SlideShare a Scribd company logo
1 of 6
Download to read offline
P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60
www.ijera.com 55 | P a g e
A Critical Path Problem Using Intuitionistic Triangular Fuzzy
Number
P.JAYAGOWRI*, G.GEETHARAMANI**
*(Department of Mathematics, Sudharsan Engineering College, and Anna University Chennai, India.)
** (Department of Mathematics, BIT Campus, Anna University Chennai, India.)
ABSTRACT
Critical path method is a network based method planned for development and organization of complex project
in real world application. In this paper, a new methodology has been made to find the critical path in a directed
acyclic graph, whose activity time uncertain. The vague parameters in the network are represented by
intuitionistic triangular fuzzy numbers, instead of crisp numbers. A new procedure is proposed to find the
optimal path, and finally illustrative examples is provided to validate the proposed approach.
Keywords - Critical path, Graded mean integration representation of intuitionistic triangular fuzzy number,
Intuitionistic triangular fuzzy number, Order relation, Ranking of intuitionistic fuzzy number.
I. INTRODUCTION
A constructed network is an imperative tool in
the development and organizes of definite project
execution. Network diagram play a vital role in
formative project-completion time. In general a
project will consist of a number of performance and
some performance can be started, only after ultimate
some other behavior. There may be some behavior
which is self-determining of others. Network analysis
is a practice which determines the various sequences
of behavior in relation to a project and the
corresponding project completion time. The method
is widely used are the critical path method program
assessment and evaluation techniques. The successful
finishing of critical path method requires the clear
unwavering time duration in each movement.
However in real life situation vagueness may arise
from a number of possible sources like: due date may
be distorted, capital may unavailable weather
situation may root several impediments. Therefore
the fuzzy set theory can play a significant role in this
kind of problems to handle the ambiguity about the
time duration of deeds in a project network. To
effectively deal with the lack of clarity involved in
the process of linguistic predictable times the
intuitionistic trapezoidal fuzzy numbers are used to
distinguish the fuzzy measures of linguistic values. In
the current past, fuzzy critical path problems are
addressed by many researchers, like S.Chanas ,
T.C.Han, J.Kamburowski, Zielinski, L.Sujatha and
S.Elizabeth. S.Chanas, and J.Kamburowski,[11]
explained fuzzy variables PERT. S.Chanas P.and
Zielinski, [10] have also discussed critical path
analysis in networks. G.Liang and T.C.Han [4]
proposed a fuzzy critical path for project networks.
Elizabeth and L.Sujatha [13] discussed a critical path
problem under fuzzy Environment. They have
deliberated a critical path problem for project
networks. C.T Chen and S.F Huang [2] proposed a
new model that combines fuzzy set theory with the
PERT technique to determine the critical degrees of
activities and paths, latest and earliest starting time
and floats. The Bellman algorithm seeks to specify
the critical path and the fuzzy earliest and latest
starting time and floats of activities in a continuous
fuzzy network. S.H. Nasution [12] proposed a fuzzy
critical path method by considering interactive fuzzy
subtraction and by observing that only the
nonnegative part of the fuzzy numbers can have
physical elucidation.
This paper is organized as follows: In section 2, basic
definitions of intuitionistic fuzzy set theory have been
reviewed. Section 3, give procedures to find out the
intuitionistic fuzzy critical path using an illustrative
example. In section 4 the obtained results are
discussed. Finally, in section 5 some conclusions are
drawn.
II. PRELIMINARIES
Some basic definitions related to our research work
are review.
2.1 Intuitionistic Fuzzy Set
Let X be an Universe of discourse, then an
Intuitionistic fuzzy set(IFS) A in X is given by
A=   X/x)(Aγ),(Aμx, xx , where the function
RESEARCH ARTICLE OPEN ACCESS
P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60
www.ijera.com 56 | P a g e
 0,1X:(x)Aμ  and
 0,1X:(x)Aγ  determine the degree of
membership and non-membership of the
element Xx , respectively and for
every Xx , 1.(x)Aγ(x)Aμ0 
2.2 Triangular Intuitionistic Fuzzy Number
An intuitionistic fuzzy number A={<a,b,c> <e,b,f>}
is said to be a triangular intuitionistic fuzzy number if
its membership function and non- membership
function are given by
&Rcb,a,where
cxb
b)(c
x)(c
bx1
bxa
a)(b
a)(x
(x)A 

























Rfb,e,where
xb
b)f(
b)(x
bx0
bx
)e(b
)x(b
(x)A 
























f
e

2.3 Graded Mean Integration Representation for
Triangular Intuitionistic Fuzzy numbers
The membership and non-membership function of
triangular intuitionistic fuzzy numbers are defined as
follows.
fx;w
bf
bx
(x)Rbxe;w
eb
xb
(x)L
cx;w
bc
xc
(x)Rbxa;w
ab
ax
(x)μL
&
&














b
b


Then
1
R
1
L and

are inverse functions of functions L
and R respectively,
h/wb)(fb(h)
1
γR&h/we)(bb(h)
1
γL
h/wb)(cc(h)
1
μR&h/wa)(ba(h)
1
μL








Then the graded mean integration representation of
membership function and non-membership function
are,
&)1(
6
4
(A)μP 


cba
)2(
3
(A)P 


feb

2.4 Arithmetic Operations of Triangular Intuitionistic
Fuzzy Number
)3
'
b,
2
b,1
'
b;
3
b,
2
b,
1
b(
I
B
~
and)3
'
a,
2
a,1
'
a;
3
a,
2
a,
1
a(
I
A
~
If


are two intuitionistic fuzzy numbers we define,
Addition :
)3
'
b3
'
a,
2
b
2
a,1
'
b1
'
a
;
3
b
3
a,
2
b
2
a,
1
b
1
a(
I
B
~I
A
~


Subtraction:
)1
'
3
'
,
22
,3
'
1
'
;
13
,
22
,
31
(
~~


bababa
bababa
I
B
I
A
2.5 Order Relation
Consider an order relation among intuitionistic
fuzzy numbers.Rule:Let A and B be two
triangular intuitionistic fuzzy numbers such that
and)
A
γ;
3γc,
2γc,
1γc
A
μ;
3μa,
2μa,
1μa(A 
B
γ
A
γand
B
μ
A
μwith
)
A
γ;
3γd,
2γd,
1γd
A
μ;
3μb,
2μb,
1μb(B


P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60
www.ijera.com 57 | P a g e
(3)
3γd
3γc;
3μb
3μa3.
2γd
2γc;
μ2
b
2μa2.
1γd
1γc;
1μb
1μa1.


