Network - CPM & Pert
Network - CPM & Pert
net/publication/305684171
CITATIONS READS
0 7,689
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Dalgobind Mahto on 28 July 2016.
ESSENTIALS OF
OPERATIONS RESEARCH
Chapter 10: Network Techniques (PERT & CPM)
1
CHAPTER 7
In the past ,the scheduling of a project (over time) was done with little specifies
the start and finish for each activity on a horizontal time scale . Its disadvantage is
that the interdependency between the different activities(which mainly controls
the progress of the project)cannot be determined from the bar chart .The
growing complexities of today's project have demanded more systematic and
more effective planning techniques with the objective of optimizing the efficiency
of executing the project .Efficiency here implies effecting almost reduction in the
time required to complete the project while accounting for the economic
feasibility of using available resources .
Project management has evolved as a new field with the development of two
analytic techniques for planning, scheduling, and controlling of projects.
7.1 Background:
These are the critical path method (CPM) and the project evaluation and review
technique (PERT). The two techniques were developed by two different groups
almost simultaneously (1956- 1958) CPM was first developed by E.Idu Pout de
Nemours and company as an application to construction projects and was later
extended to a more advanced status by Mauchly associates . PERT, on the other
hand was developed for the U.S. Navy by a consulting firm for scheduling the
research and development activities for the Polaris missile program.
2
PERT and CPM are basically time –oriented methods in the sense that they both
lead to the determination of a time schedule. Although the two methods were
developed independently, they are strikingly similar. Perhaps the most important
difference is that originally the time estimates for the activities were assumed
deterministic in CPM and probabilistic in PERT. Today , PERT and CPM actually
comprise one technique and the differences , if any, are only historical .
Consequently, both techniques will be referred to as "project scheduling"
techniques.
Project scheduling by PERT-CPM consist of three basic phases
1. Planning
2. Scheduling and
3. Controlling.
7.2 Planning Phase
The planning phase is initiated by breaking down the project into distinct
activities . The time estimates for these activities are then determined and a
network (or arrow)diagram is constructed with each of its arcs(arrows)
representing an activity. The entire arrow diagram gives a graphic representation
of the interdependencies between the activities of the project. The construction
of the arrow diagram as a planning phase has the advantage of studying the
different jobs in detail .perhaps suggesting improvement before the project is
actually executed . More important will be its use to develop a schedule for the
project.
7.3 Scheduling phase
The ultimate objective of the Scheduling phase is to construct a time chart
showing the start and finish times for each activity as well as its relationship to
other activities in the project. In addition, the Schedule must pinpoint the critical
(in view of time) activities that require special attention if the project is to be
completed on time. For the non critical activities the schedule must show the
amount of slack or float time that can be used advantageously when such
activities are delayed or when limited resources are to be used effectively.
7.4 Controlling
The final phase in project management is project control .This includes the use of
the arrow diagram and the time chart for making periodic progress reports. The
network may thus be updated and analyzed and, if necessary, a new schedule is
determined for the remaining portion of the project.
3
7.5 Project Management
Project management is concerned with the overall planning and co-ordination of
a project from conception to completion aimed at meeting the stated
requirements and ensuring completion on time, within cost and to required
quality standards. Project management is normally reserved for focused, non-
repetitive, time-limited activities with some degree of risk and that are beyond
the usual scope of operational activities for which the organization is responsible.
A project is a temporary endeavour involving a connected sequence of activities
and a range of resources, which is designed to achieve a specific and unique
outcome and which operates within time, cost and quality constraints and which
is often used to introduce change.
7.6 Characteristic of a project
A unique, one-time operational activity or effort
Requires the completion of a large number of interrelated activities
Established to achieve specific objective
Resources, such as time and/or money, are limited
Typically has its own management structure
Need leadership
The application of a collection of tools and techniques to direct the use of
diverse resources towards the accomplishment of a unique, complex, one
time task within time, cost and quality constraints.
Used the techniques of operational research to plan the optimum use of
resources.
