A multi-objective resource allocation problem in PERT networks

European Journal of Operational Research 172 (2006) 838–854
www.elsevier.com/locate/ejor
Discrete Optimization
A multi-objective resource allocation problem
in PERT networks
Amir Azaron a, Hideki Katagiri a,*, Masatoshi Sakawa a,
Kosuke Kato a, Azizollah Memariani b
a
Department of Artificial Complex Systems Engineering, Graduate School of Engineering, Hiroshima University, Kagamiyama 1-4-1,
Higashi-Hiroshima, Hiroshima 739-8527, Japan
b
Department of Industrial Engineering, Bu-Ali Sina University, Ghobare Hamadani Boulevard, Hamadan, Iran
Received 14 July 2004; accepted 25 November 2004
Available online 12 February 2005
Abstract
We develop a multi-objective model for resource allocation problem in PERT networks with exponentially or Erlang
distributed activity durations, where the mean duration of each activity is a non-increasing function and the direct cost
of each activity is a non-decreasing function of the amount of resource allocated to it. The decision variables of the
model are the allocated resource quantities. The problem is formulated as a multi-objective optimal control problem
that involves four conflicting objective functions. The objective functions are the total direct costs of the project (to
be minimized), the mean of project completion time (min), the variance of project completion time (min), and the probability that the project completion time does not exceed a certain threshold (max). The surrogate worth trade-off
method is used to solve a discrete-time approximation of the original problem.
Ó 2005 Elsevier B.V. All rights reserved.
Keywords: Multiple objective programming; Project management and scheduling; Optimal control; Markov processes
1. Introduction
Project Scheduling has been a major objective of most models proposed to aid planning and management of projects. The most important method to schedule a project assuming deterministic durations is
the well-known CPM—Critical Path Method. However, most durations have a random nature and therefore, PERT was proposed to determine the distribution of the total duration, T.
*
Corresponding author. Tel.: +81 824 24 7701; fax: +81 824 22 7195.
E-mail address: [email protected] (H. Katagiri).
0377-2217/$ - see front matter Ó 2005 Elsevier B.V. All rights reserved.
doi:10.1016/j.ejor.2004.11.018
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
839
This method is based on the substitution of the network by the CPAD—critical path assuming that
each activity has a fixed duration equal to its mean (critical path using average durations). The mean
and the variance of the CPAD are given by the sum of the means and of the variances of its activities,
respectively, and therefore these results considered the mean and the variance of the total duration of the
network.
Unfortunately, this is an optimistic assumption as the real mean, E(T), is greater than or equal to such
estimate. Thus, many authors have studied:
1. Analytical approximations of the cumulative distribution function of T, F(T). Charnes et al. [4]
developed a chance-constrained programming approach to PERT problems. They assumed exponential
activity durations. Martin [21] provided a systematic way of analyzing PERT networks through series–
parallel reductions. Fatemi Ghomi and Hashemin [10] generalized the Gaussian quadrature formula to
compute F(T). Fatemi Ghomi and Rabbani [11] presented a structural mechanism, which changes the
structure of network to a series–parallel network, to estimate F(T). Kulkarni and Adlakha [19] developed
a continuous-time Markov process approach to PERT problems with exponentially distributed activity
durations.
2. Upper or lower bounds of F(T). Elmaghraby [7] provided lower bounds for the true, expected project
completion time. Fulkerson [14], Clingen [5], Robillard [23] and Perry and Creig [22] have done similar
works.
3. Monte-Carlo simulation to estimate F(t). Several authors have used conditional sampling to achieve variance reduction, see Burt and Garman [3], Garman [15], and Sigal et al. [26]. Fishman [12] achieved further variance reduction by using a combination of quasirandom points and conditional sampling to
estimate the distribution and mean of project completion time.
In CPM networks, activity duration is viewed either as a function of cost or as a function of resources
committed to it. The well-known time–cost trade-off problem (TCTP) in CPM networks takes the former
view. Studies on TCTP have been done using various kinds of cost functions such as linear (Fulkerson [13]
and Kelly [18]), discrete (Demeulemeester et al. [6]), convex (Lamberson and Hocking [20] and Berman [2]),
and concave (Falk and Horowitz [9]). When the cost functions are arbitrary (still non-increasing), a
dynamic programming (DP) approach was suggested by Robinson [24]. A powerful approach for solving
this problem using dynamic programming was presented by Elmaghraby [8].
In the TCTP, the objective is to determine the duration of each activity in order to achieve the minimum
total direct and indirect costs of the project. Tavares [28] has presented a general model based on the
decomposition of the project into a sequence of stages and the optimal solution can be easily computed
for each practical problem as it is shown for a real case study.
Weglarz [30] studied this problem using optimal control theory and assuming that the processing speed
of each activity at time t is a continuous, non-decreasing function of the amount of resource allocated to the
activity at that instant of time. This means that also time is here considered as a continuous variable.
Unfortunately, it seems that this approach is not applicable to networks with a reasonable size (>10).
The stochastic assumption introduces additional difficulties and then the experimental approach has to
be adopted. There are also some other papers related to the applications of optimal control theory in stochastic networks, but we could not find any paper corresponding to the application of this issue in PERT
networks. For example, Jordan and Ku [17] investigated the optimal control of two multiserver loss queues
with two types of customers. Tseng and Hsiao [29] analyzed the optimal control of the arrival rate to a twostation network of queues for the objective of maximum system throughput under a system time-delay constraint optimality criterion. Shioyama [27] developed an optimal control problem in a queueing network
system with two types of customers and two stages. Azaron and Fatemi Ghomi [1] developed a new model
for the optimal control of service rates and the arrival rates to the service stations of a class of Jackson
840
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
networks, where the expected shortest time of the network and also the total operating costs of the service
stations per period, as two conflicting objective functions, are minimized.
In this paper, we develop a multi-objective model for the time–cost trade-off problem via optimal control
theory in PERT networks. It is assumed that the activity durations are independent random variables with
exponential or Erlang distributions. It is also assumed that the amount of resource allocated to each activity
is controllable, where the mean duration of each activity is a non-increasing function of this control variable. The direct cost of each activity is also assumed to be a non-decreasing function of the amount of resource allocated to it.
The problem is formulated as a multi-objective optimal control problem, where the objective functions
are the total direct costs of the project (to be minimized), the mean of project completion time (min), its
variance (min) and the probability that the project completion time does not exceed a given level (max).
For solving this problem, we do the discretization of time and convert the optimal control problem into
an equivalent nonlinear optimization problem.