2.6 Ranking of Intuitionstic Triangular Fuzzy umber
    fb,e,;cb,a,
'
A
~
numberfuzzysticintuitioniTriangularA

Then the graded mean integration representation of
membership function and non-membership function
of A
~
are
.B
~
A
~
)B
~
(
β
γP)A
~
(
β
γPand)B
~
(
α
μP)A
~
(
α
μ(iii)
.B
~
A
~
)B
~
(
β
γP)A
~
(
β
γPand)B
~
(
α
μP)A
~
(
α
μ(ii)
.B
~
A
~
)B
~
(
β
γP)A
~
(
β
γPand)B
~
(
α
μP)A
~
(
α
μP(i)
thennumbersfuzzytriangularsticIntuitioni
twoanybe)fb,,ecb,,a(B
~
)andfb,e,cb,a,(A
~
Let
3
2fbf)-e(2β
)A
~
(γP
&
3
2bcc)α(a
)A
~
(μP












III. INTUITIONISTIC FUZZY CRITICAL PATH
METHOD
The following is the Procedure for finding
intuitionistic fuzzy critical path.
3.1 Notations
N= The set of all nodes in a project network.
EST = Earliest Starting time
EFTµij = Earliest finishing time for membership
function
EFTγij = Earliest finishing time for non-membership
function
LFTµij = Latest finishing time for membership
function
LFTγij = Latest finishing time for non- membership
function
LSTµij = Latest starting time for membership function
LSTγij = Latest starting time for non-membership
function
TF = Total float
Tij = The Intuitionistic fuzzy activity time
3.2 Forward Pass Calculation
Forward pass calculations are employed to calculate
the Earliest Starting Time(EST) in the Project
network
 
 
(4)nodesprecedingofnumberi
,jiγt)(
iγ
E
i
MinjγE
nodesprecedingofnumberi
,jiμt)(
iμ
E
i
MaxjμE




 
  )5(timeactivityFuzzysticIntuitioni)(
jiγ
EST
jiγ
EFT
functionmembershipnonfortimeFinishingEarliest
timeactivityFuzzysticIntuitioni)(
jiμ
EST
jiμ
EFT
functionmembershipfortimeFinishingEarliest



3.3 Backward Pass Calculation
Backward pass calculations are employed to calculate
the Latest Finishing Time (LFT) in the Project
network
 
 
)6(nodessucceedingofnumber
,)(
nodessucceedingofnumber
,)(




j
jitiLiMaxjL
j
jitjLjMiniL


)7(
timeactivityFuzzysticIntuitioni
)(
jiγ
LFT
jiγ
LST
functionmembershipnonfortimeFinishingLatest
timeactivityFuzzysticIntuitioni
)(
jiμ
LFT
jiμ
LST
functionmembershipfortimeStartingLatest






















P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60
www.ijera.com 58 | P a g e
3.4 Total Float (TF)
(8)
jiγ
EST
jiγ
LSTγTF
or
jiγ
EFT
jiγ
LFTγTF
jiμ
EST
jiμ
LSTμTF
or
jiμ
EFT
jiμ
LFTμTF