One of these techniques was the use of networks to represent a system of
related activities
7.7 Project Management Process
Project planning
Project scheduling
Project control
Project team -made up of individuals from various areas and departments
within a company
Matrix organization -a team structure with members from functional areas,
depending on skills required
4
Project Manager -most important member of project team Scope
statement -a document that provides an understanding, justification, and
expected result of a project
Statement of work -written description of objectives of a project
Organizational Breakdown Structure -a chart that shows which
organizational units are responsible for work items
Responsibility Assignment Matrix -shows who is responsible for work in a
project
7.8 Work breakdown structure
A method of breaking down a project into individual elements (
components, subcomponents, activities and tasks) in a hierarchical
structure which can be scheduled and cost
It defines tasks that can be completed independently of other tasks,
facilitating resource allocation, assignment of responsibilities and
measurement and control of the project
It is foundation of project planning
It is developed before identification of dependencies and estimation of
activity durations
It can be used to identity the tasks in the CPM and PERT
5
• Use of nodes and arrows
Arrows An arrow leads from tail to head directionally Indicate
ACTIVITY, a time consuming effort that is required to perform a part of the
work.
Nodes A node is represented by a circle Indicate EVENT, a point
in time where one or more activities start and/or finish
• Activity
– A task or a certain amount of work required in the project
– Requires time to complete
– Represented by an arrow
• Dummy Activity
– Indicates only precedence relationships
– Does not require any time of effort
• Event
– Signals the beginning or ending of an activity
– Designates a point in time
– Represented by a circle (node)
• Network
– Shows the sequential relationships among activities using nodes
and arrows
Activity-on-node (AON)
nodes represent activities, and arrows show precedence relationships
Activity-on-arrow (AOA)
arrows represent activities and nodes are events for points in time
Lay 3 Dummy
foundation
2 0 Build Finish
3 1 house work
1 2 4 3 6 1
7
Design house Order and
and obtain receive Select 1 1 Select
financing materials paint carpet
5
6
Lay foundations Build house
2 4
Finish work
2 3
7
Start 1 1
3
Design house 6
and obtain
3
financing 1 5 1
1 Select carpet
Order and receive
materials Select paint
B
A
C
Fig 7.3: A must finish before either B or C can start
A
C
B
7
A C
B
D
Fig 7.5: both A and C must finish before either of B or D can start
A B
Dummy
C
D
Fig 7.6: A must finish before B can start
both A and C must finish before D can start
8
La y 3
La y
foundation Dumm
foundatio
n 2 0 y
2 3
1
Order 2 4
material Order
material
9
CPM provides the following benefits:
CPM models the events and activities of a project as a network. Activities are
depicted as nodes on the network and events that signify the beginning or
ending of activities are depicted as arcs or lines between the nodes.
One of the methods used to develop the list of tasks is to create what is known
as a Work Breakdown Structure (WBS).
A definition
The WBS may be drawn in diagrammatic form (if automated tools are available)
or in a chart form resembling an outline.
The WBS begins with a single overall task representing the totality of work to be
performed on the project. This becomes the name of the project plan WBS
Using a methodology or system life cycle steps as a guide, the project is divided
into its major steps. In our case we will use the Unified Process phases. Each of
10
these phases must be broken down into their next level of detail, and each of
those, into still finer level of detail, until a manageable task size is arrived at. The
first level of Work Breakdown Structure for the unified process is illustrated in
Table 6.1
Tasks at each successively finer level of detail are numbered to reflect the task
from which they were derived. Thus the first level of tasks would be numbered
1.0, 2.0, 3.0, and so forth. Each of their sub-tasks would have a two part
number. The first part reflecting the parent task and the second part being the
sub-task number itself e.g. 1.1, 1.2, 1.3, etc. As each of these is in turn
decomposed or broken down into their component tasks, the components
receive a number comprised of its parent’s number plus a unique number of its
own.
Another Definition:
A manageable task is one where the expected results can be easily identified,
success, failure, or completion of the task can easily be ascertained, the time to
complete the task can easily be estimated, and the resource requirements of the
task can easily be determined.
