SlideShare a Scribd company logo
1 of 7
Download to read offline
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206
ISSN: 2249-6645

An Approach for Project Scheduling Using PERT/CPM and
Petri Nets (PNs) Tools
Amer A. M. Boushaala
(Department of Industrial and Manufacturing Systems Engineering / University of Benghazi, Libya)

ABSTRACT: The Petri Nets are more powerful models as compared to the PERT/CPM charts. The Petri Nets show the
same type of scheduling constraints as the PERT/CPM charts does. We can easily convert a PERT/CPM networks to a Petri
Net model.This work shows how to use Petri net’s for modeling and verifying project management networks. Software for a
functional analysis of a Petri Net model is developed. The developed software enables analyzing of a system for its various
properties irrespective of time. The software analysis is based on some approaches used to determine the various properties
of PN model: livens, safeness, reach-ability and conservativeness. This paper proposes a PN based modeling approach to
provide a formal way to verify that all the activities are well connected in the project network. This PN model can then be
analyzed through (PN based) scheduling techniques, used to find the critical path, used as a basis to develop algorithms for
resource-constrained project management, and used for other decisions related to project management. The proposed PN
based approach enables the project manager to consider not only resources but also all different types of
variables/constraints related to a project, e.g. costs of activities.

Keywords: CPM, PERT, Petri Net’s, Verifications
I.

INTRODUCTION

CPM/PERT are major tools for project management. They are networks that show precedence relations of activities
of a project with the activity times. They are used to find project completion time, which is the longest path in the network.
They are also used to find other related information about the activities, e.g., slack time, earliest start and end time. All
these analyses are made based on the infinite resource assumption. Then, resource allocation of the project is carried out. That
is, finite resources are allocated to the project activities whose time requirements were calculated based on the infinite
resource assumption. However, instead of this two-step approach to the resource-constrained project management, a onestep approach, through Petri nets (PNs), is possible. Furthermore, CPM/PERT; do not provide a formal way to verify that all
the activities are well connected in the project network.
Liang, Chen and Wang [1] introduced a project model, called SPREM, which extends CPM/PERT's notation to
four types of vertices to express the non-deterministic and iterative behaviors of software engineering projects. They
compared it with PNs, and discussed its analysis and behavioral properties. These properties are verified through several
algorithms they proposed. However, as discussed in section 5, the well known place (transition) invariants help verify some
of these properties without any additional algorithms.
Desrochers and Al-Jaar [2] give some advantages of PNs: PNs capture the precedence relations; conflicts and buffer
sizes can be modeled easily; PN models represent a hierarchical modeling tool with a well-developed mathematical and
practical foundation. These advantages help model and verify (resource-constrained) project networks.
Several PN based approaches to project management were proposed in the literature. Jeetendra et al. [3] evaluate
conventional project management tools, state their inadequacies and list advantages of using PNs for project management.
Chang and Christensen [4] propose PM-Net for software development, which adopts the basic concepts of PNs with
extensions to represent both decisions and artifacts. Ashok Kumar and Ganesh [5] also describe project management
models with their inadequacies, and propose a new model based on PNs and demonstrate its usefulness for real-time activity
scheduling in a resource-constrained project environment. However, these approaches need to modify and extend basic PN
semantics and add new tools to analyze the project network. For example, Jeetendra et al. [3] change PN semantics through
a precedence matrix they developed. Conflicting transitions in traditional PNs behave concurrently in their definition.
This matrix is then used to help determine floats and the critical path and to find deadlocks. Ashok Kumar and Ganesh [5]
also add several features to basic PN semantics for project management.
The proposed PN based approach facilitates modeling (resource-constrained) projects, and verifying some
properties of the projects networks, exploiting the well known place (transition) invariants, through the basic PN definitions.
That is, contrary to some approaches in the literature, there is no need to modify the basic PN semantics to model activities
and decisions related to a project. This increases the capability of the basic PNs, without any extension in the theory, to
model projects. Transitions are used to model all the preconditions, for an activity to start, which is modeled via a place.
The place invariants are then used to verify some properties of the projects, as discussed in section 5. This model can then be
analyzed through (PN based) scheduling techniques [6, 7], and used to find the critical path [8], and used as a basis to
develop algorithms for resource-constrained project management [9, 10]. These considerations are beyond the scope of this
paper. The aim of this paper is to show how to model project networks with PNs without any modification or extension in
the basic PN semantics, and how to compute the critical path and verify some project properties through the well known
place invariants.

www.ijmer.com

3200 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206
ISSN: 2249-6645

II.

PERT/CPM ACTIVITY NETWORKS

The foundation of the approach came from the Special Projects Office of the US Navy in 1958. It developed a
technique for evaluating the performance of large development projects, which became known as PERT - Project Evaluation
and Review Technique. Other variations of the same approach are known as the Critical Path Method (CPM) or Critical Path
Analysis (CPA) [11, 12].
The heart of any PERT chart is a network of tasks needed to complete a project, showing the order in which the
tasks need to be completed and the dependencies between them. This is represented graphically as shown in Fig. 1. The
diagram consists of a number of circles, representing events within the development lifecycle, such as the start or completion
of a task, and lines, which represent the tasks themselves. Each task is additionally labeled by its time duration. Thus the task
between events 4 and 5 is planned to take 3 time units. The primary benefit is the identification of the critical path. The
critical path = total time for activities on this path is greater than any other path through the network (delay in any task on the
critical path leads to a delay in the project). Diagram Symbols illustrated in Fig. 2.
Project network complexity is often recognized way, but not completely understood by everyone. Boushaala [13]
proposed a new measure of project complexity. The developed measure showed more sensitivity to the changes in the
network data and give accurate quantified results in evaluating the project complexity where the critical activities, the critical
paths, number of critical activities to the total number of project activities, the length of critical path, the resource types and
their availability are considered.

Fig. 1 Example of an activity network

Fig. 2 Symbols used in activity networks

III. MODELING WITH PETRI NET’S
A Petri net (PN) is formally defined as a four-tuple C= (P,T, I,O) where P is a finite set of places p, T is a finite set
of transitions t, I is a mapping from transitions to a subset of places (bag of input places) such that I(t) represents input places
for transition t, and O is a mapping from transitions to a subset of places (a bag of output places) such that O(t) represents
output places for transition t. Multiple occurrences of each in the input and output bags are allowed [14, 15].
A PN can also be described by a bipartite directed graph with two types of nodes: circles for places and bars for
transitions. Directed arcs connected places and transitions. Let B ( p, t ) and F ( p, t ) be, respectively, the number of
occurrences of places P in the input and output bags of transition t. Then B, F and D = F - B, respectively, define the
backward, forward and incidence matrices of the PN. These matrices define the topology of the PN. The dynamics of the PN
are defined by marking  of the PN;  is a state vector with  (p) is the number of tokens in place p. The dynamics of the
PN are controlled by the execution of that PN. A PN executes by firing its transitions. A transition fires by removing tokens
www.ijmer.com
3201 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206
ISSN: 2249-6645
from its input places and depositing tokens at its output places. A transition may fire if it is enabled. A transition t is enabled
in marking  if   B.ft where ft = (0, 0, ... ,1 , 0, ..., 0) with 1 corresponding to transition t. If  ’ is a new marking after
firing transition t, then  ’ =  + D.ft defines the dynamics of the PN. For a sequence  of n transitions, the dynamics
equation becomes  n =  0 + D.ft where f =