We can apply one of the multiple objective techniques to obtain the optimal allocated resource quantities. We use the surrogate worth trade-off method, see Hwang and Masud [16], which is an interactive approach with explicit trade-off information given, to solve this multi-objective problem.
The remainder of this paper is organized in the following way. In Section 2, we extend the method of Kulkarni and Adlakha [19] to obtain the project completion time distribution in PERT networks with Erlang distributed activity durations. Section 3 presents the multi-objective resource allocation formulation. In Section
4, we describe about the application of the surrogate worth trade-off method to our formulation. Section 5
presents the computational experiments, and finally we draw the conclusion of the paper in Section 6.
2. Project completion time analysis in PERT networks
In this section, we present an analytical method to obtain the distribution function of project completion
time in PERT networks, or in fact the distribution function of the longest path from the source to the sink
node of a directed acyclic stochastic network, where the arc lengths or activity durations are mutually independent random variables with exponential or Erlang distributions. To do that, we extend the one of Kulkarni and Adlakha [19], because this method is an analytical one, simple, easy to implement on a computer
and computationally stable.
Let G = (V, A) be a PERT network with set of nodes V = {v1, v2, . . ., vm} and set of activities
A = {a1, a2, . . ., an}. Duration of activity a 2 A is either an exponentially distributed with the parameter
ka, or Erlang distributed with the parameters (ka, na).
We know that an exponential density function is a special case of Erlang density function with na = 1,
and consequently a random variable with Erlang density function and the parameters (ka, na) can be decomposed to na series of exponentially random variables with the parameter ka.
First, we transform the original PERT network into a new one, in which all activity durations have exponential distributions. To do that, we substitute each Erlang activity with the parameters (ka, na) with na series of exponential activities with the parameter ka. Now, Let G 0 = (V 0 , A 0 ) be the transformed network, in
which V 0 and A 0 represent the sets of nodes and arcs of this transformed network, respectively. The source
and sink nodes are denoted by s and t, respectively. For a 2 A 0 , let a(a) be the starting node of arc a, and
b(a) be the ending node of arc a.
Definition 1. Let I(v) and O(v) be the sets of arcs ending and starting at node v, respectively, which are
defined as follows:
IðvÞ ¼ fa 2 A0 : bðaÞ ¼ vg ðv 2 V 0 Þ;
ð1Þ
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
OðvÞ ¼ fa 2 A0 : aðaÞ ¼ vg
ðv 2 V 0 Þ:
841
ð2Þ
Definition 2. If X V 0 , such that s 2 X and t 2 X ¼ V 0 X , then an (s, t) cut is defined as:
ðX ; X Þ ¼ fa 2 A0 : aðaÞ 2 X ; bðaÞ 2 X g:
ð3Þ
An (s, t) cut ðX ; X Þ is called an uniformly directed cut (UDC), if ðX ; X Þ is empty.
Example 1. Before proceeding, we illustrate the material by an example. Consider the network shown in
Fig. 1.
Clearly, (1, 2) is a uniformly directed cut (UDC), because V 0 is divided into two disjoint subsets X and X ,
where s 2 X and t 2 X . The other UDCs of this network are (2, 3), (1, 4, 6), (3, 4, 6) and (5, 6).
Definition 3. Let D = E [ F be a uniformly directed cut (UDC) of a network. Then, it is called an admissible 2-partition, if I(b(a)) X F, for a 2 F.
To illustrate this definition, consider Example 1 again. As mentioned, (3, 4, 6) is a UDC. This cut can be
divided into two subsets E and F. For example, E = {4} and F = {3, 6}. In this case, the cut is an admissible
2-partition, because I(b(3)) = {3, 4} X F and also I(b(6)) = {5, 6} X F. However, if E = {6} and
F = {3, 4}, then the cut is not an admissible 2-partition, because I(b(3)) = {3, 4} F = {3, 4}.
Definition 4. During the project execution and at time t, each activity can be in one of the active, dormant
or idle states, which are defined as follows:
(i) Active: an activity is active at time t, if it is being executed at time t.
(ii) Dormant: an activity is dormant at time t, if it has finished but there is at least one unfinished activity
in I(b (a)). If an activity is dormant at time t, then its successor activities in O(b(a)) cannot begin.
(iii) Idle: an activity is idle at time t, if it is neither active nor dormant at time t.
The sets of active and dormant activities are denoted by Y(t) and Z(t), respectively, and
X(t) = (Y(t), Z(t)).
Consider Example 1, again. If activity 3 is dormant, it means that this activity has finished but the next
activity, i.e. 5, cannot begin because activity 4 is still active.
Table 1, presents all admissible 2-partition cuts of this network. We use a superscript star to denote a
dormant activity. All others are active. E contains all active while F includes all dormant activities.
Now, let S denote the set of all admissible 2-partition cuts of the network, and S ¼ S [ fð/; /Þg. Note
that X(t) = (/, /) implies that Y(t) = / and Z(t) = /, i.e. all activities are idle at time t and hence the project is completed by time t. It can be proved that {X(t), t P 0} is a continuous-time Markov process with
state space S, see Kulkarni and Adlakha [19] for the details of proof.
b
1
3
5
d
s
2
4
c
6
Fig. 1. Example network.
t
842
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
Table 1
All admissible 2-partition cuts of the example network
1.
2.
3.
4.
5.
6.
7.
8.
9.
(1, 2)
(2, 3)
(2, 3 )
(1, 4, 6)
(1, 4 , 6)
(1, 4, 6 )
(1, 4 , 6 )
(3, 4, 6)
(3 , 4, 6)
10.
11.
12.
13.
14.
15.
16.
17.
(3, 4 , 6)
(3, 4, 6 )
(3 , 4, 6 )
(3, 4 , 6 )
(5, 6)
(5 , 6)
(5, 6 )
(/, /)
As mentioned before, E and F contain active and dormant activities of a UDC, respectively. When activity a finishes (with the rate of ka), and there is at least one unfinished activity in I(b(a)), it moves from E to a
new dormant activities set, i.e. to F 0 . Furthermore, if by finishing this activity, its succeeding ones, O(b(a)),
become active, then this set will also be included in the new E 0 , while the elements of I(b(a)), which one of
them belongs to E and the other ones belong to F, will be deleted from these sets. Thus, the elements of the
infinitesimal generator matrix Q = [q{(E, F), (E 0 , F 0 )}], (E, F) and ðE0 ; F 0 Þ 2 S, are calculated as follows:
qfðE; F Þ; ðE0 ; F 0 Þg ¼
8
ka
>
>
>
>
>
>
>
>
>
>
>
>
< ka
>
>
>
>
P
>
>
>
ka
>
>
a2E
>
>
>
:
0
if a 2 E; IðbðaÞÞ 6 F [ fag; E0 ¼ E fag;
F 0 ¼ F [ fag;
ðaÞ
0
if a 2 E; IðbðaÞÞ F [ fag; E ¼ ðE fagÞ [ OðbðaÞÞ;
F 0 ¼ F IðbðaÞÞ;
ðbÞ
if E0 ¼ E; F 0 ¼ F ;
ðcÞ
otherwise:
ðdÞ
ð4Þ
In Example 1, if we consider E = {1, 2}, F = (/), E 0 = {2, 3} and F 0 = (/), then E 0 = (E {1}) [ O(b(1)),
and thus from (4b), q{(E, F), (E 0 , F 0 )} = k1.