Table 7.1 First level of Work Breakdown Structure for the life cycle
11
5. Identify the critical path (the longest path through the network)
6. Update the CPM diagram as the project progresses.
From the Work Breakdown Structure, a listing can be made of all the activities in
the project. This listing can be used as the basis for adding sequence and
duration information in later steps.
Some activities are dependent upon the completion of others. A listing of the
immediate predecessors of each activity is useful for constructing the CPM
network diagram.
Once the activities and their sequencing have been defined, the CPM diagram
can be drawn. CPM originally was developed as an activity on node (AON)
network, but some project planners prefer to specify the activities on the arcs.
The time required to complete each activity can be estimated using past
experience or the estimates of knowledgeable persons. CPM is a deterministic
model that does not take into account variation in the completion time, so only
one number can be used for an activity’s time estimate.
The critical path is the longest-duration path through the network. The
significance of the critical path is that the activities that lie on it cannot be
delayed without delaying the project. Because of its impact on the entire project,
critical path analysis is an important aspect of project planning.
The critical path can be identified by determining the following four parameters
for each activity:
ES – earliest start time: the earliest time at which an activity can begin
given that its predecessor activities must be completed first.
12
EF – earliest finish time, equal to the earliest start time for the activity plus
the time required to complete the activity.
LF – latest finish time: the latest time at which an activity can be
completed without delaying the project.
LS – latest start time, equal to the latest finish time minus the time
required to complete the activity.
The slack or float time for an activity is the time between the earliest and latest
start time, or between the earliest and latest finish time. Slack is the amount of
time that an activity can be delayed past its earliest start or earliest finish without
delaying the project.
The critical path is the path through the project network in which none of the
activities have slack, that is, the path for which LS=ES and LF=EF for all activities
in the path. A delay in the critical path delays the project. Similarly, to accelerate
the project it is necessary to reduce the total time required for the activities in the
critical path.
As the project progresses, the actual task completion times will be known and the
diagram can be updated to include this information. A new critical path may
emerge, and structural changes may be made in the network if project
requirements change.
CPM was developed for complex but fairly routine projects with minimal
uncertainty in project completion times. For less routine projects there is more
uncertainty in the completion times, and this uncertainty limits the usefulness of
the deterministic CPM model. An alternative to CPM is the PERT (Program
Evaluation and Review Technique) project planning model, which allows a range
of durations to be specified for each activity.
13
have argued that in part, the benefits are due to managers having to know and
clarify the tasks rather than the diagram which follows (which may by then be
self-evident).
The objectives of network analysis are to locate the activities that must be kept to
time, manage activities to make the most effective use of resources and look for
ways of reducing the total project time. For any but the smallest projects, this
analysis is likely to be done using a computer package, but your understanding
of the output will only develop if you have some experience of the basic steps of
analysis.
ACTIVITY DURATION ESTIMATION – BETA DISTRIBUTION
TE = A + 4(B) + C
6
WHERE:
14
CONSTRUCTING THE CRITICAL PATH
B Questionnaire design A 5
C Target market ID A 6
D Survey sample B, C 13
E Develop presentation B 6
F Analyze results D 4
G Demographic analysis C 9
H Presentation to client E, F, G 2
15
Partial Project Activity Network with Task Durations
B E
Design Dev. Present
5 6
A D F H
Contract Survey Analysis Present
5 13 4 2
C G
Market ID Demog.
6 9
RULES WHEN USING THE FORWARD PASS
1. Add all activity times along each path as we move through the
network (ES + Dur = EF),
2. Carry the EF time to the activity nodes immediately succeeding
the recently completed node. That EF becomes the ES of the
next node, unless the succeeding node is a merge point.
3. At a merge point, the largest preceding EF becomes the ES for
that node.
17
ACTIVITY NETWORK WITH FORWARD PASS
5 B 10 10 E 16
Design Dev. Present
5 6
0 A 5 11 D 24 24 F 28 28 H 30
Contract Survey Analysis Present
5 13 4 2
5 C 11 11 G 20
Market ID Demog.
