A refined selection method for project portfolio optimization considering project interactions

A refined selection method for project portfolio optimization considering project interactions

A Refined Selection Method for Project Portfolio Optimization Considering Project Interactions Journal Pre-proof A Refined Selection Method for Proj...

8MB Sizes 2 Downloads 70 Views

A Refined Selection Method for Project Portfolio Optimization Considering Project Interactions

Journal Pre-proof

A Refined Selection Method for Project Portfolio Optimization Considering Project Interactions Hechuan Wei, Caiyun Niu, Boyuan Xia, Yajie Dou, Xuejun Hu PII: DOI: Reference:

S0957-4174(19)30670-0 https://doi.org/10.1016/j.eswa.2019.112952 ESWA 112952

To appear in:

Expert Systems With Applications

Received date: Revised date: Accepted date:

9 April 2019 24 June 2019 12 September 2019

Please cite this article as: Hechuan Wei, Caiyun Niu, Boyuan Xia, Yajie Dou, Xuejun Hu, A Refined Selection Method for Project Portfolio Optimization Considering Project Interactions, Expert Systems With Applications (2019), doi: https://doi.org/10.1016/j.eswa.2019.112952

This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. © 2019 Published by Elsevier Ltd.

Highlights • The project co-utilization network indicating project interactions is constructed. • The project interaction is used as a regularization item of the value function. • A refined selection strategy is proposed to get the optimal one in the Pareto set.

1

A Refined Selection Method for Project Portfolio Optimization Considering Project Interactions Hechuan Weia , Caiyun Niub , Boyuan Xiab , Yajie Doub,∗, Xuejun Huc a College

of Information Science and Engineering, Northeastern University, ShenYang, Liaoning, 110004, P.R. China b College of Systems Engineering, National University of Defense Technology, Changsha, Hunan, 410073, P.R. China c Business School, Hunan University, Changsha, Hunan, 410073, P.R.China

Abstract This paper proposes two innovative approaches to address the two challenges of project portfolio selection: (i) determining how project interactions influence the final values of project portfolios, and (ii) selecting the best solution from non-dominated project portfolios. First, based on the dependence relationship between projects and technologies, we construct a project co-utilization network indicating project interactions using the co-citation network method. We also consider project interaction as a regularization item of the value function to indicate the influence of project interactions on the value of project portfolios. Second, we propose a refined selection strategy. All the projects are ranked in the order of their appearance in the ranked association rules. Project portfolios having no highly ranked projects are deleted successively until only one of them remains. Finally, a case of multi-objective project portfolio selection is studied and an optimal project portfolio recommended. A comparison shows the availability and advantages of the proposed approaches. Keywords: project portfolio, project interaction, multi-objective, non-dominated solutions, refined selection, value and risk

✩ Fully

documented templates are available in the elsarticle package on CTAN. author Email addresses: [email protected] (Hechuan Wei), [email protected] (Caiyun Niu), [email protected] (Boyuan Xia), [email protected] (Yajie Dou), [email protected] (Xuejun Hu) ∗ Corresponding

Preprint submitted to Elsevier

September 16, 2019

1

1. Introduction

2

Project portfolio selection has gained increased interest and attention in the

3

fields of public administration (Voss & Kock , 2013), industrial firms, enterprises

4

(Martinsuo et al. , 2014), and military (Zhang et al. , 2016) during the past

5

decades. It focuses on selecting the project proposals under limited resources to

6

maximize the benefits of stakeholders with multiple evaluation criteria (Paquin

7

et al. , 2016). However, practitioners face two challenges in selecting the op-

8

timal project portfolio. First, the wide interactions between projects influence

9

the real value and risk of a project portfolio. Second, since project portfolio

10

optimization always has multiple objectives, common multi-objective optimiza-

11

tion methods are efficient to obtain the non-dominated solutions, but they raise

12

the problem of how to further select the optimal project portfolio from these so-

13

lutions. Therefore, a refined selection method for project portfolio optimization

14

based on project interactions has great research significance.

15

Project portfolio research and development (R&D) in the existing literature

16

can be summarized as follows: (i) dividing the projects into tasks, with focus on

17

how they can be implemented effectively (Carazo et al. , 2010). (ii) assessing

18

the value of projects in order to determine funding policies aimed at maximizing

19

their total value (Medaglia et al. , 2007). (iii) analysing how project synergies

20

affect the value and expected performance of projects (Liesi¨ o & Salo , 2012).

21

In this paper, project portfolio selection focuses on project programming rather

22

than project engineering. Therefore, this study focuses on which projects should

23

be selected for implementation, rather than how to complete the projects.

24

The portfolio idea in the financial domain was first applied to address the

25

asset allocation problem. A major breakthrough was the publication of the

26

mean-variance method, proposed by Markowitz in 1952. This method has been

27

regarded as the modern portfolio theory (Kolm et al. , 2014). The financial

28

portfolio problem gives great importance to the trade-off between return and

29

risk, and is therefore inconsistent with the essence of project portfolio selection,

30

which is to select the optimal portfolio from among several project proposals

3

31

within resource constraints and maximize stakeholder benefits (Petit & Hobbs

32

, 2010). Additionally, for the financial portfolio, the proportion or weight of

33

alternative stocks can be distributed and modified with discretion, but project

34

portfolio selection is analogous to the Boolean problem, where each project can

35

have only selected/unselected options (Eilat et al. , 2006). Thus, financial

36

portfolio selection consists of continuous linear programming, whereas project

37

portfolio selection adopts integer programming. Obviously, the decision-making

38

methods and models of financial portfolios cannot be directly applied to non-

39

financial project portfolio selection problems.

40

Furthermore, project interaction or dependence draws less attention in the

41

project portfolios R&D. According to the existing literature, Ghasemi et al.

42

(Ghasemi et al. , 2018) proposed a Bayesian network methodology to model and

43

analyse the portfolio risks, considering project interdependencies and the cause-

44

effect relationship between risks as interaction factors. Takami et al. (Takami

45

et al. , 2018) used the hesitant fuzzy weighted averaging operator to aggregate

46

the project interaction hesitant fuzzy information that is considered to affect the

47

final portfolio values. Eilat et al. (Eilat et al. , 2006) considered a combination

48

of the extended data envelopment analysis model and balanced scorecard ap-

49

proach to evaluate the individual R&D projects and alternative R&D portfolios

50

with interactions. Ying et al. (Ying & Liu , 2017) discussed how uncertainty

51

and interaction impact the return and staff allocation of project portfolios from

52

the critical value criterion perspective. In addition, because the exact possibility

53

distributions of uncertain parameters are often not available, the variable para-

54

metric possibility distributions are used to characterize the uncertainty interac-

55

tion parameters. Liesi¨ o et al. (Liesi , 2008) used a robust portfolio modelling

56

method to account for project interdependencies by incorporating synergies and

57

the portfolio positioning requirements.

