Determining project characteristics and critical path by a...

22

Transcript of Determining project characteristics and critical path by a...

Page 1: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Scientia Iranica E (2019) 26(4), 2579{2600

Sharif University of TechnologyScientia Iranica

Transactions E: Industrial Engineeringhttp://scientiairanica.sharif.edu

Determining project characteristics and critical path bya new approach based on modi�ed NWRT method andrisk assessment under an interval type-2 fuzzyenvironment

Y. Dorfeshana, S.M. Mousavia, B. Vahdanib, and A. Siadatc;�

a. Department of Industrial Engineering, Faculty of Engineering, Shahed University, Tehran, Iran.b. Department of Industrial Engineering, Faculty of Industrial and Mechanical Engineering, Qazvin Branch, Islamic Azad

University, Qazvin, Iran.c. Laboratoire de Conception, Fabrication Commande, Arts et M�etier Paris Tech, Centre de Metz, Metz, France.

Received 24 December 2017; received in revised form 15 March 2018; accepted 14 May 2018

KEYWORDSProject scheduling;Modi�ed Node-Weighted Rooted Tree(NWRT) method;Risk factors;Interval Type-2 FuzzySets (IT2FSs);Projectcharacteristics;Project critical path.

Abstract. Considering the important role of risks in real-world projects and the abilityof Interval Type-2 Fuzzy Sets (IT2FSs) to tackle uncertainty, this study introduces a newapproach to consider risks and the correlation among risk factors by subjective judgment ofexperts on the probability and impact under IT2FSs. Furthermore, a new impact functionused for considering the correlation among the risk factors is extended under an IT2Fenvironment. Moreover, a new subtraction operator is introduced for the critical pathanalysis. The Node-Weighted Rooted Tree (NWRT) method is modi�ed based on theproposed new operator to avoid producing negative number for characteristics of eachactivity. In addition, in order to deal with the uncertainty of the projects, NWRT methodis developed under the IT2FSs. Finally, to illustrate the validity and capability of theproposed method, two examples derived from the literature are solved and compared.

© 2019 Sharif University of Technology. All rights reserved.

1. Introduction

The Critical Path Method (CPM) is a project man-agement approach to planning that determines criticaland non-critical activities in order to prevent time-frame problems [1]. The longest path of a projectnetwork is critical path. The CPM is a network-based method and is designed to facilitate evaluatinga project's performance and recognizing bottlenecks inthe network. In addition, it is useful in practice to

*. Corresponding author. Tel.: +98 21 51212091E-mail addresses: [email protected] (S.M.Mousavi); [email protected] (A. Siadat)

doi: 10.24200/sci.2018.50091.1503

schedule complex projects [1]. In the CPM, the timeof activities is considered certain and deterministic.In practice, this assumption cannot always hold withsatisfactory precision. Hence, Program Evaluation AndReview Technique (PERT) has been introduced byusing a random variable called the beta distributionto model the activity times [2]. In this method, manysimpli�ed assumptions have been considered so that itcan be intensively developed in several directions underthe assumption that the probability distributions ofactivity times are varied, compared to the beta distri-bution [3,4]. In such situations, for instance, Zadeh [5]used fuzzy set theory, which does not require posteriorfrequency distributions and, also, can deal with vagueinput information including feelings and emotions usingsubjective judgments of Decision-Makers (DMs).

Page 2: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2580 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

One of the most important aspects of projectmanagement is the risk management. Risk manage-ment is known as one of the ten knowledge areas ofproject management. Project risk has been de�nedby a project management institute as \an uncertainevent or condition that, if it occurs, has a positive ornegative e�ect on a project's objectives" [6]. Projectrisks exist because of uncertainty. In addition, there isa probability that anything known or unknown coulda�ect the process of achieving a project's objectives.Risk management is concerned with preparations tomanage these risks [6].

Several studies have focused on project and riskmanagement in recent years. Espinoza [7] separatedthe project risk from the time value of money. Yim etal. [8] analyzed the impact of project classi�cation onproject risk indicators. Golini et al. [9] investigated theimpact of international development projects of non-governmental organizations. Carvalho and RabechiniJunior [10] found the link between risk managementand project success. Muriana and Vizzini [11] proposeda quantitative method to assess and mitigate projectrisks.

Problems associated with construction projectsare complex and usually involve vast uncertaintiesand subjectivities. Compared to other industries, theconstruction industry is known as a high-risk industrydue to the unique features of construction activities [12-14]. The incidence of project risk may have positive ornegative e�ects on one of the project objectives, suchas time, cost, safety, quality, or sustainability [15-20].Construction projects are susceptible to considerablerisks due to the involvement of a large number of partiessuch as owners, designers, supervision consultants,contractors, subcontractors, suppliers, manufacturers,and governments [21]. Uncertainty, vagueness, andincomplete information are inherent parts of construc-tion projects due to the susceptibility of real-worldprojects to numerous risks. In this condition, fuzzyset theory is a helpful approach to the uncertainty ofprojects. In recent years, several types of studies haveused fuzzy set theory to deal with uncertainty [22-24].Taylan et al. [25] presented Fuzzy Analytic HierarchyProcess (FAHP) and Fuzzy Technique for Order ofPreference by Similarity to Ideal Solution (FTOPSIS)to ass the risk in construction projects. Kuchta andPtaszy�nska [26] used a fuzzy-based risk register forassessing risks in construction projects. Asan et al. [27]introduced an IT2F-prioritization approach to projectrisk assessment.

In comparison to an ordinary Type-1 Fuzzy Set(T1FS), Type-2 Fuzzy Set (T2FS) has a degree ofmembership, which is fuzzy, whereas the ordinary fuzzyset has a crisp membership function [28]. A T2FScomes with a measure of dispersion so that inherentuncertainties can be considered better, which becomes

especially useful in problems in which it is di�cult todetermine the deterministic membership function for afuzzy set [29]. In fact, T2FSs are more appropriate andpowerful than T1FSs and provide a suitable conditionfor considering subjective judgments of experts. In thispaper, to address the uncertainty and vagueness of real-world projects, IT2FSs are used.

IT2FSs are very bene�cial and pliable to addressthe uncertainties in comparison to classic fuzzy sets.The great discrepancy between T2FSs and T1FSs ismembership degree, which is demonstrated by a fuzzyset in [0, 1] for IT2FSs, instead of a crisp number in[0, 1] [30,31]. In fact, T2FSs are three-dimensional, andtheir membership degrees are determined by a fuzzy setat the interval [0, 1] and explained by both elementaryand secondary memberships to supply more degreesof freedoms to tackle uncertainty. By consideringthe nature of the construction projects and inherentuncertainty attached to them, IT2FSs are suitable andpowerful tools to tackle project uncertainty.

In recent years, many methods have been devel-oped under IT2FSs [32-34]. Furthermore, the IT2FSshave been applied to the project management areasuccessfully [35-37]. Bozdag et al. [38] presented amethod for risk prioritization under the IT2F envi-ronment. Mohagheghi et al. [39] analyzed the projectcash ow in the construction industry based on theIT2FSs. Mohagheghi et al. [40] evaluated R&D projectand portfolio selection by using an IT2F optimizationapproach.

In order to tackle the uncertainty of the real-project situations, fuzzy set theory was introduced byZadeh [41]. However, classic fuzzy set theory wascriticized because of its certain membership grade. Inthis situation, IT2FSs were proposed by Zadeh [42].As a matter of fact, the IT2FSs are more powerfulthan T1FSs in dealing with uncertainty. Consideringthe nature of the projects and inherent uncertaintyabout them, the IT2FS is a suitable and powerful toolfor dealing with project uncertainty. Moreover, in theproject management, owing to the nature of projectsand that many activities of the project may have beendone for the �rst time, the planning process may beopen to di�culties and obstacles because of the lackof information about activities. To this end, experts'opinions and judgments on activities are used. On theother hand, linguistic variables are mostly representedby fuzzy sets [43], which makes more sense than certainnumbers [41]. However, classic fuzzy set theory hascrisp membership grades at the interval [0, 1], whichconsequently cannot completely support various typesof uncertainty present in linguistic explanations ofnumerical quantities or in the subjectively explainedjudgment of experts [44,45]. In this case, IT2FSs can beapplied. To date, IT2FSs have been used successfullyfor many project management problems [37,40].

Page 3: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2581

The backward recursion, explained in traditionalfuzzy CPM, produces negative times because durationsare explained by means of fuzzy sets and the lateststarting date of the last task is set to its earliest date;however, negative number for characteristics of theactivity has no physical meaning. To overcome thisproblem, Shanker et al. [46] introduced an analyticalmethod for �nding Fuzzy Critical Path (FCP) in aproject network. Kumar and Kaur [47] presenteda methodology for fuzzy critical path analysis andintroduced a new subtraction operator to avoid pro-ducing negative fuzzy number. Rao and Shanker [48]carried out fuzzy critical path analysis based on thecentroid of centroids of fuzzy numbers and the newsubtraction method. In all subtraction methods thathave been introduced, the amount of fuzzy number hasincreased. In fact, the crisp value of fuzzy numbersafter applying the new methods increases toward thetraditional methods. In this situation, a new methodis developed such that the crisp value of this method ismore suitable than others.

In recent years, many researchers attempt toanalyze fuzzy project network and characteristics.Yakhchali and Ghodsypour [49] proposed a methodfor calculating the latest starting times of activitiesin interval-valued networks. Yakhchali and Ghodsy-pour [50] also introduced an approach to compute thelatest starting times and activities' criticality in projectnetwork. Zareei et al. [4] presented an approach basedon the analysis of events for solving FCP problem.Sireesha and Shankar [51] focused on a methodologyto report project characteristics and multiple possibleFCPs in a project network and introduced a graphical�gure (rooted tree) to illustrate the fuzzy projectnetwork. Sireesha and Shankar [52] applied a Node-Weighted Rooted Tree (NWRT) method based onthe new graphical �gure (rooted tree) to illustrateproject characteristics and triangular FCPs. However,this methodology produces negative fuzzy number inbackward recursion. To overcome this issue and useadvantages of the new graphical �gure and NWRTmethod, this method is extended in this paper by anew operator to avoid producing negative fuzzy numberbecause the negative fuzzy number has no physicalmeaning.