3.5 Procedure to Find Intuitionistic Fuzzy Critical
Path
Step1: Construct a network G (V,E) where v is the
set of vertices and E is the set of edges. Here G is an
acyclic digraph and arc length or edge weight are
taken as Intuitionistic Triangular fuzzy numbers.
Step 2: Expected time in terms of Intuitionistic
Triangular fuzzy numbers are defuzzified using
equation 1 and 2 in the network diagram.
Step3: Calculate Earliest Starting time for
membership and non-membership functions ( ESTµij
and ESTγij respectively) according to Forward pass
calculation given in equation (4)
Step4: Calculate Earliest finishing time for
membership and non-membership functions (EFTµij
and EFTγij respectively )using equation (5).
Step 5 :Calculate latest finishing time- LFTµij and
LFTγij - according to backward pass calculation given
in equation(6)
Step 6: Calculate latest starting time -LSTµij and
LSTγij- using equation (7)
Step 7 :Calculate Total float- TFµ and TFγ -using
equation (8)
Step 8: In each activity using (8) whenever one get 0
, such activities are called as Intuitionistic Fuzzy
critical activities and the corresponding paths
Intuitionistic critical paths.
3.5 Illustrative example
Consider a small network with 5 vertices and 6 edges
shown in figure1, where each arc length is
represented as a trapezoidal Intuitionistic fuzzy
number
Table1: Results of the network
Activity Intuitionistic
Fuzzy
Activity time
Defuzzified
Activity time
using equation
1 and 2 for
membership
and non-
membership
functions
TFµ TFγ
1→2 <6,8,10>
<12,14,15>
<8,13.7> 0 2.3
1→3 <7,9,10>
<15,17,16>
<8.8,16> 12.6 0
1→4 <5,6,7>
<16,19,12>
<6,15.7> 0 0
2→4 <7,9,11>
<10,12,13>
<9,11.7> 11 2.3
3→4 <8,10,11>
<9,12,14>
<9.8, 11.7> 12.6 0
4→5 <9,11,13>
<7,9,11>
<11,9> 0 0
P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60
www.ijera.com 59 | P a g e
Table2: Rank value of total slack intuitionstic
fuzzy time of all possible paths for membership
function
Paths IFCPM(pµk)
k=1 to m
Rank
value
defini
tion
2.6
Rank
1→2→4→5 <22,28,34> 28 II
1→4→5 <14,17,20> 17 I
1→3→4→5 <24,30,34> 29.7 III
Table3: Rank value of total slack intuitionstic
fuzzy time of all possible paths for non-
membership function
Paths IFCPM(pγk)
k=1 to m
Rank
value
definiti
on 2.6
Rank
1→2→4→5 <29,35,39> 34.3 II
1→4→5 <23,28,23> 24.7 I
1→3→4→5 <31,38,41> 36.7 III
IV. RESULTS AND DISCUSSION
This paper proposes an algorithm to tackle
the problem in intuitionistic fuzzy environment. In
this paper the trapezoidal intuitionistic fuzzy number
is defuzzified using graded mean integration
representation. Now the intuitionistic fuzzy number is
converted to crisp number. Then applying the
proposed algorithm we find the critical path. The path
in intuitionistic fuzzy project network are
1→4→5,1→2→4→5and 1→3→4→5.The critical
path for intuitionistic fuzzy network for both
membership and non-membership function are
1→4→5. Hence the procedure developed in this
paper form new methods to get critical path, in
intuitionistic fuzzy environment.
V. CONCLUSION
A new analytical method for finding critical
path in an intuitionistic fuzzy project network has
been proposed. We have used new defuzzification
formula for trapezoidal fuzzy number and applied to
the float time for each activity in the intuitionistic
fuzzy project network to find the critical path. In
general intuitionistic fuzzy models are more effective
in determining critical paths in real project networks.
This paper, use the Graded mean integration
representation the Procedure to find the optimal path
in an intuitionistic fuzzy weighted graph having help
decision makers to decide on the best possible critical
path in intuitionistic fuzzy environments.
References
[1] A.I Slyeptsov, T.A. Tyshchuk, Fuzzy Critical
Path Method for Project Network Planning
and Control, Cyber net. System Anal. 3
(1997) 158 -170.
[2] C.T Chen and S.F. Huang, Applying fuzzy
methods for measuring criticality in project
network, Information sciences,
177(2007)2448-2458.
[3] D. Dubois and H. Prade, Possibility Theory:
An Approach to Computerized Processing
of Uncertainty, New York: Plenum, 1988.
[4] G.S. Liang and T.C.Han, Fuzzy Critical Path
for Project Network, Information and
Management Sciences, 15, No. 4 (2004), 29-
40.
[5] Lin, K.C. and Chern, M. S. (1993). The Fuzzy
Shortest Path Problem and its Most Vital
Arcs, Fuzzy Sets and Systems, Vol. 58, No. 3,
pp. 343-353.
[6] Mahdavi. I.. Nourifar, R., Heidarzade. A. and
Amiri. N. M. (2009). A Dynamic
Programming Approach for Finding Shortest
Chains in Fuzzy Network, Applied Soft
Computing, Vol.9. No.2.pp.502-511.
[7] M.Blue, B.Bush and J.Puckett, Unified
Approach to Fuzzy Graph Problems, Fuzzy
Sets and Systems, 125(2002),355-368.
[8] N. Ravi Shankar,V. Sireesha, P. Phani
Booshan Rao, An Analytical Method for
Finding Critical Path in a Fuzzy Project
Network, Int.J.Contemp.Math.Sciences,
5(20)(2010) 953-962.
[9] Salim rezvani , Ranking method of
Trapezoidal Intuitionitic Fuzzy , Annlas of
Fuzzy Mathematics and Informatics, Vol-
5.No:3,(May2013) p.p.515-523.
[10] S.Chanas P. and Zielinski, Critical Path
analysis in the Network with Fuzzy Activity
Times, Fuzzy sets and Systems, 122(2001),
195-204.
[11] S.Chanas and J.Kamburowski, The set of
fuzzy variable in PERT, Fuzzy Sets and
Systems, 5 (1981), 11-19.
[12] S.H. Nasution, Fuzzy critical path method,
IEEE Trans. Systems Man Cyber net, 24
(1994) 48-57
P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60
www.ijera.com 60 | P a g e
[13] S. Elizabeth and L.Sujatha ,Fuzzy Critical
Path Problem For Project Network ,
International Journal of Pure and Applied
Mathematics Volume 85 No. 2 2013, 223-
240.
[14] S.Yao and F.T.Lin Fuzzy Critical Path
Methods Based on Signed Distance ranking
of fuzzy numbers, IEEE Transactions on
systems, man and cybernetics- Part A:
systems and humans, 30(1)2000.
[15] T.C.Han, C.C. Chung and G.S. Liang,
Application of fuzzy critical path method to
airport’s cargo ground operation systems,
Journal of Marine Science and Technology,
14, No. 3 (2006), 139-146.

More Related Content

What's hot

SMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTS
SMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTSSMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTS
SMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTSsmumbahelp
 
Interactive Information Retrieval inspired by Quantum Theory
Interactive Information Retrieval inspired by Quantum TheoryInteractive Information Retrieval inspired by Quantum Theory
Interactive Information Retrieval inspired by Quantum TheoryIngo Frommholz
 
Towards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationTowards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationIDES Editor
 
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...Waqas Nawaz
 
ANN Based POS Tagging For Nepali Text
ANN Based POS Tagging For Nepali Text ANN Based POS Tagging For Nepali Text
ANN Based POS Tagging For Nepali Text ijnlc
 
A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems
A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems
A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems Navodaya Institute of Technology
 
A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...IAEME Publication
 
Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...
Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...
Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...CSCJournals
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
 
Detail description of scientific publications
Detail description of scientific publicationsDetail description of scientific publications
Detail description of scientific publicationsManolis Vavalis
 