6 9
RULES FOR USING THE BACKWARD PASS
19
ACTIVITY NETWORK WITH BACKWARD PASS
5 B 10 10 E 16
Design Dev. Present
6 5 11 22 6 28
0 A 5 11 D 24 24 F 28 28 H 30
Contract Survey Analysis Presentation
0 5 5 11 13 24 24 4 28 28 2 30
5 C 11 11 G 20
Market ID Demograph.
5 6 11 19 9 28
COMPLETED ACTIVITY NETWORK WITH CRITICAL PATH AND ACTIVITY SLACK TIMES IDENTIFIED
5 B 10 10 E 16
1 Design 12 Dev. Present
6 5 11 22 6 28
0 A 5 11 D 24 24 F 28 28 H 30
0 Contract 0 Survey 0 Analysis 0 Presentation
0 5 5 11 13 24 24 4 28 28 2 30
5 C 11 11 G 20
0 Market ID 8 Demograph.
5 6 11 19 9 28
ES ID EF
LS Duration LF
ACTIVITY NETWORK DEMONSTRATING LADDERING TECHNIQUE
A1 A2 A3
Design Design Design
A1 A2 A3
Coding Coding Coding
A1 A2 A3
Debugging Debugging Debugging
NETWORK DEMONSTRATING HAMMOCK ACTIVITY
5 B 9 12 G 21
13 10
18 4 22 22 9 31
0 A 5 5 C 12 12 H 22 31 I 35
0 9 9 0
0 5 5 14 7 21 21 10 31 31 4 35
5 D 11 11 E 25 25 F 31
0 user needs 0 Coding 0 Debugging
5 6 11 11 14 25 25 6 31
5 A 31
Hammock
26
STEPS TO REDUCE THE CRITICAL PATH
Free float
Free float is the time that an activity could be delayed without affecting any of the
activities that follow.
However, free float does assume that previous activities run to time.
Independent float
24
The independent float gives the time that an activity could be delayed if all the
previous activities are completed as late as possible and all the following activities are to
start as early as possible.
The determination of total, free and independent float is illustrated in Figure 20.10.
Table7.2
Task : A B C D E F G H I
Time : 8 10 8 10 16 17 18 14 9
Also identify the critical path.
25
Sol:
Fig(7.1)
The given procedure order reveals that there are no predecessors to activities A,B and C
and they all start from the initial node. Similarly, there are no successor to activities E,H
and I and hence they all merge into the end node of project. The network obtained is
shown in fig(7.1)
The nodes of the network have been numbered by using the Fulkerson’s rule. The
activity description and times are written along the activity arrows. To determine the
minimum project completion time, let event 1 occur at zero time. The earliest
occurrence time (E) and the latest occurrence time (L) of each event is then computed.
E1 = 0,
E2 = E1+ t12= 0 + 8 = 8,
E3= E1+t13=0 + 8 = 8,
E4 = Max.[ 0 + 10 , 8+10] = 18,
E5 = Max.[ 18 + 17 , 8+18] = 35,
E6 = Max.[ 8 + 16 , 35+ 9, 8+14] = 44.
Similarly,
L6 =E6 = 44,
L5 = L6- t56 = 44 - 9 = 35,
L4= L5 – t45 = 35 - 17 =18,
L3 = Min.[ 44 - 14 , 35-18] = 17,
26
L2 = Min.[ 44 - 16 , 18-10] = 8,
L1 = Min.[ 8 - 8 , 17- 8, 18-10] = 0.
The E and L values for each event have been written along the nodes in Fig(7.2)
FIG(7.2)
Table7.3
27
Activities1-2,2-4,4-5 and 5-6 having zero float are the critical activities and 1-2-4-5-6 is
the critical path.
Method 2. For identifying the critical path, the following condition are checked. If an
activity satisfies all the three conditions, it is critical.
(i). E=L for the tail event.
(ii) E= L for the head event.
(iii) Ej-Ei = Lj-Li = tij.
Activities 1-2,2-4,4-5 and 5-6 satisfy these conditions. Other activities do not fulfil all the
three conditions. The critical path is , therefore, 1-2-4-5-6.