t

f t,  is a set of n transitions and  0 is the initial marking; f is called the

firing vector of the sequence. Each marking defines a state. Firing a transition may result in a new state. All the possible
states define the state space of the PN. From an analytical perspective, it is quite important to determine all the reachable
states. It is also important to determine whether or not the PN is live or dead-lock free, bounded (number of tokens in any
place is finite in any marking), conservative (the weighted number of tokens in any marking is fixed and finite) and
consistent (there is a firing vector with all positive elements). A live and consistent PN is cyclic, which is typical property of
manufacturing systems. One may also be interested in other features of a PN as a controller, such as recoverability and
fairness. Some of these properties can be mathematically analysed through the P-and T-invariants of the PN [15, 16].
3.1 Marked Graph
A marked graph is a PN in which each place is an input for exactly one transition and an output for exactly one
transition. Alternatively, we can say that each place exactly one input and one output [16, 17].
Definition: A marked graph is a PN C = ( P,T,I,O ) such that for each p i P,I(pi)  = {tj/pi O(tj)} =1 and O(pi)
= {tj/pi I(tj)} =1.
Marked graphs can model concurrence and synchronization but cannot model conflict or data-dependent decisions.
The properties which have been investigated for marked graphs have been Livens, safeness, and reach-ability. Marked
graphs can model concurrence and synchronization but cannot model conflict or data-dependent decisions. The properties
which have been investigated for marked graphs have been Livens, safeness, and reach-ability. In the investigation of these
properties, the major structural parts of a marked graph of interest are its cycles. A cycle in a marked graph is a sequence of
transitions tj1tj2...tjk such that for each tjr and tjr+1 in the sequence there is a place pir the pir  O(tjr) and pirI(tjr+1) and tj1= tjk.
A cycle is such a closed path from a transition back to that same transition.
If P` P is a subset of places that compose a cycle, then the characteristic vector U= ( u i i = { 1, 2, ..., n} such that
crdi U = 1 for pi  P`, is a p- invariant of PN. If U' and U'' are P- invariants of PN, then U = U' + U'' + ... is also a P-invariant
of PN, where crdi U = ui for U=(u1,u2,...,ui,...,ur) [16].
3.2 P – Invariant
U is said to be a P-invariant of a PN if and only if U=(u 1,u2,...,un) is a vector such that D*U=0 and ui  0 for I
=1,2,...,n and D is the incidence matrix. The following theorem provides the condition allowing solving the reachability
problem states. Given a Petri net C =( P,T,I,O,µo ) with marking µ ( R ( C,µo ) ) and marking µ` ( R ( C,µo ) ). The problem
is if µ` is reachable from µ , i.e. µ`( R ( C,µ ) ) [10,18].
Theorem (1): Let µ0 be an initial marking and let µ ( R ( C,µ0 ) ). If U is an P-invariant, then µ0 UT = µ UT
The above theorem provides the condition allowing solving the so called reachability problem. The problem can be
stated as following. Given a PN C = ( P,T,I,O,µo ) with marking µ ( R ( C,µ0 ) ) and marking µ`( R ( C,µ0 ) ). Is µ` reachable
from µ, i.e. µ`( R (C,µ) )?.As shown in Fig. 3[19].
3.3 Software for a Functional Analysis of a Petri Net Model
The developed software enables analyzing of a system for its various properties irrespective of time. Functional
analysis has been used in the Petri net to refer to this type of analysis. The software analysis is based on some approaches
used to determine the various properties of PN model: livens, safeness, reach-ability and conservativeness. Fig. 3 shows the
flow chart of computing P-invariants.
Input / Output Matrices

Compute Loops
U = u1 + u2 + ....

Is
U*D+0?

No
Deadlock

Yes

M' is reached from M

Yes

Is
M * U = M' * U

No
M' is not reached
from M

Fig. 3: Flow chart of computing P-invariants
www.ijmer.com

3202 | Page
www.ijmer.com

IV.

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206
ISSN: 2249-6645

HEADINGS CONVERSION OF PERT/CPM CHARTS INTO EQUIVALENT PETRI NET
MODEL

The Petri Nets show the same type of scheduling constraints as the PERT/CPM charts does. We can easily convert a
PERT/CPM networks to a Petri Net model. Each activity in the PERT chart is represented by a place, while the precedence
constraints are represented by the transitions. In CPM chart each event is represented by place (transition), while the activity
is represented by transition (place). The Petri Net is excellent vehicle to represent the concurrency and precedence
constraints of the PERT chart. In modelling the PERT chart with the Petri Net, activities that are represented by places and
transitions are reserved to model multiple resources of limited amounts. Fig. 4 demonstrates the conversion process of
PERT/CPM charts into Petri net chart.
Activity on Arc

Activity On Node
A

A

B

1

B

3

2

a ) PERT Chart
b ) Equivalent CPM Chart for PERT Chart

tA

Transition
PB

PA

tB
P2

P1

t1

P3

OR

Equivalent PN diagram for the PERT diagram

t1

t3

t2
PA

PB

d ) Equivalent PN diagram for the CPM diagram
B
A
C

t1

PA

t2

t3

t5

e ) CPM chart

PB

PC

t4

t6

f ) Equivalent PN diagram for e ) CPM chart

Fig. 4: Conversion of PERT/CPM charts into Petri net chart
The Petri Nets are more powerful models as compared to the PERT/CPM charts. The following reasons may be given for it:
 The repeated performance of activities, if necessary, can be modelled by the PN.
 Required resources per activity appear explicitly as tokens in representation.
 Non-deterministic aspects can be dealt with. For example: the order in which a particular resource performs some tasks
may not be totally specified.

V.

MODELING PROJECT NETWORKS THROUGH PETRI NETS

By definition of a project, the project is completed when all the activities are processed exactly once. In PN
terminology, this means that all the transitions must fire exactly once, i.e. U.D = 0 for U = 1, where 1 is a column vector
with all entries being one. This transition invariant verifies that the precedence relations among the activities are well
established (the nodes are strongly connected), i.e. the project can be completed. Note that because the PN model of a
project is a marked graph, the transition invariant is also a sufficient condition. D.1 = 0 means that the sum of each and every
row of D should be zero. Hence, to verify that the project can be completed, it is sufficient to show that the incidence matrix
of the PN model of the project has this property and that the PN is a marked graph. The following demonstrates this through
an illustrative example. Consider a project consists of 8 activities A, B, C, D, E, F, G, and H with their times of completion
as shown in Table 1 [18].
The project will be finished after 21 weeks, which is the CPM network contains two of critical paths. The first
critical bath consists of 4 activities A, B, E, and H, and the second critical bath consists of 5 activities A, B, D1, F, and H.
The activities D1 and D2 were dummies with zero duration. Fig. 5 shows A CPM project network for Table 1 with
completion time for the project.
Table 1: The sequence of the project activities
Activity Precedecessor(s) Duration ( Weeks )
A
-----3
B
A
6
C
A
4
D
A
3
E
B
4
F
B, C, D
4
G
B
1
H
E, F
8

www.ijmer.com

3203 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206
ISSN: 2249-6645
3
9

9

G

0

6
1

2

A
0

0

6

F

9

4

0

4

4

C

3

3

3

1

0 D1

B

0

E

9

21

8

0

0

7

H
13

13

4

21
0

0 D2
3

D
5
9

6
3

Fig. 5: A CPM project net work for table 1 with completion time for the project [13]
1

P9
t8
P3

PB

t3

PG

P10

t4

t14
4

6
t9

PE

P19

P11
t7

P1

t1

PA

t2

P4

t5

3

0 PD1
t12

PC
4

P17

t13

t15

PF
4

PH

P20

t17

8
t16

PD2 0
P5

t6

PD

t10

t11

3
P13

Fig. 6: Petri net (PN) model of figure 5
Fig. 6 shows the PN model of the project network in Fig. 5. For example activity A (PA) needs 3days to be
completed. Activity times are denoted within the circles (places), which model the timed places. The bars denote immediate
transitions, which model logical conditions (transitions t1 and t2 were pre and post conditions of PA) and take zero time to
fire. The same as for the other activities from B through H including dummy activities D1 and D2 have pre and post
conditions represented in transitions. All other places P1, P3, P4, … , and P20 were connection places between all the project
activities, for example P3 is the connection between the two activities PA and PB through t2 which is post condition of PA
and t3 which is precondition of PB, as well as for the other remaining places ( e.g. P4, P5, … , P20 ) and needs zero time to
be completed.
The incidence matrix of Fig. 6 is shown below. The sum of each and every row of the incidence matrix should be
zero and each and every column should have at least one -1 and +1 entry to verify that the corresponding PN models the
project correctly, i.e. all the activities, hence the project, can be completed
t1 t 2 t 3 t 4 t 5 t 6 t 7 t8 t 9 t10 t11 t12 t13 t14 t15 t16 t17
p1  1 0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