{X(t), t P 0} is a finite-state absorbing continuous-time Markov process. Since q{(/, /), (/, /)} = 0, this
state would be an absorbing one and obviously the other states are transient. Furthermore, we number the
states in S such this Q matrix be an upper triangular one. We assume that the states are numbered
1; 2; . . . ; N ¼j S j. State 1 is the initial state, namely (O(s), /); and state N is the absorbing state, namely
(/, /).
Let T represent the length of the longest path in the network, or the project completion time. Clearly,
T = min{t > 0 : X(t) = N/X(0) = 1}. Thus, T is the time until {X(t), t P 0} gets absorbed in the final state
starting from state 1.
Chapman–Kolmogorov backward equations can be applied to compute F(t) = P{T 6 t}. If we define:
P i ðtÞ ¼ P fX ðtÞ ¼ N =X ð0Þ ¼ ig;
i ¼ 1; 2; . . . ; N ;
ð5Þ
then F(t) = P1(t).
The system of differential equations for the vector P(t) = [P1(t), P2(t), . . ., PN(t)]T is given by
P 0 ðtÞ ¼ QP ðtÞ;
T
P ð0Þ ¼ ½0; 0; . . . ; 1 ;
ð6Þ
where P(t) represents the state vector of system and Q is the infinitesimal generator matrix. By taking
advantage of the upper triangular nature of Q, the differential equations (6) can be easily solved.
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
843
3. Multi-objective resource allocation problem
In this section, we develop a multi-objective model to optimally control the resources allocated to the
activities in a PERT network with exponentially or Erlang distributed activity durations, where the mean
duration of each activity is a non-increasing function and the direct cost of each activity is a non-decreasing
function of the amount of resource allocated to it. We may decrease the total direct costs of the project, by
decreasing the amount of resource allocated to the activities. However, clearly it causes the project completion time to be increased, because these objectives have the confliction with each other. Consequently, an
appropriate trade-off between the total direct costs, and the project completion time is required.
This is a multi-objective stochastic programming problem. Therefore, we transform this model into a
relevant multi-objective problem with four conflicting deterministic objective functions. The objective functions are the total direct costs of the project (to be minimized), the mean of project completion time (min),
the variance of project completion time (min), and the probability that the project completion time does not
exceed a certain threshold (max). The last three objective functions are the appropriate deterministic objective functions associated with the minimization of project completion time, which has a random nature.
The direct cost of activity a 2 A is assumed to be the non-decreasing function da(xa) of the
Pamount of
resource xa allocated to it. Therefore, the total direct costs of the project would be equal to a2A d a ðxa Þ.
The mean duration of activity a 2 A, which is equal to na/ka (na = 1 for exponential and na > 1 for Erlang distribution), is assumed to be the non-increasing function ga(xa) of the amount of resource xa allocated to it. Let Ua represent the amount of resource available to be allocated to the activity a, and La
represent the minimum amount of resource required to achieve the activity a. It is also assumed that the
mean duration of activity a cannot be smaller than a specific value ca, even if we allocate the maximum
amount of resource to it.
In application, da(xa) and ga(xa) can be estimated using linear regression. We can collect the sample
paired data of da(xa) and ga(xa) as the dependent variables, for the different values of xa as the unique independent variable, from the similar activities, which have done before, or using the judgments of the experts
in this area. Then, we can estimate the parameters of the relevant linear regression model.
The mean of project completion time is
EðT Þ ¼
Z
1
tP 01 ðtÞ dt ¼
0
Z
1
ð1 P 1 ðtÞÞ dt;
ð7Þ
0
where P 01 ðtÞ is the density function of project completion time.
The variance of project completion time is
VarðT Þ ¼
Z
1
2
t2 P 01 ðtÞ dt ½EðT Þ :
ð8Þ
0
The probability that the project completion time does not exceed a given threshold u is
P ðT 6 uÞ ¼ P 1 ðuÞ:
ð9Þ
Taking into account the above assumptions, the infinitesimal generator matrix Q is a function of the control vector k = [k1, k2, . . ., kn]T. Therefore, the dynamic model is
P 0 ðtÞ ¼ QðkÞP ðtÞ;
P i ð0Þ ¼ 0;
P N ðtÞ ¼ 1:
i ¼ 1; 2; . . . ; N 1;
ð10Þ
844
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
Theorem 1. The appropriate multi-objective optimal control problem is
X
d a ðxa Þ;
Min f 1 ðX ; kÞ ¼
Min f 2 ðX ; kÞ ¼
a2A
Z 1
tP 01 ðtÞ dt;
0
Min f 3 ðX ; kÞ ¼
Z
1
t2 P 01 ðtÞ dt 0
ð11bÞ
Z
1
2
tP 01 ðtÞ dt ;
ð11dÞ
0
s:t:
ð11cÞ
0
f 4 ðX ; kÞ ¼ P 1 ðuÞ;
Max
ð11aÞ
P ðtÞ ¼ QðkÞP ðtÞ;
ð11eÞ
P i ð0Þ ¼ 0;
ð11fÞ
i ¼ 1; 2; . . . ; N 1;
P N ðtÞ ¼ 1;
ð11gÞ
ka 6 na =ca ;
a 2 A;
ka 6 na =ga ðxa Þ;
a 2 A;
ð11hÞ
ð11iÞ
xa 6 U a ;
a 2 A;
ð11jÞ
xa P La ;
a 2 A;
ð11kÞ
a 2 A:
ka P 0;
ð11lÞ
Proof. The objective functions (11b)–(11d) are the appropriate deterministic objective functions associated
with the minimization of project completion time. The constraints (11e)–(11g) determine the dynamic of
this continuous-time system. According to the constraints (11i), if we allocate xa to the activity a 2 A
and ga(xa) exceeds ca, then ka gets its maximum value and becomes equal to na/ga(xa), or the mean duration
of activity a becomes equal to ga(xa), because the mean and variance of this activity will be decreased in this
case and consequently the last three objective functions would be satisfied. Otherwise, according to the constraints (11h), if ga(xa) does not exceed ca, then because of the same reason, ka gets its maximum value and
becomes equal to na/ca, or the mean duration of activity a becomes equal to ca. Constraints (11j) result from
the capacity limitation on the resources, and the minimum amount of resource required to achieve each
activity is insured by constraints (11k). h
We try to solve problem (11), optimally, using the Maximum Principle, see Sethi and Thompson
[25] for
R1
the details. For simplicity, we consider only one objective function, for example f2 ðX ; kÞ ¼ 0 ð1 P 1 ðtÞÞ dt,
in the model.