58

From the literature, project portfolio optimization draws more attention

59

from researchers than project interaction. This can be classified into single

60

objective and multi-objective optimization. The latter is more widely stud-

61

ied in the literature. Several studies confuse multi-objective optimization with 4

62

multi-criterion decision since they directly transform multiple objectives to sin-

63

gle objective through the weighting operation. In fact, numerous concepts

64

and algorithms are specially defined for multi-objective optimizations. The

65

widely adopted algorithms include the non-dominated sorting genetic algorithm

66

(NSGA) (Deb & Jain , 2014), non-dominated sorting and local search (Chen

67

et al. , 2015), strength Pareto evolution algorithm (SPEA) (Shankar & Baviskar

68

, 2018), niched Pareto genetic algorithm (Tongur & lker , 2016), Pareto-archived

69

evolution strategy (Rostami & Neri , 2016), multi-objective evolutionary algo-

70

rithms based on decomposition (Zhang & Hui , 2007) and so on. These algo-

71

rithms have been successfully used in diverse areas. However, since the decision

72

makers always expect only one solution, these algorithms have the common

73

problem of being dedicated to finding the best Pareto solutions set, instead of

74

the best solution. Therefore, the Pareto set should be further refined to find

75

the optimal solution.

76

Motivated by the aforementioned challenges and also following the literature

77

discussed, this study tries to go deeper into the project interactions and propose

78

a new refined selection strategy for project portfolio optimization. The purposes

79

of the paper are to: (i) define a representative project interaction model and

80

determine how project interactions influence the final value of a project portfo-

81

lio, and (ii) construct a refined selection method to obtain the optimal solution

82

from obtained non-dominated project portfolios. By applying the above meth-

83

ods, the finally recommended project portfolio can convincingly benefic after

84

implementation.

85

The study has three main contributions. First, it determines project inter-

86

action degree by adopting the project co-utilization model transformed from

87

co-citation network, rather than by subjective experience. This model is proven

88

to be effective, operable, and interpretable. Second, the method can directly

89

provide decision makers with the optimal solution without asking them to deter-

90

mine the optimal solution from the non-dominated set, and thus saves decision

91

cost and effort. Third, it proposes a clear, concise, and reasonable integrated

92

framework that addresses the project portfolio optimization problem consider5

93

ing project interactions and can be applied directly to enterprise practices.

94

The remainder of the paper is structured as follows. Section 2 introduces

95

the value and risk calculation models, which take account of project interaction,

96

modelled using the co-utilization network. Section 3 studies the optimal project

97

portfolio selection method by illustrating how to obtain the optimal solution

98

through a refined selection strategy. Section 4 presents an application of the

99

proposed models and approaches to verify their feasibility and effectiveness.

100

101

102

103

104

2. Value and Risk Model Construction Considering Projects Interactions 2.1. Notations Definition The section introduces and defines notations that will be used later in the study.

105

(1) n, the number of project proposals.

106

(2) m, the number of concerned technologies.

107

(3) s, the number of company strategies.

108

(4) C = [c1 , c2 , ..., cn ] , the vector of project costs.

109

(5) b, the total budget.

110

(6) X, the solution space of total project portfolios.

111

(7) Xf , the set of feasible solutions.

112

(8) Xe , the set of efficient project portfolios.

113

(9) P = {p1 , ..., pn }, the set of alternative projects.

114

(10) xi = [xij ]1×n , j = 1, 2, ..., n, a project portfolio solution.

115

(11) x+ i = {i|xij 6= 0, j = 1, ..., n}, the set of nonzero elements of xi .

116

(12) T P = [tij ]m×n , the dependence relation matrix of technologies and

117

T

projects.

118

(13) P U = [puxy ]n×n , the project co-utilization network.

119

(14) R = [r1 , r2 , ..., rn ] , the vector of projects revenue.

120

(15) A = [aij ]n×t , the alignment degree matrix of projects with company

121

T

strategies.

6

122

(16) V (xi ), the value of a project portfolio solution xi .

123

(17) E = [e1 , e2 , ..., et ] , the weight vector of company strategies.

124

(18) α, the trade-off parameter for revenue and alignment of company strate-

125

T

gies.

126

(19) RI (xi ), the risk index of a project portfolio solution xi .

127

(20) w = [wj ], j = 1, 2, ..., m, the weight vector of technologies.

128

(21) T RL, technology readiness level.

129

(22) γ1 , γ2 , the parameters that determine the effects of exceeding part on

130

the fitness values.

131

(23) r1 , r2 , and r3 , individuals randomly selected in the current population.

132

(24) r, rbest , the current individual and the optimal individual in the popu-

133

134

135

136

lation at current moment. (25) r0 , r00 , the new individual after mutation operation and the crossover operation. (26) p, the probability that each code bit of r0 be replaced by the corre-

138

sponding bit of parent r.   (27) Cro = cro1 , cro2 , ..., cro|r| , the crossover operator.

139

2.2. Project Interaction Model based on Co-citation Network

137

140

Technologies are interpreted as project supporters, while projects are re-

141

garded as technology utilizers. This paper denotes the technology-project de-

142

pendence relations by a matrix T P = [tij ]m×n , where tij = 1 indicates technol-

143

ogy ti is required for project pj . This kind of dependence relations is analogous

144

to the citation network. A project co-utilization network can be constructed

145

using the co-citation method.

146

In a co-citation network, if two papers are cited together, a co-citation rela-

147

tion exists between the two papers. By mapping this to the project co-utilization

148

network, two projects are treated as having a co-utilization relation if they re-

149

quire the same technology. The amount of technology simultaneously utilized

150

by two projects are set as the weight of the co-utilization edge between the

151

projects. Therefore, the project co-utilization network P U = (puxy )n×n can be 7

152

constructed, where puxy represents the amount of technology required simulta-

153

neously by projects x and y. Following the adjacency network, if technology

154

k simultaneously points to project t and project l, then tkt tkl = 1; otherwise,

155

156

157

158

tkt tkl = 0. Therefore, the co-utilization amount of project t and l can be calPn T culated as putl = k=1 tkt tkl . One can prove that P U = (T P ) (T P ), and that the diagonal elements conform to Equation 1. In fact, putt is equal to the amount of technology required by project t.

putt =

n X

tkt 2 =

k=1

n X

tkt

(1)

k=1

159

The following example illustrates this transformation. Assume a T P3×4

160

network, with the adjacency matrix indicated as T P ; see Equation 2. Then, the

161

co-utilization network can be calculated as P U , which is a symmetric matrix.

162

For the transformation process, see Figure 1.



1   TP =  1  0

1

1

1

0

1

0





2 2 1 1



       2 3 1 2  T   1  , P U = (T P ) T P =     1 1 1 0    1 1 2 0 2 0

(2)

Figure 1: Transformation from T P network to P U network

163

Projects 1 and 2 co-utilize technologies 1 and 2. Projects 1 and 3 co-utilize

164

technology 1. Projects 1 and 4 co-utilize technology 2. Projects 2 and 3 co-

165

utilize technology 1. Projects 2 and 4 co-utilize technologies 2 and 3. Projects

166

3 and 4 have no technology co-utilization relations.