1

pA

1 1 0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

p3

0

1 1 0

0

0

0

0

0

0

0

0

0

0

0

0

0

p4

0

1

0

0 1 0

0

0

0

0

0

0

0

0

0

0

0

p5

0

1

0

0

0 1 0

0

0

0

0

0

0

0

0

0

0

pB
pC

0
0

0
0

1 1 0
0 0 1

0
0

0
0

0
0

0
0

0
0

0 0 0
0 1 0

0
0

0
0

0
0

0
0

pD

0

0

0

0

0

1

0

0

0 1 0

p9

0

0

0

1

0

0

0 1 0

p10 0

0

0

1

0

0

0

p11 0

0

0

1

0

0 1 0

0

pD1 0

0

0

0

0

0

1

0

p13 0

0

0

0

0

0

0

pD2 0

0

0

0

0

0

pE

0

0

0

0

0

pG

0

0

0

0

p17 0
pF 0

0
0

0
0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0 1 0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0 1 0

0

0

0

0

0

0

1 1 0

0

0

0

0

0

0

0

0

0

1 1 0

0

0

0

0

0

0

0

1

0

0

0

0 1 0

0

0

0

0

0

1

0

0

0

0

0

0 1

0
0

0
0

0
0

0
0

0
0

0
0

0
0

0
0

1 1 0 0 0
0 1 0 1 0

0

0

0
0

p19 0

0

0

0

0

0

0

0

0

0

0

0

0

1

0 1 0

p 20 0

0

0

0

0

0

0

0

0

0

0

0

0

0

1 1 0

pH

0

0

0

0

0

0

0

0

0

0

0

0

0

0

0

-u1
u1 – u2

1 1

+ u17 = 0
=0
u16 – u17 = 0
www.ijmer.com

3204 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206
ISSN: 2249-6645
In order to illustrate the application of the approach proposed, let consider the example provided in the previous
example of Fig. 6. An event graph (like PN in general) said to be strongly connected if there is a directed path joining any
node A to any node B of the graph. The event graph presented in Fig. 6 strongly connected. We also define an elementary
circuit in a strongly connected event as a directed path goes from one node, i.e. a place or transition, back to the same node,
which any other node is not repeated. For instance, Fig. 6 exposes five elementary circuits, namely:
1 = ( p1, t1;pA ,t2; p3 ,t3; pB ,t4;p9 ,t8;pG ,t17; )
2 = (p1,t1;pA ,t2;p3 ,t3;pB ,t4;p10 ,t9;pE ,t14;p19 ,t16;pH ,t17; )
3 = (p1,t1;pA ,t2;p3 ,t3;pB ,t4;p11 ,t7;pD1 ,t12;p17 ,t13;pF ,t15;p20 ,t16;pH ,t17; )
4 = (p1,t1;pA ,t2;p4 ,t5;pC ,t12;p17 ,t13;pF ,t15;p20 ,t16;pH ,t17; )
5 = (p1,t1;pA ,t2;p5 ,t06;pD ,t10;p13 ,t11;pD2 ,t12;p17 ,t13;pF ,t15;p20 ,t16;pH ,t17; )
If the number of tokens in a marking remains fixed for all markings in the reachability set, the Petri net is then said
to be strictly conservative. An immediate consequence of conservativeness is boundedness of the Petri net. The boundedness
property implies that the number of tokens in any place does not increase beyond a limit. This in turn guarantees a finite
reachability set for the Petri net. If there exist an U with all positive elements the Petri net is then said to be conservative.
If U = (1,...,1) then the Petri net is strictly conservative. The total number of tokens in i ( i=1,2,5  is then:
n1(1) = μ (p1 ) + μ ( pA ) + μ ( p3 ) + μ ( pB) + μ ( p9 ) + μ ( pE ) + = 1 + 0 + 0 + 0 + 0 + 0 = 1
n2(2) = μ (p1 ) + μ ( pA ) + μ ( p3 ) + μ ( pB) + μ ( p10 ) + μ ( pG ) + μ ( p19 ) + μ ( pH ) = 1 + 0 + 0 + 0 + 0 + 0 + 0 + 0 = 1
n3(3) = μ (p1 ) + μ ( pA ) + μ ( p3 ) + μ ( pB) + μ ( p11 ) + μ ( pD1 ) + μ ( p17 ) + μ ( pF ) + μ ( p20 ) + μ ( pH ) = 1+ 0 + 0 + 0
+0+0+0+0+0+0=1
n4(4) = μ (p1 ) + μ ( pA ) + μ ( p4 ) + μ ( pC) + μ ( p17 ) + μ ( pF ) + μ ( p20 ) + μ ( pH ) = 1 + 0 + 0 + 0 + 0 + 0 + 0 + 0 = 1
N5(5) = μ (p1 ) + μ ( pA ) + μ ( p5 ) + μ ( pD) + μ ( p13 ) + μ ( pD2 ) + μ ( p17 ) + μ ( pF ) + μ ( p20 ) + μ ( pH ) = 1+ 0 + 0 + 0
+0+0+0+0+0+0=1
Therefore, the total P – invariants of all loops U = (5, 5, 3, 1, 1, 3, 1, 1, 1, 1, 1, 1, 1, 3, 3, 1, 3, 4).
By applying the equations : U * D = (0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 ), this means that the system is deadlock free.
To compute the total time for each loop to find the critical path(s) as follows:
1 = ( p1, pA , p3 , pB ,p9 ,pG ) = 0 + 3 + 0 + 6 + 0 + 1 = 10 weeks
2 = (p1, pA ,p3 ,pB ,p10 ,pE ,p19 ,pH ) = 0 + 3 + 6 + 0 + 4 + 0 + 8 = 21 weeks
3 = (p1, pA ,p3 ,pB ,p11 ,pD1 ,p17 ,pF ,p20 ,pH , ) = 0 + 3 + 0 + 6 + 0 + 0 + 0 + 4 + 8 = 21 weeks
4 = (p1,pA ,p4 ,pC ,p17 ,pF ,p20 ,pH ) = 0 + 3 + 0 + 4 + 0 + 4 + 0 + 8 = 19 weeks
5 = (p1,pA ,p5 ,pD ,p13 ,pD2 ,p17 ,pF ,p20 ,pH ) = 0 + 3 + 0 + 3 + 0 + 0 + 0 + 4 + 0 + 8 = 18 weeks
Then there is two critical paths γ2 and γ3, as the same as of the CPM network Figure 5.

VI.

CONCLUSIONS AND REMARKS

The proposed PN based approach to project management facilitated modeling (resource -constrained) projects,
and verifying some properties of the projects networks, exploiting the well known place ( transition ) invariants, through
the basic PN semantics. That is, contrary to some approaches in the literature, there is no need to modify the basic PN
semantics to model activities and decisions related to a project. This increases the capability of the basic PNs, without any
extension in the theory, to model projects. Places were used to model all the preconditions, including resources, for an
activity to start, which was modeled via a place (transition). The place (transition) invariants were then used to verify some
properties of the projects. This PN model can then be analyzed through (PN based) scheduling techniques, used to find the
critical path, used as a basis to develop algorithms for resource-constrained project management, and used for other
decisions related to project management.
The transition invariant means that the sum of each and every row of the incidence matrix should be zero. Hence, to
verify that the project can be completed, it is sufficient to show that the sum of each and every row of the incidence matrix is
zero, and that each and every column has at least one -1 and +1 entry.
The proposed PN based approach enables the project manager to consider not only resources but also all different
types of variables/constraints related to a project, e.g. costs of activities. Any of these variables can be considered fuzzy as
well. In this case, fuzzy arc weights cause the firing rule to be modified. These are possible future research directions.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]

B.S., Liang, J.N., Chen, and F.J., Wang, A project model for software development, Journal of Information Science and
Engineering, 16, 2000, 423 – 446.
A.A., Desrochers, and R.Y, Al-Jaar, Application of Petri nets in manufacturing systems: modeling, control, and performance
analysis (New York: IEEE Press, 1995).
V.A., Jeetendra, O.V., Chetty, and J., Reddy, Petri nets for project management and resource leveling, International Journal of
Advanced Manufacturing Technology, 16, 2000, 516-520.
C.K.,Chang and M., Christensen, A net practice for software project management, IEEE Software, November/ December, 1999, 8088.
V.K., Kumar, and L.S., Ganesh, Use of Petri nets for resource allocation in projects, IEEE Transactions on Engineering
Management, 45(1), 1998, 49 – 56.
W.M.P., Van der Aalst, Petri net based scheduling, OR Spectrum, 18, 1996, 219-229.