Considering k as the control vector of this problem, which is also dependent on the vector
x = [x1, x2, . . ., xn]T, K as the set of allowable controls, which consists of the constraints from (11h)–(11l)
(k 2 K), and n-vector l(t) as the adjoint vector function, the Hamiltonian function would be
T
H ðlðtÞ; P ðtÞ; kÞ ¼ lðtÞ QðkÞP ðtÞ þ 1 P 1 ðtÞ:
ð12Þ
Then, we write the adjoint equations and terminal conditions, which are
T
T
l0 ðtÞ ¼ lðtÞ QðkÞ þ ½1; 0; . . . ; 0;
T
lðT Þ ¼ 0;
T ! 1:
ð13Þ
If we could compute l(t) from (13), we could minimize the Hamiltonian function subject to k 2 K in
order to get the optimal control k , and solve the problem optimally. Unfortunately, the adjoint equations
(13) are dependent on the unknown control vector, k, and therefore they cannot be solved directly.
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
845
If we could also minimize the Hamiltonian function (12), subject to k 2 K, for an optimal control function in closed form as k = f(P (t), l (t)), then we could substitute this into the state equations,
P 0 (t) = Q(k)P(t), P(0) = [0, 0, . . ., 1]T, and adjoint equations (13) to get a set of differential equations, which
is a two-point boundary value problem. Unfortunately, we cannot obtain k by differentiating H respect to
k, because the minimum of H occurs on the boundary of K, and consequently k cannot be obtained in
closed form.
According to the two mentioned points, it is impossible to solve the optimal control problem (11), optimally, even in the case of single objective. Relatively few optimal control problems can be solved optimally.
Therefore, we try to solve this problem, numerically. To do that, we do the discretization of time and convert the multi-objective optimal control problem into an equivalent multi-objective nonlinear programming
one. In other words, we transform the differential equations to the equivalent difference equations as well as
transform the integral terms into equivalent summation terms. To follow this approach, the time interval is
divided into K equal portions with the length of Dt. If Dt is sufficiently small, it can be assumed that P(t)
varies only in times 0, Dt, . . ., (K 1)Dt.
Corollary 1. Considering bu/Dtc as the integer part of u/Dt, the appropriate multi-objective nonlinear
optimization problem is
X
Min f 1 ðX ; kÞ ¼
d a ðxa Þ;
ð14aÞ
a2A
Min
f 2 ðX ; kÞ ¼
K 1
X
kDtðP 1 ðk þ 1Þ P 1 ðkÞÞ;
ð14bÞ
k¼0
Min
"
#2
K 1
K 1
X
X
2
ðkDtÞ ðP 1 ðk þ 1Þ P 1 ðkÞÞ kDtðP 1 ðk þ 1Þ P 1 ðkÞÞ ;
f 3 ðX ; kÞ ¼
k¼0
Max
f 4 ðX ; kÞ ¼ P 1 bu=Dtc;
s:t:
P ðk þ 1Þ ¼ P ðkÞ þ QðkÞP ðkÞDt;
P i ð0Þ ¼ 0;
ð14cÞ
k¼0
ð14dÞ
k ¼ 0; 1; . . . ; K 1;
i ¼ 1; 2; . . . ; N 1;
ð14eÞ
ð14fÞ
P N ðkÞ ¼ 1;
k ¼ 0; 1; . . . ; K;
ð14gÞ
ka 6 na =ca ;
a 2 A;
ð14hÞ
ka 6 na =ga ðxa Þ;
a 2 A;
ð14iÞ
xa 6 U a ;
a 2 A;
ð14jÞ
xa P L a ;
a 2 A;
ð14kÞ
P i ðkÞ 6 1;
ka P 0;
i ¼ 1; 2; . . . ; N 1; k ¼ 1; 2; . . . ; K;
a 2 A:
ð14lÞ
ð14mÞ
Proof. The integral terms in (11b) and (11c), are easily transformed into the equivalent summation terms
(14b) and (14c), by considering P(k) instead of P(kDt). The objective function (11d) is transformed to the
new one (14d), because of the same reason. The differential Eqs. (11e)–(11g) are also easily transformed
into the equivalent difference Eqs. (14e)–(14g), by the same approach. Since each Pi(k), for
i = 1, 2, . . ., N 1, k = 1, 2, . . ., K is a distribution function, then the constraints (14l) should also be
included in this nonlinear programming problem. h
846
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
If we consider the initial and terminal state conditions for P(k) implicitly, and substitute each Pi(0) and
PN(k) with zero and one, respectively, the multi-objective nonlinear optimization problem (14) would have
2K(N 1) + 5n constraints including the constraints (14m), and K(N 1) + 2n decision variables.
For estimating the length of the time interval in this problem, first we assume that the estimated amount
of resource allocated to the activity a is Da = 0.5(La + Ua). In this case, the mean duration of this activity
would be equal to ga(Da) and its variance is equal to ga(Da)2/n. Then, it is assumed that each activity has a
fixed duration equal to its mean. The mean and the variance of the critical path are given by the sum of the
means (M) and of the variances (V) of its activities, respectively. pInffiffiffiffi this case, a good estimation for the
length of the time interval would be equal to T^ ¼ KDt ¼ M þ 2 V , because in most distributions, for
example normal distribution, an appropriate upper bound, in which the probability that the random variable exceeds this bound is less than 0.05 would be equal to its mean plus two times of its standard
deviation.