8

167

2.3. Value Determination Model

168

Typically, the value of a project mainly consists of two aspects, (i) the rev-

169

enue of the project itself, (ii) the alignment degrees with company strategies.

170

In this paper, the project revenue is indicated by Net Present Value; the align-

171

ment degrees with company strategies is determined by experts experience. The

172

revenue of project pi is quantitatively denoted by ri . The alignment degrees of

173

project pi with t company strategies are denoted as aij , j = 1, 2, ...t. The overall

174

value of a project portfolio solution xi can be expressed as Equation 3.

ξ

V (xi ) = [α × (xi · R) + (1 − α) × (xi · A · E)] + [xi (P U − λ)xi T ] where : α ∈ [0, 1], xi = [xi1 , ..., xin ], xij = 0/1, R = [r1 , r2 , ..., rn ]T ,

A = [aij ]n×t , t P E = [e1 , e2 , ..., et ] , ei = 1, i=1   pu11 0 0 0      0 pu22 · · · 0  . λ=    0 0 ··· 0    0 0 0 punn T

(3)

175

where xi · R indicates the total revenue of the project portfolio xi ; xi · A · w de-

176

notes the total alignment degree with company strategies of xi ; w is the weight

177

information of t company strategies; α is a trade-off parameter determining the

178

importance degree of ”revenue” and ”alignment with company strategies” to

179

180

181

182

183

project portfolio value. Matrix λ is the diagonal elements of P U . Notation ξ xi (P U − λ) xi T is the regularization item, reflecting the project interaction  effect on the project portfolio values. xi (P U − λ) xi T represents the regular-

ization coefficient indicating the total number of interactions of project portfolio xi ; ξ indicates the exponential item of xi (P U − λ) xi T .

9

184

2.4. Risk Determination Model

185

Risk is determined on two aspects: the technology readiness level (TRL), a

186

widely used measure for readiness degree of a single technology ranging from 1

187

to 9 (Crosbie et al. , 2018), and the co-utilization relation on technologies. An

188

example for the latter is that risk will be relatively high if all the projects in a

189

project portfolio co-utilize an immature technology. To construct a risk calculation model for a project portfolio solution xi , two preconditions should be met. (i) The risk value range should lie in the interval [0, 1]. (ii) When more technologies with low T RL are required by projects in xi , the risk should be higher. Therefore, considering the project interactions, the risk index of project portfolio xi can be defined as Equation 4. s  2 m P 9−T RLj RI (xi ) = wj 9 j=1

where : wj =

P

(4)

tij

+ i∈x i

kxi ·T P k1 , j

= 1, 2, ..., m

190

Equation 4 is defined by computing the gap between the ideal value and the

191

real T RL value of a project portfolio. Only the selected projects in xi and the

192

technologies required by those projects are considered. T RLj is the T RL of

193

technology j. The weight wj , j = 1, 2, ..., m is set under the rule that the more

194

times a technology is required, the greater the weight. kxi · T P k is the L1 norm

195

of the vector xi · T P , that is the sum of elements in the vector. Next, Equation 4 can be proved to meet the preconditions mentioned above. First, the value of RI (xi ) , xi ∈ X can be proved to lie in the range [0, 1] according to Equation 5.   2   T RLj ∈ [1, 9] ⇒ 9−T RLj ∈ [0, 1] ⇒ 9−T RLj ∈ [0, 1]  9 9 m P m P P  tij = kxi · T P k1 ⇒ wj = 1   i=1 j=1 j∈x+ i  2 m P 9−T RLj ⇒ wj ∈ [0, 1] 9 j=1 s  2 m P 9−T RLj wj ∈ [0, 1] ⇒ RI (xi ) = 9 j=1

10

(5)

196

197

198

199

200

Next, it can be proved that in Equation 6, for two weight vectors w1 =     1 2 1 , where wa1 + wb1 = and w2 = w12 , ..., wa2 , ..., wb2 ., , , wm w1 , ..., wa1 , ..., wb1 ., , , wm  P P wa2 + wb2 , wa1 > wa2 and i6=a,b wi1 = i6=a,b wi2 , the RI xi , w1 is bigger than  RI xi , w2 if technology b is more mature than technology a, that is T RLa < T RLb .

 2 2  RI xi , w1 − RI xi , w2      2 P 2  m m P  9−T RLj  2 9−T RLj  wj1 w = −  j 9 9   j=1 j=1     2 2 2  1 9−T RLa   + wb1 9−T9RLb − wa2 9−T9RLa − wb2  = wa 9  2 2  = 9−T9RLa × wa1 − wa2 + 9−T9RLb × wb1 − wb2        ∵ wa1 + wb1 = wa2 + wb2      2 2     = wa1 − wa2 × 9−T9RLa − 9−T9RLb       >0 wa1 > wa2 , T RLa < T RLb   ⇒ RI xi , w1 > RI xi , w2 201

3.

 9−T RLb 2 9

(6)

Project Portfolio Optimization Based on A Refined Selection

202

Strategy

203

This section describes a process for obtaining the optimal project portfolio.

204

The process has three steps: (i) obtaining the non-dominated project portfolio

205

solutions, (ii) association rules mining and ranking, (iii) refined selection on non-

206

dominated solutions. The detailed flows in Figure 2 illustrate the framework

207

of the whole process to make it more understandable and operational. The

208

following three subsections illustrate the three steps in detail, respectively.

209

3.1. Obtaining the Non-dominated Set

210

Project portfolio solution xi is a subset of n project proposals, where xij =

211

0 or 1. While xij = 0 denotes that project pj in P is not selected in solution

212

xi , xij = 1 means that pj is selected in solution xi . xi is feasible if and only

213

214

if the total cost of it is less than b. Therefore, the feasible set Xf is defined as P n o n Xf := {xi ∈ X |xi C ≤ b } := xi ∈ X j=1 xij × cj ≤ b . 11

Figure 2: The framework for project portfolio optimization with refined selection strategy 215

Considering the presence of multiple evaluation indicators for project port-

216

folios, solution that performs best on all criteria may not exist. Therefore, the

217

corresponding definitions for evaluating multi-objectives are used for reference.

218

First, the domination relationships between project portfolios can be defined

219

as Equation 7. The dominated solutions need not to be considered, and can be

220

directly deleted from the decision space. Definition 1: Project portfolio solution xj is dominated by xi , when:    V (xi ) ≥ V (xj ) and RI (xi ) ≤ RI (xj )   xi  xj := V (xi ) 6= V (xj ) or RI (xi ) 6= RI (xj )     x ,x ∈ X i

j

(7)

f

Definition 2: From definition 1, the efficient project portfolio set Xe can be

defined as Equation 8.  /xj ∈ Xe , xj  xi . s.t. xj 6= xi Xe := xi ∈ Xe ∃

(8)

221

Next, the method to obtain the project portfolio Pareto set is discussed.

