study is considered as a numerical tested problem to demonstrate our approach. Keywords: Project network, Fuzzy Network, Defuzzification Techniques. I. Introduction In recent years, the range of project management applications, under uncertainty are extremely critical for many organizations has greatly expanded. Project management concerns the scheduling and controlling of activities (tasks) in such a way that the project can be completed in as little time as possible. As a result, the uncertainty associated with such risky projects should be reduced. The problem of identifying critical activities in deterministic problems is well understood. Since a project could be delayed if these activities were not completed in the scheduled time, Standard Critical Path Method (CPM) analyses can be used to identify the longest path(s), known as the critical path(s), in an activity network. However, there are many cases where the activity times may not be presented in a precise manner. To deal quantitatively with imprecise data, the (PERT) based on the probability theory can be employed, and the probability distributions of each activities is needed, it is difficult to use in some situations when the priori data of the activity probability distributions are absence. Identifying critical activities in a fuzzy project is difficult problems. Several methods had been proposed contain series draw backs which lead to identifying critical fuzzy activities incorrectly, leaving project mangers without means to identify the most probable sources of project delays. A new direction for identifying fuzzy critical path activities in stochastic project is based on different philosophy, than in deterministic project, where each critical activity must correspond to zero time slack activity, while such condition need not to be necessary. We immediately encounter difficulties developing concepts analogous to total slack and "critical" activities for stochastic project. Such concept is a criticality index, defined as the probability that an activity will lie on a critical path. However, an activity may lie on a critical path without introducing risk of project delay. Based on such concept, a critical degree is constructed to schedule fuzzy critical paths, [1]. Fuzzy set theory has been proposed to handle non crisp parameters (fuzzy) by generalizing the notion of membership in a set. Essentially, in a fuzzy set each element is associated with a point value selected from the unit interval [0,1], which is an arbitrary grade of truth referred to as the grade of membership in the set. The main objective in FLP is to find the best solution possible with imprecise, vague, uncertain or incomplete information. Many previous studies on fuzzy project management network are reviewed before. In [2], Prade (1979) first applied fuzzy set theory into the project scheduling problem. Furthermore, in [3], [4], [5], [6] and [7], various types of project scheduling problems with fuzzy activity duration times are discussed. An alternative way to deal with imprecise data is to employ the concept of fuzziness; the main advantages of methodologies based on fuzzy theory are that they do not require prior predictable regularities or posterior frequency distributions . The problems of computing the intervals of possible values of the latest starting times and floats of activities with imprecise durations represented by fuzzy or interval numbers, and many solution methods have been proposed, in which most of them are straightforward extension of deterministic CPM. In [8], a nice literature survey about this subject mentioned the works had been presented. Most of the systems work with fuzzy values, which have to be mapped to non-fuzzy (crisp) values after conversion processing called defuzzification. Various defuzzification methods have