A computer program was written in order to evaluate our algorithm on some problems with different
sizes and investigate the trade-off between the accuracy (correctness) and the computation time in each
problem. At the beginning of the algorithm, we consider K = 10 and Dt ¼ T^ =10. A feasible solution should
posses this property that P1(K) P 1 e, in which e is assumed to be equal 0.05 in this paper. If a solution
does not have the mentioned property, the value of Dt is increased in order to satisfy this necessary
condition.
After solving the problem (14) and obtaining k , we compute P1(t) by solving the system of differential equations with constant coefficients (6), analytically. Then, we compute the real mean and the
variance of the project completion time from (7) and (8), respectively. The percentage difference between the approximated mean taken from (14b) and the real mean taken from (7), PD.M, and also
the percentage difference between the approximated variance taken from (14c) and the real variance
taken from (8), PD.V, or the absolute differences between the approximated values and the real values
divided by the real ones can be considered as two important criteria for the accuracy of the discretetime approximated solution. As K is increased and Dt is decreased, PD.M and PD.V approach zero.
Therefore, the approximated discrete project completion time distribution approaches to the analytical
distribution, because of matching the first two moments, and consequently, the optimal solution of the
discrete-time problem (14) approaches to the optimal solution of the original optimal control problem
(11).
In the next steps of the algorithm, we replace K with K + 10 and each new value for Dt should be selected, such that the length of the time interval remains unchanged, in order to investigate the trade-off between optimality and computation time.
4. Surrogate worth trade-off method
For solving the multi-objective nonlinear optimization problem (14), we use the surrogate worth tradeoff method, which is an interactive approach with explicit trade-off information given, see Hwang and
Masud [16] for the details. The method consists of two phases: Phase 1. Identification and generation of
non-dominated solutions which form the trade-off functions in the objective surface. Phase 2. Search for
a preferred solution in the non-dominated solutions. The preferred solution is located by interaction with
the decision maker ‘‘DM’’.
The major steps in the SWT method to solve the multi-objective programming problem (14) are
Step 1. Determine the ideal solution for each of the objectives of problem (14), or the optimal value for
each objective function subject to the set of constraints. Then, set up the multi-objective problem
in the following form:
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
Min f 1 ðX ; kÞ
s:t:
f j ðX ; kÞ 6 ej ;
847
j ¼ 2; 3;
ð15Þ
f 4 ðX ; kÞ P e4 ;
X ; k 2 S ðfeasible region of problem (14)Þ:
Step 2. Identify and generate a set of non-dominated solutions by varying eÕs parametrically in problem
(15).
Step 3. Interact with the DM to assess the surrogate worth function wj, or the DMÕs assessment of how
much (from 10 to 10) he prefers trading gj marginal units of the first objective for one marginal
unit of the jth objective fj (X, k), given the other objectives remaining at their current values.
Step 4. Isolate the indifference solutions. The solutions, which have wj = 0 for all j, are said to be indifference solutions. If there exists no indifference solution, develop approximate relations for all worth
_
functions wj ¼ wj ðfj ; j ¼ 2; 3; 4Þ, by multiple regressions.
5. Computational experiments
For showing the numerical stability of the theoretical developments of the paper, we solve three numerical examples, and investigate the trade-off between the accuracy and the computation time in each problem. Case I is depicted in Fig. 2.
Table 2 shows the characteristics of the activities. The given threshold value, u, is equal to 40. We want
to obtain the optimal allocated resource quantities. The transformed network is shown in Fig. 3. In this
network, the durations of activities 3, 4 are exponentially distributed with the parameter k3. The stochastic
process {X(t), t P 0} has seven states in the order of S ¼ fð1Þ; ð2; 3Þ; ð2 ; 3Þ; ð2; 4Þ; ð2 ; 4Þ; ð2; 4 Þ; ð/; /Þg.
Table 3 shows matrix Q(k).
The ideal solutions are f1 ¼ 11 at (x1 = 1, x2 = 1, x3 = 1), f2 ¼ 10:116 at (x1 = 4, x2 = 6, x3 = 6),
f3 ¼ 38:487 at (x1 = 4, x2 = 6, x3 = 6) and f4 ¼ 0:999 at (x1 = 4, x2 = 6, x3 = 6).
The single objective optimization problem for generating a set of non-dominated solutions is formulated
according to (15). The length of the time interval is approximated as T^ ¼ 50. Therefore, we consider K = 10
and Dt = 5, at the beginning. Then, ej, j = 2, 3, 4, are varied parametrically to obtain several non-dominated
1
s
2
b
t
3
Fig. 2. Case I.
Table 2
Characteristics of the activities in Case I
a
Distribution
Parameters
da(xa)
ga(xa)
ca
La
Ua
1
2
3
Exponential
Exponential
Erlang
k1
k2
(k3, n3 = 2)
3x1 + 2
2x2 + 1
x23 þ 2
24 5x1
20 3x2
15 2x3
5
4
3
1
1
1
4
6
6
848
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
1
2
s
b
t
3
4
c
Fig. 3. Transformed network of Case I.
Table 3
Matrix Q(k) corresponding to Case I
State
1
2
3
4
5
6
7
1
2
3
4
5
6
7
k1
0
0
0
0
0
0
k1
(k2 + k3)
0
0
0
0
0
0
k2
k3
0
0
0
0
0
k3
0
(k2 + k3)
0
0
0
0
0
k3
k2
k3
0
0
0
0
0
k3
0
k2
0
0
0
0
0
k3
k2
0
solutions. For investigating the trade-off between accuracy and computation time on a PC Pentium IV
2.1 GHz Processor, C.T. (hh:mm:ss), we also solve the problem for some different pairs of K and Dt as:
(K = 20, Dt = 2.5), (K = 30, Dt = 1.7), (K = 40, Dt = 1.3), (K = 50, Dt = 1), (K = 100, Dt = 0.5) and compute the values of PD.M and PD.V in each case. Table 4 shows the results for 10 different sets of ej,
j = 2, 3, 4. In this table, all solutions are non-dominated and satisfy the necessary condition (P1(K) P 0.95).
Now, according to any pair of K and Dt, the DM can select any of the above non-dominated solutions, if
the surrogate worth functions wj for all j, assessed by the DM, for that non-dominated solution are considered equal to zero. Otherwise, we can obtain an indifference solution, approximately, using multiple regressions. For example, if the surrogate worth functions for the non-dominated solution corresponding with
e2 = 24, e3 = 55, e4 = 0.95, K = 100 and Dt = 0.5 are all equal to zero, or this solution is considered as
an indifference solution by the DM, then the optimal allocated resource quantities are
T
T
x ¼ ½x1 ; x2 ; x3 ¼ ½3:8; 5:23; 2:975 . In this case, the approximated mean project completion time is almost
the same as the real one and the percentage difference between the approximated variance and the real variance is about 14%. Therefore, the accuracy of this solution is acceptable, but access to this level of accuracy
needs a long computation time (about 17 minutes).