222

The project portfolio solution space shows an exponential increase with the 12

223

increase in number of proposed projects. For m projects, it generates 2m − 1

224

solutions (Xia et al. , 2017). Therefore, an efficient multi-objective algorithm

225

is needed to solve the optimization problem. The NSGA is a type of widely

226

used multi-objective intelligent algorithm that can retain the elites in offsprings.

227

While the differential evolution (DE) algorithm is a good genetic operator for

228

maintaining population diversity. Thus, the DE algorithm is embodied in the

229

NSGA framework to obtain non-dominated solutions by fusing the advantages

230

of NSGA and DE. The precise steps are as follows.

231

(1) Population initialization. The chromosome form of individuals is defined as

232

xi = {xi1 , xi2 , ..., xin }, xij ∈ [0, 1], from which the initial populations are

233

generated. (2) Fitness and penalty functions construction and calculation. Fitness functions are set with focus on the two objectives of maximizing value and minimizing risk. The penalty function is set to avoid exceeding the budget by adding a penalty item to the fitness functions, as shown in Equation 9. f1 = −V (xi ) + γ1 × max {0, xi · c − b} f2 = R (xi ) + γ2 × max {0, xi · c − b}   x = (x , ..., x ) , x ∈ {0, 1}m i i1 im i s.t.  x ∈X i e

(9)

234

where V (xi ) and R(xi ) are the value and risk of the project portfolio xi ,

235

respectively. The objective of the algorithm is to minimize the values of f1

236

and f2 . In addition, if the cost exceeds the budget, the amount exceeding

237

the budget will be added to the two fitness functions, where γ1 and γ2

238

are the parameters determining how the amount exceeding the budget will

239

affect the fitness values. (3) Mutation operation. Assume that r1 , r2 , and r3 are individuals randomly selected in the current population, and r and rbest stand for the current and optimal individuals in the population, respectively. The new individual r0

13

will be generated according to Equation 10. r0 = r3 + rand ∗ (r2 − r1 )

r0 = rgebest + rand ∗ (r2 − r1 )

(10)

r0 = r + rand ∗ (rgebest − r1 ) + rand ∗ (r2 − r1 ) (4) Crossover operation. This is executed on the newly generated individuals to ensure the diversity of species according to Equation 11; where, r00 represents the new individual after the crossover operation. |r| is the number of elements in r. Cro is the crossover operator guaranteeing that each code bit of r0 has a probability of p being replaced by the corresponding bit of parent r. r00 = (1 − Cro) ∗ (r0 ) + Cro ∗ (r)      Cro = cro1 , cro2 , ..., cro|r|     1, if (rand < p) where :  croi =    0, if (rand ≥ p) 

(11)

240

(5) Selecting the elites from offsprings. The elite individuals will be selected

241

using the crowding comparison operator, a non-dominated sorting method.

242

(6) Repeating step 2 to 5 until the termination condition is met.

243

3.2. Association Rules Mining on the Non-dominated Set

244

3.2.1. Association Criteria

245

Finding the patterns of association rules can help in decision making. The as-

246

sociation rules from the non-dominated project portfolios represent the projects

247

frequently appearing simultaneously in the Pareto set; that is the combination

248

of these projects tends to perform better. Therefore, before the refined selec-

249

tion on the non-dominated project portfolios, the association rules need to be

250

obtained in the Pareto set.

251

To effectively find the association rules set, the standards for identifying

252

the association rules need to be defined. Support degree, confidence degree

253

and promotion degree are three commonly used evaluation criteria for mining

254

association rules. To introduce these criteria in detail, the variables Z1 and Z2

14

255

are taken for example. In addition, to make the criteria more understandable,

256

an example is provided after each criterion introduction. (1) Support degree is the proportion of several items that appear simultaneously in the data set to the total amount of the data set. This can also be explained as the association probability of certain items. The calculation of support degree is shown in Equation 12, where f requent (Z1 Z2 ) denotes the frequency of items appearing simultaneously in Z1 and Z2 , and |AllSamples| indicates the total number of items in the data set. In general, the items with high support degree may not form an association rule, but those with low support degree certainly do not form an association rule. SD (Z1 , Z2 ) = P (Z1 Z2 ) =

f requent (Z1 Z2 ) |AllSamples|

(12)

257

Example 1: If 1000 customers go to the mall to purchase items, of which

258

150 customers purchase ballpoint pens and notebooks at the same time,

259

then the support degree of the association rule (ballpoint pen, notebook) is

260

150/1000 × 100% = 15%. (2) Confidence degree means the probability of the appearance of an item when another item appears, or the conditional probability of an item. The confidence degree of Z1 ← Z2 can be expressed as Equation 13. CD (Z1 ← Z2 ) = P (Z1 |Z2 ) =

f requent (Z1 Z2 ) f requent (Z2 )

(13)

261

Example 2: In the above example, if 65% of the customers who purchase

262

ballpoint pen also purchase notebook, then, the confidence level of the as-

263

sociation rule (ballpoint pen → notebook) is 65%. (3) The lift degree represents the ratio of the probability of P (Z1 |Z2 ) to the probability of Z1 , as shown in Equation 14. It reflects the degree of association between Z1 and Z2 . A lift degree greater than 1 indicates that Z1 ← Z2 is an effectively strong association rule. However, Z1 ← Z2 is judged as an invalidly strong association rule when the lift degree is less than or equal to 1. As a special case, when Z1 and Z2 are independent, the lift degree will 15

be equal to 1. LD (Z1 ← Z2 ) =

P (Z1 |Z2 ) C (Z1 ← Z2 ) = P (Z1 ) P (Z1 )

(14)

264

Example 3: In the above example, the lift degree of the association rule

265

(ballpoint pen → notebook) is 65%/25% = 2.6, indicating that it is a effec-

266

tively strong association rule.

267

The refined selection strategy traverses the ranked association rules to re-

268

fine non-dominated solutions until only one solution remains. There should be

269

enough association rules, otherwise, the rules may have been completely tra-

270

versed before the optimal solution obtained. Therefore, when implementing the

271

association rule mining algorithm, users should set minimum limits of support

272

and confidence degrees to slightly lower values to guarantee to obtain enough

273

association rules.

274

3.2.2. Association Rules Ranking based on TOPSIS

275

The technique for order preference by similarity to ideal solution (TOPSIS)

276

is adopted to obtain the most frequent association rule. The TOPSIS method

277

aggregates the performance of support degree, confidence degree and lift degree.