been proposed in [9], [10] & [11]. Many researchers attempted to understand the logic of the defuzzification process from the perspective of invariant transformation between different uncertainty paradigms, including basic defuzzification distribution, semi-linear defuzzification and generalized level set defuzzification. from the perspective of invariant transformation between different uncertainty paradigms, including basic defuzzification distribution, semi-linear defuzzification and generalized level set defuzzification. s from the perspective of invariant transformation
  • 2. Critical Paths Identification on Fuzzy Network Project DOI: 10.9790/5728-11164954 www.iosrjournals.org 50 | Page between different uncertainty paradigms, including basic defuzzification distribution, semi-linear defuzzification and generalized level set defuzzification, see [12], [13], [14] & [15]. In [16] they attempt to understand the defuzzification problem from the scope of optimal selection of an element from a fuzzy set. They used the concepts of interaction, variability, and voting techniques to compute an optimal solution. In [17], they proposed a fuzzy clustering based defuzzification method. In [18], they proposed a defuzzification method with most typical values. In [19], he proposed a method for defuzzification with weighted distance. Smith [20], proposed a dynamic switching defuzzification method for fuzzy control. In [21], he proposed a defuzzification method with the “nearest” symmetric triangular fuzzy number of a fuzzy set. In [22], he proposed a procedure to defuzzify fuzzy subsets and interval values by employing the concept of sensitivity analysis with a kind min-max principle. There are also researchers who tried to build an axiomatic foundation for the defuzzification theory [23] & [24]. It should be noted that with the developments of intelligent technologies, some adaptive and parameterized defuzzification methods that can include human knowledge have been proposed. In [25], they used neural networks for defuzzification. Song, et al. [26], proposed an adaptive learning defuzzification technique. In [27], he proposed a knowledge based defuzzification process become more intelligent. Although so many defuzzification methods have been proposed so far, no one method gives a right effective defuzzified output. The computational results of these methods often conflict, and they don’t have a uniform framework in theoretical view. We often face difficulty in selecting appropriate defuzzification methods for some specific application problems. Most of the existing defuzzification methods tried to make the estimation of a fuzzy set in an objective way. However, an important aspect of the fuzzy set application is that it can represent the subjective knowledge of the decision maker. Different decision makers may have different perception for the defuzzification results. In this paper, we are presented a new approach for identifying critical path based on defuzzification parameters set of fuzzy types activities, by using the concept of the probability density function of each fuzzy activity.. A case study is considered to explain the proposed approach. II. Basic Concepts In this section, we are presented basic concepts of fuzzy set theory and fuzzy network problems. Usually the structures embedded in fuzzy set theories are less rich than the Boolean lattice of classical set theory. Moreover, there is also some arbitrariness in the choice of the valuation set for the elements: the real interval [0,1] is most commonly used. Definition (1) Fuzzy Sets, [27],[28],[29]: Let U be a universe set. A fuzzy set 𝐀 of 𝐔 is defined by a membership function µA x → [0,1], where µA x indicatesthe degree of x in 𝐀 which defined as following: µ = 0, −∞, a1 f1 x , a1,a2 1, a2, a3 f2 x , [a3, a4] 0, [a4,+∞) (1) where a1, a2, a3 and a4are real number, note that f1 x andf2 x are may be linear or convex nonlinear function. Definition (2) Fuzzy Number, [30]: A fuzzy number Ais a convex normalized fuzzy set Aof the real line R such that: 1. It exists exactly one x0 ∈ R with μA x0 = 1 (x0is called the mean value of A). 