Case II is depicted in Fig. 1. This network has six activities with exponentially distributed activity durations. Table 5 shows the characteristics of the activities. The threshold value is equal to 5.
The length of the time interval is approximated as T^ ¼ 6. Table 6 shows the trade-off between the accuracy and the computation time of one non-dominated solution, which is assumed to be considered as an
indifference solution by the DM, for the different pairs of K and Dt.
In the case of K = 70 and Dt = 0.086, the optimal resource quantities would be
x = [1, 1, 7.366, 4, 1, 5.147]T. In this case, PD.M and PD.V are almost equal to 1.3% and 41%, respectively.
The accuracy of this solution is relatively good, but even access to this level of accuracy takes a long time
(more than one hour).
Case III is depicted in Fig. 4. This network has 10 activities with exponentially distributed activity durations. In this case, the stochastic process {X(t), t P 0} has 25 states. Table 7 shows the characteristics of the
activities. The threshold value is equal to 8.
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
849
Table 4
A set of non-dominated solutions in Case I
e2
e3
e4
f1
f2
25
25
25
25
25
25
70
70
70
70
70
70
0.9
0.9
0.9
0.9
0.9
0.9
19.809
23.876
25.871
27.23
28.072
30.065
25
21.262
19.754
18.842
18.243
17.174
30
30
30
30
30
30
100
100
100
100
100
100
0.9
0.9
0.9
0.9
0.9
0.9
18.553
20.931
22.157
22.872
23.116
23.949
25.557
22.739
21.959
21.606
21.131
20.527
20
20
20
20
20
20
85
85
85
85
85
85
0.9
0.9
0.9
0.9
0.9
0.9
23.511
25.663
25.509
25.456
25.16
26.347
20
20
20
20
20
19.112
35
35
35
35
35
35
150
150
150
150
150
150
0.75
0.75
0.75
0.75
0.75
0.75
15.362
17.215
17.907
18.338
18.368
18.763
26.911
24.354
23.741
23.481
22.682
22.099
23
23
23
23
23
23
90
90
90
90
90
90
0.9
0.9
0.9
0.9
0.9
0.9
21.701
21.84
23.182
23.983
24.333
25.42
23
22.384
21.491
20.992
20.51
19.679
22
22
22
22
22
22
80
80
80
80
80
80
0.9
0.9
0.9
0.9
0.9
0.9
23.511
22.806
24.341
25.354
25.92
27.414
27
27
27
27
27
27
75
75
75
75
75
75
0.9
0.9
0.9
0.9
0.9
0.9
29
29
29
29
29
29
110
110
110
110
110
110
21
60
f3
70
70
70
70
70
70
f4
PD.M (%)
PD.V (%)
K
Dt
C.T
0.929
0.963
0.976
0.978
0.978
0.981
7.17
2.81
1.48
1.09
1.42
1.27
70.01
48.23
36.25
29.68
25.45
16.29
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
3
17
1:08
1:23
4:37
19:52
88.055
100
100
100
100
100
0.9
0.91
0.928
0.931
0.928
0.934
10.58
9.67
7.28
5.67
6.69
5.79
67.98
51.92
42.50
35.82
33.44
25.29
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
11
19
49
1:25
1:50
13:11
26.766
57.501
72.107
79.403
84.337
85
0.987
0.98
0.974
0.966
0.958
0.962
10.05
1.06
1.69
1.92
3.15
2.88
81.16
48.56
36.27
30.13
27.72
19.67
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
4
24
44
1:19
1:40
11:48
0.797
0.812
0.83
0.829
0.82
0.825
19.97
20.27
19.23
18.11
20.76
20.97
60.68
52.94
50.02
48.25
48.13
46.57
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
21
26
1:07
2:24
3:12
10:51
77.519
90
90
90
90
90
0.913
0.929
0.946
0.949
0.948
0.954
11.27
7.13
4.79
3.51
4.22
3.62
71.17
50.41
39.52
32.46
29.44
21.02
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
6
15
1:19
2:02
2:06
6:14
22
21.867
20.808
20.074
19.511
18.497
26.766
80
80
80
80
80
0.987
0.947
0.962
0.965
0.965
0.969
1.06
4.81
2.80
1.97
2.49
2.23
81.15
49.15
37.23
30.22
26.84
18.39
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
4
17
26
1:50
2:17
31:45
19.45
23.323
25.033
26.227
26.917
28.645
25.124
21.594
20.34
19.479
18.896
17.848
75
75
75
75
75
75
0.921
0.955
0.97
0.972
0.972
0.976
8.19
3.71
2.05
1.48
1.91
1.70
69.45
48.56
36.52
29.76
26.09
17.28
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
6
15
16
1:43
2:37
26:44
0.85
0.85
0.85
0.85
0.85
0.85
17.217
20.057
21.20
21.865
22.037
22.754
26.239
22.917
22.283
22.037
21.531
21.048
110
110
110
110
110
110
0.864
0.89
0.909
0.912
0.908
0.914
14.08
12.55
10.11
8.18
9.56
8.62
65.47
53.90
45.70
39.51
37.84
30.68
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
3
51
59
1:10
2:23
6:01
0.95
24.145
21
0.994
2.77
84.06
150
150
150
150
150
150
20.804
10
5
6
(continued on next page)
850
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
Table 4 (continued)
e2
e3
e4
f1
f2
f3
f4
PD.M (%)
PD.V (%)
K
Dt
C.T
21
21
21
21
21
60
60
60
60
60
0.95
0.95
0.95
0.95
0.95
25.212
27.971
29.737
30.961
33.568
20.336
18.439
17.486
16.854
15.757
60
60
60
60
60
0.978
0.986
0.987
0.994
0.989
1.31
0.76
0.53
0.71
0.61
48.33
36.53
29.49
24.75
14.70
20
30
40
50
100
2.5
1.7
1.3
1
0.5
25
43
1:07
1:47
8:08
24
24
24
24
24
24
55
55
55
55
55
55
0.95
0.95
0.95
0.95
0.95
0.95
20.985
26.101
29.291
31.303
32.757
35.719
24
19.7
17.733
16.77
16.12
15.007
55
55
55
55
55
55
0.95
0.984
0.99
0.991
0.996
0.992
4.05
0.89
0.49
0.36
0.38
0.45
72.61
49.01
36.98
29.83
24.55
14.37
10
20
30
40
50
100
5
2.5
1.7
1.3
1
0.5
3
28
39
52
2:08
17:10
Table 5
Characteristics of the activities in Case II
a
da(xa)
ga(xa)
ca
La
Ua
1
2
3
4
5
6
2x1
3x2 + 1
x3 + 2
x4
3x5 + 4
x6 + 3
0.7 0.1x1
1.5 0.2x2
1 0.1x3
1.5 0.3x4
0.9 0.1x5
1.1 0.1x6
0
0
0
0
0
0
1
1
1
1
1
1
5
6
9
4
5
6
Table 6
Trade-off results in Case II
e2
e3
e4
f1
f2
f3
f4
PD.M (%)
PD.V (%)
K
Dt
C.T
2.5
2.5
2.5
2.5
2.5
2.5
2.5
2.5
2.5
2.5
2.5
2.5
2.5
2.5
0.9
0.9
0.9
0.9
0.9
0.9
0.9
38.411
36.402
35.599
35.235
34.986
34.513
2.5
2.5
2.5
2.5
2.5
2.5
0.623
1.203
1.371
1.421
1.454
1.471
0.988
0.944
0.937
0.931
0.93
0.929
11.31
3.73
0.76
0.08
0.43
1.38
59.88
47.65
44.96
42.95
41.67
41.11
10
20
30
40
50
60
70
0.6
0.3
0.2
0.15
0.12
0.1
0.086
*
2:52
13:53
23:56
27:48
49:21
1:20:50
* No feasible solution exists for K = 10 and Dt = 0.6.