278

The basic idea of TOPSIS is to compare the distance of all candidates with

279

the positive and negative ideal points (Lin & Yeh , 2012). Assuming that

280

m frequent association rules exist, with the three criteria vectors denoted as

281

SD = [si ]T , CD = [ci ]T , and LD = [li ]T , where i = 1, 2, ...m, respectively, the

282

283

284

285

specific steps of the method are presented as follows. h i (1) The criteria matrix M = [mij ]m×3 = SD CD LD is normalized to  construct the decision matrix M 0 = m0ij m×3 , where aij is determined as Equation 15.

,v um uX 0 mij = mij t m2ij , i = 1, · · · , m; j = 1, 2, 3 i=1

16

(15)

(2) Determine the positive ideal point pip and negative ideal point nip according to Equation 16. pip = [max {m0i1 } , max {m0i2 } , max {m0i3 }] , i = 1, 2, ..., m nip = [min {m0i1 } , min {m0i2 } , min {m0i3 }] , i = 1, 2, ..., m

(16)

(3) The distances between the criteria of the frequent set mi = [mi1 , mi2 , mi3 ] and the ideal points (both positive and negative) are calculated according to Equation 17. d∗i d0i

= =

s

2 m0ij − pip , i = 1, · · · , m

3 P

sj=1 3 P

m0ij

j=1

2

(17)

− nip , i = 1, · · · , m

(4) The relative distances to the negative ideal point are calculated in Equation 18; here tvi∗ is also called the TOPSIS value. tvi∗ = d0i 286



 d0i + d∗i , i = 1, · · · , m

(5) tvi∗ describes the importance of the corresponding frequent items, according

287

to which the most frequent association rule can be obtained as

288

arg (maxi=1,2,...m tvi∗ ).

289

290

(18)

3.3. Refined Selection Strategy on Non-dominated Project Portfolios From the ranked association rules, the refined selection strategy is to delete

291

the worst project portfolios with no highly ranked projects from the non-dominated

292

solutions step-by-step until only one project portfolio remains. The detailed

293

steps are as follows.

294

(1) Define the counter t = 1, empty set U , and input the non-dominated port-

295

296

297

298

299

folio solutions Nd0 . (2) Scan the tth association rule, and store the projects appearing in this rule as Ut . (3) Screen Nd0 by deleting all the project portfolios that do not contain Ut − U . Let U = U + Ut . 17

300

(4) Examine the remaining project portfolio NdL . If only one project portfolio

301

exists in NdL , then stop the algorithm and output NdL ; otherwise, let t = t+1,

302

and repeat steps 2 to 4.

303

This strategy is based on the principle that the more frequently a project is

304

selected in the non-dominated set, the more it should be retained. Therefore,

305

the strategy follows the inverse idea that project portfolios without any project

306

should be deleted.

307

Consider the following example illustrating the processes of the refined se-

308

lection strategy. First, 12 association rules are abstracted from the total set in

309

the case study, as shown in Table 1 . The projects will be ranked in the order in

310

which they first appears in the 12 rules. That is the earlier a project appears in

311

the association rules, the higher it would be ranked. Therefore, as shown Table

312

1, the project ranking is [3,4], 6, 13, and 16, indicating that projects 3 and 4

313

are the most important ones. Table 1: Abstracted association rules Association rules

Support degree

Confidence degree

Lift degree

TOPSIS values

Rank

Project 3 → Project 4

1

1

1

0.883607

1

Project 6→ Project 3

0.851852

1

1

0.779176

2

Project 3→ Project 6

0.851852

0.851852

1

0.777655

3

Project 13→ Project 3

0.814815

1

1

0.739088

4

Project 3→ Project 13

0.814815

0.814815

1

0.73698

5

Project 13→ Project 6

0.740741

0.909091

1.067194

0.654444

6

Project [6,13]→ Project 3

0.740741

1

1

0.65408

7

Project 6→ Project 13

0.740741

0.869565

1.067194

0.653932

8

Project 3→ Project [6,13]

0.740741

0.740741

1

0.650578

9

Project [6,16]→ Project 13

0.703704

1

1

0.610265

10

Project 6→ Project 16

0.703704

0.826087

0.969754

0.60742

11

Project 3→ Project [6,16]

0.703704

0.703704

1

0.605923

12

314

Next, the non-dominated project portfolios are refined. First, the project

315

portfolios that do not include projects 3 and 4 are deleted, then those that do

316

no include project 6 are deleted, and finally those that do not include project 13

317

are deleted. The deletion process will continue until only one project portfolio

318

remains.

18

319

4. Case Study

320

The following case study comprising project portfolio selection illustrates the

321

feasibility and efficiency of the proposed model and approach. The stakeholders

322

are assumed to demand from the researchers a recommendation of the optimal

323

project portfolio.

324

4.1. Data Instruction

325

In the case study, the data sets in Table 2 and 3 refer to the context in

326

(Martino , 1995). Table 2 provides 16 project proposals with information of

327

the expected costs, revenues and the scores of alignment degrees (between 0-1)

328

with 6 company strategies: (i) improving market share, (ii) expanding products

329

ranges, (iii) occupying the new products market, (iv) reducing supply chain

330

risk, (v) increasing turnover by more than 10%. The interactions between the

331

projects on technology and T RL information are tabulated in Table 3. The total

332

budget is set to 600 ∗ (104 ) $. There are 216 − 1 = 65535 alternative project

333

portfolio solutions, within which the recommended solution will be generated. Table 2: Criteria of project proposals Alignment degree with company strategies

Project

Project name

Cost (104 $)

Revenue (104 $)