www.ijmer.com

3205 | Page
www.ijmer.com
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206
ISSN: 2249-6645

W., Herroelen, and R., Leus, Project scheduling under uncertainty: Survey and research potentials, European Journal of
Operational Research, 165, 2005, 289-306.
S.M., Chen, and T.H., Chang, Finding multiple possible critical paths using fuzzy PERT, IEEE Transactions on System
Management, and Cybernetics Part B: Cybernetics, 31 (6), 2001, 930 – 937.
K.W., Kim, Y.S., Yun, J.M., Yoon, M., Gen, and G., Yamazaki, Hybrid genetic algorithm with adaptive abilities for resourceconstrained multiple project scheduling, Computers in Industry, 56, 2005, 143- 160.
V., Valls, F., Ballestín, and S., Quintanilla, Justification and RCPSP: A technique that pays, European Journal of
Operational Research, 165, 2005, 375-386.
Erik and Will, Project scheduling a research handbook, (Kulwer Academic Publishers : New York, Boston, London, Moscow, and
Dordrecht, 2002).
J.P., Lewis, Project planning, scheduling and control, (Mc Graw – Hill Companies, Inc., 2001).
A. M., Boushaala, Project complexity indices based on topology features, Al-satil Journal, 4 (8), 2010, 137-150.
T., Peterson, Petri Net Theory and the Modeling of Systems (Prentice Hall, 1981).
Z., Banaszak and K., Jedrzejek, Rule – based knowledge verification using Petri nets, 3rd Turkish Symposium on AI and Networks,
June 1994.
P.M., del Foyo and J. R., Silva, Using timed Petri nets for modeling and verification of timed constrained workflow systems,
ABCM Symposium Series in Mechatronics, 3, 2008, 471-478.
Y., Chen, P., Fsu, and Y., Chang, A Petri net approach to support resource assignment in project management, IEEE Transactions
on Engineering Management, 38(3), 2008, 564 – 574.
I. Amiruddin, K. Abdul Rashid, and J. Wisam, Literature review in resource – constrain critical path method technique, European
Journal of Scientific research, 29(2), 2009, 222-236.
I. M., Buseif, An approach to FMS design using SADT and PN tools, doctoral diss., Faculty of Production Engineering, Warsaw
University of Technology, Warsaw – Poland, 1997.

www.ijmer.com

3206 | Page

More Related Content

What's hot

Integration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisIntegration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisPatricia Tavares Boralli
 
Software effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN networkSoftware effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN networkIOSR Journals
 
Advanced property tracking Industrial Modeling Framework
Advanced property tracking Industrial Modeling FrameworkAdvanced property tracking Industrial Modeling Framework
Advanced property tracking Industrial Modeling FrameworkAlkis Vazacopoulos
 
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEMGRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEMIJCSEA Journal
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applicationsAbu Hussein
 
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET Journal
 
Evolutionary Multi-Goal Workflow Progress in Shade
Evolutionary  Multi-Goal Workflow Progress in ShadeEvolutionary  Multi-Goal Workflow Progress in Shade
Evolutionary Multi-Goal Workflow Progress in ShadeIRJET Journal
 
An optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkAn optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkISA Interchange
 
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...Waqas Nawaz
 
Scalability in Model Checking through Relational Databases
Scalability in Model Checking through Relational DatabasesScalability in Model Checking through Relational Databases
Scalability in Model Checking through Relational DatabasesCSCJournals
 
Rapport_Cemracs2012
Rapport_Cemracs2012Rapport_Cemracs2012
Rapport_Cemracs2012Jussara F.M.
 
Design and analysis of algorithms - Abstract View
Design and analysis of algorithms - Abstract ViewDesign and analysis of algorithms - Abstract View
Design and analysis of algorithms - Abstract ViewWaqas Nawaz
 
Skyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed EnvironmentSkyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed EnvironmentIJMER
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCpaperpublications3
 

What's hot (20)

3rd 3DDRESD: Floorplacer
3rd 3DDRESD: Floorplacer3rd 3DDRESD: Floorplacer
3rd 3DDRESD: Floorplacer
 
Integration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysisIntegration of queuing network and idef3 for business process analysis
Integration of queuing network and idef3 for business process analysis
 
Software effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN networkSoftware effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN network
 
Advanced property tracking Industrial Modeling Framework
Advanced property tracking Industrial Modeling FrameworkAdvanced property tracking Industrial Modeling Framework
Advanced property tracking Industrial Modeling Framework
 
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEMGRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
 
PPoPP15
PPoPP15PPoPP15
PPoPP15
 
Colored petri nets theory and applications
Colored petri nets theory and applicationsColored petri nets theory and applications
Colored petri nets theory and applications
 
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
 
Evolutionary Multi-Goal Workflow Progress in Shade
Evolutionary  Multi-Goal Workflow Progress in ShadeEvolutionary  Multi-Goal Workflow Progress in Shade
Evolutionary Multi-Goal Workflow Progress in Shade
 
An optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic NetworkAn optimal general type-2 fuzzy controller for Urban Traffic Network
An optimal general type-2 fuzzy controller for Urban Traffic Network
 
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
 
Uic Montone Thesis
Uic Montone ThesisUic Montone Thesis
Uic Montone Thesis
 
UIC Thesis Montone
UIC Thesis MontoneUIC Thesis Montone
UIC Thesis Montone
 
Scalability in Model Checking through Relational Databases
Scalability in Model Checking through Relational DatabasesScalability in Model Checking through Relational Databases
Scalability in Model Checking through Relational Databases
 
Rapport_Cemracs2012
Rapport_Cemracs2012Rapport_Cemracs2012
Rapport_Cemracs2012
 
Design and analysis of algorithms - Abstract View
Design and analysis of algorithms - Abstract ViewDesign and analysis of algorithms - Abstract View
Design and analysis of algorithms - Abstract View
 
K-BestMatch
K-BestMatchK-BestMatch
K-BestMatch
 
Skyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed EnvironmentSkyline Query Processing using Filtering in Distributed Environment
Skyline Query Processing using Filtering in Distributed Environment
 
Energy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LCEnergy Efficient Optimal Paths Using PDORP-LC
Energy Efficient Optimal Paths Using PDORP-LC
 
Thesis Proposal Presentation
Thesis Proposal PresentationThesis Proposal Presentation
Thesis Proposal Presentation
 

Viewers also liked

Regression techniques to study the student performance in post graduate exam...
Regression techniques to study the student performance in post  graduate exam...Regression techniques to study the student performance in post  graduate exam...
Regression techniques to study the student performance in post graduate exam...IJMER
 
Do3211611166
Do3211611166Do3211611166
Do3211611166IJMER
 
A Detailed Modelingof a Five Parameters Model for Photovoltaic Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic  ModulesA Detailed Modelingof a Five Parameters Model for Photovoltaic  Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic ModulesIJMER
 
A Bayesian Probit Online Model Framework for Auction Fraud Detection
A Bayesian Probit Online Model Framework for Auction Fraud DetectionA Bayesian Probit Online Model Framework for Auction Fraud Detection
A Bayesian Probit Online Model Framework for Auction Fraud DetectionIJMER
 
Analysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir FilterAnalysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir FilterIJMER
 
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution in Packed Column
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution  in Packed Column Absorption of Nitrogen Dioxide into Sodium Carbonate Solution  in Packed Column
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution in Packed Column IJMER
 
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...IJMER
 
Cn31386390
Cn31386390Cn31386390
Cn31386390IJMER
 
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...IJMER
 
A Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different MethodsA Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different MethodsIJMER
 
Cm31381385
Cm31381385Cm31381385
Cm31381385IJMER
 
Ai32647651
Ai32647651Ai32647651
Ai32647651IJMER
 
Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s) Reinforced Ep...
Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s)  Reinforced Ep...Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s)  Reinforced Ep...
Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s) Reinforced Ep...IJMER
 
Ijmer 46065964
Ijmer 46065964Ijmer 46065964
Ijmer 46065964IJMER
 
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of  Deltaic EcologyHydrological Modeling of Upper Indus Basin and Assessment of  Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic EcologyIJMER
 
An Investigative Review on Thermal Characterization of Hybrid Metal Matrix C...
An Investigative Review on Thermal Characterization of Hybrid  Metal Matrix C...An Investigative Review on Thermal Characterization of Hybrid  Metal Matrix C...
An Investigative Review on Thermal Characterization of Hybrid Metal Matrix C...IJMER
 
Steady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaSteady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaIJMER
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...IJMER
 
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...IJMER
 
Compensation for Inverter Nonlinearity Using Trapezoidal Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal  VoltageCompensation for Inverter Nonlinearity Using Trapezoidal  Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal VoltageIJMER
 

Viewers also liked (20)

Regression techniques to study the student performance in post graduate exam...
Regression techniques to study the student performance in post  graduate exam...Regression techniques to study the student performance in post  graduate exam...
Regression techniques to study the student performance in post graduate exam...
 