Advances in composite integer factorization
Advances in composite integer factorizationAdvances in composite integer factorization
Advances in composite integer factorizationAlexander Decker
 
Data driven approaches to empirical discovery
Data driven approaches to empirical discoveryData driven approaches to empirical discovery
Data driven approaches to empirical discoverySzymon Klarman
 
Csit77406
Csit77406Csit77406
Csit77406csandit
 
Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesData Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesFerdin Joe John Joseph PhD
 
A Survey of Various Methods for Text Summarization
A Survey of Various Methods for Text SummarizationA Survey of Various Methods for Text Summarization
A Survey of Various Methods for Text SummarizationIJERD Editor
 
Partial compute function
Partial compute functionPartial compute function
Partial compute functionRajendran
 
Introduction to Reinforcement Learning for Molecular Design
Introduction to Reinforcement Learning for Molecular Design Introduction to Reinforcement Learning for Molecular Design
Introduction to Reinforcement Learning for Molecular Design Dan Elton
 
Data Structures and Algorithm - Week 11 - Algorithm Analysis
Data Structures and Algorithm - Week 11 - Algorithm AnalysisData Structures and Algorithm - Week 11 - Algorithm Analysis
Data Structures and Algorithm - Week 11 - Algorithm AnalysisFerdin Joe John Joseph PhD
 
Deep Learning for Search
Deep Learning for SearchDeep Learning for Search
Deep Learning for SearchBhaskar Mitra
 

What's hot (20)

SMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTS
SMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTSSMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTS
SMU BSC IT FALL / SUMMER 2013 SOLVED ASSIGNMENTS
 
Interactive Information Retrieval inspired by Quantum Theory
Interactive Information Retrieval inspired by Quantum TheoryInteractive Information Retrieval inspired by Quantum Theory
Interactive Information Retrieval inspired by Quantum Theory
 
Towards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key GenerationTowards Practical Homomorphic Encryption with Efficient Public key Generation
Towards Practical Homomorphic Encryption with Efficient Public key Generation
 
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
ICDE-2015 Shortest Path Traversal Optimization and Analysis for Large Graph C...
 
ANN Based POS Tagging For Nepali Text
ANN Based POS Tagging For Nepali Text ANN Based POS Tagging For Nepali Text
ANN Based POS Tagging For Nepali Text
 
A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems
A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems
A Simple Method for Solving Type-2 and Type-4 Fuzzy Transportation Problems
 
Introduction to fuzzy logic
Introduction to fuzzy logicIntroduction to fuzzy logic
Introduction to fuzzy logic
 
A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...A minimization approach for two level logic synthesis using constrained depth...
A minimization approach for two level logic synthesis using constrained depth...
 
Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...
Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...
Automated Education Propositional Logic Tool (AEPLT): Used For Computation in...
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
Detail description of scientific publications
Detail description of scientific publicationsDetail description of scientific publications
Detail description of scientific publications
 
Advances in composite integer factorization
Advances in composite integer factorizationAdvances in composite integer factorization
Advances in composite integer factorization
 
Data driven approaches to empirical discovery
Data driven approaches to empirical discoveryData driven approaches to empirical discovery
Data driven approaches to empirical discovery
 
Csit77406
Csit77406Csit77406
Csit77406
 
Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning TreesData Structures and Algorithm - Week 8 - Minimum Spanning Trees
Data Structures and Algorithm - Week 8 - Minimum Spanning Trees
 
A Survey of Various Methods for Text Summarization
A Survey of Various Methods for Text SummarizationA Survey of Various Methods for Text Summarization
A Survey of Various Methods for Text Summarization
 
Partial compute function
Partial compute functionPartial compute function
Partial compute function
 
Introduction to Reinforcement Learning for Molecular Design
Introduction to Reinforcement Learning for Molecular Design Introduction to Reinforcement Learning for Molecular Design
Introduction to Reinforcement Learning for Molecular Design
 
Data Structures and Algorithm - Week 11 - Algorithm Analysis
Data Structures and Algorithm - Week 11 - Algorithm AnalysisData Structures and Algorithm - Week 11 - Algorithm Analysis
Data Structures and Algorithm - Week 11 - Algorithm Analysis
 
Deep Learning for Search
Deep Learning for SearchDeep Learning for Search
Deep Learning for Search
 

Viewers also liked

Sri Lank斯里蘭卡
Sri Lank斯里蘭卡Sri Lank斯里蘭卡
Sri Lank斯里蘭卡Jaing Lai
 
H. moyses nussenzveig Curso de Física Básica 1
H. moyses nussenzveig   Curso de Física Básica 1H. moyses nussenzveig   Curso de Física Básica 1
H. moyses nussenzveig Curso de Física Básica 1Rosane Viola
 
Trabajo De Educacion Fisica
Trabajo De Educacion FisicaTrabajo De Educacion Fisica
Trabajo De Educacion Fisicaguest65c993
 
Primera guerra-mundial1361
Primera guerra-mundial1361Primera guerra-mundial1361
Primera guerra-mundial1361Alejandro Peña
 
Mãe que Faz História
Mãe que Faz HistóriaMãe que Faz História
Mãe que Faz História4UComunicacao
 
Kennismiddag Google Min AZ - Iskander Smit
Kennismiddag Google Min AZ - Iskander SmitKennismiddag Google Min AZ - Iskander Smit
Kennismiddag Google Min AZ - Iskander SmitInfo.nl
 
Sectional view of profile for extruded heat sinks
Sectional view of profile for extruded heat sinksSectional view of profile for extruded heat sinks
Sectional view of profile for extruded heat sinksSara Huang
 
Rezumat strategie lugoj
Rezumat strategie lugojRezumat strategie lugoj
Rezumat strategie lugojPaul Keisch
 