S1

S2

S3

S4

S5

P1

Digital signal processor

48

113

0

0.06

0.25

0.22

0

P2

Digital image processor

38

77

0.19

0.06

0

0.01

0

P3

Speech synthesizer

40

78

0.20

0

0.07

0

0.07

P4

Low-voltage computer chip

43

67

0.11

0

0.07

0

0.07

P5

High-efficiency solar cell

35

19

0

0.04

0

0.01

0

P6

Digital-to-analog converter

25

54

0

0

0

0.09

0.1

P7

Analog-to-digital converter

26

67

0.02

0.09

0

0

0.09

P8

Frequency converter module

41

73

0

0

0.06

0

0.24

P9

Conformal phased-array antenna

53

76

0

0

0.34

0.14

0

P10

Radio frequency mixer

81

148

0

0.24

0.11

0.14

0

P11

Signal converter

97

114

0.20

0

0

0.07

0.16

P12

High-speed encryption circuit

51

105

0.01

0.21

0

0

0.06

P13

Lightweight dc-to-dc converter

89

34

0

0.05

0.02

0.05

0

P14

High-energy-density battery

78

88

0.17

0

0.03

0.14

0

P15

Improved coding algorithm

97

105

0.11

0

0

0.07

0.20

P16

Optical materials for solar cells

90

111

0

0.24

0.08

0.02

0

19

Table 3: Utilization relations between projects and technologies

334

Project

T1

T2

T3

T4

T5

T6

T7

T8

T9

P1

1

0

1

0

0

0

1

1

1

P2

1

0

0

0

0

1

0

1

0

P3

0

0

0

0

0

0

1

0

0

P4

0

1

1

1

1

1

1

0

0

P5

0

1

0

0

0

0

0

0

1

P6

1

0

1

0

0

1

1

1

0

P7

1

0

1

0

0

1

1

1

0

P8

1

0

1

0

0

0

1

0

1

P9

1

0

1

0

0

0

0

0

0

P10

1

0

1

0

0

0

1

0

1

P11

1

0

1

0

0

0

1

0

1

P12

0

0

0

0

1

0

1

0

1

P13

1

1

1

0

0

0

1

0

0

P14

0

1

0

0

0

0

1

0

0

P15

0

0

0

0

0

0

1

0

0

P16

0

1

0

0

0

0

0

0

1

TRL

8

9

5

7

8

5

6

7

6

4.2. Constructing the Co-utilization Network of Projects

335

From the utilization relation in Table 3, the technology-project network T P

336

is transformed into the project co-utilization network P U , as shown in Figure

337

3 (The work is carried out with the widely used Gephi, a network visualization

338

tool (Nycz et al. , 2016)).

(a) Technology-project network

(b) Project co-utilization network

Figure 3: The transformation from the T P network to P U network

339

In (a) of Figure 2, an edge indicates that the linked project is in need of

340

linked technology. The edges have no weight information. In (b) of Figure

341

2, the thickness of an edge represents the co-utilization amount of the linked 20

342

projects. Projects 3, 5, 12, 14, 15, and 16 have weaker co-utilization relations

343

than the other projects.

344

The detailed co-utilization information is shown in Table 4; the numbers in

345

the table represent the co-utilization amount of the projects in the corresponding

346

rows and columns. The diagonal elements give the quantity of technologies re-

347

quired by the corresponding project. Besides the diagonal elements, 200 project

348

interaction relationships form the non-zero items in the project co-utilization

349

matrix. Table 4: Project co-utilization matrix

350

351

PU

P1

P2

P3

P4

P5

P6

P7

P8

P9

P10

P11

P12

P13

P14

P15

P16

P1

5

2

1

2

1

4

4

4

2

4

4

2

3

1

1

1

P2

2

3

0

1

0

3

3

1

1

1

1

0

1

0

0

0

P3

1

0

1

1

0

1

1

1

0

1

1

1

1

1

1

0

P4

2

1

1

6

1

3

3

2

1

2

2

2

3

2

1

1

P5

1

0

0

1

2

0

0

1

0

1

1

1

1

1

0

2

P6

4

3

1

3

0

5

5

3

2

3

3

1

3

1

1

0

P7

4

3

1

3

0

5

5

3

2

3

3

1

3

1

1

0

P8

4

1

1

2

1

3

3

4

2

4

4

2

3

1

1

1

P9

2

1

0

1

0

2

2

2

2

2

2

0

2

0

0

0

P10

4

1

1

2

1

3

3

4

2

4

4

2

3

1

1

1

P11

4

1

1

2

1

3

3

4

2

4

4

2

3

1

1

1

P12

2

0

1

2

1

1

1

2

0

2

2

3

1

1

1

1

P13

3

1

1

3

1

3

3

3

2

3

3

1

4

2

1

1

P14

1

0

1

2

1

1

1

1

0

1

1

1

2

2

1

1

P15

1

0

1

1

0

1

1

1

0

1

1

1

1

1

1

0

P16

1

0

0

1

2

0

0

1

0

1

1

1

1

1

0

2

4.3. Non-dominated Solutions For multi-objective optimization, the DE algorithm is embodied in the NSGA-

352

II framework, to obtain the non-dominated solutions. The advantage of the pro-

353

posed NSDE is illustrated by comparing the algorithm with three other mature

354

algorithms, NSGA-II, NSGA-III, and SPEA2. The population of the four algo-

355

rithms is set to 200, with the maximal number of iterations set to 100. Through

356

sensitive analysis, the parameters of the four algorithms are determined as those

357

with the best performance, as shown in Table 5. From the value function in

358

Equation 3, parameter ξ plays an important role in determining the project

359

portfolio values. Therefore, nine cases of ξ = 1/5, 1/4, 1/3, 1/2, 1, 2, 3, 4, 5 are

360

tested on each algorithm, as shown in Figure 4. 21

Table 5: Project co-utilization matrix Algorithms

NSDE

NSGA-II

NSGA-III

SPEA-II

Crossover probability

0.7

0.5

0.5

0.1

Mutation probability

/

0.1

0.1

0.2

Figure 4: The 9 non-dominated sets

361

The term “Xi” represents the notation of ξ. x and y are value and risk,

362

respectively. A comparison shows that the Pareto set of SPEA2 is more concen-

363

trated and those of the other three NSGA series algorithms are more diversified.

364

Further, the NSDE shows the widest distribution of the Pareto set due to diver-

365

sity of the DE operator. Therefore, the NSDE is better for population diversity.

366

In addition to the diversity, the hypervolume metric value is adopted to measure

367

the non-dominated set performance. The hypervolume metric values of the four

368

algorithms on the nine cases are calculated as shown in Figure 5. The results

22

369

show that the NSDE is the best for ξ = 1/5, 1/4, 1/2, and performs at least as

370

good as any other algorithm on other cases.

Figure 5: The hypervolume metric value of four algorithms on 9 cases

371

4.4. Analysis of the Pareto Set

372

A statistical analysis is carried out on a single Pareto set to illustrate the

373

relative importance of projects. In the following step, the non-dominated solu-

374

tions generated by NSDE with ξ = 1/2 is further studied as an example, with

375

200 Pareto set individuals shown in Figure 6.

376

The rectangular area is divided into 200 × 16 rectangles according to the

377

number of project proposals. Each rectangle shows whether a project candidate

378

is selected in the non-dominated set. If project P − i is selected in the j th non-

379

dominated project portfolio, the corresponding rectangular block indicated by

380

ji is coloured black, or is left blank.

381

Then, the projects in the Pareto set selected are counted, and the relative

382

importance degree is calculated, as shown in Figure 7. From the single project

383

aspect, projects 3, 4 and 14 are the most important. However, this type of

384

ranking does not consider the combination of projects. Therefore, to determine

385

the optimal project portfolio, the association rules should be mined from the

386

Pareto set. 23

Figure 6: The non-dominated project portfolios generated by NSDE with ξ = 1/2

387

4.5. Refined Selection on The Non-dominated Solutions

388

There are some repetitive project portfolios in the 200 individuals. After

389

deleting the repetitive items, only 42 non-dominated project portfolios remain,

390

as shown in Figure 8.