Determining the critical path of a project playsan important role in the planning process of real-worldprojects. By considering the nature of the projectsand that many activities of the project may have beendone for the �rst time, the uncertainty of project isquite high. In order to address this uncertainty, theIT2FS is a useful tool because it is more powerfulin dealing with the uncertainty and provides moredegree of freedom and exibility. In this paper, theanalysis of activities' risk is carried out under the IT2Fenvironment.

In this paper, to address the uncertainty of real-world projects, IT2FSs are provided. Furthermore, anew operator is introduced to avoid producing negativefuzzy numbers for characteristics of project activities.Then, NWRT method is modi�ed by this operator andupdated in the IT2F-environment. Moreover, risks ofany activity and its correlation are considered usingsubjective judgments of experts. In addition, a newimpact function for considering the correlation of twokinds of risks for linguistic variables is developed underthe IT2F environment. The novelties of this paper aresummarized as follows:

� IT2FSs are used to address the uncertainty of real-world projects properly;

� A new operator is introduced to avoid producingnegative fuzzy numbers under the IT2F environ-ment;

� Risks and their correlation with each other for anyactivity are determined by subjective judgmentsunder IT2FSs;

� A new impact function for considering the correla-tion among risk factors is developed under the IT2Fenvironment;

� The NWRT method is introduced based on a newoperator, which is modi�ed to avoid producingnegative fuzzy number;

� The modi�ed NWRT method is extended to theIT2F environment.

The rest of this study is organized as follows: InSection 2, the proposed operator and modi�ed NWRTmethod are presented. In Section 3, two examplesare solved to illustrate the validity of the proposedmethod. In Section 4, comparative analysis is given.In Section 5, the conclusion is expressed.

2. Proposed methodology

In this section, the risk assessment for each task oractivity by subjective judgments of DMs is presented.Then, a new impact function for considering thecorrelation of risk factors is developed under IT2FSs.Moreover, the NWRT method is modi�ed based on anew subtraction operator for avoiding the productionof negative fuzzy numbers. In the presented approach,the Total Float (TF) of any tasks is speci�ed by anew characteristic path oat. The Earliest Time andLatest Time (ET and LT) of each task are determinedusing TF. The main advantage of NWRT among otherexisting approaches is its simplicity and comprehensi-bility for any experts with low technical training. Theproposed framework is depicted in Figure 1.

Page 4: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2582 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

Figure 1. Graphical presentation of the proposed methodology.

Page 5: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2583

2.1. Proposed risk assessmentIn this subsection, by considering the importance ofrisks in projects, risk assessment of each activity is doneby the risk management group who are responsible foranalyzing and determining the time of each activity.The important risks are categorized in four classes.The �rst class is the risk of increasing costs; the secondand third ones classes are concerned with the reductionof quality and safety, respectively. Finally, the fourthclass is the general risks. The experts' judgmentson the probability and impact of each risk of anyactivities are gathered. Note that experts' judgmentsare expressed through linguistic variables. Then, lin-guistic variables are converted to the equivalent IT2Fnumbers. In addition, the probability of correlationamong the risks is expressed by an expert, and theimpact between risks is determined by a new extendedmethod. Moreover, the most important risk of anyactivities is determined by their measures. Finally, theimportant risks' e�ects are converted to the time ofactivity. The duration of the activity is the input ofthe proposed NWRT method.

Procedure of the proposed methodology is pro-vided as follows:

Step 1. Experts' judgments on the time of eachactivity are gathered. Furthermore, their subjectivejudgments on rating the probability and impact ofeach activity's risks are collected.

Step 2. Qualitative assessment of each risk factor isdone based on experts' judgments. In other words,the risk with the very low probability and impactis removed from assessment and, then, another riskfactor is considered as the input of the qualitative riskassessment stage.

Step 3. The experts' judgments on risks' probabilityand impact of each activity are converted to anequivalent IT2F-number by Table 1.

Step 4. A new function for obtaining the impactof two risks on each other or impact of three riskson each other, etc. is developed under IT2FSs, asadopted from Madhuri et al. [53].

If there are two fuzzy numbers ~~A1 and ~~A2 asbelow:

~~A1 =�

~AU1 ; ~AL1�

=��aU11; a

U12; a

U13; a

U14;H1

�~AU1�;H2

�~AU1��

;�aL11; a

L12; a

L13; a

L14;H1

�~AL1�;H2

�~AL1���

;

~~A2 =�

~AU2 ; ~AL2�

=��aU21; a

U22; a

U23; a

U24;H1

�~AU2�;H2

�~AU2��

;�aL21; a

L22; a

L23; a

L24;H1

�~AL2�;H2

�~AL2���

; (1)

then the addition of these two numbers is calculatedas follows:

~~A3 =�

~AU3 ; ~AL3�

=��aU31; a

U32; a

U33; a

U34;H1

�~AU3�;H2

�~AU3��

;�aL31; a

L32; a

L33; a

L34;H1

�~AL3�;H2

�~AL3���

; (2)

where:

aL31 = aL11 + aL21 � aL11 � aL21;

aL32 = aL11 + aL22

+

24�aL12�aL11� min

�H1

�~AL1�;H1

�~AL2��

H1

�~AL1� 35

+

24�aL22�aL21� min

�H1

�~AL1�;H1

�~AL2��

H1

�~AL2� 35

� aL12 � aL22;

Table 1. Linguistic variables and their corresponding interval Type-2 fuzzy numbers.

Linguistic variables Interval Type-2 fuzzy numbers

Very Low (VL) ((0,0,0,0.1;1,1),(0,0,0,0.05;0.9,0.9))

Low (L) ((0,0.1,0.1,0.3;1,1),(0.05,0.1,0.1,0.2;0.9,0.9))

Medium Low (ML) ((0.1,0.3,0.3,0.5;1,1),(0.2,0.3,0.3,0.4;0.9,0.9))

Medium (M) ((0.3,0.5,0.5,0.7;1,1),(0.4,0.5,0.5,0.6;0.9,0.9))

Medium High (MH) ((0.5,0.7,0.7,0.9;1,1),(0.6,0.7,0.7,0.8;0.9,0.9))

High (H) ((0.7,0.9,0.9,1;1,1),(0.8,0.9,0.9,0.95;0.9,0.9))

Very High (VH) ((0.9,1,1,1;1,1),(0.95,1,1,1;0.9,0.9))

Page 6: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2584 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

aL33 = aL14 + aL24

�24�aL14�aL13

� min�H2

�~AL1�; H2

�~AL2��

H2

�~AL1� 35

�24�aL24�aL23

� min�H2

�~AL1�; H2

�~AL2��

H2

�~AL2� 35

� aL13 � aL23;

aL34 = aL14 + aL24 � aL14 � aL24; (3)

aU31 = aU11 + aU21 � aU11 � aU21;

aU32 = aU11 + aU22

+

24�aU12�aU11� min

�H1

�~AU1�;H1

�~AU2��

H1

�~AL1� 35

+

24�aU22�aU21� min

�H1

�~AU1�;H1

�~AU2��

H1

�~AL2� 35

� aU12 � aU22;

aU33 = aU14 + aU24

�24�aU14�aU13

� min�H2

�~AU1�;H2

�~AU2��

H2

�~AU1� 35

�24�aU24�aU23

� min�H2

�~AU1�;H2

�~AU2��

H2

�~AL2� 35

� aU13 � aU23;

aU34 = aU14 + aU24 � aU14 � aU24: (4)

Step 5. The risk measurement is made through the

multiplication of the probability and impact. Finally,the most important risk of each activity is determinedand added to the time of each activity. In fact, theoutput of risks assessment in this step is the updatedduration for activities of project network.

2.2. Introduced NWRT methodIn the subsection, NWRT method is expressed underIT2FSs. In fact, in this new graphical �gure, (NWRT),the initial and ending nodes are considered as the rootand leaf, respectively. The graphical �gure illustratesall paths. Each vertex demonstrates the event, andeach edge illustrates the activity. The IT2F-activitytimes of the project are considered as correspondingedge weights in the rooted tree. The relative impor-tance of root can be zero. The relative importance ofthe ending node in each path will be the length of thepath. Finally, the path with maximum length will becritical path. In order to illustrate the rooted tree, anexample is shown in Table 2 and Figures 2 and 3.

Path: 1-2-4-5!(1) = ~~0Relative importance of Node 2, !(2) = !(1) + ~~A =~~0 + ~~A = ~~ARelative importance of Node 4, !(4) = !(2) + ~~D =~~A+ ~~DRelative importance of Node 5, !(5) = !(4) + ~~E =~~A+ ~~D + ~~E.

Similarly, the weights of other nodes on otherpaths are calculated.

Figure 2. Fuzzy project network.

Table 2. Fuzzy activities times.

Activities Fuzzy activities times

1-2 ~~A =��aU1 ; aU2 ; aU3 ; aU4 ;H1

�AU�;H2

�AU��;�aL1 ; aL2 ; aL3 ; aL4 ;H1

�AL�; H2

�AL���

1-3 ~~B =��bU1 ; bU2 ; bU3 ; bU4 ;H1

�BU�; H2

�BU��;�bL1 ; bL2 ; bL3 ; bL4 ;H1

�BL�; H2

�BL���

1-5 ~~C =��cU1 ; cU2 ; cU3 ; cU4 ;H1

�CU�; H2

�CU��;�cL1 ; cL2 ; cL3 ; cL4 ;H1

�CL�; H2

�CL���

2-4 ~~D =��dU1 ; dU2 ; dU3 ; dU4 ;H1

�DU� ;H2

�DU�� ; �dL1 ; dL2 ; dL3 ; dL4 ;H1

�DL� ; H2

�DL���

4-5 ~~E =��eU1 ; eU2 ; eU3 ; eU4 ;H1

�EU�; H2

�EU��;�eL1 ; eL2 ; eL3 ; eL4 ;H1

�EL�;H2

�EL���

3-5 ~~F =��fU1 ; fU2 ; fU3 ; fU4 ;H1

�FU�; H2

�FU��;�fL1 ; fL2 ; fL3 ; fL4 ;H1

�FL�; H2

�FL���

Page 7: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2585

Figure 3. Rooted tree project network.