Do3211611166
Do3211611166Do3211611166
Do3211611166
 
A Detailed Modelingof a Five Parameters Model for Photovoltaic Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic  ModulesA Detailed Modelingof a Five Parameters Model for Photovoltaic  Modules
A Detailed Modelingof a Five Parameters Model for Photovoltaic Modules
 
A Bayesian Probit Online Model Framework for Auction Fraud Detection
A Bayesian Probit Online Model Framework for Auction Fraud DetectionA Bayesian Probit Online Model Framework for Auction Fraud Detection
A Bayesian Probit Online Model Framework for Auction Fraud Detection
 
Analysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir FilterAnalysis of Genomic and Proteomic Sequence Using Fir Filter
Analysis of Genomic and Proteomic Sequence Using Fir Filter
 
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution in Packed Column
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution  in Packed Column Absorption of Nitrogen Dioxide into Sodium Carbonate Solution  in Packed Column
Absorption of Nitrogen Dioxide into Sodium Carbonate Solution in Packed Column
 
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF  and UHF Applica...
Turnstile S-Shaped Dipole and Swastika Wire Antennas for VHF and UHF Applica...
 
Cn31386390
Cn31386390Cn31386390
Cn31386390
 
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
A Novel Technique for Enhancing Active and Reactive Power Quality for Renewab...
 
A Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different MethodsA Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different Methods
 
Cm31381385
Cm31381385Cm31381385
Cm31381385
 
Ai32647651
Ai32647651Ai32647651
Ai32647651
 
Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s) Reinforced Ep...
Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s)  Reinforced Ep...Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s)  Reinforced Ep...
Studies Of Influence on Multiwalled Carbon Nanotubes (MWCNT’s) Reinforced Ep...
 
Ijmer 46065964
Ijmer 46065964Ijmer 46065964
Ijmer 46065964
 
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of  Deltaic EcologyHydrological Modeling of Upper Indus Basin and Assessment of  Deltaic Ecology
Hydrological Modeling of Upper Indus Basin and Assessment of Deltaic Ecology
 
An Investigative Review on Thermal Characterization of Hybrid Metal Matrix C...
An Investigative Review on Thermal Characterization of Hybrid  Metal Matrix C...An Investigative Review on Thermal Characterization of Hybrid  Metal Matrix C...
An Investigative Review on Thermal Characterization of Hybrid Metal Matrix C...
 
Steady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in NigeriaSteady Resource Selection Model for Housing Projects in Nigeria
Steady Resource Selection Model for Housing Projects in Nigeria
 
Design and Configuration of App Supportive Indirect Internet Access using a ...
Design and Configuration of App Supportive Indirect Internet  Access using a ...Design and Configuration of App Supportive Indirect Internet  Access using a ...
Design and Configuration of App Supportive Indirect Internet Access using a ...
 
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
 
Compensation for Inverter Nonlinearity Using Trapezoidal Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal  VoltageCompensation for Inverter Nonlinearity Using Trapezoidal  Voltage
Compensation for Inverter Nonlinearity Using Trapezoidal Voltage
 

Similar to An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools

Overview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docxOverview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docxalfred4lewis58146
 
Yagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docx
Yagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docxYagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docx
Yagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docxjeffevans62972
 
Overview1) Overview – The continued discussion of .docx
Overview1)             Overview – The continued discussion of .docxOverview1)             Overview – The continued discussion of .docx
Overview1) Overview – The continued discussion of .docxalfred4lewis58146
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netredpel dot com
 
Graph-based analysis of resource dependencies in project networks
Graph-based analysis of resource dependencies in project networksGraph-based analysis of resource dependencies in project networks
Graph-based analysis of resource dependencies in project networksGurdal Ertek
 
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...IJERA Editor
 
00b7d51ed81834e4d7000000
00b7d51ed81834e4d700000000b7d51ed81834e4d7000000
00b7d51ed81834e4d7000000Rahul Jain
 
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...IJCNCJournal
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfssuserf7cd2b
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfkndnewguade
 
Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...
Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...
Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...ijfcstjournal
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksPvrtechnologies Nellore
 
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET Journal
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
 
Complex Project Crashing Algorithm
Complex Project Crashing AlgorithmComplex Project Crashing Algorithm
Complex Project Crashing AlgorithmIOSR Journals
 
IRJET- Review on Scheduling using Dependency Structure Matrix
IRJET-  	  Review on Scheduling using Dependency Structure MatrixIRJET-  	  Review on Scheduling using Dependency Structure Matrix
IRJET- Review on Scheduling using Dependency Structure MatrixIRJET Journal
 

Similar to An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools (20)

Overview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docxOverview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docx
 
Yagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docx
Yagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docxYagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docx
Yagmur Bostanci47 Hackensack Street, East Rutherford, NJ929-22.docx
 
Overview1) Overview – The continued discussion of .docx
Overview1)             Overview – The continued discussion of .docxOverview1)             Overview – The continued discussion of .docx
Overview1) Overview – The continued discussion of .docx
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri net
 
Graph-based analysis of resource dependencies in project networks
Graph-based analysis of resource dependencies in project networksGraph-based analysis of resource dependencies in project networks
Graph-based analysis of resource dependencies in project networks
 
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
 
00b7d51ed81834e4d7000000
00b7d51ed81834e4d700000000b7d51ed81834e4d7000000
00b7d51ed81834e4d7000000
 
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
 
Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...
Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...
Multiprocessor scheduling of dependent tasks to minimize makespan and reliabi...
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
Impact of Graphs and Network in Minimizing Project and Product Cost
Impact of Graphs and Network in Minimizing Project and Product CostImpact of Graphs and Network in Minimizing Project and Product Cost
Impact of Graphs and Network in Minimizing Project and Product Cost
 
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
 
Ip and 3 g
Ip and 3 gIp and 3 g
Ip and 3 g
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
Complex Project Crashing Algorithm
Complex Project Crashing AlgorithmComplex Project Crashing Algorithm
Complex Project Crashing Algorithm
 
Bulk transfer scheduling and path reservations in research networks
Bulk transfer scheduling and path reservations in research networksBulk transfer scheduling and path reservations in research networks
Bulk transfer scheduling and path reservations in research networks
 
IRJET- Review on Scheduling using Dependency Structure Matrix
IRJET-  	  Review on Scheduling using Dependency Structure MatrixIRJET-  	  Review on Scheduling using Dependency Structure Matrix
IRJET- Review on Scheduling using Dependency Structure Matrix
 