Table7.4
Path Duration(days)
1-2-6 24
1-2-4-5-6 44
1-4-5-6 36
1-3-5-6 35
1-3-6 22
Path1-2-4-5-6, the longest in time involving 44 days, is the critical path. It represented
by bold lines in fig(7.2).
E= 8
L= 8
28
4-9 5 9-10 7
(i). Construct the network.
(ii). Compute E and L for each , and
(iii). Find the critical path.
Solution: The given data result in a network shown in fig(7.5). The figures along the
arrows represent the activity times.
The earliest occurrence time(E) and the latest occurrence time (L) of each event are now
computed by employing forward and backward pass calculations.
In forward pass computations,
E1=0,
E2= E1+t12 = 0+ 4 = 4,
E3= E1+t13 = 0+ 1 = 1,
E4= Max [Ei + ti4 ] = Max.[4+1,1+1] = 5,
i=2,3
E5= E3+t35 = 1+ 6 = 7,
E6= E5+t56 = 7+ 4 =11,
E7= E5+t57 = 7+ 8 = 15,
E8 = Max [Ei + ti8 ] = Max.[11+1,15+1] = 17,
i=6,7
E9= E4+t49 = 5+ 5 = 10, and
E10 = Max [Ei + ti10 ] = Max.[17+5,10+7] = 22,
i=8,9
E values are represented in fig 7.2.
In backward pass computations,
L10=E10=22,
L9 = L10 - t9 ,10 = 22-7 = 15,
L8 = L10 – t8 ,10 = 22-5 = 17,
L7 = L8 – t78 = 17 -2 = 15,
L6 = L8 – t68 = 17-1 = 16,
L5 =Min [Lj - t5j] = Min[16-4 , 15-8] = 7,
j=6,7
L4 = L9 – t49 = 15-5 = 10,
29
L3 =Min [Lj – t3j] = Min[10 - 4 , 7 - 6] = 1,
j=4,5
L2 = L4 – t24 = 10-1 = 9,
L1 =Min [Lj – t1j] = Min [9 - 4 , 1 - 1] = 0,
j=2,3
L values are also represent in fig(7.2).
Table 7.6
Activity Duration Start time Finish time Total
(weeks) Earliest Earliest Latest float
Latest
1-2 4 0 5 4 9 5
1-3 1 0 0 1 1 0
2-4 1 4 9 5 10 5
3-4 1 1 9 2 10 8
3-5 6 1 1 7 7 0
4-9 5 5 10 10 15 5
5-6 4 7 12 11 16 5
5-7 8 7 7 15 15 0
6-8 1 11 16 12 17 5
7-8 2 15 15 17 17 0
8-10 5 17 17 22 22 0
9-10 7 10 15 17 22 5
Example7.3:The utility data for a network are given below. Determine the total, free,
independent and interfering floats and identify the critical path.
Table7.7
Activity 0-1 1-2 1-3 2-4 2-5 3-4 3-6 4-7 5-7 6-7
Duration 2 8 10 6 3 3 7 5 2 8
Sol: The network diagram for the given project data is shown in fig(1.3). Activity durations are
written along the activity arrows.
The earliest start and latest finish times of the activities are computed by employing the forward
pass and backward pass calculation as explained in previous example. These times are
represented in network around the respective nodes.
The network analysis table is now constructed.
30
Fig(7.3)
Table 7.8
Activity Duration Start Time Finish time Float___________________
Earliest Latest Earliest Total Free Independent
Latest Interfering
1 2 3 4 5 6 7 8 9 10
0-1 2 0 0 2 2 0 0 0 0
1-2 8 2 8 10 16 6 0 0 6
1-3 10 2 2 12 12 0 0 0 0
2-4 6 10 16 16 22 6 0 -60 6
2-5 3 10 22 13 25 12 0 -60 12
3-4 3 12 19 15 22 7 1 1 6
3-6 7 12 12 19 19 0 0 0 0
4-7 5 16 22 21 27 6 6 0 0
5-7 2 13 25 15 27 12 12 0 0
6-7 8 19 19 27 27 0 0 0 0
Total float is the positive difference between latest and earliest finish times or latest and earliest
start time. For activity 1-2 ,
Total float (T.F)=16-10 = 8-2 = 6.