The length of the time interval is approximated as T^ ¼ 11. Table 8 shows the trade-off between the accuracy and the computation time of one non-dominated solution, which is assumed to be considered as an
indifference solution by the DM, for the different pairs of K and Dt.
In the case of K = 50 and Dt = 0.22, the optimal resource quantities would be
x = [1.5, 1.5, 3, 3, 1.782, 1.5, 3, 1.5, 1.5, 3]T. In this case, PD.M and PD.V are almost equal to 1.4% and
32%, respectively. The accuracy of this solution is relatively good, but access to this level of accuracy needs
a long time (about 50 minutes).
Figs. 5–7 show the computation time, PD.M and PD.V, respectively, according to the different pairs of K
and Dt for 10 non-dominated solutions of Case I and also the indifference solutions of Cases II and III,
respectively.
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
1
4
s
8
b
2
c
10
d
3 5
6
f
7
851
t
9
e
Fig. 4. Case III.
Table 7
Characteristics of the activities in Case III
a
da(xa)
ga(xa)
ca
La
Ua
1
2
3
4
5
6
7
8
9
10
2x1
3x2 + 1
x3 + 2
x4
3x5 + 4
x6 + 3
2x7 + 5
4x8 + 1
5x9 + 2
2x10 + 3
0.7 0.1x1
1.5 0.2x2
1 0.1x3
1.5 0.3x4
1.3 0.2x5
1.1 0.1x6
1.5 0.2x7
1 0.2x8
0.9 0.1x9
2 0.4x10
0
0
0
0
0
0
0
0
0
0
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
1.5
3
3
3
3
3
3
3
3
3
3
Table 8
Trade-off results in Case III
e2
e3
e4
5.5
5.5
5.5
5.5
5.5
5
5
5
5
5
0.85
0.85
0.85
0.85
0.85
f1
f2
58.783
67.166
67.222
66.846
f3
5.123
5.5
5.5
5.5
f4
5
2.021
2.405
2.717
PD.M (%)
0.869
0.929
0.931
0.922
19.61
1.13
1.06
1.45
PD.V (%)
K
Dt
C.T
4.96
49.65
39.99
32.86
10
20
30
40
50
1.1
0.55
0.367
0.275
0.22
*
6:25
19:49
45:20
51:35
* No feasible solution exists for K = 10 and Dt = 1.1.
6000
4000
3000
2000
100
K
70
60
50
40
30
0
20
1000
10
C.T. (Sec.)
5000
Fig. 5. Computation time (second) versus K.
Ι1
Ι2
Ι3
Ι4
Ι5
Ι6
Ι7
Ι8
Ι9
Ι10
ΙΙ
ΙΙΙ
852
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
25
PD.M %
20
15
10
5
0
10 20 30 40 50 60 70
K
10
0
Ι1
Ι2
Ι3
Ι4
Ι5
Ι6
Ι7
Ι8
Ι9
Ι10
ΙΙ
ΙΙΙ
0
10
K
70
60
50
40
30
20
90
80
70
60
50
40
30
20
10
0
10
PD.V%
Fig. 6. PD.M versus K.
Ι1
Ι2
Ι3
Ι4
Ι5
Ι6
Ι7
Ι8
Ι9
Ι10
ΙΙ
ΙΙΙ
Fig. 7. PD.V versus K.
According to Fig. 5, computation time grows with K. Computation time is also strongly dependent on
the network size, and sensitive to the values of ej, j = 2, 3, 4, or the structure of non-dominated solutions.
According to Fig. 6, when we increase K, the percentage difference between the approximated and the
real mean of project completion time, which is one of the important criteria for the accuracy of the solution,
in most cases, will be decreased. The exception is the case of K = 50. It seems that for decreasing PD.M in
this case, we should change the value of Dt. There is also no significant relation between PD.M and the
network size.
According to Fig. 7, when we increase K, the percentage difference between the approximated and the
real variance of project completion time, which is another important criteria for the accuracy of the solution, in almost all case, with one exception, will be decreased. There is also no significant relation between
PD.V and the network size.
6. Conclusion
In this paper, we developed a new multi-objective model for resource allocation in PERT networks with
Erlang distributions of activity durations. Our method can be applied for the management and control of
the projects with stochastic natures.
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
853
The multi-objective nonlinear optimization problem was cast into a discrete-time approximation, and
the latter model was solved using the surrogate worth trade-off method.
The major advantages of the SWT method are
1. The method requires the DM to consider only two objectives at a time while assessing the worth function, even if there are many objectives in the problem.
2. Both linear and nonlinear models can be exercised.
3. The method is applicable to both static and dynamic problems.
4. Preference information from multiple decision makers with varied opinions can be processed.
Taking into account the above advantages, the SWT method is an appropriate method to solve the
multi-objective resource allocation problem.