2. μA(x)is piecewise continuous. III. Proposed Approach Definition (3) Defuzzification, [31]: Deffuzification is a mapping from space of fuzzy action defined over an output universe into a space of nonfuzzy (crisp) actions. In this paper we proposed a defuzzification method to obtain a Probability Density Function from Membership Function [32]. If we considered Ai = (ai1, ai2,ai3, al4) is fuzzy trapezoidal number with membership function defined as (1), where f1 x and f2 x are linear function, (if they are convex nonlinear functions, we are using any approximated methods to linearized them). Let the function pAi defined by pAi x = ciμAi (x) is a probability density function associated with Ai, where ci can be obtained by the property that pi x dx = 1 ∞ −∞ as following: ci = 2 ai4+ai3−ai2−ai1 (2)
  • 3. Critical Paths Identification on Fuzzy Network Project DOI: 10.9790/5728-11164954 www.iosrjournals.org 51 | Page Now, we are using the following transformation called Mellin Transform to find the expected value of the activity fuzzy duration times. Definition (10) Mellin Transform, [33]: The Mellin transformμX s of a probability density function f(x), where x is positive, is defined as μX s = xs−1 f x dx ∞ 0 (3) whenever the integral exist. Now it is possible to think of theMellin transform in terms of expected values recall that the expected value of any function g(x) of the random variable X, whose distribution is f(x), is given by E g x = g x f x dx ∞ −∞ (4) There for it follows that μX s = E[xs−1 ] = xs−1 f x dx ∞ 0 (5) Hence E xs = MX s + 1 (6) Thus, the expectation of random variable X is E x = MX 2 . Now, if we let A = (a1, a2, a3,a4) an arbitrary trapizoidal fuzzy number, then the density function f(x) corresponding to A is as follows: pAi x = 2(x−ai1) (ai4+ai3−ai2−ai1)(ai2−ai1) , ai1 ≤ x < ai2 2 ai4+ai3−ai2−ai1 , ai2 ≤ x ≤ ai3 2 ai4−x ai4+ai3−ai2−ai1 ai4−ai3 , ai3 < x ≤ ai4 0, otherwise. (7) The Mellin transform is the obtained by: ℳAi s = xs−1 pAi x dx ∞ 0 = 2 ai4+ai3−ai2−ai1 s2+s ai4 s+1 −ai3 s+1 ai4−ai3 − ai2 s+1 −ai1 s+1 ai2−ai1 (8) and E Ai = ℳA 2 = 1 3 ai1 + a2i + ai3 + ai4 + ai1ai2−ai3ai4 ai4+ai3−ai2−ai1 (9) Therefore, all the fuzzy durations times are transformed into crisps values as expected values. Now, we implemented the following proposed standard Critical Path Method "CPM. For each activity, an expected duration time tij is calculated using (6).defined, where tij is the time required for the completion of activity (i,j). A critical path is a longest path, and an activity on a critical path is called a critical activity. Let ESi and LFi be the earliest start time event i, and the finish time event i, respectively. Let Dj be a set of events obtained from event j and i< j. We then obtain ESjusing the following equations: ESj = maxi∈Dj ESi + tij and ES1 = LS1 = 0 (10) Similarly, let Hi be a set of events obtained from event i and i< j . We obtain LFi using the following equations: LFi = minj∈Hi [LFj − tij] and LFn = EFn (11) The interval [ ESi, LFj] is the time during which the activity (i,j) must be completed. Now, we can calculate the float time Tij of the activity (i,j) can be computed as follows : Tij = LFj − ESi − tij (12) Hence we can obtain the earliest event time, latest event time, and the total float of every activity by using the above last three equations, and the critical events are identified corresponding to their zeros values of total float times. IV. Case Study We are considering a project network, figure (1), taken from [34] as a case study.As shown in table (1); the 30 activities are listed with their fuzzy operation times. In order to solve such problem, the proposed method is implemented to convert the fuzzy time number to crisp time number, explained in the table (2). Performed the standard critical path method CPM, to obtain the following critical path 1⇒2⇒3⇒4⇒5⇒6⇒7⇒9⇒10⇒11⇒12⇒16⇒24 of the fuzzy network project.