2.3. New subtraction operationIn this subsection, a new operator is introduced foravoiding the production of negative numbers in criticalpath calculations.

If there are two IT2F-numbers ~~A1 and ~~A2 basedon Eq. (A.4), then a new subtraction operator (�) isde�ned as follows:

~~A1 � ~~A2 =��aU11�aU21; a

U12�aU22; a

U13�aU23; a

U14�aU24;

min�H1

�~AU1�; H1

�~AU2��

;

min�H2

�~AU1�; H2

�~AU2���

;�aL11�aL21; a

L12�aL22; a

L13�aL23; a

L14�aL24;

min�H1

�~AL1�;H1

�~AL1��

;

min�H2

�~AL1�;H2

�~AL1����

: (5)

However, this operator has two problems as follows:

1. Sometimes, the trapezoidal or triangular structuresof fuzzy numbers are disturbed. For example, ifthere are two fuzzy numbers as follows:

~~A1 = ((5; 7; 11; 12; 1; 1) ; (6; 8; 10; 11; 0:9; 0:9)) ;

~~A2 = ((2; 6; 9; 11; 1; 1) ; (3; 7; 8; 10; 0:9; 0:9)) ;

then:

~~A1 � ~~A2 = ((5� 2; 7� 6; 11� 9; 12� 11; 1; 1);

(6� 3; 8� 7; 10� 8; 11� 10; 0:9; 0:9))

= ((3; 1; 2; 1; 1; 1); (3; 1; 2; 1; 0:9; 0:9)):

In this situation, the new subtraction operator ismodi�ed by using the following relation:

~~A1 � ~~A2 =��aU(1); a

U(2); a

U(3); a

U(4);

min�H1

�~AU1�;H1

�~AU2���

;�aL(1); a

L(2); a

L(3); a

L(4);

min�H1

�~AL1�;H1

�~AL1��

;

min�H2

�~AL1�;H2

�~AL1����

; (6)

where:

aU(1) � aU(2) � aU(3) � aU(4);

and:

aL(1) � aL(2) � aL(3) � aL(4):

Note that aU(1) and aL(1) are de�ned as follows:

aU(1)=min�aU11�aU21; a

U12�aU22; a

U13�aU23; a

U14�aU24

;

aL(1)=min�aL11�aL21; a

L12�aL22; a

L13�aL23; a

L14�aL24

:

(7)

2. If there are two fuzzy numbers as follows:

~~A1 = ((2; 5; 10; 12; 1; 1); (3; 6; 9; 10; 0:9; 0:9));

~~A2 = ((3; 5; 8; 10; 1; 1); (4; 6; 7; 9; 0:9; 0:9));

then some of its elements will be negative:

~~A1 � ~~A2 = ((2� 3; 5� 5; 10� 8; 12� 10; 1; 1);

(3� 4; 6� 6; 9� 7; 10� 9; 0:9; 0:9))

= ((�1; 0;+2;+2; 1; 1);

(�1; 0;+2;+1; 0:9; 0:9)):

Negative numbers in the project scheduling have nophysical meaning. In this condition, the introducedoperator is improved as below.

At �rst, similar to the �rst problem, the structureof fuzzy numbers is modi�ed and, then, negativenumbers are removed by using the following relations:

aU(1) = max�

0; aU11 � aU21;

Page 8: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2586 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

aU(2) = maxn

0;hmax

�0; aU12 � aU22

+ min

�0; aU11 � aU21

i= CU

o;

aU(3) = maxn

0;hmax

�0; aU13 � aU23

+min

�0; aU12�aU22

+min

�0; CU

i=GU

o;

aU(4) = maxn

0;hmax

�0; aU14 � aU24

+ min

�0; aU13 � aU23

+ min

�0; GU

io; (8)

aL(1) = max�

0; aL11 � aL21;

aL(2) = maxn

0;hmax

�0; aL12 � aL22

+ min

�0; aL11 � aL21

i= CL

o;

aL(3) = maxn

0;hmax

�0; aL13 � aL23

+min

�0; aL12�aL22

+min

�0; CL

i=GL

o;

aL(4) = maxn

0;hmax

�0; aL14 � aL24

+ min

�0; aL13 � aL23

+ min

�0; GL

io: (9)

In order to illustrate the ability of the proposedoperator, the above example is solved below:

aU(1) = maxf0; 2� 3g = 0;

aU(2) = maxf0; [maxf0; 5�5g+minf0; 2�3g]=�1g= 0;

aU(3) = maxf0; [maxf0; 10� 8g+ minf0; 5� 5g+ minf0;�1g] = 1g = 1;

aU(4) = maxf0; [maxf0; 12� 10g+ minf0; 10� 8g+ minf0; 1g]g = 2:

aL(1) = maxf0; 3� 4g = 0;

aL(2) = maxf0; [maxf0; 6�6g+minf0; 3�4g]=�1g= 0;

aL(3) = maxf0; [maxf0; 9� 7g+ minf0; 6� 6g+ minf0;�1g] = 1g = 1;

aL(4) = maxf0; [maxf0; 10� 9g+ minf0; 9� 7g+ minf0; 1g]g = 1:

Generally, the new subtraction operator is de�ned bythe following steps:

Step 1. In this step, the subtraction operator isperformed as follows:

~~A1� ~~A2 =��aU11�aU21; a

U12�aU22; a

U13�aU23; a

U14�aU24;

min�H1

�~AU1�; H1

�~AU2��

;

min�H2

�~AU1�; H2

�~AU2���

;�aL11�aL21; a

L12�aL22; a

L13�aL23; a

L14�aL24;

min�H1

�~AL1�; H1

�~AL1��

;

min�H2

�~AL1�; H2

�~AL1����

: (10)

If the subtraction operator does not have any ofthe two problems mentioned above, the operation isperformed correctly. Otherwise, go to the next step.

Step 2. In this step, the subtraction operator ismodi�ed to keep the triangular and trapezoidal fuzzystructures as follows:

~~A1 � ~~A2 =��aU(1); a

U(2); a

U(3); a

U(4);

min�H1

�~AU1�;H1

�~AU2���

;�aL(1); a

L(2); a

L(3); a

L(4);

min�H1

�~AL1�;H1

�~AL1��

;

min�H2

�~AL1�;H2

�~AL1����

; (11)

where:

aU(1) � aU(2) � aU(3) � aU(4);

and:

aL(1) � aL(2) � aL(3) � aL(4):

Page 9: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2587

In addition, aU(1) and aL(1) are de�ned as follows:

aU(1) =min�aU11�aU21; a

U12�aU22; a

U13�aU23; a

U14�aU24

;

aL(1) =min�aL11�aL21; a

L12�aL22; a

L13�aL23; a

L14�aL24

:(12)

If the results contain a negative number, go to thenext step (Step 3); otherwise, the �nal results areobtained.

Step 3. In order to avoid producing negativenumbers, unrealistic results of the proposed operatorare improved as follows:

aU(1) = max�

0; aU11 � aU21;

aU(2) = max�

0;�max

�0; aU12 � aU22

+ min

�0; aU11 � aU21

�= CU

;

aU(3) = max�

0;�max

�0; aU13 � aU23

+min

�0; aU12�aU22

+min

�0; CU

�=GU

;

aU(4) = max�

0;�max

�0; aU14 � aU24

+ min

�0; aU13 � aU23

+ min

�0; GU

�; (13)

aL(1) = max�

0; aL11 � aL21;

aL(2) = max�

0;�max

�0; aL12 � aL22

+ min

�0; aL11 � aL21

�= CL

;

aL(3) = max�

0;�max

�0; aL13 � aL23

+min

�0; aL12�aL22

+min

�0; CL

�=GL

;

aL(4) = max�

0;�max

�0; aL14 � aL24

+ min

�0; aL13 � aL23

+ min

�0; GL

�: (14)

2.4. T2F-total oat of each activityIn this section, �rstly, the TF of each path is obtained,and it is proven that T ~~F(i;j) = min

s2S1;nfP ~~Fsj(i; j) 2 sg,

where T ~~F(i;j) represents the TF of each activity, P ~~Fsrepresents the TF of each path, and Si;j is a set of allpaths from i to j. The IT2F-ES time (E ~~ST(i;j)) andIT2F-LS time (L ~~ST(i;j)) are calculated as follows:

E ~~ST(i;j) = maxs2S1;i

~~Ls = maxs2S1;i

X(i;j)2s

~~t(i;j)

= maxs2S1;i

nX(i;j)2s

��tU(1;i)1; t

U(1;i)2; t

U(1;i)3; t

U(1;i)4;

H1

�~TU(1;i)1

�;H2

�~TU(1;i)1

��;�

tL(1;i)1; tL(1;i)2; t

L(1;i)3; t

L(1;i)4;H1

�~TL(1;i)1

�;

H2

�~TL(1;i)1

���; (15)

L ~~ST(i;j) = maxs2S1;n

~~Ls � maxs2Si;n

~~Ls = maxs2S1;n

X(i;j)2s

~~t(i;j)

� maxs2Si;n

X(i;j)2s

~~t(i;j) = maxs

nX(i;j)2s

��tU(1;n)1

� tU(i;n)1; tU(1;n)2 � tU(i;n)2; t

U(1;n)3

� tU(i;n)3; tU(1;n)4 � tU(i;n)4;H1

�~TU1�;

H2

�~TU1��;�tL(1;n)1 � tL(i;n)1; t

L(1;n)2

� tL(i;n)2; tL(1;n)3 � tL(i;n)3; t

L(1;n)4 � tL(i;n)4;

H1

�~TL1�;H2

�~TL1���

=��lstU(i;j)(1);

lstU(i;j)(2); lstU(i;j)(3); lst

U(i;j)(4);

H1

�~TU(i;j)

�;H2

�~TU(i;j)

��;�

lstL(i;j)(1); lstL(i;j)(2); lst

L(i;j)(3); lst

L(i;j)(4);

H1

�~TL(i;j)

�;H2

�~TL(i;j)

���: (16)

Nevertheless, the IT2F-TF of each task is computed asfollows:

T ~~F(i;j) =L ~~ST(i;j) � E ~~ST(i;j) = maxs2S1;n

~~Ls � maxs2Si;n

~~Ls

� maxs2S1;i

~~Ls = maxs2S1;n

X(i;j)2s

~~t(i;j)