PresentacióN6
PresentacióN6PresentacióN6
PresentacióN6hiramnvp
 
Desvendando o risco empresarial: uma abordagem da participação tributária dos...
Desvendando o risco empresarial: uma abordagem da participação tributária dos...Desvendando o risco empresarial: uma abordagem da participação tributária dos...
Desvendando o risco empresarial: uma abordagem da participação tributária dos...berbone
 
Balestreri direitos humanos
Balestreri direitos humanosBalestreri direitos humanos
Balestreri direitos humanosCavaleiro Branco
 
在心靈最微妙的地方
在心靈最微妙的地方在心靈最微妙的地方
在心靈最微妙的地方Jaing Lai
 
Homenagem%20 professor%20p%c3%a9ricles%20senai
Homenagem%20 professor%20p%c3%a9ricles%20senaiHomenagem%20 professor%20p%c3%a9ricles%20senai
Homenagem%20 professor%20p%c3%a9ricles%20senaiPericles Francisco Bueno
 

Viewers also liked (20)

Sri Lank斯里蘭卡
Sri Lank斯里蘭卡Sri Lank斯里蘭卡
Sri Lank斯里蘭卡
 
H. moyses nussenzveig Curso de Física Básica 1
H. moyses nussenzveig   Curso de Física Básica 1H. moyses nussenzveig   Curso de Física Básica 1
H. moyses nussenzveig Curso de Física Básica 1
 
Aj4506186190
Aj4506186190Aj4506186190
Aj4506186190
 
Estrategias de ensino
Estrategias de ensinoEstrategias de ensino
Estrategias de ensino
 
Trabajo De Educacion Fisica
Trabajo De Educacion FisicaTrabajo De Educacion Fisica
Trabajo De Educacion Fisica
 
Primera guerra-mundial1361
Primera guerra-mundial1361Primera guerra-mundial1361
Primera guerra-mundial1361
 
Mãe que Faz História
Mãe que Faz HistóriaMãe que Faz História
Mãe que Faz História
 
Fenômenos
FenômenosFenômenos
Fenômenos
 
Kennismiddag Google Min AZ - Iskander Smit
Kennismiddag Google Min AZ - Iskander SmitKennismiddag Google Min AZ - Iskander Smit
Kennismiddag Google Min AZ - Iskander Smit
 
Mordidas
MordidasMordidas
Mordidas
 
Sectional view of profile for extruded heat sinks
Sectional view of profile for extruded heat sinksSectional view of profile for extruded heat sinks
Sectional view of profile for extruded heat sinks
 
Rezumat strategie lugoj
Rezumat strategie lugojRezumat strategie lugoj
Rezumat strategie lugoj
 
LinkS
LinkSLinkS
LinkS
 
Nbr 8403 emprego de linhas
Nbr 8403 emprego de linhasNbr 8403 emprego de linhas
Nbr 8403 emprego de linhas
 
PresentacióN6
PresentacióN6PresentacióN6
PresentacióN6
 
Ac4506156158
Ac4506156158Ac4506156158
Ac4506156158
 
Desvendando o risco empresarial: uma abordagem da participação tributária dos...
Desvendando o risco empresarial: uma abordagem da participação tributária dos...Desvendando o risco empresarial: uma abordagem da participação tributária dos...
Desvendando o risco empresarial: uma abordagem da participação tributária dos...
 
Balestreri direitos humanos
Balestreri direitos humanosBalestreri direitos humanos
Balestreri direitos humanos
 
在心靈最微妙的地方
在心靈最微妙的地方在心靈最微妙的地方
在心靈最微妙的地方
 
Homenagem%20 professor%20p%c3%a9ricles%20senai
Homenagem%20 professor%20p%c3%a9ricles%20senaiHomenagem%20 professor%20p%c3%a9ricles%20senai
Homenagem%20 professor%20p%c3%a9ricles%20senai
 

Similar to J045055560

Critical Paths Identification on Fuzzy Network Project
Critical Paths Identification on Fuzzy Network ProjectCritical Paths Identification on Fuzzy Network Project
Critical Paths Identification on Fuzzy Network Projectiosrjce
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925IJRAT
 
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...Wireilla
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...ijfls
 
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...AM Publications,India
 
Linear Programming Problems with Icosikaipentagonal Fuzzy Number
Linear Programming Problems with Icosikaipentagonal Fuzzy NumberLinear Programming Problems with Icosikaipentagonal Fuzzy Number
Linear Programming Problems with Icosikaipentagonal Fuzzy Numberijtsrd
 
The cross-association relation based on intervals ratio in fuzzy time series
The cross-association relation based on intervals ratio in fuzzy time series The cross-association relation based on intervals ratio in fuzzy time series
The cross-association relation based on intervals ratio in fuzzy time series IJECEIAES
 
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATION
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATIONEXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATION
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATIONijaia
 
MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...
MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...
MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...ijcsa
 
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...YogeshIJTSRD
 
Comparative Analysis of Algorithms for Single Source Shortest Path Problem
Comparative Analysis of Algorithms for Single Source Shortest Path ProblemComparative Analysis of Algorithms for Single Source Shortest Path Problem
Comparative Analysis of Algorithms for Single Source Shortest Path ProblemCSCJournals
 
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERAN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERijfls
 
A-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-Model
A-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-ModelA-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-Model
A-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-ModelProf Dr S.M.Aqil Burney
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)neeraj7svp
 
Conceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri NetConceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri NetIJRES Journal
 
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...IJERA Editor
 
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERAN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERijfls
 
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERAN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERWireilla
 
The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...
The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...
The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...ijtsrd
 

Similar to J045055560 (20)

Critical Paths Identification on Fuzzy Network Project
Critical Paths Identification on Fuzzy Network ProjectCritical Paths Identification on Fuzzy Network Project
Critical Paths Identification on Fuzzy Network Project
 
Paper id 71201925
Paper id 71201925Paper id 71201925
Paper id 71201925
 
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
 
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
 
Linear Programming Problems with Icosikaipentagonal Fuzzy Number
Linear Programming Problems with Icosikaipentagonal Fuzzy NumberLinear Programming Problems with Icosikaipentagonal Fuzzy Number
Linear Programming Problems with Icosikaipentagonal Fuzzy Number
 
The cross-association relation based on intervals ratio in fuzzy time series
The cross-association relation based on intervals ratio in fuzzy time series The cross-association relation based on intervals ratio in fuzzy time series
The cross-association relation based on intervals ratio in fuzzy time series
 
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATION
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATIONEXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATION
EXTENDING OUTPUT ATTENTIONS IN RECURRENT NEURAL NETWORKS FOR DIALOG GENERATION
 
MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...
MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...
MULTIPROCESSOR SCHEDULING AND PERFORMANCE EVALUATION USING ELITIST NON DOMINA...
 