The limitation of this model is that the number of variables and constraints of the multi-objective nonlinear programming formulation (14) can grow exponentially with the network size. As the worst case
example, consider a complete transformed network with m nodes and m(m 1)/2 activities. The size of
the state space for this network is given by N(m) = Um Um1, where
Um ¼
m
X
2kðmkÞ
ð16Þ
k¼0
(refer to Kulkarni and Adlakha [19]).
Consequently, the number of constraints of the nonlinear model is equal to 2K(N(m) 1) +
2.5m(m 1), and the number of decision variables would be equal to K(N(m) 1) + m(m 1). Therefore
the number of constraints and variables of the nonlinear programming formulation (14) grows exponentially with m. In practice, the number of arcs of the PERT networks is generally much less than
m(m 1)/2. Even large sparse networks generally produce a reasonable size state space.
According to computational experiments, when K goes to infinity and Dt goes to zero, the percentage
differences between the approximated mean and variance, respectively, and the real ones approach zero.
Therefore, the approximated discrete project completion time distribution approaches to the continuous
distribution, because the first two moments of the approximated distribution and the analytical one are
matched with each other. In this case, the optimal solution of the discrete-time problem approaches to
the optimal solution of the original continuous-time problem, but the computation time goes to infinity.
Therefore, we should select the values of K and Dt, in the realistic sized problems, such that we can solve
each problem in a minimum level of accuracy with reasonable computation time.
According to the computational experiments, there is no significant relation between PD.M and the network size and also between PD.V and the network size, but the computation time grows with the size of the
PERT network.
Our model can be extended in the following directions:
1. The model can include the other objective functions like the minimization of total indirect costs of the
project, or the minimization of the a-fractile of the distribution function of project completion time with
the value of a pre-assigned by the DM.
2. The model can be extended to the general PERT networks, where general activity durations are allowed.
In general networks, we can approximate non-exponential distributions by mixture of sums of independent exponentials. For unimodal distributions, the sum of two independent exponentials is a reasonable
approximation. For multimodal distributions, one must use mixtures.
3. The allocated resource quantities can be considered as a function of time.
854
A. Azaron et al. / European Journal of Operational Research 172 (2006) 838–854
4. Another interactive method like the method of satisfactory goals, STEM or SEMOPS can be applied to
solve the multi-objective problem (14), see Hwang and Masud [16] for the details of the mentioned methods. In these methods, the progressive definition takes place through a DM-Analyst dialogue at each
iteration, and at each such dialogue, the DM is asked about some trade-off based upon the current solution in order to determine a new solution.
References
[1] A. Azaron, S. Fatemi Ghomi, Optimal control of service rates and arrivals in Jackson networks, European Journal of Operational
Research 147 (2003) 17–31.
[2] E. Berman, Resource allocation in a PERT network under continuous activity time–cost function, Management Science 10 (1964)
734–745.
[3] J. Burt, M. Garman, Conditional Monte Carlo: A simulation technique for stochastic network analysis, Management Science 18
(1971) 207–217.
[4] A. Charnes, W. Cooper, G. Thompson, Critical path analysis via chance constrained and stochastic programming, Operations
Research 12 (1964) 460–470.
[5] C. Clingen, A modification of FulkersonÕs algorithm for expected duration of a PERT project when activities have continuous d.f.,
Operations Research 12 (1964) 629–632.
[6] E. Demeulemeester, W. Herroelen, S. Elmaghraby, Optimal procedures for the discrete time–cost trade-off problem in project
networks, Research Report, Department of Applied Economics, Katholieke Universiteit Leuven, Leuven, Belgium, 1993.
[7] S. Elmaghraby, On the expected duration of PERT type networks, Management Science 13 (1967) 299–306.
[8] S. Elmaghraby, Resource allocation via dynamic programming in activity networks, European Journal of Operational Research
64 (1993) 199–245.
[9] J. Falk, J. Horowitz, Critical path problem with concave cost curves, Management Science 19 (1972) 446–455.
[10] S. Fatemi Ghomi, S. Hashemin, A new analytical algorithm and generation of Gaussian quadrature formula for stochastic
network, European Journal of Operational Research 114 (1999) 610–625.
[11] S. Fatemi Ghomi, M. Rabbani, A new structural mechanism for reducibility of stochastic PERT networks, European Journal of
Operational Research 145 (2003) 394–402.
[12] G. Fishman, Estimating critical path and arc probabilities in stochastic activity networks, Naval Research Logistic Quarterly 32
(1985) 249–261.
[13] D. Fulkerson, A network flow computation for project cost curves, Management Science 7 (1961) 167–178.
[14] D. Fulkerson, Expected critical path lengths in PERT networks, Operations Research 10 (1962) 808–817.
[15] M. Garman, More on conditioned sampling in the simulation of stochastic networks, Management Science 19 (1972) 90–95.
[16] C. Hwang, A. Masud, Multiple Objective Decision Making, Methods and Applications, Springer-Verlag, Berlin, 1979.
[17] S. Jordan, C. Ku, Access control to two multiserver loss queue in series, IEEE Transactions on Automatic Control 42 (1997)
1017–1023.
[18] J. Kelly, Critical path planning and scheduling: Mathematical basis, Operations Research 9 (1961) 296–320.
[19] V. Kulkarni, V. Adlakha, Markov and Markov-regenerative PERT networks, Operations Research 34 (1986) 769–781.
[20] L. Lamberson, R. Hocking, Optimum time compression in project scheduling, Management Science 16 (1970) 597–606.
[21] J. Martin, Distribution of the time through a directed acyclic network, Operations Research 13 (1965) 46–66.
[22] C. Perry, I. Creig, Estimating the mean and variance of subjective distributions in PERT and decision analysis, Management
Science 21 (1975) 1477–1480.
[23] P. Robillard, Expected completion time in PERT networks, Operations Research 24 (1976) 177–182.
[24] D. Robinson, A dynamic programming solution to cost–time trade-off for CPM, Management Science 22 (1965) 158–166.
[25] S. Sethi, G. Thompson, Optimal Control Theory, Martinus Nijhoff Publishing, Boston, 1981.
[26] C. Sigal, A. Pritsker, J. Solberg, The use of cutsets in Monte-Carlo analysis of stochastic networks, Mathematical Simulation 21
(1979) 376–384.
[27] T. Shioyama, Optimal control of a queueing network system with two types of customers, European Journal of Operational
Research 52 (1991) 367–372.
[28] L. Tavares, Optimal resource profiles for program scheduling, European Journal of Operational Research 29 (1987) 83–90.
[29] K. Tseng, M. Hsiao, Optimal control of arrivals to token ring networks with exhaustive service discipline, Operations Research 43
(1995) 89–101.