� maxs2Si;n

X(i;j)2s

~~t(i;j) � maxs2S1;i

X(i;j)2s

~~t(i;j): (17)

Furthermore, the IT2F-TF of each path (P ~~FS) isde�ned by:

Page 10: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2588 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

P ~~FS =~~L�S � ~~LS = maxs2S1;n

~~Ls � ~~Ls

= maxs2S1;n

X(i;j)2s

~~t(i;j) � sX

(i;j)2s~~t(i;j)

=nX

(i;j)2s

��max tU(1;n)1 � tU(1;n)1;max tU(1;n)2

� tU(1;n)2;max tU(1;n)3 � tU(1;n)3;max tU(1;n)4

� tU(1;n)4;H1

�~TU1�;H2

�~TU1��;�

max tL(1;n)1

� tL(1;n)1;max tL(1;n)2 � tL(1;n)2;max tL(1;n)3

� tL(1;n)3;max tL(1;n)4 � tL(1;n)4;H1

�~TL1�;

H2

�~TL1���

=��pfUs(1); pf

Us(2); pf

Us(3); pf

Us(4);

H1

�P ~FUS

�;H2

�P ~FUS

��;�pfLs(1); pf

Ls(2);

pfLs(3); pfLs(4);H1

�P ~FLS

�;H2

�P ~FLS

���: (18)

Theorem: The IT2F-TF of each task is obtained by:

T ~~F(i;j) = mins2S1;n

nP ~~Fs

��� (i; j) 2 so : (19)

Proof. Consider:

mins2S1;n

nP ~~Fs

��� (i; j) 2 so= min

0BB@ maxs2S1;n

X(i;j)2s

~~t(i;j) �X

(i;j)2ss2S1;n

~~t(i;j)

1CCA= min

0BB@ maxs2S1;n

X(i;j)2s

~~t(i;j) �0BB@� X

(i;j)2ss2S1;n

~~t(i;j)

1CCA1CCA

= min

0@maxs2S1;n

X(i;j)2s

~~t(i;j)

1A�min

0BB@� X(i;j)2ss2S1;n

~~t(i;j)

1CCA= maxs2S1;n

X(i;j)2s

~~t(i;j) �max

0BB@ X(i;j)2ss2S1;n

~~t(i;j)

1CCA

= maxs2S1;n

X(i;j)2s

~~t(i;j) �max

0@maxs2S1;i

X(i;j)2s

~~t(i;j)

� maxs2Si;n

X(i;j)2s

~~t(i;j)

1A 8 (i; j) 2 S;

= maxs2S1;n

X(i;j)2s

~~t(i;j) � maxs2S1;i

0@ X(i;j)2s

~~t(i;j)

1A� maxs2Si;n

0@ X(i;j)2s

~~t(i;j)

1A 8 (i; j) 2 S;

= T ~~F(i;j) 8 (i; j) 2 S: (20)

In conclusion, the IT2F-TF of each activity is given asfollows:

1. At �rst, the IT2F-TF of each path is determined byEq. (18);

2. Then, The IT2F-TF of each task is reported bymeans of the above theorem and Eq. (19).

2.5. IT2F-earliest start and �nish timeIf ~~Ei denotes the IT2F-earliest start occurrence of nodei, then ~~Ei can be calculated as follows:

~~Ei=E ~~ST(i;j) =max fwn;q(i)jn=1; 2; � � � ;mg ; (21)

where n represents the level in the rooted tree, qdenotes the position of node i at the nth level fromleft to right, and wn;q(i) stands for the weight of nodei introduced at various levels.

In addition, the fuzzy Earliest Finish (EF) time(E ~~FT(i;j)) for each activity is computed as below:

E ~~FT(i;j) = ~~Ei+~~t(i;j) =maxfwk;q(i)j k=1; 2; � � � ;mg+ ~~t(i;j): (22)

Note that the computation of IT2F-Earliest Start (ES)time by the proposed method is easier than by theconventional approach, and it will be straightly gainedfrom the rooted tree. However, the calculation of EFtime for each activity is exactly similar to that by theconventional method.

2.6. IT2F-latest start and �nish timeIn this subsection, with respect to IT2F-TF of eachtask, the IT2F-LS time (L ~~ST(i;j)) can be calculatedby:

Page 11: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2589

L ~~ST(i;j) = T ~~F(i;j) � E ~~ST(i;j) =��tfU(i;j)1

+ estU(i;j)1; tfU(i;j)2 + estU(i;j)2; tf

U(i;j)3

+ estU(i;j)3; tfU(i;j)4 + estU(i;j)4;

min�H1

�T ~FU

�;H1

�E ~~STU

��;

min�H2

�T ~FU

�;H2

�E ~~STU

���;�

tfL(i;j)1 + estL(i;j)1; tfL(i;j)2 + estL(i;j)2;

tfL(i;j)3 + estL(i;j)3; tfL(i;j)4 + estL(i;j)4;

min�H1

�T ~FL

�;H1

�E ~~STL

��;

min�H2

�T ~FL

�;H2

�E ~~STL

���: (23)

Furthermore, the IT2F-LF time of each task can beobtained by using the IT2F-LS time as follows:

~~Lj =L ~~FT(i;j) = L ~~ST(i;j) � ~~t(i;j)

=��lstU(i;j)1 + tU(i;j)1; lst

U(i;j)2 + tU(i;j)2; lst

U(i;j)3

+ tU(i;j)3; lstU(i;j)4 + tU(i;j)4;

min�H1

�L ~STU

�;H1

�~TU��

;

min�H2

�L ~STU

�;H2

�~TU���

;�lstL(i;j)1 + tL(i;j)1; lst

L(i;j)2 + tL(i;j)2; lst

L(i;j)3

+ tL(i;j)3; lstL(i;j)4 + tL(i;j)4;

min�H1

�L ~STL

�;H1

�~TL��

;

min�H2

�L ~STL

�;H2

�~TL����

: (24)

Nevertheless, the computation of IT2F-latest �nish andstart times is easier and simpler than that by thetraditional method.

2.7. Overview of the proposed methodIn this subsection, an overview of the proposed methodis carried out to understand the new method better. Inaddition, the proposed framework is demonstrated inFigure 1. The main steps of the proposed method arede�ned below:

Step 1. Gather experts' opinions on the time of eachactivity;

Step 2. Identify the potential risks of each activity;Step 3. Collect experts' judgments on the probabil-ity and impact of potential risks;Step 4. Do the primary re�nement of risks andremove the risks with low probability and impactsfor the qualitative risk analysis;Step 5. Convert experts' judgments on the prob-ability and impact of each risk to equivalent IT2F-numbers by using Table 1;Step 6. Obtain the impact of k risks on each otherby a new developed operator, which is explained inEqs. (1) to (4);Step 7. Determine the most important risk ofeach activity by calculating the risk measurements ofeach activity and considering the impact of the mostimportant risk on the duration of activities based onStep 5 of subsection 2.1;Step 8. Construct a rooted tree project networkbased on Table 2 and Figure 3;Step 9. Introduce a new subtraction operatorusing Eqs. (10) to (17) to avoid producing negativenumbers;Step 10. Modify the NWRT method by the newsubtraction operator:

Step 10-1. Compute the IT2F-TF of each path byEq. (18);Step 10-2. Calculate the IT2F-TF of each activityvia Eq. (19);Step 10-3. Compute the IT2F-ES time of eachtask by means of Eq. (21);Step 10-4. Calculate the IT2F-EF time of eachtask by Eq. (22);Step 10-5. Obtain the IT2F-LS time of each taskby means of Eq. (23);Step 10-6. Calculate the IT2F-LF time of eachtask via Eq. (24).

Step 11. Determine the criticality degree of eachtask and the project critical path by Eq. (A.8).

3. Application

In this section, to illustrate the applicability and abilityof the proposed method, �rst, an example taken fromliterature has been adopted and solved [52]. Theproject network is shown in Figure 4. In addition,experts' judgments on the time of each activity areillustrated in Table 3. Furthermore, the important risksof each activity and the probability and impact of eachone are gathered from an expert and demonstrated inTables 4 to 10. Generally, the probability and impactof each risk of activities are gathered from experts, andthe impact of each risk on each other is determined by

Page 12: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2590 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

Figure 4. Project network.

Table 3. IT2F-activities time.

Activities Expert1-2 ((10,15,20,25;1,1),(12,16,19,23;0.9,0.9))1-3 ((30,40,50,60;1,1),(35,45,45,55;0.9,0.9))1-4 ((15,23,30,37;1,1),(18,25,30,35;0.9,0.9))2-3 ((30,45,60,75;1,1),(35,50,55,65;0.9,0.9))2-5 ((60,125,180,240;1,1),(90,140,160,210;0.9,0.9))3-5 ((60,125,180,240;1,1),(90,140,160,210;0.9,0.9))4-5 ((60,125,180,240;1,1),(90,140,160,210;0.9,0.9))

using a new function that is developed under IT2FSs.Then, the most important risk of each activity isspeci�ed based on the risk level; �nally, the impactof the most important risk is considered as the timeof activities and added to the initial time of activities.Furthermore, the project network is updated by newactivities' times. Moreover, the NWRT method, whichwas originally proposed by Sireesha and Shankar [52],is modi�ed by means of the new subtraction method to

avoid producing negative numbers in determining thecharacteristics of each activity.

Then, the linguistic variables are converted toequivalent IT2F-numbers, and the impacts of all risksare determined by Eqs. (11) and (12). Moreover, therisk measurement based on multiple probability andimpact is calculated, and the most important risk ofeach activity is speci�ed. Finally, the impact of themost important risk of each activity is regarded asthe time of activity and is added to the duration ofactivities. The new duration of activities is depicted inTable 11. In addition, the IT2F node-weighted rootedtree is depicted in Figure 5.