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...
 
Comparative Analysis of Algorithms for Single Source Shortest Path Problem
Comparative Analysis of Algorithms for Single Source Shortest Path ProblemComparative Analysis of Algorithms for Single Source Shortest Path Problem
Comparative Analysis of Algorithms for Single Source Shortest Path Problem
 
Forecasting Gasonline Price in Vietnam Based on Fuzzy Time Series and Automat...
Forecasting Gasonline Price in Vietnam Based on Fuzzy Time Series and Automat...Forecasting Gasonline Price in Vietnam Based on Fuzzy Time Series and Automat...
Forecasting Gasonline Price in Vietnam Based on Fuzzy Time Series and Automat...
 
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERAN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
 
A-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-Model
A-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-ModelA-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-Model
A-New-Quantile-Based-Fuzzy-Time-Series-Forecasting-Model
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
 
Conceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri NetConceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri Net
 
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
 
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERAN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
 
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBERAN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
AN ARITHMETIC OPERATION ON HEXADECAGONAL FUZZY NUMBER
 
The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...
The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...
The New Ranking Method using Octagonal Intuitionistic Fuzzy Unbalanced Transp...
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

J045055560

  • 1. P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60 www.ijera.com 55 | P a g e A Critical Path Problem Using Intuitionistic Triangular Fuzzy Number P.JAYAGOWRI*, G.GEETHARAMANI** *(Department of Mathematics, Sudharsan Engineering College, and Anna University Chennai, India.) ** (Department of Mathematics, BIT Campus, Anna University Chennai, India.) ABSTRACT Critical path method is a network based method planned for development and organization of complex project in real world application. In this paper, a new methodology has been made to find the critical path in a directed acyclic graph, whose activity time uncertain. The vague parameters in the network are represented by intuitionistic triangular fuzzy numbers, instead of crisp numbers. A new procedure is proposed to find the optimal path, and finally illustrative examples is provided to validate the proposed approach. Keywords - Critical path, Graded mean integration representation of intuitionistic triangular fuzzy number, Intuitionistic triangular fuzzy number, Order relation, Ranking of intuitionistic fuzzy number. I. INTRODUCTION A constructed network is an imperative tool in the development and organizes of definite project execution. Network diagram play a vital role in formative project-completion time. In general a project will consist of a number of performance and some performance can be started, only after ultimate some other behavior. There may be some behavior which is self-determining of others. Network analysis is a practice which determines the various sequences of behavior in relation to a project and the corresponding project completion time. The method is widely used are the critical path method program assessment and evaluation techniques. The successful finishing of critical path method requires the clear unwavering time duration in each movement. However in real life situation vagueness may arise from a number of possible sources like: due date may be distorted, capital may unavailable weather situation may root several impediments. Therefore the fuzzy set theory can play a significant role in this kind of problems to handle the ambiguity about the time duration of deeds in a project network. To effectively deal with the lack of clarity involved in the process of linguistic predictable times the intuitionistic trapezoidal fuzzy numbers are used to distinguish the fuzzy measures of linguistic values. In the current past, fuzzy critical path problems are addressed by many researchers, like S.Chanas , T.C.Han, J.Kamburowski, Zielinski, L.Sujatha and S.Elizabeth. S.Chanas, and J.Kamburowski,[11] explained fuzzy variables PERT. S.Chanas P.and Zielinski, [10] have also discussed critical path analysis in networks. G.Liang and T.C.Han [4] proposed a fuzzy critical path for project networks. Elizabeth and L.Sujatha [13] discussed a critical path problem under fuzzy Environment. They have deliberated a critical path problem for project networks. C.T Chen and S.F Huang [2] proposed a new model that combines fuzzy set theory with the PERT technique to determine the critical degrees of activities and paths, latest and earliest starting time and floats. The Bellman algorithm seeks to specify the critical path and the fuzzy earliest and latest starting time and floats of activities in a continuous fuzzy network. S.H. Nasution [12] proposed a fuzzy critical path method by considering interactive fuzzy subtraction and by observing that only the nonnegative part of the fuzzy numbers can have physical elucidation. This paper is organized as follows: In section 2, basic definitions of intuitionistic fuzzy set theory have been reviewed. Section 3, give procedures to find out the intuitionistic fuzzy critical path using an illustrative example. In section 4 the obtained results are discussed. Finally, in section 5 some conclusions are drawn. II. PRELIMINARIES Some basic definitions related to our research work are review. 2.1 Intuitionistic Fuzzy Set Let X be an Universe of discourse, then an Intuitionistic fuzzy set(IFS) A in X is given by A=   X/x)(Aγ),(Aμx, xx , where the function RESEARCH ARTICLE OPEN ACCESS