  • 4. Critical Paths Identification on Fuzzy Network Project DOI: 10.9790/5728-11164954 www.iosrjournals.org 52 | Page Figure (1): Project Network Table (1): ProjectConstruction ActivityItem Activity Description PrecedenceItem Fuzzy Operation Time (per day) P1 Concrete works foundation - (25,28,30,35) P2 Insulation works P1 (3,4,4,5) P3 Parking area + Roads + Landscape P2 (25,29,30,35) P4 Back filling works P3 (3,7,12,15) P5 Sub-base P4 (5,6,6,10) P6 Steel structure erection P5 (26,30,35,40) P7 Under ground drainage system P5 (7,10,10,13) P8 Water tank - civil works - (15,21,21,25) P9 Steel structure testing P6 (2,3,4,5) P10 Roofing works P6 (9,10,12,15) P11 Water tank – finishing P8 (6,7,8,10) P12 HVAC works - 1st fix P9 (12,14,14,16) P13 Fire fighting works 1st fix P9 (7,9,11,12) P14 Electrical system works - 1st fix P12, P13 (5,6,7,10) P15 Flooring P14 (7,9,11,12) P16 HVAC work-2nd fix P9 (12,14,14,16) P17 Fire fighting works – 2nd fix P9 (7,9,11,12) P18 Cladding works P9 (15,24,25,30) P19 Electrical system works - 2nd fix P16,P17 (5,6,7,10) P20 Water tank – MEP P11 (9,11,12,14) P21 Finishing works P15 (15,18,18,20) P22 HVAC works - 3rd P9 (12,14,14,16) P23 Fire fighting work - 3rd fix P9 (7,9,11,12) P24 Electrical system works -3rd fix P22,P23 (5,6,7,10) P25 Plumbing works - 1st fix P14 (5,6,6,8) P26 Plumbing works – 2nd fix P19 (5,6,6,8) P27 Plumbing works - 3rd fix P24 (5,6,6,8) P28 Water tank testing P20 (1,2,2,3) P29 Testing and commissioning P28 (1,2,2,3) P30 Snag list and Initial handling P29 (5,7,7,9) Table (2): Corresponding crisps expected duration times Activity Item Crisp Duration Time (in days) P1 27 P2 4 P3 28.625 P4 11.125 P5 5.625
  • 5. Critical Paths Identification on Fuzzy Network Project DOI: 10.9790/5728-11164954 www.iosrjournals.org 53 | Page P6 30.625 P7 10 P8 22.5 P9 3.5 P10 10 P11 7.375 P12 14 P13 10.375 P14 6 P15 10.375 P16 14 P17 10.375 P18 26 P19 6 P20 10.75 P21 16.875 P22 14 P23 10.375 P24 6 P25 6.125 P26 6.125 P27 6.125 P28 2 P29 2 P30 7 References [1]. Alauldin N. A. and Saad M. S. 2014; "Scheduling Algorithm of fuzzy critical paths in project network". Jr. of Eng. & Technology, Iraq. To be appeared. [2]. Prade H., 1979; Using fuzzy set theory in a scheduling problem: a case study, Fuzzy Sets and Systems, 2, 153-165. [3]. Chanas S. and Kamburowski J., 1981; The use of fuzzy variables in PERT, Fuzzy Sets and Systems, 5, 11-19. [4]. Dubios D. and Prade H., 1979; Decision-making under fuzziness, Advances in Fuzzy Set Theory and Applications, North-Holland, Amsterdam, 279-302. [5]. Hapke M. and Slowinski R., 1993; A DSS for resource-constrained project scheduling under uncertainty, Journal of Decision Systems, 2, 111-128. [6]. Kaufmann A. and Gupta M.M., 1988; Fuzzy Mathematical Models in Engineering and Management Science, North-Holland, Amsterdam, 1988. [7]. Ke H. and Liu B.D.,2010; Fuzzy project scheduling problem and its hybrid intelligent algorithm, Applied Mathematical Modelling, 34, 301-308. [8]. ghoseirl k. A.R. Moghadam (2012): "Continuous fuzzy longest path problem in project networks ". mhtml:file//c:users21 desktop fuzzy documents fz17 .mht [9]. Roychowdhury, S., W. Pedrycz, 2001. A survey of defuzzification strategies, International Journal of Intelligent systems, 16: 679- 695. [10]. Leekwijck, W.V., E.E. Kerre, 1999. Defuzzification criteria an classification, Fuzzy Sets and Systems, 108:159-178. [11]. Kosko, B., 1992. Neural Networks and Fuzzy