For comparative purposes, the Length of Paths(LP ) is computed by Eq. (A.8) as follows:

L ~~P1�2�3�5 = ((136:1; 302:8; 426; 623:35; 1; 1);

(206:87; 337:3; 383:15; 520:13; 0:9; 0:9)) = 367;

L ~~P1�2�5 = ((87; 201:67; 228; 434:5; 1; 1);

(136:8; 224:67; 257:83; 358:8; 0:9; 0:9)) = 248:74;

L ~~P1�3�5 = ((119:3; 263:4; 368:93; 539:6; 1; 1);

(183:53; 295:3; 328:7; 453:07; 0:9; 0:9)) = 319:05;

L ~~P1�4�5 = ((88:38; 221:3; 314:3; 482:3; 1; 1);

(145:44; 246:82; 284:1; 399; 0:9; 0:9)) = 272:79:

Table 4. Probability and impact of risks in activities 1-2.

ExpertRisks Probability Impact

Risk of increasing cost = R1 ML MRisk of reducing quality = R2 M MLRisk of reducing safety = R3 MH MCorrelation between R1 and R2 L Calculation via Eqs. (3) and (4)Correlation between R1 and R3 ML Calculation via Eqs. (3) and (4)Correlation between R2 and R3 ML Calculation via Eqs. (3) and (4)Correlation among R1, R2 and R3 L Calculation via Eqs. (3) and (4)

Table 5. Probability and impact of risks in activities 1-3.

ExpertRisks Probability Impact

Risk of increasing cost = R1 M LRisk of reducing quality = R2 ML MLGeneral risks = R4 L MCorrelation between R1 and R2 L Calculation via Eqs. (3) and (4)Correlation between R1 and R4 VL Calculation via Eqs. (3) and (4)Correlation between R2 and R4 VL Calculation via Eqs. (3) and (4)Correlation among R1, R2 and R4 VL Calculation via Eqs. (3) and (4)

Page 13: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2591

Table 6. Probability and impact of risks in activities 1-4.

ExpertRisks Probability Impact

Risk of reducing quality = R2 M MLRisk of reducing safety = R3 MH MLGeneral risks = R4 MH LCorrelation between R2 and R3 M Calculation via Eqs. (3) and (4)Correlation between R2 and R4 ML Calculation via Eqs. (3) and (4)Correlation between R3 and R4 M Calculation via Eqs. (3) and (4)Correlation among R2, R3 and R4 ML Calculation via Eqs. (3) and (4)

Table 7. Probability and impact of risks in activities 2-3.

ExpertRisks Probability Impact

Risk of increasing cost = R1 M MLGeneral risks = R4 M MLCorrelation between R1 and R4 ML Calculation via Eqs. (3) and (4)

Table 8. Probability and impact of risks in activities 2-5.

ExpertRisks Probability Impact

Risk of increasing cost = R1 ML MRisk of reducing safety = R3 L MHCorrelation between R1 and R3 VL Calculation via Eqs. (3) and (4)

Table 9. Probability and impact of risks in activities 3-5.

ExpertRisks Probability Impact

Risk of reducing quality = R2 M MRisk of reducing safety = R3 MH MLCorrelation between R2 and R3 M Calculation via Eqs. (3) and (4)

Table 10. Probability and impact of risks in activities 4-5.

ExpertRisks Probability Impact

Risk of increasing cost = R1 M MLGeneral risks = R4 M MLRisk of reducing safety = R3 ML MCorrelation between R1 and R4 ML Calculation via Eqs. (3) and (4)Correlation between R1 and R3 L Calculation via Eqs. (3) and (4)Correlation between R3 and R4 L Calculation via Eqs. (3) and (4)Correlation among R1, R3, and R4 L Calculation via Eqs. (3) and (4)

Table 11. New durations for activities.

Activities Expert

1-2 ((13,22.5,30,42.5;1,1),(16.8,24,28.5,36.8;0.9,0.9))1-3 ((35,54.67,68.3,94;1,1),(44.3,61.5,61.5,80.67;0.9,0.9))1-4 ((16.95,32.58,42.5,62.28;1,1),(23.04,35.42,42.5,54.6;0.9,0.9))2-3 ((38.9,71.55,95.4,135.25;1,1),(50.87,79.5,87.45,110.93;0.9,0.9))2-5 ((74,179.17,258,392;1,1),(120,200.67,229.3,322;0.9,0.9))3-5 ((84.2,208.75,300.6,445.6;1,1),(139.2,233.8,267.2,372.4;0.9,0.9))4-5 ((71.4,188.75,271.8,420;1,1),(122.4,211.4,241.6,344.4;0.9,0.9))

Page 14: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2592 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

Figure 5. IT2F node-weighted rooted tree.

Table 12. Total oat of each path.

Path Length of the path Total oat of each path

1-2-3-5 ((136.1,302.8,426,623.35;1,1),(206.87,337.3,383.15, 520.13;0.9,0.9))

((0,0,0,0;1,1),(0,0,0,0;0.9,0.9))

1-2-5 ((87,201.67,228,434.5;1,1),(136.8,224.67,257.83,358.8;0.9,0.9))

((49.1,101.13,138,188.85;1,1),(70.07,112.63,125.32,161.3;0.9,0.9))

1-3-5 ((119.3,263.4,368.93,539.6;1,1),(183.53,295.3,328.7,453.07;0.9,0.9))

((16.9,39.38,57.07,83.75;1,1),(23.3,42,54.45,67.07;0.9,0.9))

1-4-5 ((88.38,221.3,314.3,482.3;1,1),(145.44,246.82,284.1,399;0.9,0.9))

( (47.75,81.47,111.7,141.07;1,1),(61.43,90.48,9.05,121.13;0.9,0.9))

Based on the compared results, it is clear that IT2F-critical path is 1-2-3-5. IT2F-TF of the paths iscomputed by means of Eq. (18) and illustrated inTable 12.

Moreover, the IT2F-TF of each activity is com-puted by using Eq. (19) and presented in Table 13.For instance:

T ~~F(1;2) = minnP ~~F(1�2�3�5); P

~~F(1�2�5)

o

= min

8>>>><>>>>:((0; 0; 0; 0; 1; 1); (0; 0; 0; 0; 0:9; 0:9));0@(49:1; 101:1; 138; 188:85; 1; 1);

(70:07; 112:63; 125:32; 161:3; 0:9; 0:9)

1A9>>>>=>>>>;

= ((0; 0; 0; 0; 1; 1); (0; 0; 0; 0; 0:9; 0:9)):

Furthermore, the IT2F-earliest occurrence time of eachnode i is calculated by means of Eq. (21).

Page 15: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2593

Table 13. IT2F-total oat, earliest, and latest times.

Act.a Activity time Total oat of each activity Earliest start time

1-2 ((13,22.5,30,42.5;1,1),(16.8,24,28.5,36.8;0.9,0.9))

((0,0,0,0;1,1),(0,0,0,0;0.9,0.9))

((0,0,0,0;1,1),(0,0,0,0;0.9,0.9))

1-3 ((35,54.67,68.3,94;1,1),(44.3,61.5,61.5,80.67;0.9,0.9))

((16.9,39.38,57.06,83.75;1,1),(23.3,42,54.45,67.07;0.9,0.9))

((0,0,0,0;1,1),(0,0,0,0;0.9,0.9))

1-4 ((16.95,32.58,42.5,62.28;1,1),(23.04,35.42,42.5,54.6;0.9,0.9))

( (47.75,81.47,111.7,141.07;1,1),(61.4,90.48,99.05,121.13;0.9,0.9))

((0,0,0,0;1,1),(0,0,0,0;0.9,0.9))

2-3 ((38.9,71.55,95.4,135.25;1,1),(50.87,79.5,87.45,110.93;0.9,0.9))

((0,0,0,0;1,1),(0,0,0,0;0.9,0.9))

((13,22.5,30,42.5;1,1),(16.8,24,28.5,36.8;0.9,0.9))

2-5 ((74,179.17,258,392;1,1),(120,200.67,229.3,322;0.9,0.9))

((49.1,101.13,138,188.85;1,1),(70.07,112.63,125.32,161.3;0.9,0.9))

((13,22.5,30,42.5;1,1),(16.8,24,28.5,36.8;0.9,0.9))

3-5 ((84.2,208.75,300.6,445.6;1,1),(139.2,233.8,267.2,372.4;0.9,0.9))

((0,0,0,0;1,1),(0,0,0,0;0.9,0.9))

((51.9,94.05,125.4,177.75;1,1),(67.67,103.5,115.95,147.73;0.9,0.9))

4-5 ((71.4,188.75,271.8,420;1,1),(122.4,211.4,241.6,344.4;0.9,0.9))

( (47.75,81.47,111.7,141.07;1,1),(61.4,90.48,99.05,121.13;0.9,0.9))

((16.95,32.58,42.5,62.28;1,1),(23.04,35.42,42.5,54.6;0.9,0.9))

Earliest �nish time Latest start time Latest �nish time((13,22.5,30,42.5;1,1),

(16.8,24,28.5,36.8;0.9,0.9))((0,0,0,0;1,1),

(0,0,0,0;0.9,0.9))( (13,22.5,30,42.5;1,1),

(16.8,24,28.5,36.8;0.9,0.9))((35,54.67,68.3,94;1,1),

(44.3,61.5,61.5,80.67;0.9,0.9))((16.9,39.38,57.06,83.75;1,1),(23.3,42,54.45,67.07;0.9,0.9))

((51.9,94.05,125.4,177.75;1,1),(67.67,103.5,115.95,147.73;0.9,0.9))

((16.95,32.58,42.5,62.28;1,1),(23.04,35.42,42.5,54.6;0.9,0.9))

((47.75,81.47,111.7,141.07;1,1),(61.4,90.48,99.05,121.13;0.9,0.9))

( (64.7,114.05,154.2,203.35;1,1),(84.47,125.9,141.55,175.73;0.9,0.9))

((51.9,94.05,125.4,177.75;1,1),(67.67,103.5,115.95,147.73;0.9,0.9))

((13,22.5,30,42.5;1,1),(16.8,24,28.5,36.8;0.9,0.9))

((51.9,94.05,125.4,177.75;1,1),(67.67,103.5,115.95,147.73;0.9,0.9))

((87,201.67,288,434.5;1,1),(136.8,224.67,257.83,358.8;0.9,0.9))

( (62.1,123.63,168,231.35;1,1),(86.87,136.63,153.82,198.13;0.9,0.9))

((136.1,302.8,426,3623.35;1,1),(206.87,337.3,383.15,520.13;0.9,0.9))

((136.1,302.8,426,623.35;1,1),(206.87,337.3,383.15,520.13;0.9,0.9))

( (51.9,94.05,125.4,177.75;1,1),(67.67,103.5,115.95,147.73;0.9,0.9))

((136.1,302.8,426,3623.35;1,1),(206.87,337.3,383.15,520.13;0.9,0.9))

((88.35,221.33,314.3,482.3;1,1),(145.4,246.82,284.1,399;0.9,0.9))

( (64.7,114.05,154.2,203.35;1,1),(84.47,125.9,141.55,175.73;0.9,0.9))

((136.1,302.8,426,3623.35;1,1),(206.87,337.3,383.15,520.13;0.9,0.9))

aAct.: Activities.