  • 2. P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60 www.ijera.com 56 | P a g e  0,1X:(x)Aμ  and  0,1X:(x)Aγ  determine the degree of membership and non-membership of the element Xx , respectively and for every Xx , 1.(x)Aγ(x)Aμ0  2.2 Triangular Intuitionistic Fuzzy Number An intuitionistic fuzzy number A={<a,b,c> <e,b,f>} is said to be a triangular intuitionistic fuzzy number if its membership function and non- membership function are given by &Rcb,a,where cxb b)(c x)(c bx1 bxa a)(b a)(x (x)A                           Rfb,e,where xb b)f( b)(x bx0 bx )e(b )x(b (x)A                          f e  2.3 Graded Mean Integration Representation for Triangular Intuitionistic Fuzzy numbers The membership and non-membership function of triangular intuitionistic fuzzy numbers are defined as follows. fx;w bf bx (x)Rbxe;w eb xb (x)L cx;w bc xc (x)Rbxa;w ab ax (x)μL & &               b b   Then 1 R 1 L and  are inverse functions of functions L and R respectively, h/wb)(fb(h) 1 γR&h/we)(bb(h) 1 γL h/wb)(cc(h) 1 μR&h/wa)(ba(h) 1 μL         Then the graded mean integration representation of membership function and non-membership function are, &)1( 6 4 (A)μP    cba )2( 3 (A)P    feb  2.4 Arithmetic Operations of Triangular Intuitionistic Fuzzy Number )3 ' b, 2 b,1 ' b; 3 b, 2 b, 1 b( I B ~ and)3 ' a, 2 a,1 ' a; 3 a, 2 a, 1 a( I A ~ If   are two intuitionistic fuzzy numbers we define, Addition : )3 ' b3 ' a, 2 b 2 a,1 ' b1 ' a ; 3 b 3 a, 2 b 2 a, 1 b 1 a( I B ~I A ~   Subtraction: )1 ' 3 ' , 22 ,3 ' 1 ' ; 13 , 22 , 31 ( ~~   bababa bababa I B I A 2.5 Order Relation Consider an order relation among intuitionistic fuzzy numbers.Rule:Let A and B be two triangular intuitionistic fuzzy numbers such that and) A γ; 3γc, 2γc, 1γc A μ; 3μa, 2μa, 1μa(A  B γ A γand B μ A μwith ) A γ; 3γd, 2γd, 1γd A μ; 3μb, 2μb, 1μb(B  
  • 3. P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60 www.ijera.com 57 | P a g e (3) 3γd 3γc; 3μb 3μa3. 2γd 2γc; μ2 b 2μa2. 1γd 1γc; 1μb 1μa1.   2.6 Ranking of Intuitionstic Triangular Fuzzy umber     fb,e,;cb,a, ' A ~ numberfuzzysticintuitioniTriangularA  Then the graded mean integration representation of membership function and non-membership function of A ~ are .B ~ A ~ )B ~ ( β γP)A ~ ( β γPand)B ~ ( α μP)A ~ ( α μ(iii) .B ~ A ~ )B ~ ( β γP)A ~ ( β γPand)B ~ ( α μP)A ~ ( α μ(ii) .B ~ A ~ )B ~ ( β γP)A ~ ( β γPand)B ~ ( α μP)A ~ ( α μP(i) thennumbersfuzzytriangularsticIntuitioni twoanybe)fb,,ecb,,a(B ~ )andfb,e,cb,a,(A ~ Let 3 2fbf)-e(2β )A ~ (γP & 3 2bcc)α(a )A ~ (μP             III. INTUITIONISTIC FUZZY CRITICAL PATH METHOD The following is the Procedure for finding intuitionistic fuzzy critical path. 3.1 Notations N= The set of all nodes in a project network. EST = Earliest Starting time EFTµij = Earliest finishing time for membership function EFTγij = Earliest finishing time for non-membership function LFTµij = Latest finishing time for membership function LFTγij = Latest finishing time for non- membership function LSTµij = Latest starting time for membership function LSTγij = Latest starting time for non-membership function TF = Total float Tij = The Intuitionistic fuzzy activity time 3.2 Forward Pass Calculation Forward pass calculations are employed to calculate the Earliest Starting Time(EST) in the Project network     (4)nodesprecedingofnumberi ,jiγt)( iγ E i MinjγE nodesprecedingofnumberi ,jiμt)( iμ E i MaxjμE         )5(timeactivityFuzzysticIntuitioni)( jiγ EST jiγ EFT functionmembershipnonfortimeFinishingEarliest timeactivityFuzzysticIntuitioni)( jiμ EST jiμ EFT functionmembershipfortimeFinishingEarliest    3.3 Backward Pass Calculation Backward pass calculations are employed to calculate the Latest Finishing Time (LFT) in the Project network     )6(nodessucceedingofnumber ,)( nodessucceedingofnumber ,)(     j jitiLiMaxjL j jitjLjMiniL   )7( timeactivityFuzzysticIntuitioni )( jiγ LFT jiγ LST functionmembershipnonfortimeFinishingLatest timeactivityFuzzysticIntuitioni )( jiμ LFT jiμ LST functionmembershipfortimeStartingLatest                      
  • 4. P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60 www.ijera.com 58 | P a g e 3.4 Total Float (TF) (8) jiγ EST jiγ LSTγTF or jiγ EFT jiγ LFTγTF jiμ EST jiμ LSTμTF or jiμ EFT jiμ LFTμTF     3.5 Procedure to Find Intuitionistic Fuzzy Critical Path Step1: Construct a network G (V,E) where v is the set of vertices and E is the set of edges. Here G is an acyclic digraph and arc length or edge weight are taken as Intuitionistic Triangular fuzzy numbers. Step 2: Expected time in terms of Intuitionistic Triangular fuzzy numbers are defuzzified using equation 1 and 2 in the network diagram. Step3: Calculate Earliest Starting time for membership and non-membership functions ( ESTµij and ESTγij respectively) according to Forward pass calculation given in equation (4) Step4: Calculate Earliest finishing time for membership and non-membership functions (EFTµij and EFTγij respectively )using equation (5). Step 5 :Calculate latest finishing time- LFTµij and LFTγij - according to backward pass calculation given in equation(6) Step 6: Calculate latest starting time -LSTµij and LSTγij- using equation (7) Step 7 :Calculate Total float- TFµ and TFγ -using equation (8) Step 8: In each activity using (8) whenever one get 0 , such activities are called as Intuitionistic Fuzzy critical activities and the corresponding paths Intuitionistic critical paths. 