Systems, Prentice Hall, NJ. [12]. Filev, D.P., R.R. Yager, 1991. A generalized defuzzification method via BADD distribution, International Journal of Intelligence Systems, 6: 687-697. [13]. Yager, R.R., D.P. Filev, 1994. Parameterized and-like and or-like OWA operators, International Journal of General Systems, 22: 297-316. [14]. Yager, R.R., D.P. Filev, 1993. SLIDE: A simple adaptive defuzzification method, IEEE Transaction on Fuzzy systems, 1: 69-78. [15]. Filev, D.P., R.R. Yager, 1993. An adaptive approach to defuzzification based on level sets, Fuzzy Sets and Systems, 53: 355-360. [16]. Roychowdhury, S., B.H. Wang, 1996. Cooperative neighbors in defuzzification, Fuzzy Sets and Systems, 78: 37-49.J. Appl. Sci. Res., 7(2): 102-110, 2011 110 [17]. Genther, H., T. Runkler, M. Glenser, 1994. Defuzzification based on fuzzy clustering, Third IEEE Conference on fuzzy Systems, 1646-1648. [18]. Ezzati, R., R. Saneifard, 2010. A new approach for ranking of fuzzy numbers with continuous weighted quasiarithmetic means, Mathematical Sciences, 4: 143-158. [19]. Saneifard, R., 2009. A method for defuzzification by weighted distance , International Journal of Industrial Mathematics., 3: 209- 217. [20]. Smith, M., 1994. Tuning membership functions, tuning AND and OR operations, tuning defuzzification: which is best?, Proceeding of the 1st International Joint Conference of the North American, 347-351. [21]. Ming, M., A. Kandel, M. Friedman, 2000. A new approach for defuzzification, Fuzzy Sets and Systems, 111: 351-356. [22]. Mabuchi, S., 1993. A proposal for a defuzzification strategy by the concept of the sensitivity analysis, Fuzzy Sets and Systems, 55: 1-14. [23]. Runkler, T.A., M. Glesner, 1993. A set of axioms for defuzzification strategies-towards a theory of rational defuzzification operators, Proceeding of the 2nd IEEE Internat. Conf. on fuzzy Systems, San Francisco, 1161-1166. [24]. Thiele, H., 1998. Towards axiomatic foundations for defuzzification theory, 2nd International Conference on Knowledge-Based Intelligent Electronic Systems, 2: 243-250. [25]. Halgamuge, S., T. Runkler, M. Glesner, 1996. On the neural defuzzification methods, Proceeding of the 5th IEEE International Conference on Fuzzy Systems, 463-469. [26]. Song, Q., R.P. Leland, 1996. Adaptive learning defuzzification techniques and applications, Fuzzy Sets and Systems, 81: 321-329.
  • 6. Critical Paths Identification on Fuzzy Network Project DOI: 10.9790/5728-11164954 www.iosrjournals.org 54 | Page [27]. Saneifared R., 2009; Ranking L-R Fuzzy Number with Weighted Averaging Based on Levels, International Journal of Industrial Mathematics, 2: 163-173. [28]. Heilpern S., 1992; The Expected Value of a Fuzzy Number, Fuzzy Sets and Systems, 47: 81-86. [29]. Kauffman A., Gupta M.M., 1991; Introduction to Fuzzy Arithmetic: Theory and Application, Van Nostrand Reinhold, New York. [30]. Dubios D. and Prade H.,1980; Fuzzy Sets and Systems: Theory and Applications. Fuzzy Sets, 9. [31]. D. H. Rao, S. S. Saraf., 1995; Study of DefuzzificationMethodes of Fuzzy Logic Controller for Speed Control of a DC Motor. IEEE Transactions, pp. 782-787. [32]. Rahim S. and Rasul S., 2011; A Modified Method for Defuzzification by probability density function. Jor. Of Appl. Sci. Res. 7(2), pp. 102-110. [33]. Yoon, K.P., 1996; A probabilistic approach to rank complex fuzzy numbers, Fuzzy Sets and Systems, 80: 167-176, 1996. [34]. Mohamed F., 2011; El-Santawy, Soha M. Abd-Alla, The Longest Path Problem in Fuzzy Project Networks: A Case Study. Gen. Math. Notes, Vol. 3, No 2, pp. 97-107. Biography Prof.Dr.Alaulden N. Ahmed is specialist in different areas of Operation Researches. He received his Ph.D in 1986 from UK. He supervised of more than 50 M.Sc. students and 5 Ph.D students. Mr.Saad M. Salman,published more than 10 papers in optimization field.