For example:

~~E3 = maxfw2;2(3); w3;1(3)g

= max

8>>>>>>>><>>>>>>>>:

((35; 54:67; 68:3; 94; 1; 1);

(44:3; 61:5; 61:5; 80:67; 0:9; 0:9));

((51:9; 94; 125:4; 177:75; 1; 1);

(67:67; 103:5; 115:95; 147:73; 0:90:9))

9>>>>>>>>=>>>>>>>>;=((51:9; 94; 125:4; 177:75; 1; 1);

(67:67; 103:5; 115:95; 147:73; 0:90:9)):

In addition, IT2F-ES time and IT2F-EF time of eachnode i are determined via Eqs. (21) and (22) andillustrated in Table 13.

For example:

E ~~ST(3;5) = ~~E3 = ((51:9; 94; 125:4; 177:75; 1; 1);

(67:67; 103:5; 115:95; 147:73; 0:90:9));

E ~~FT(3;5) =E ~~ST(3;5) + ~~T(3;5)

=((51:9; 94; 125:4; 177:75; 1; 1);

(67:67; 103:5; 115:95; 147:73; 0:90:9))

� ((84:2; 208:75; 300:6; 445:6; 1; 1);

(139:2; 233:8; 267:2; 372:4; 0:9; 0:9))

=((136:1; 302:8; 426; 623:35; 1; 1);

(206:87; 337:3; 383:15; 520:13; 0:9; 0:9)):

Page 16: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2594 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

Finally, the IT2F-latest start and �nish times areobtained by means of Eqs. (23) and (24), respectively.The results are demonstrated in Table 13.

For example:

L ~~ST(3;5) =T ~~F(3;5) + E ~~ST(3;5)

=((0; 0; 0; 0; 1; 1); (0; 0; 0; 0; 0:9; 0:9))

� ((51:9; 94; 125:4; 177:75; 1; 1);

(67:67; 103:5; 115:95; 147:73; 0:90:9))

=((51:9; 94; 125:4; 177:75; 1; 1);

(67:67; 103:5; 115:95; 147:73; 0:90:9));

and:

L ~~FT(3;5) =L ~~ST(3;5) + ~~T(3;5)

=((51:9; 94; 125:4; 177:75; 1; 1);

(67:67; 103:5; 115:95; 147:73; 0:90:9))

� ((84:2; 208:75; 300:6; 445:6; 1; 1);

(139:2; 233:8; 267:2; 372:4; 0:9; 0:9))

=((136:1; 302:8; 426; 3623:35; 1; 1);

(206:87; 337:3; 383:15; 520:13; 0:9; 0:9)):

The criticality degree of each activity and critical pathcan be determined, as shown in Table 14. The IT2F-TF of each activity is converted to a crisp number byusing Eq. (A.8). It is obvious that the critical activitiesare 1-2, 2-3, and 3-5; nevertheless, the critical path isthe path 1-2-3-5.

In order to show the advantages of the proposedmethod, a simple example is solved by two methods of

the literature. If ~A, ~B are de�ned as follows:

~A = (10; 15; 30; 40);

~B = (12; 13; 15; 20);

then the subtraction operation is performed by themethodology of Kumar and Kaur [47] as follows:

~A� ~B = (5; 10; 10; 11):

Further, the subtraction operation is computed by themethod of Rao and Shankar [48] as follows:

~A� ~B = (0; 0; 17; 28):

Finally, this operation is carried out by using theproposed method as follows:

~A� ~B = (0; 0; 15; 20):

The classic fuzzy subtraction operation is calculated asfollows:

~A� ~B =(10; 15; 30; 40)�(12; 13; 15; 20)

=(�10; 0; 17; 28) crisp number��������!=354:

With this in mind, the crisp results of the proposedmethod, and methods of Kumar and Kaur [47], andRao and Shankar [48] are calculated as follows:

Kumar and Kaur [47] method:�5 + 10 + 10 + 11

4

�=

364;

Rao and Shankar [48] method:�0 + 0 + 17 + 28

4

�=

454;

Proposed method:

Table 14. Criticality degree of each activity.

Activities Total oat of each activity Criticality degree

1-2 ((0,0,0,0;1,1),(0,0,0,0;0.9,0.9)) 0

1-3 ((16.9,39.38,57.06,83.75;1,1),(23.3,42,54.45,67.07;0.9,0.9)) 47.95

1-4 ((47.75,81.47,111.7,141.07;1,1),(61.4,90.48,99.05,121.13;0.9,0.9)) 94.21

2-3 ((0,0,0,0;1,1),(0,0,0,0;0.9,0.9)) 0

2-5 ((49.1,101.13,138,188.85;1,1),(70.07,112.63,125.32,161.3;0.9,0.9)) 118.26

3-5 ((0,0,0,0;1,1),(0,0,0,0;0.9,0.9)) 0

4-5 ((47.75,81.47,111.7,141.07;1,1),(61.4,90.48,99.05,121.13;0.9,0.9)) 94.21

Page 17: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2595

�0 + 0 + 15 + 20

4

�=

354:

As shown above, the previous methods compute theamounts larger than the actual amount. However, theresults of classic fuzzy subtraction and the proposedmethod are the same. In fact, the proposed methodproduces real amounts in subtraction operation andavoids negative numbers.

4. Comparative analysis

In this section, to validate the results of characteristicsof each task and critical path, a new proposed approachis applied to the two examples from recent literature.Note that these examples are solved by the proposedmethod under traditional fuzzy environment. The �rstexample is related to Sireesha and Shankar [51] andis solved in the triangle fuzzy environment, and thesecond example is relevant to Sireesha and Shankar [52]and is solved in the trapezoidal fuzzy environment.These two examples are depicted in Tables 15 and 16,respectively. In these two cases, it is observed thatthe criticality degree is the same, showing the validityof the proposed method. It is obvious that the

proposed method avoids producing negative number indetermining the characteristics of each activity.

The proposed method has been compared withtwo methods explored in the literature, and the resultscon�rmed the viability of proposed method. However,these two methods of the literature have producednegative number in determining the characteristics ofthe fuzzy project network. As seen in Tables 13 and 14,the proposed method avoided producing negative num-ber in determining the characteristics of fuzzy projectnetwork, and the results were the same. Nevertheless,the validity of the proposed method was con�rmedbased on Tables 13 and 14.

5. Conclusions

In this paper, IT2FSs were used to consider the risksof each activity and determine the critical path ofthe project network. A new method for determiningthe correlation among risk factors was also extendedunder the IT2F environment to tackle the uncertaintyof real-world projects better. Then, a new sub-traction operator was introduced to avoid producingnegative numbers in the project network, and the

Table 15. Comparative analysis of the proposed method and the method of Sireesha and Shankar [51] in the case of the�rst example.

Activities Sireesha and Shankar [51]T ~Fij

Criticalitydegree

Proposedmethod

Criticalitydegree

1-2 (-7,0,6,14) 3.25 (2,3,3,5) 3.251-3 (-12,-3,3,12) 0 (0,0,0,0) 01-5 (2,6,10,18) 9 (6,7,9,14) 92-4 (-7,0,6,14) 3.25 (2,3,3,5) 3.252-5 (-5,2,7,16) 5 (4,4,5,7) 53-4 (-6,2,6,15) 4.25 (3,3,5,6) 4.253-6 (-12,-3,3,12) 0 (0,0,0,0) 04-5 (-7,0,6,14) 3.25 (2,3,3,5) 3.254-6 (-6,2,6,15) 3.75 (2,3,4,6) 3.755-6 (-7,0,6,14) 3.25 (2,3,3,5) 3.25

Table 16. Comparative analysis of the proposed method and the method of Sireesha and Shankar [52] in the case of thesecond example.

Activities Sireesha and Shankar [52]T ~Fij

Criticalitydegree

Proposedmethod

Criticalitydegree

1-2 (-160,0,160) 0 (0,0,0) 01-3 (-130,20,170) 20 (10,20,30) 201-4 (-110,37,185) 37.3 (25,37,50) 37.32-3 (-160,0,160) 0 (0,0,0) 02-5 (-100,45,190) 45 (30,45,60) 453-5 (-160,0,160) 0 (0,0,0) 04-5 (-110,37,185) 37.3 (25,37,50) 37.3

Page 18: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2596 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

NWRT method was modi�ed by this new operator.Furthermore, the NWRT method was developed underIT2FSs. An example from literature was solved todemonstrate the calculation procedure and capabilityof the proposed method. For the comparative analysis,the total oat of each activity of two examples from therecent literature was obtained; �nally, the results weredefuzzi�ed to determine the criticality degree. It wasobserved that the criticality degree of the two previousdecision methods was the same as the results of theproposed method. The main advantage of the proposedmethod was the production of positive numbers, be-cause the negative numbers have no physical meaningsin a project network. The new subtraction operatorfor critical path computation did not generate largervalues than real values in comparison with previousmethods. In fact, the new subtraction operator enjoyedtwo advantages. Firstly, it avoided producing negativenumber; secondly, it avoided producing lager valuesthan real values. Moreover, the presented approach wassimpler and easier than traditional CPM calculation,and the critical path would be determined directlybased on the rooted tree. A mathematical modelingapproach of the problem can be set for the futureresearch. The proposed methodology will require moreinputs from the DMs, which can be time consuming.To solve this problem, a new operator for consideringthe correlation between risk factors and obtainingprobability can be added to the proposed method.Furthermore, the proposed method can be extendedunder the group decision environment to achieve ahigher degree of accuracy.