Cb32492496
Cb32492496Cb32492496
Cb32492496
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206 ISSN: 2249-6645 An Approach for Project Scheduling Using PERT/CPM and Petri Nets (PNs) Tools Amer A. M. Boushaala (Department of Industrial and Manufacturing Systems Engineering / University of Benghazi, Libya) ABSTRACT: The Petri Nets are more powerful models as compared to the PERT/CPM charts. The Petri Nets show the same type of scheduling constraints as the PERT/CPM charts does. We can easily convert a PERT/CPM networks to a Petri Net model.This work shows how to use Petri net’s for modeling and verifying project management networks. Software for a functional analysis of a Petri Net model is developed. The developed software enables analyzing of a system for its various properties irrespective of time. The software analysis is based on some approaches used to determine the various properties of PN model: livens, safeness, reach-ability and conservativeness. This paper proposes a PN based modeling approach to provide a formal way to verify that all the activities are well connected in the project network. This PN model can then be analyzed through (PN based) scheduling techniques, used to find the critical path, used as a basis to develop algorithms for resource-constrained project management, and used for other decisions related to project management. The proposed PN based approach enables the project manager to consider not only resources but also all different types of variables/constraints related to a project, e.g. costs of activities. Keywords: CPM, PERT, Petri Net’s, Verifications I. INTRODUCTION CPM/PERT are major tools for project management. They are networks that show precedence relations of activities of a project with the activity times. They are used to find project completion time, which is the longest path in the network. They are also used to find other related information about the activities, e.g., slack time, earliest start and end time. All these analyses are made based on the infinite resource assumption. Then, resource allocation of the project is carried out. That is, finite resources are allocated to the project activities whose time requirements were calculated based on the infinite resource assumption. However, instead of this two-step approach to the resource-constrained project management, a onestep approach, through Petri nets (PNs), is possible. Furthermore, CPM/PERT; do not provide a formal way to verify that all the activities are well connected in the project network. Liang, Chen and Wang [1] introduced a project model, called SPREM, which extends CPM/PERT's notation to four types of vertices to express the non-deterministic and iterative behaviors of software engineering projects. They compared it with PNs, and discussed its analysis and behavioral properties. These properties are verified through several algorithms they proposed. However, as discussed in section 5, the well known place (transition) invariants help verify some of these properties without any additional algorithms. Desrochers and Al-Jaar [2] give some advantages of PNs: PNs capture the precedence relations; conflicts and buffer sizes can be modeled easily; PN models represent a hierarchical modeling tool with a well-developed mathematical and practical foundation. These advantages help model and verify (resource-constrained) project networks. Several PN based approaches to project management were proposed in the literature. Jeetendra et al. [3] evaluate conventional project management tools, state their inadequacies and list advantages of using PNs for project management. Chang and Christensen [4] propose PM-Net for software development, which adopts the basic concepts of PNs with extensions to represent both decisions and artifacts. Ashok Kumar and Ganesh [5] also describe project management models with their inadequacies, and propose a new model based on PNs and demonstrate its usefulness for real-time activity scheduling in a resource-constrained project environment. However, these approaches need to modify and extend basic PN semantics and add new tools to analyze the project network. For example, Jeetendra et al. [3] change PN semantics through a precedence matrix they developed. Conflicting transitions in traditional PNs behave concurrently in their definition. This matrix is then used to help determine floats and the critical path and to find deadlocks. Ashok Kumar and Ganesh [5] also add several features to basic PN semantics for project management. The proposed PN based approach facilitates modeling (resource-constrained) projects, and verifying some properties of the projects networks, exploiting the well known place (transition) invariants, through the basic PN definitions. That is, contrary to some approaches in the literature, there is no need to modify the basic PN semantics to model activities and decisions related to a project. This increases the capability of the basic PNs, without any extension in the theory, to model projects. Transitions are used to model all the preconditions, for an activity to start, which is modeled via a place. The place invariants are then used to verify some properties of the projects, as discussed in section 5. This model can then be analyzed through (PN based) scheduling techniques [6, 7], and used to find the critical path [8], and used as a basis to develop algorithms for resource-constrained project management [9, 10]. These considerations are beyond the scope of this paper. The aim of this paper is to show how to model project networks with PNs without any modification or extension in the basic PN semantics, and how to compute the critical path and verify some project properties through the well known place invariants. www.ijmer.com 3200 | Page
  • 2. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206 ISSN: 2249-6645 II. PERT/CPM ACTIVITY NETWORKS The foundation of the approach came from the Special Projects Office of the US Navy in 1958. It developed a technique for evaluating the performance of large development projects, which became known as PERT - Project Evaluation and Review Technique. Other variations of the same approach are known as the Critical Path Method (CPM) or Critical Path Analysis (CPA) [11, 12]. The heart of any PERT chart is a network of tasks needed to complete a project, showing the order in which the tasks need to be completed and the dependencies between them. This is represented graphically as shown in Fig. 1. The diagram consists of a number of circles, representing events within the development lifecycle, such as the start or completion of a task, and lines, which represent the tasks themselves. Each task is additionally labeled by its time duration. Thus the task between events 4 and 5 is planned to take 3 time units. The primary benefit is the identification of the critical path. The critical path = total time for activities on this path is greater than any other path through the network (delay in any task on the critical path leads to a delay in the project). Diagram Symbols illustrated in Fig. 2. Project network complexity is often recognized way, but not completely understood by everyone. Boushaala [13] proposed a new measure of project complexity. The developed measure showed more sensitivity to the changes in the network data and give accurate quantified results in evaluating the project complexity where the critical activities, the critical paths, number of critical activities to the total number of project activities, the length of critical path, the resource types and their availability are considered. Fig. 1 Example of an activity network Fig. 2 Symbols used in activity networks III. MODELING WITH PETRI NET’S A Petri net (PN) is formally defined as a four-tuple C= (P,T, I,O) where P is a finite set of places p, T is a finite set of transitions t, I is a mapping from transitions to a subset of places (bag of input places) such that I(t) represents input places for transition t, and O is a mapping from transitions to a subset of places (a bag of output places) such that O(t) represents output places for transition t. Multiple occurrences of each in the input and output bags are allowed [14, 15]. A PN can also be described by a bipartite directed graph with two types of nodes: circles for places and bars for transitions. Directed arcs connected places and transitions. Let B ( p, t ) and F ( p, t ) be, respectively, the number of occurrences of places P in the input and output bags of transition t. Then B, F and D = F - B, respectively, define the backward, forward and incidence matrices of the PN. These matrices define the topology of the PN. The dynamics of the PN are defined by marking  of the PN;  is a state vector with  (p) is the number of tokens in place p. The dynamics of the PN are controlled by the execution of that PN. A PN executes by firing its transitions. A transition fires by removing tokens www.ijmer.com 3201 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206 ISSN: 2249-6645 from its input places and depositing tokens at its output places. A transition may fire if it is enabled. A transition t is enabled in marking  if   B.ft where ft = (0, 0, ... ,1 , 0, ..., 0) with 1 corresponding to transition t. If  ’ is a new marking after firing transition t, then  ’ =  + D.ft defines the dynamics of the PN. For a sequence  of n transitions, the dynamics equation becomes  n =  0 + D.ft where f =  t f t,  is a set of n transitions and  0 is the initial marking; f is called the firing vector of the sequence. Each marking defines a state. Firing a transition may result in a new state. All the possible states define the state space of the PN. From an analytical perspective, it is quite important to determine all the reachable states. It is also important to determine whether or not the PN is live or dead-lock free, bounded (number of tokens in any place is finite in any marking), conservative (the weighted number of tokens in any marking is fixed and finite) and consistent (there is a firing vector with all positive elements). A live and consistent PN is cyclic, which is typical property of manufacturing systems. One may also be interested in other features of a PN as a controller, such as recoverability and fairness. Some of these properties can be mathematically analysed through the P-and T-invariants of the PN [15, 16]. 