3.5 Illustrative example Consider a small network with 5 vertices and 6 edges shown in figure1, where each arc length is represented as a trapezoidal Intuitionistic fuzzy number Table1: Results of the network Activity Intuitionistic Fuzzy Activity time Defuzzified Activity time using equation 1 and 2 for membership and non- membership functions TFµ TFγ 1→2 <6,8,10> <12,14,15> <8,13.7> 0 2.3 1→3 <7,9,10> <15,17,16> <8.8,16> 12.6 0 1→4 <5,6,7> <16,19,12> <6,15.7> 0 0 2→4 <7,9,11> <10,12,13> <9,11.7> 11 2.3 3→4 <8,10,11> <9,12,14> <9.8, 11.7> 12.6 0 4→5 <9,11,13> <7,9,11> <11,9> 0 0
  • 5. P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60 www.ijera.com 59 | P a g e Table2: Rank value of total slack intuitionstic fuzzy time of all possible paths for membership function Paths IFCPM(pµk) k=1 to m Rank value defini tion 2.6 Rank 1→2→4→5 <22,28,34> 28 II 1→4→5 <14,17,20> 17 I 1→3→4→5 <24,30,34> 29.7 III Table3: Rank value of total slack intuitionstic fuzzy time of all possible paths for non- membership function Paths IFCPM(pγk) k=1 to m Rank value definiti on 2.6 Rank 1→2→4→5 <29,35,39> 34.3 II 1→4→5 <23,28,23> 24.7 I 1→3→4→5 <31,38,41> 36.7 III IV. RESULTS AND DISCUSSION This paper proposes an algorithm to tackle the problem in intuitionistic fuzzy environment. In this paper the trapezoidal intuitionistic fuzzy number is defuzzified using graded mean integration representation. Now the intuitionistic fuzzy number is converted to crisp number. Then applying the proposed algorithm we find the critical path. The path in intuitionistic fuzzy project network are 1→4→5,1→2→4→5and 1→3→4→5.The critical path for intuitionistic fuzzy network for both membership and non-membership function are 1→4→5. Hence the procedure developed in this paper form new methods to get critical path, in intuitionistic fuzzy environment. V. CONCLUSION A new analytical method for finding critical path in an intuitionistic fuzzy project network has been proposed. We have used new defuzzification formula for trapezoidal fuzzy number and applied to the float time for each activity in the intuitionistic fuzzy project network to find the critical path. In general intuitionistic fuzzy models are more effective in determining critical paths in real project networks. This paper, use the Graded mean integration representation the Procedure to find the optimal path in an intuitionistic fuzzy weighted graph having help decision makers to decide on the best possible critical path in intuitionistic fuzzy environments. References [1] A.I Slyeptsov, T.A. Tyshchuk, Fuzzy Critical Path Method for Project Network Planning and Control, Cyber net. System Anal. 3 (1997) 158 -170. [2] C.T Chen and S.F. Huang, Applying fuzzy methods for measuring criticality in project network, Information sciences, 177(2007)2448-2458. [3] D. Dubois and H. Prade, Possibility Theory: An Approach to Computerized Processing of Uncertainty, New York: Plenum, 1988. [4] G.S. Liang and T.C.Han, Fuzzy Critical Path for Project Network, Information and Management Sciences, 15, No. 4 (2004), 29- 40. [5] Lin, K.C. and Chern, M. S. (1993). The Fuzzy Shortest Path Problem and its Most Vital Arcs, Fuzzy Sets and Systems, Vol. 58, No. 3, pp. 343-353. [6] Mahdavi. I.. Nourifar, R., Heidarzade. A. and Amiri. N. M. (2009). A Dynamic Programming Approach for Finding Shortest Chains in Fuzzy Network, Applied Soft Computing, Vol.9. No.2.pp.502-511. [7] M.Blue, B.Bush and J.Puckett, Unified Approach to Fuzzy Graph Problems, Fuzzy Sets and Systems, 125(2002),355-368. [8] N. Ravi Shankar,V. Sireesha, P. Phani Booshan Rao, An Analytical Method for Finding Critical Path in a Fuzzy Project Network, Int.J.Contemp.Math.Sciences, 5(20)(2010) 953-962. [9] Salim rezvani , Ranking method of Trapezoidal Intuitionitic Fuzzy , Annlas of Fuzzy Mathematics and Informatics, Vol- 5.No:3,(May2013) p.p.515-523. [10] S.Chanas P. and Zielinski, Critical Path analysis in the Network with Fuzzy Activity Times, Fuzzy sets and Systems, 122(2001), 195-204. [11] S.Chanas and J.Kamburowski, The set of fuzzy variable in PERT, Fuzzy Sets and Systems, 5 (1981), 11-19. [12] S.H. Nasution, Fuzzy critical path method, IEEE Trans. Systems Man Cyber net, 24 (1994) 48-57
  • 6. P.JAYAGOWRI et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.55-60 www.ijera.com 60 | P a g e [13] S. Elizabeth and L.Sujatha ,Fuzzy Critical Path Problem For Project Network , International Journal of Pure and Applied Mathematics Volume 85 No. 2 2013, 223- 240. [14] S.Yao and F.T.Lin Fuzzy Critical Path Methods Based on Signed Distance ranking of fuzzy numbers, IEEE Transactions on systems, man and cybernetics- Part A: systems and humans, 30(1)2000. [15] T.C.Han, C.C. Chung and G.S. Liang, Application of fuzzy critical path method to airport’s cargo ground operation systems, Journal of Marine Science and Technology, 14, No. 3 (2006), 139-146.