Acknowledgements

The authors thank anonymous referees for valuablecomments, which improved the primary version of thispaper.

References

1. Kerzner, H., Project Management: A Systems Ap-proach to Planning, Scheduling, and Controlling, 12thEdn., John Wiley & Sons, US (2017).

2. Malcolm, D.G., Roseboom, J.H., Clark, C.E., andFazar, W. \Application of a technique for researchand development program evaluation", Operations Re-search, 7(5), pp. 646-669 (1959).

3. Chanas, S. and Zieli�nski, P. \Critical path analysis inthe network with fuzzy activity times", Fuzzy Sets andSystems, 122(2), pp. 195-204 (2001).

4. Zareei, A., Zaerpour, F., Bagherpour, M., Noora, A.A.,and Vencheh, A.H. \A new approach for solving fuzzycritical path problem using analysis of events", ExpertSystems with Applications, 38(1), pp. 87-93 (2011).

5. Zadeh, L.A. \Fuzzy sets as basis for a theory ofpossibility", Fuzzy Sets and Systems, 1, pp. 3-28(1978).

6. Project Management Institute, A Guide to the ProjectManagement Body of Knowledge (PM-BOK Guide),5th Edn., US (2013).

7. Espinoza, R.D. \Separating project risk from the timevalue of money: A step toward integration of risk man-agement and valuation of infrastructure investments",International Journal of Project Management, 32(6),pp. 1056-1072 (2014).

8. Yim, R., Castaneda, J., Doolen, T., Tumer, I., andMalak, R. \A study of the impact of project classi�ca-tion on project risk indicators", International Journalof Project Management, 33(4), pp. 863-876 (2015).

9. Golini, R., Kalchschmidt, M., and Landoni, P.\Adoption of project management practices: Theimpact on international development projects of non-governmental organizations", International Journal ofProject Management, 33(3), pp. 650-663 (2015).

10. Carvalho, M.M.D. and Rabechini Junior, R. \Impactof risk management on project performance: Theimportance of soft skills", International Journal ofProduction Research, 53(2), pp. 321-340 (2015).

11. Muriana, C. and Vizzini, G. \Project risk manage-ment: A deterministic quantitative technique for as-sessment and mitigation", International Journal ofProject Management, 35(3), pp. 320-340 (2017).

12. Kuchta, D. \Use of fuzzy numbers in project risk (crit-icality) assessment", International Journal of ProjectManagement, 19(5), pp. 305-310 (2001).

13. Smith, N.J., Appraisal, Risk and Uncertainty, 1st Ed.,Thomas Telford UK (2003).

14. Ksi _zek, M.V., Nowak, P.O., Kivrak, S., Ros lon,J.H., and Ustinovichius, L. \Computer-aided decision-making in construction project development", Journalof Civil Engineering and Management, 21(2), pp. 248-259 (2015).

15. Barber, R.B. \Understanding internally generatedrisks in projects", International Journal of ProjectManagement, 23(8), pp. 584-590 (2005).

16. Ebrahimnejad, S., Mousavi, S.M., Tavakkoli-Moghaddam, R., and Heydar, M. \Evaluating highrisks in large-scale projects using an extended VIKORmethod under a fuzzy environment", InternationalJournal of Industrial Engineering Computations, 3,pp. 463-476 (2012).

17. Mousavi, S.M., Tavakkoli-Moghaddam, R., Azaron,A., Mojtahedi, S.M.H., and Hashemi, H. \Risk assess-ment for highway projects using Jackknife technique",Expert Systems with Applications, 38, pp. 5514-5524(2011).

18. Mousavi, S.M., Tavakkoli-Moghaddam, R., Hashemi,H., and Mojtahedi, S.M.H. \A novel approach based onnon-parametric resampling with the interval analysisfor large engineering project risks", Safety Science, 49,pp. 1340-1348 (2011).

Page 19: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2597

19. Hashemi, H., Mousavi, S.M., and Mojtahedi, S.M.H.\Bootstrap technique for risk analysis with intervalnumbers in bridge construction projects", Journal ofConstruction Engineering and Management - ASCE,137(8), pp. 600-608 (2011).

20. Makui, A., Mojtahedi, S.M.H., and Mousavi, S.M.\Project risk identi�cation and analysis based ongroup decision making methodology in a fuzzy envi-ronment", International Journal of Management Sci-ence and Engineering Management, 5(2), pp. 108-118(2010).

21. El-Sayegh, S.M. \Risk assessment and allocation in theUAE construction industry", International Journal ofProject Management, 26(4), pp. 431-438 (2008).

22. Liang, G.S. and Han, T.C. \Fuzzy critical path forproject network", Information and Management Sci-ences, 15(4), pp. 29-40 (2004).

23. Kumar, A. and Kaur, P. \A new method for fuzzycritical path analysis in project networks with a newrepresentation of triangular fuzzy numbers", Appli-cations and Applied Mathematics: An InternationalJournal, 5(10), pp. 1442-1466 (2010).

24. Shankar, N.R. and Saradhi, B.P. \Fuzzy critical pathmethod in interval-valued activity networks", Inter-national Journal of Pure and Applied Sciences andTechnology, 3(2), pp. 72-79 (2011).

25. Taylan, O., Bafail, A.O., Abdulaal, R.M., and Kabli,M.R. \Construction projects selection and risk assess-ment by fuzzy AHP and fuzzy TOPSIS methodolo-gies", Applied Soft Computing, 17, pp. 105-116 (2014).

26. Kuchta, D. and Ptaszy�nska, E. \Fuzzy based riskregister for construction project risk assessment",AIP Conference Proceedings, 1863(1), pp. 1011-1019(2017).

27. Asan, U.M.U.T., Soyer, A., and Bozdag, E. \Aninterval type-2 fuzzy prioritization approach to projectrisk assessment", Journal of Multiple-Valued Logic andSoft Computing, 26(6), pp. 541-577 (2016).

28. Mendel, J. and Wu, D., Perceptual Computing: AidingPeople in Making Subjective Judgments, 1st Ed., JohnWiley & Sons, US (2010).

29. Mendel, J.M. \Type-2 fuzzy sets and systems: Anoverview", IEEE Computational Intelligence Maga-zine, 2(2), pp. 20-29 (2007).

30. Deveci, M., Demirel, N.C� ., and Ahmeto�glu, E. \Airlinenew route selection based on interval type-2 fuzzyMCDM: A case study of new route between Turkey-North American region destinations", Journal of AirTransport Management, 59, pp. 83-99 (2017).

31. Qin, J., Liu, X., and Pedrycz, W. \An extendedTODIM multi-criteria group decision making methodfor green supplier selection in interval type-2 fuzzyenvironment", European Journal of Operational Re-search, 258(2), pp. 626-638 (2017).

32. Abdullah, L. and Najib, L. \A new type-2 fuzzy setof linguistic variables for the fuzzy analytic hierarchyprocess", Expert Systems with Applications, 41(7), pp.3297-3305 (2014).

33. Ghorabaee, M.K., Amiri, M., Zavadskas, E.K.,Turskis, Z., and Antucheviciene, J. \A new multi-criteria model based on interval type-2 fuzzy sets andEDAS method for supplier evaluation and order allo-cation with environmental considerations", Computers& Industrial Engineering, 112, pp. 156-174 (2017).

34. Abdullah, L. and Zulki i, N. \A new DEMATELmethod based on interval type-2 fuzzy sets for devel-oping causal relationship of knowledge managementcriteria", Neural Computing and Applications, 29, pp.1-17 (2018).

35. Kilic, M. and Kaya, _I. \Investment project evaluationby a decision making methodology based on type-2fuzzy sets", Applied Soft Computing, 27, pp. 399-410(2015).

36. Ghorabaee, M.K., Amiri, M., Sadaghiani, J.S., andZavadskas, E.K. \Multi-criteria project selection usingan extended VIKOR method with interval type-2 fuzzysets", International Journal of Information Technology& Decision Making, 14(5), pp. 993-1016 (2015).

37. Oztaysi, B. \A group decision making approach usinginterval type-2 fuzzy AHP for enterprise informationsystems project selection", Journal of Multiple-ValuedLogic & Soft Computing, 24(5), pp. 475-500 (2015).

38. Bozdag, E., Asan, U., Soyer, A., and Serdarasan, S.\Risk prioritization in failure mode and e�ects analysisusing interval type-2 fuzzy sets", Expert Systems withApplications, 42(8), pp. 4000-4015 (2015).

39. Mohagheghi, V., Mousavi, S.M., and Vahdani, B. \An-alyzing project cash ow by a new interval type-2 fuzzymodel with an application to construction industry",Neural Computing and Applications, 28(11), pp. 3393-3411 (2017).

40. Mohagheghi, V., Mousavi, S.M., Vahdani, B., andShahriari, M.R. \R&D project evaluation and projectportfolio selection by a new interval type-2 fuzzyoptimization approach", Neural Computing and Ap-plications, 28(12), pp. 3869-3888 (2017).

41. Zadeh, L.A. \Fuzzy sets", Information and Control,8(3), pp. 338-353 (1965).

42. Zadeh, L.A. \The concept of a linguistic variable andits application to approximate reasoning-I", Informa-tion Sciences, 8(3), pp. 199-249 (1975).

43. Chen, T.Y. \A linear assignment method for multiple-criteria decision analysis with interval type-2 fuzzysets", Applied Soft Computing, 13(5), pp. 2735-2748(2013).

44. Bezdek, J.C., Pattern Recognition with Fuzzy ObjectiveFunction Algorithms, 1st Edn., Springer Science &Business Media, US (2013).

45. Celikyilmaz, A. and Turksen, I.B. \Modeling uncer-tainty with fuzzy logic", Studies in Fuzziness and SoftComputing, 240, pp. 149-215 (2009).

46. Shankar, N.R., Sireesha, V., and Rao, P.P.B. \Ananalytical method for �nding critical path in a fuzzyproject network", International Journal of Contempo-rary Mathematical Sciences, 5(20), pp. 953-962 (2010).

Page 20: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2598 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

47. Kumar, A. and Kaur, P. \A new approach for fuzzycritical path analysis", International Journal of Math-ematics in Operational Research, 3(3), pp. 341-357(2011).