391

The association rules of the 42 project portfolios can be found with the

392

Apriori mining algorithm (Pei et al. , 2002). Finally, 18,405 association rules

393

are mined from the 42 project portfolios with the support degree, confidence

Figure 7: The relative importance of projects when xi = 1/2

24

Figure 8: Project portfolios of the non-dominated set after deleting repetitive solutions

394

degree, and lift degree information. The TOPSIS algorithm is then applied on

395

the degrees to determine the rule rankings, as shown in Figure 8. In (b) of

396

Figure 9, the area graph indicates the ranked TOPSIS value distributions of all

397

the association rules. Most of the TOPSIS values are located in the interval

398

of [0.3, 0.5] and the higher the TOPSIS value, the higher the association rule

399

ranks. Furthermore, the support degrees, confidence degrees, lift degrees, and

400

TOPSIS values are exhibited in (a) of Figure 9, where the three coordinate axes

401

represent the three degrees and the area of the circle indicates the corresponding

402

TOPSIS values. The degrees are found distributed in the left-hand side of the

403

space, indicating that the support and confidence degrees are correlative. That

404

is the confidence degree tends to be higher than the support degree in the case.

405

Next, regarding the example’s processes in the 3.3 part, the 42 non-dominated

406

project portfolios are refined. First, the projects are ranked according to their

407

first appearance in the association rules, as Table 6 shows. The association rule

408

rankings correspond to the rules position when the projects first appear. For

409

example, project 6 first appears in the 603th association rule.

410

Now, following the project rankings, the project portfolios without projects

25

(b) Area graph of TOPSIS values

(a) Degree distributions

Figure 9: The association rules information

Table 6: Project co-utilization matrix Project

The association rule ranking position

Project

when a project first appears

The association rule ranking position when a project first appears

3

1

2

1755

14

1

5

3928

15

3

13

4139

16

13

12

5433

4

51

8

/

7

181

9

/

6

603

10

/

1

1511

11

/

411

[3, 14], 15, 16, 4, 7, 6, 1, 2, 5, 13, and 12 are successively deleted from the 42

412

non-dominated project portfolios. The detailed process is shown in Figure 10.

413

The deletion process terminates when the algorithm tries to delete the project

414

portfolios that do not include project 8, because otherwise no project portfolio

415

will remain. Finally, the project portfolios of [P1, P2, P3, P4, P5, P6, P7, P12,

416

P14, P15, P16] will be recommended as the optimal solution. The value and

417

risk of this project portfolio are 453.7215 and 0.4736, respectively.

418

The advantage of the proposed refined selection strategy can be shown by

419

comparing the results with those obtained using the weighted goal programming

420

methodology. The two objectives are combined to a single objective, as Equation

26

Figure 10: The refined selection processes

421

19 shows, which is actually an integer programming problem. i) min z = δ · (− value(x value∗ ) + (1 − δ) ·   0<δ<1  x = (x , ..., x ) , x ∈ {0, 1}n

i

i1

in

risk(xi ) risk∗

(19)

i



422

Variable δ is set to 0.5. The value and value∗ are respectively the target

423

goals of value and risk. They are divided by the value and risk to standardize

424

the different goals following the percentage normalization method (Sarkar et al.

425

, 2018).

426

Using the lingo tool, the minimum value of z is obtained as −0.3857, when

427

value = 382.8549 and risk = 0.5026. The optimal solution is [P2, P3, P4,

428

P5, P7, P8, P9, P12, P13, P16]. A comparison shows that for both value and

429

risk, the optimal solution is dominated by the refined selection solution, because

430

382.8549 < 453.7215 and 0.5026 > 0.4736.

431

In conclusion, the case study includes 16 projects proposals. The project

27

432

co-utilization network shows 200 project interaction relations. Projects 7 and

433

6 have the biggest interaction degree of 5, meaning that the two projects si-

434

multaneously depend on five technologies. An improvement in any one of the

435

five technologies will promote the value of the projects and project portfolios

436

containing the two projects.

437

Then, by setting parameter ξ to 1/5, 1/4, 1/3, 1/2, 1, 2, 3, 4, 5, respectively, 9

438

non-dominated sets are obtained. The bigger ξ is, the closer the frontier is to

439

the upper left-hand corner. Thus, the value of ξ determines the solution space

440

shape, and hence the Pareto frontier shape.

441

As for the 200 non-dominated solutions considered, after deleting the repet-

442

itive items in the non-dominated solutions, 42 project portfolios remain and

443

18,405 association rules are mined, providing information of the support degree,

444

confidence degree, and lift degree. The three criteria are ranked according to

445

the multi-criteria decision method TOPSIS. The TOPSIS values show a normal

446

distribution characteristic that most rules locate in the interval of [0.3, 0.5].

447

Then, the 42 project portfolios are refined using the successively deleting

448

strategy. First, the projects are ranked in the order of their appearance in the

449

ranked association rules. Projects 3 and 14 rank first in all projects. In fact, all

450

the project portfolios contain the two projects, indicating that they are truly

451

important. Second, from the project rankings, the 42 non-dominated projects

452

are refined step-by-step, until only one project portfolio remains, that is [P1,

453

P2, P3, P4, P5, P6, P7, P12, P14, P15, P16]. The value and risk of this project

454

portfolio are 453.7215 and 0.4736, respectively.

455

5. Discussion and Conclusions

456

The result in case study indicates that: (i) The project interaction degrees

457

have influence on the project portfolio values. The exponential coefficient of

458

regularization item has a significant influence on the value of project portfolio

459

and the shape of non-dominated project portfolios. (ii) The four multi-objective

460

algorithms are all efficient to obtain non-dominated set. The NSDE algorithm

28

461

has a slight advantage in both diversity and performance. (iii) The refined

462

optimal solution shows better performance compared to the result obtained

463

using the goal programming method. The result prove the advantage of the

464

proposed refined selection strategy. Further studies should focus on proving the

465

optimality of the refined selection solution by logical reasoning. In addition,

466

the current project interaction only includes project dependence relation with

467

technology. More factors in real world should be considered, such as market

468

and resource, to make the provided methods more applicable.

469

In conclusion, the study shows that the two proposed innovative approaches

470

on project interaction and refined selection are feasible and reasonable to tackle

471

the two challenges on project portfolio selection: (i) modelling the influences of

472

project interactions on the final value of project portfolios, and (ii) selecting the

473

best solution from the non-dominated project portfolios.

474

As for the value and risk models, based on the dependence relations between

475

projects and technologies, the project co-utilization network representing the

476

interaction relations is constructed. Then, the project interaction degree is set as

477

a regularization item, and is added to the original value function to indicate the

478

influence of interactions on the project portfolio values. Second, the risk model

479

is constructed based on the T RL and the condition that the more immature the

480

technologies a project portfolio depends on, the higher the risk.

481

As for the optimal project portfolio selection, based on the obtained non-

482

dominated project portfolios, the association rules are mined and ranked by

483

the TOPSIS method. Next, the refined selection strategy is adopted to delete

484

the worst project portfolios that have no highly ranked projects from the non-

485

dominated solutions step-by-step until only one project portfolio remains, which

486

will be recommended as the optimal solution.