3.1 Marked Graph A marked graph is a PN in which each place is an input for exactly one transition and an output for exactly one transition. Alternatively, we can say that each place exactly one input and one output [16, 17]. Definition: A marked graph is a PN C = ( P,T,I,O ) such that for each p i P,I(pi)  = {tj/pi O(tj)} =1 and O(pi) = {tj/pi I(tj)} =1. Marked graphs can model concurrence and synchronization but cannot model conflict or data-dependent decisions. The properties which have been investigated for marked graphs have been Livens, safeness, and reach-ability. Marked graphs can model concurrence and synchronization but cannot model conflict or data-dependent decisions. The properties which have been investigated for marked graphs have been Livens, safeness, and reach-ability. In the investigation of these properties, the major structural parts of a marked graph of interest are its cycles. A cycle in a marked graph is a sequence of transitions tj1tj2...tjk such that for each tjr and tjr+1 in the sequence there is a place pir the pir  O(tjr) and pirI(tjr+1) and tj1= tjk. A cycle is such a closed path from a transition back to that same transition. If P` P is a subset of places that compose a cycle, then the characteristic vector U= ( u i i = { 1, 2, ..., n} such that crdi U = 1 for pi  P`, is a p- invariant of PN. If U' and U'' are P- invariants of PN, then U = U' + U'' + ... is also a P-invariant of PN, where crdi U = ui for U=(u1,u2,...,ui,...,ur) [16]. 3.2 P – Invariant U is said to be a P-invariant of a PN if and only if U=(u 1,u2,...,un) is a vector such that D*U=0 and ui  0 for I =1,2,...,n and D is the incidence matrix. The following theorem provides the condition allowing solving the reachability problem states. Given a Petri net C =( P,T,I,O,µo ) with marking µ ( R ( C,µo ) ) and marking µ` ( R ( C,µo ) ). The problem is if µ` is reachable from µ , i.e. µ`( R ( C,µ ) ) [10,18]. Theorem (1): Let µ0 be an initial marking and let µ ( R ( C,µ0 ) ). If U is an P-invariant, then µ0 UT = µ UT The above theorem provides the condition allowing solving the so called reachability problem. The problem can be stated as following. Given a PN C = ( P,T,I,O,µo ) with marking µ ( R ( C,µ0 ) ) and marking µ`( R ( C,µ0 ) ). Is µ` reachable from µ, i.e. µ`( R (C,µ) )?.As shown in Fig. 3[19]. 3.3 Software for a Functional Analysis of a Petri Net Model The developed software enables analyzing of a system for its various properties irrespective of time. Functional analysis has been used in the Petri net to refer to this type of analysis. The software analysis is based on some approaches used to determine the various properties of PN model: livens, safeness, reach-ability and conservativeness. Fig. 3 shows the flow chart of computing P-invariants. Input / Output Matrices Compute Loops U = u1 + u2 + .... Is U*D+0? No Deadlock Yes M' is reached from M Yes Is M * U = M' * U No M' is not reached from M Fig. 3: Flow chart of computing P-invariants www.ijmer.com 3202 | Page
  • 4. www.ijmer.com IV. International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206 ISSN: 2249-6645 HEADINGS CONVERSION OF PERT/CPM CHARTS INTO EQUIVALENT PETRI NET MODEL The Petri Nets show the same type of scheduling constraints as the PERT/CPM charts does. We can easily convert a PERT/CPM networks to a Petri Net model. Each activity in the PERT chart is represented by a place, while the precedence constraints are represented by the transitions. In CPM chart each event is represented by place (transition), while the activity is represented by transition (place). The Petri Net is excellent vehicle to represent the concurrency and precedence constraints of the PERT chart. In modelling the PERT chart with the Petri Net, activities that are represented by places and transitions are reserved to model multiple resources of limited amounts. Fig. 4 demonstrates the conversion process of PERT/CPM charts into Petri net chart. Activity on Arc Activity On Node A A B 1 B 3 2 a ) PERT Chart b ) Equivalent CPM Chart for PERT Chart tA Transition PB PA tB P2 P1 t1 P3 OR Equivalent PN diagram for the PERT diagram t1 t3 t2 PA PB d ) Equivalent PN diagram for the CPM diagram B A C t1 PA t2 t3 t5 e ) CPM chart PB PC t4 t6 f ) Equivalent PN diagram for e ) CPM chart Fig. 4: Conversion of PERT/CPM charts into Petri net chart The Petri Nets are more powerful models as compared to the PERT/CPM charts. The following reasons may be given for it:  The repeated performance of activities, if necessary, can be modelled by the PN.  Required resources per activity appear explicitly as tokens in representation.  Non-deterministic aspects can be dealt with. For example: the order in which a particular resource performs some tasks may not be totally specified. V. MODELING PROJECT NETWORKS THROUGH PETRI NETS By definition of a project, the project is completed when all the activities are processed exactly once. In PN terminology, this means that all the transitions must fire exactly once, i.e. U.D = 0 for U = 1, where 1 is a column vector with all entries being one. This transition invariant verifies that the precedence relations among the activities are well established (the nodes are strongly connected), i.e. the project can be completed. Note that because the PN model of a project is a marked graph, the transition invariant is also a sufficient condition. D.1 = 0 means that the sum of each and every row of D should be zero. Hence, to verify that the project can be completed, it is sufficient to show that the incidence matrix of the PN model of the project has this property and that the PN is a marked graph. The following demonstrates this through an illustrative example. Consider a project consists of 8 activities A, B, C, D, E, F, G, and H with their times of completion as shown in Table 1 [18]. The project will be finished after 21 weeks, which is the CPM network contains two of critical paths. The first critical bath consists of 4 activities A, B, E, and H, and the second critical bath consists of 5 activities A, B, D1, F, and H. The activities D1 and D2 were dummies with zero duration. Fig. 5 shows A CPM project network for Table 1 with completion time for the project. Table 1: The sequence of the project activities Activity Precedecessor(s) Duration ( Weeks ) A -----3 B A 6 C A 4 D A 3 E B 4 F B, C, D 4 G B 1 H E, F 8 www.ijmer.com 3203 | Page
  • 5. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206 ISSN: 2249-6645 3 9 9 G 0 6 1 2 A 0 0 6 F 9 4 0 4 4 C 3 3 3 1 0 D1 B 0 E 9 21 8 0 0 7 H 13 13 4 21 0 0 D2 3 D 5 9 6 3 Fig. 5: A CPM project net work for table 1 with completion time for the project [13] 1 P9 t8 P3 PB t3 PG P10 t4 t14 4 6 t9 PE P19 P11 t7 P1 t1 PA t2 P4 t5 3 0 PD1 t12 PC 4 P17 t13 t15 PF 4 PH P20 t17 8 t16 PD2 0 P5 t6 PD t10 t11 3 P13 Fig. 6: Petri net (PN) model of figure 5 Fig. 6 shows the PN model of the project network in Fig. 5. For example activity A (PA) needs 3days to be completed. Activity times are denoted within the circles (places), which model the timed places. The bars denote immediate transitions, which model logical conditions (transitions t1 and t2 were pre and post conditions of PA) and take zero time to fire. The same as for the other activities from B through H including dummy activities D1 and D2 have pre and post conditions represented in transitions. All other places P1, P3, P4, … , and P20 were connection places between all the project activities, for example P3 is the connection between the two activities PA and PB through t2 which is post condition of PA and t3 which is precondition of PB, as well as for the other remaining places ( e.g. P4, P5, … , P20 ) and needs zero time to be completed. The incidence matrix of Fig. 6 is shown below. The sum of each and every row of the incidence matrix should be zero and each and every column should have at least one -1 and +1 entry to verify that the corresponding PN models the project correctly, i.e. all the activities, hence the project, can be completed t1 t 2 t 3 t 4 t 5 t 6 t 7 t8 t 9 t10 t11 t12 t13 t14 t15 t16 t17 p1  1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 pA 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 p3 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 p4 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 p5 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 pB pC 0 0 0 0 1 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 pD 0 0 0 0 0 1 0 0 0 1 0 p9 0 0 0 1 0 0 0 1 0 p10 0 0 0 1 0 0 0 p11 0 0 0 1 0 0 1 0 0 pD1 0 0 0 0 0 0 1 0 p13 0 0 0 0 0 0 0 pD2 0 0 0 0 0 0 pE 0 0 0 0 0 pG 0 0 0 0 p17 0 pF 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 1 0 1 0 0 0 0 0 p19 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 p 20 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 pH 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 -u1 u1 – u2 1 1 + u17 = 0 =0 u16 – u17 = 0 www.ijmer.com 3204 | Page