48. Rao, P.P.B. and Shankar, N.R. \Fuzzy critical pathanalysis based on centroid of centroids of fuzzy num-bers and new subtraction method", InternationalJournal of Mathematics in Operational Research, 5(2),pp. 205-224 (2013).

49. Yakhchali, S.H. and Ghodsypour, S.H. \Computinglatest starting times of activities in interval-valuednetworks with minimal time lags", European Journalof Operational Research, 200(3), pp. 874-880 (2010).

50. Yakhchali, S.H. and Ghodsypour, S.H. \On the lateststarting times and criticality of activities in a networkwith imprecise durations", Applied Mathematical Mod-elling, 34(8), pp. 2044-2058 (2010).

51. Sireesha, V. and Shankar, N.R. \A new approachto �nd project characteristics and multiple possiblecritical paths in a fuzzy project network", FuzzyInformation and Engineering, 5(1), pp. 69-85 (2013).

52. Sireesha, V. and Shankar, N.R. \A node-weightedrooted tree (NWRT) method to �nd project charac-teristics and critical path in a triangular fuzzy projectnetwork", Computational and Applied Mathematics,37(2), pp. 1971-1985 (2018).

53. Madhuri, K.U., Babu, S.S., and Shankar, N.R. \Fuzzyrisk analysis based on the novel fuzzy ranking with newarithmetic operations of linguistic fuzzy numbers",Journal of Intelligent & Fuzzy Systems, 26(5), pp.2391-2401 (2014).

54. Hu, J., Zhang, Y., Chen, X., and Liu, Y. \Multi-criteria decision making method based on possibilitydegree of interval type-2 fuzzy number", Knowledge-Based Systems, 43, pp. 21-29 (2013).

55. Mendel, J.M., John, R.I., and Liu, F. \Interval type-2fuzzy logic systems made simple", IEEE Transactionson Fuzzy Systems, 14(6), pp. 808-821 (2006).

56. Chen, S.M. and Lee, L.W. \Fuzzy multiple attributesgroup decision-making based on the interval type-2TOPSIS method", Expert Systems with Applications,37(4), pp. 2790-2798 (2010).

57. Hu, J., Xiao, K., Chen, X., and Liu, Y. \Intervaltype-2 hesitant fuzzy set and its application in multi-criteria decision making", Computers & IndustrialEngineering, 87, pp. 91-103 (2015).

58. Li, D. and Gu, Y. \Method for ranking interval num-bers based on possibility degree", Xitong GongchengXuebao, 23(2), pp. 243-261 (2008).

Appendix

The membership degree of the T1FS is a crisp numberin [0, 1]. Usually, there are circumstances where itis di�cult to specify the exact membership functionfor a fuzzy set. It is not appropriate to use T1FSs in

this situation. To overcome this issue, Zadeh [42] pre-sented T2FSs, which are the extended form of T1FSs.T2FSs are de�ned by both primary and secondarymemberships to achieve higher degrees of freedom and exibility, and they are three-dimensional. Hence,T2FSs have the advantage of modeling uncertaintymore accurately than T1FSs [54]. T2FSs are moreappropriate, exible and intelligent than T1FSs in illus-trating uncertainties for handling fuzzy group decisionproblems [55-57]. Moreover, the computational burdenis signi�cant when using T2FSs to solve problems [58].IT2FSs can be considered as a special case of generalT2FS, where all the amounts of secondary membershipare equal to 1 [55]. Therefore, it not only demonstratesuncertainty better than T1FSs, but also reduces thecomputation burden when compared with T2FSs.

A T2FS ~~A in the universe of discourse X canbe illustrated by a Type-2 membership function � ~~Ademonstrated below [55]:

~~A =n

((x; u); � ~~A(x; u))

���8 x 2 X; 8 u 2 Jx� [0; 1]; 0 � � ~~A

(x; u) � 1o; (A.1)

where Jx demonstrates an interval in [0; 1]. However,the T2FS ~~A can also be shown by using the following:

~~A =Z

x2X

Zu2Jx

� ~~A(x; u)=(x; u); (A.2)

where Jx � [0; 1] ands

demonstrate union over alladmissible x and u.

If all � ~~A(x; u) = 1, then ~~A is called IT2FS. An

IT2FS ~~A can be viewed as a special case of T2FSs asdemonstrated below:

~~A =Z

x2X

Zu2Jx

1=(x; u): (A.3)

The upper membership grade and the lower member-ship grade of an IT2FS are Type-1 membership grades,respectively. Figure A.1 illustrates a trapezoidal IT2F:

~~Ai =�

~AUi ; ~ALi�

=��aUi1; a

Ui2; a

Ui3; a

Ui4;H1

�~AUi�; H1

�~AUi��;�

aLi1; aLi2; a

Li3; a

Li4;H1

�~ALi�;H1

�~ALi���

;

where ~AUi and ~ALi are T1FSs; aUi1, aUi2, aUi3, aUi4,aLi1, aLi2, aLi3 and aLi4 are the reference points of theIT2F ~~Ai;Hj( ~AUi ) denotes the membership value of the

Page 21: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600 2599

Figure A.1. Trapezoidal interval Type-2 fuzzy set.

element aUi(j+1) in the upper trapezoidal membershipfunction ~AUi ; 1 � j � 2; and Hj( ~ALi ) denotes themembership value of the element aLi(j+1) in the lowertrapezoidal membership function ~ALi ; 1 � j � 2 [55].

The basic algebraic operations between trape-zoidal IT2FSs are described as follows [56]:

~~F1 =�

~FU1 ; ~FL1�

=��fU11; f

U12; f

U13; f

U14;H1

�~FU1�;H2

�~FU1��;�

fL11; fL12; f

L13; f

L14;H1

�~FL1�;H2

�~FL1���

;

~~F2 =�

~FU2 ; ~FL2�

=��fU21; f

U22; f

U23; f

U24;H1

�~FU2�;H2

�~FU2��;�

fL21; fL22; f

L23; f

L24;H1

�~FL2�;H2

�~FL2���

(A.4)

The addition operation:

~~F1� ~~F2 =�

~FU1 ; ~FL1�

+�

~FU2 ; ~FL2�

=��fU11 + fU21; f

U12 + fU22; f

U13 + fU23; f

U14 + fU24;

min�H1

�~FU1�;H1

�~FU2��

;

min�H2

�~FU1�;H2

�~FU2���

;

fL11 + fL21; fL12 + fL22; f

L13 + fL23; f

L14 + fL24;

min�H1

�~FL1�;H1

�~FL2��

;

min�H2

�~FL1�;H2

�~FL2����

: (A.5)

The subtraction operation:

~~F1� ~~F2 =�

~FU1 ; ~FL1�� � ~FU2 ; ~FL2

�=��fU11 � fU24; f

U12 � fU23; f

U13 � fU22; f

U14 � fU21;

min�H1

�~FU1�;H1

�~FU2��

;

min�H2

�~AU1�;H2

�~AU2���

;

fL11 � fL24; fL12 � fL23; f

L13 � fL22; f

L14 � fL21;

min�H1

�~FL1�;H1

�~FL2��

;

min�H2

�~FL1�;H2

�~FL2����

: (A.6)

The multiplication operation:

~~F1 ~~F2 =�

~FU1 ; ~FL1�� � ~FU2 ; ~FL2

�=��fU11 � fU21; f

U12 � fU22; f

U13 � fU23; f

U14 � fU24;

min�H1

�~FU1�;H1

�~FU2��

;

min�H2

�~FU1�;H2

�~FU2���

;

fL11 � fL21; fL12 � fL22; f

L13 � fL23; f

L14 � fL24;

min�H1

�~FL1�;H1

�~FL2��

;

min�H2

�~FL1�;H2

�~FL2����

: (A.7)

The defuzzi�ed value of a trapezoidal IT2FN is de�nedas follows [36]:

Def� ~~F1

�=

12

0@ XT2fU;Lg

fT11 +H1

�~FT1�fT12 +H2

�~FT1�fT13 + fT14

2 +H1

�~FT1�

+H2

�~FT1� 1A :

(A.8)

Biographies

Yahya Dorfeshan received an MSc degree fromthe Department of Industrial Engineering, Faculty ofEngineering, Shahed University, Tehran, Iran. Hismain research interests include quantitative methodsin project management, fuzzy sets theory, multi-criteria decision-making under uncertainty, and ap-plied operations research. He has published several

Page 22: Determining project characteristics and critical path by a ...scientiairanica.sharif.edu/article_20501_58be9bc1e5770b8737d86eb0aa... · schedule complex projects [1]. In the CPM,

2600 Y. Dorfeshan et al./Scientia Iranica, Transactions E: Industrial Engineering 26 (2019) 2579{2600

papers in international journals and conference pro-ceedings.

Seyed Meysam Mousavi is an Associate Professorat the Department of Industrial Engineering, Facultyof Engineering, Shahed University in Tehran, Iran.He received a PhD degree from the School of In-dustrial Engineering at University of Tehran, Iran,and is currently a member of Iran's National EliteFoundation. He is the Head of Industrial EngineeringDepartment at Shahed University and a member ofthe Iranian Operational Research Association. Hismain research interests include cross-docking systemsplanning, logistics planning and scheduling, quantita-tive methods in project management, engineering op-timization under uncertainty, multiple criteria decisionmaking under uncertainty, and applied soft computing.He has published many papers and book chapters inreputable journals and international conference pro-ceedings.

Behnam Vahdani is an Assistant Professor at Fac-ulty of Industrial and Mechanical Engineering, QazvinBranch, Islamic Azad University in Iran and is amember of Iran's National Elite Foundation. Hiscurrent research interests include supply chain networkdesign, facility location and design, multi-criteria deci-sion making, uncertain programming, meta-heuristicsalgorithms, and operations research applications. Hehas published numerous papers and book chapters inthe aforementioned areas.

Ali Siadat is a Professor at Laboratoire de Con-ception, Fabrication Commande, Arts et M�etier ParisTech, Centre de Metz in Metz, France. His currentresearch interests include computer-aided manufactur-ing, modeling and optimization of manufacturing pro-cesses, decision-making in manufacturing, inspectionplanning, and operations research applications. He haspublished numerous papers and book chapters in theaforementioned �elds.