487

488

Finally, the paper provides a case study, which verifies the feasibility and advantage of the proposed models and approaches.

29

489

Declaration of Competing Interest

490

The authors declare that they have no known competing financial interests or

491

personal relationships that could have appeared to influence the work reported

492

in this paper.

493

Acknowledgements

494

The work was supported by the National Key R&D Program of China under

495

Grant SQ2017YFSF070185, the National Natural Science Foundation of China

496

under Grant 71971213, 71901214 and 71901215.

497

References

498

Carazo, A. F., G´ omez, T., Molina, J., Hern´ andez-D´ıaz, A. G., Guerrero, F. M.,

499

& Caballero, R. (2010). Solving a comprehensive model for multiobjective

500

project portfolio selection. Computers & operations research, 37 , 630–639.

501

Chen, B., Zeng, W., Lin, Y., & Zhang, D. (2015). A new local search-based

502

multiobjective optimization algorithm. IEEE Transactions on Evolutionary

503

Computation, 19 , 50–73.

504

Crosbie, T., Broderick, J., Short, M., & Charlesworth, M., R.and Dawood

505

(2018). Demand response technology readiness levels for energy management

506

in blocks of buildings. Buildings, 8 , 13.

507

Deb, K., & Jain, H. (2014). An evolutionary many-objective optimization al-

508

gorithm using reference-point-based nondominated sorting approach, part i:

509

Solving problems with box constraints. IEEE Transactions on Evolutionary

510

Computation, 18 , 577–601.

511

Eilat, H., Golany, B., & Shtub, A. (2006). Constructing and evaluating balanced

512

portfolios of r & d projects with interactions: A dea based methodology.

513

European Journal of Operational Research, 172 , 1018–1039.

30

514

Ghasemi, F., Sari, M., Yousefi, V., Falsafi, R., & Tamoaitien, J. (2018). Project

515

portfolio risk identification and analysis, considering project risk interactions

516

and using bayesian networks. Sustainability, 10 , 1069.

517

Kolm, P. N., T¨ ut¨ unc¨ u, R., & Fabozzi, F. J. (2014). 60 years of portfolio op-

518

timization: Practical challenges and current trends. European Journal of

519

Operational Research, 234 , 356–371.

520

Liesi¨ o, J., & Salo, A. (2012). Scenario-based portfolio selection of investment

521

projects with incomplete probability and utility information. European Jour-

522

nal of Operational Research, 217 , 162–172.

523

Liesi, J. (2008). Robust portfolio modeling with incomplete cost information

524

and project interdependencies. European Journal of Operational Research,

525

190 , 679–695.

526

Lin, Y. K., & Yeh, C. T. (2012). Multi-objective optimization for stochastic

527

computer networks using nsga-ii and topsis. European Journal of Operational

528

Research, 218 , 735–746.

529

530

Martino, J. P. (1995). Research and development project selection. Wiley: New York.

531

Martinsuo, M., Korhonen, T., & Laine, T. (2014). Identifying, framing and

532

managing uncertainties in project portfolios. International Journal of Project

533

Management, 32 , 732–746.

534

Medaglia, A. L., Graves, S. B., & Ringuest, J. L. (2007). A multiobjective evolu-

535

tionary approach for linearly constrained project selection under uncertainty.

536

European journal of operational research, 179 , 869–894.

537

Nycz, M., Nycz, T., & Czach´ orski, T. (2016). Modelling dynamics of tcp flows in

538

very large network topologies. In O. H. Abdelrahman, E. Gelenbe, G. Gorbil,

539

& R. Lent (Eds.), Information Sciences and Systems 2015 (pp. 251–259).

540

Cham: Springer International Publishing.

31

541

Paquin, J.-P., Gauthier, C., & Morin, P.-P. (2016). The downside risk of project

542

portfolios: The impact of capital investment projects and the value of project

543

efficiency and project risk management programmes. International Journal

544

of Project Management, 34 , 1460–1470.

545

Pei, J., Han, J., Lu, H., Nishio, S., Tang, S., & Yang, D. (2002). H-mine:

546

Hyper-structure mining of frequent patterns in large databases. In IEEE

547

International Conference on Data Mining.

548

Petit, Y., & Hobbs, B. (2010). Project portfolios in dynamic environments:

549

Sources of uncertainty and sensing mechanisms. Project Management Jour-

550

nal , 41 , 46–58.

551

Rostami, S., & Neri, F. (2016). Covariance matrix adaptation pareto archived

552

evolution strategy with hypervolume - sorted adaptive grid algorithm. Inte-

553

grated Computer-Aided Engineering, 23 , 313–329.

554

Sarkar, B., Omair, M., & Choi, S.-B. (2018). A multi-objective optimization of

555

energy, economic, and carbon emission in a production model under sustain-

556

able supply chain management. Applied Science, 8 , 1744.

557

Shankar, K., & Baviskar, A. S. (2018). Improved hybrid strength pareto evolu-

558

tionary algorithms for multi-objective optimization. International Journal of

559

Intelligent Computing & Cybernetics, 11 , 20–46.

560

Takami, M. A., Sheikh, R., & Sana, S. S. (2018). A hesitant fuzzy set theory

561

based approach for project portfolio selection with interactions under uncer-

562

tainty. Journal of Information Science & Engineering, 34 , 65–79.

563

564

Tongur, V., & lker, E. (2016). B-Spline Curve Knot Estimation by Using Niched Pareto Genetic Algorithm (NPGA).

565

Voss, M., & Kock, A. (2013). Impact of relationship value on project portfolio

566

success - investigating the moderating effects of portfolio characteristics and

567

external turbulence. International Journal of Project Management, 31 , 847–

568

861. 32

569

Xia, B., Dou, Y., Zhao, Q., Ge, B., & Yang, Z. (2017). Robust system portfolio

570

selection with multi-function requiremens and system instability. In Systems

571

Conference.

572

Ying, L., & Liu, Y. K. (2017). Distributionally robust fuzzy project portfolio

573

optimization problem with interactive returns. Applied Soft Computing, 56 ,

574

655–668.

575

Zhang, P., Yang, K., Dou, Y., & Jiang, J. (2016). Scenario-based approach for

576

project portfolio selection in army engineering and manufacturing develop-

577

ment. Journal of Systems Engineering and Electronics, 27 , 166–176.

578

Zhang, Q., & Hui, L. (2007). Moea/d: A multiobjective evolutionary algorithm

579

based on decomposition. IEEE Transactions on Evolutionary Computation,

580

11 , 712–731.

33

Credit author statement Hechuan Wei: Conceptualization, Data curation, Writing - original draft, Formal analysis. 581 Caiyun Niu: Revision, Language improving. Boyuan Xia: Software, Validation, Methodology, Visualization. Yajie Dou: Funding acquisition, Supervision. Xuejun Hu: Project administration, Resources, Writing - review & editing.