  • 6. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206 ISSN: 2249-6645 In order to illustrate the application of the approach proposed, let consider the example provided in the previous example of Fig. 6. An event graph (like PN in general) said to be strongly connected if there is a directed path joining any node A to any node B of the graph. The event graph presented in Fig. 6 strongly connected. We also define an elementary circuit in a strongly connected event as a directed path goes from one node, i.e. a place or transition, back to the same node, which any other node is not repeated. For instance, Fig. 6 exposes five elementary circuits, namely: 1 = ( p1, t1;pA ,t2; p3 ,t3; pB ,t4;p9 ,t8;pG ,t17; ) 2 = (p1,t1;pA ,t2;p3 ,t3;pB ,t4;p10 ,t9;pE ,t14;p19 ,t16;pH ,t17; ) 3 = (p1,t1;pA ,t2;p3 ,t3;pB ,t4;p11 ,t7;pD1 ,t12;p17 ,t13;pF ,t15;p20 ,t16;pH ,t17; ) 4 = (p1,t1;pA ,t2;p4 ,t5;pC ,t12;p17 ,t13;pF ,t15;p20 ,t16;pH ,t17; ) 5 = (p1,t1;pA ,t2;p5 ,t06;pD ,t10;p13 ,t11;pD2 ,t12;p17 ,t13;pF ,t15;p20 ,t16;pH ,t17; ) If the number of tokens in a marking remains fixed for all markings in the reachability set, the Petri net is then said to be strictly conservative. An immediate consequence of conservativeness is boundedness of the Petri net. The boundedness property implies that the number of tokens in any place does not increase beyond a limit. This in turn guarantees a finite reachability set for the Petri net. If there exist an U with all positive elements the Petri net is then said to be conservative. If U = (1,...,1) then the Petri net is strictly conservative. The total number of tokens in i ( i=1,2,5  is then: n1(1) = μ (p1 ) + μ ( pA ) + μ ( p3 ) + μ ( pB) + μ ( p9 ) + μ ( pE ) + = 1 + 0 + 0 + 0 + 0 + 0 = 1 n2(2) = μ (p1 ) + μ ( pA ) + μ ( p3 ) + μ ( pB) + μ ( p10 ) + μ ( pG ) + μ ( p19 ) + μ ( pH ) = 1 + 0 + 0 + 0 + 0 + 0 + 0 + 0 = 1 n3(3) = μ (p1 ) + μ ( pA ) + μ ( p3 ) + μ ( pB) + μ ( p11 ) + μ ( pD1 ) + μ ( p17 ) + μ ( pF ) + μ ( p20 ) + μ ( pH ) = 1+ 0 + 0 + 0 +0+0+0+0+0+0=1 n4(4) = μ (p1 ) + μ ( pA ) + μ ( p4 ) + μ ( pC) + μ ( p17 ) + μ ( pF ) + μ ( p20 ) + μ ( pH ) = 1 + 0 + 0 + 0 + 0 + 0 + 0 + 0 = 1 N5(5) = μ (p1 ) + μ ( pA ) + μ ( p5 ) + μ ( pD) + μ ( p13 ) + μ ( pD2 ) + μ ( p17 ) + μ ( pF ) + μ ( p20 ) + μ ( pH ) = 1+ 0 + 0 + 0 +0+0+0+0+0+0=1 Therefore, the total P – invariants of all loops U = (5, 5, 3, 1, 1, 3, 1, 1, 1, 1, 1, 1, 1, 3, 3, 1, 3, 4). By applying the equations : U * D = (0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 ), this means that the system is deadlock free. To compute the total time for each loop to find the critical path(s) as follows: 1 = ( p1, pA , p3 , pB ,p9 ,pG ) = 0 + 3 + 0 + 6 + 0 + 1 = 10 weeks 2 = (p1, pA ,p3 ,pB ,p10 ,pE ,p19 ,pH ) = 0 + 3 + 6 + 0 + 4 + 0 + 8 = 21 weeks 3 = (p1, pA ,p3 ,pB ,p11 ,pD1 ,p17 ,pF ,p20 ,pH , ) = 0 + 3 + 0 + 6 + 0 + 0 + 0 + 4 + 8 = 21 weeks 4 = (p1,pA ,p4 ,pC ,p17 ,pF ,p20 ,pH ) = 0 + 3 + 0 + 4 + 0 + 4 + 0 + 8 = 19 weeks 5 = (p1,pA ,p5 ,pD ,p13 ,pD2 ,p17 ,pF ,p20 ,pH ) = 0 + 3 + 0 + 3 + 0 + 0 + 0 + 4 + 0 + 8 = 18 weeks Then there is two critical paths γ2 and γ3, as the same as of the CPM network Figure 5. VI. CONCLUSIONS AND REMARKS The proposed PN based approach to project management facilitated modeling (resource -constrained) projects, and verifying some properties of the projects networks, exploiting the well known place ( transition ) invariants, through the basic PN semantics. That is, contrary to some approaches in the literature, there is no need to modify the basic PN semantics to model activities and decisions related to a project. This increases the capability of the basic PNs, without any extension in the theory, to model projects. Places were used to model all the preconditions, including resources, for an activity to start, which was modeled via a place (transition). The place (transition) invariants were then used to verify some properties of the projects. This PN model can then be analyzed through (PN based) scheduling techniques, used to find the critical path, used as a basis to develop algorithms for resource-constrained project management, and used for other decisions related to project management. The transition invariant means that the sum of each and every row of the incidence matrix should be zero. Hence, to verify that the project can be completed, it is sufficient to show that the sum of each and every row of the incidence matrix is zero, and that each and every column has at least one -1 and +1 entry. The proposed PN based approach enables the project manager to consider not only resources but also all different types of variables/constraints related to a project, e.g. costs of activities. Any of these variables can be considered fuzzy as well. In this case, fuzzy arc weights cause the firing rule to be modified. These are possible future research directions. REFERENCES [1] [2] [3] [4] [5] [6] B.S., Liang, J.N., Chen, and F.J., Wang, A project model for software development, Journal of Information Science and Engineering, 16, 2000, 423 – 446. A.A., Desrochers, and R.Y, Al-Jaar, Application of Petri nets in manufacturing systems: modeling, control, and performance analysis (New York: IEEE Press, 1995). V.A., Jeetendra, O.V., Chetty, and J., Reddy, Petri nets for project management and resource leveling, International Journal of Advanced Manufacturing Technology, 16, 2000, 516-520. C.K.,Chang and M., Christensen, A net practice for software project management, IEEE Software, November/ December, 1999, 8088. V.K., Kumar, and L.S., Ganesh, Use of Petri nets for resource allocation in projects, IEEE Transactions on Engineering Management, 45(1), 1998, 49 – 56. W.M.P., Van der Aalst, Petri net based scheduling, OR Spectrum, 18, 1996, 219-229. www.ijmer.com 3205 | Page
  • 7. www.ijmer.com [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3200-3206 ISSN: 2249-6645 W., Herroelen, and R., Leus, Project scheduling under uncertainty: Survey and research potentials, European Journal of Operational Research, 165, 2005, 289-306. S.M., Chen, and T.H., Chang, Finding multiple possible critical paths using fuzzy PERT, IEEE Transactions on System Management, and Cybernetics Part B: Cybernetics, 31 (6), 2001, 930 – 937. K.W., Kim, Y.S., Yun, J.M., Yoon, M., Gen, and G., Yamazaki, Hybrid genetic algorithm with adaptive abilities for resourceconstrained multiple project scheduling, Computers in Industry, 56, 2005, 143- 160. V., Valls, F., Ballestín, and S., Quintanilla, Justification and RCPSP: A technique that pays, European Journal of Operational Research, 165, 2005, 375-386. Erik and Will, Project scheduling a research handbook, (Kulwer Academic Publishers : New York, Boston, London, Moscow, and Dordrecht, 2002). J.P., Lewis, Project planning, scheduling and control, (Mc Graw – Hill Companies, Inc., 2001). A. M., Boushaala, Project complexity indices based on topology features, Al-satil Journal, 4 (8), 2010, 137-150. T., Peterson, Petri Net Theory and the Modeling of Systems (Prentice Hall, 1981). Z., Banaszak and K., Jedrzejek, Rule – based knowledge verification using Petri nets, 3rd Turkish Symposium on AI and Networks, June 1994. P.M., del Foyo and J. R., Silva, Using timed Petri nets for modeling and verification of timed constrained workflow systems, ABCM Symposium Series in Mechatronics, 3, 2008, 471-478. Y., Chen, P., Fsu, and Y., Chang, A Petri net approach to support resource assignment in project management, IEEE Transactions on Engineering Management, 38(3), 2008, 564 – 574. I. Amiruddin, K. Abdul Rashid, and J. Wisam, Literature review in resource – constrain critical path method technique, European Journal of Scientific research, 29(2), 2009, 222-236. I. M., Buseif, An approach to FMS design using SADT and PN tools, doctoral diss., Faculty of Production Engineering, Warsaw University of Technology, Warsaw – Poland, 1997. www.ijmer.com 3206 | Page