Similarly , for activity , say 2-5 ,
Total float = 25 -13=22-10 =12 and so on.
Total float calculations are depicted in column 7 of table 1.28.
Free float activity i-j = T.F .- head event slack
31
= T .F. – (L - E) of event j.
Thus free float of activity 0-1
= 0-( L – E ) of event 1,
= 0 – ( 2 - 2)= 0,
Free float of activity 1-2 = 6-(16-10) = 6-6 = 0, etc.
Free float of various activities are calculated in column 8 of the network analysis table.
Independent float of activity i-j= F.F – tail event slack = F.F – (L-E) of event i.
Thus independent float of activity 0-1 = 0 – (0-0)=0,
Independent float of activity 1-2 = 0 – ( 2 -2) = 0,
Independent float of activity 2-4 = 0 – (16 -10)= -6 0 and so on.
Independent float of various activities are calculated in column 9 of the table .If independent
float of an activity is negative , it is taken a zero.
Interfering float of activity i-j = Max[L.F . time of i-j – E.S. time of j-k, 0]
Thus interfering float of activity 0-1
= Max. [L.F. time of 0-1 – E.S. time of 1-2 or 1-3 , 0 ] = Max. [2 -2 , 0]= 0,
Interfering float of activity 1-2 = Max. [L.F. time of 1-2 – E.S. time of 2-4 or 2-5 , 0]
= Max. [16 -10,0] = 6 , etc
More conveniently , interfering float of an activity = T.F. – F.F.
Thus , interfering float of activity 2-5 = 12-0=12 , etc.
Alternating , interfering float of an activity 2-5 = 25 -13=12, etc.
Interfering floats of various activities are calculated in column 10 of table 7.8.
Example7.4: A PERT network is shown if fig 1.4. The activity times in days are given along the
arrows. The scheduled times for some important events are given along the nodes. Determine
the critical path and probabilities of meeting the scheduled dates for the specified events.
Tabulate the result and determine slack for each event.
Fig(7.4)
32
Solution: Table 7.9
Activity 2
t0 tm tp te
1-2 2 4 12 5.00 2.78
1-3 2 4 25 7.17 14.69
2-1 1 1 5 84.83 1.36
3-4 1 3 6 3.17 0.69
3-5 1 4 9 4.33 1.78
3-6 2 5 12 5.67 2.78
3-7 2 3 5 3.17 0.25
4-8 5 6 14 7.17 2.25
5-2 3 6 9 6.00 1.00
6-9 4 6 10 6.33 1.00
7-10 4 5 7 5.17 0.25
8-11 2 4 6 4.00 0.44
9-12 1 2 4 2.17 0.25
10-12 1 4 8 4.17 1.36
11-12 3 4 11 5.00 1.78
The arrow diagram for the given data is shown in fig 7.4. The expected activity times are shown
along the arrows. The earliest and latest occurrence times as well as the slack of the event are
also written along the nodes.
Fig(7.5)
33
Table 7.10 represent the network analysis . Floats for the activities in question are
calculated in the last column. Critical path is 1-3-4-8-11-12 and the project completion
is 26.51 days:
Table 7.10
Activity Duration Start Time Finish time Total
Earliest Latest Earliest float
Latest
1-2 5.00 0 11.68 5.00 16.68 11.68
1-3 7.17 0 0 7.17 7.17 0
2-11 4.83 5.00 16.68 9.83 21.51 11.68
3-4 3.17 7.17 7.17 10.34 10.34 0
3-5 4.33 7.17 16.18 11.50 20.51 9.01
3-6 5.67 7.17 12.33 12.84 18.00 5.16
3-7 3.17 7.17 14.00 10.34 17.17 6.83
4-8 7.17 10.34 10.34 17.51 17.51 0
5-12 6.00 11.50 20.51 17.50 26.51 9.01
6-9 6.33 12.84 18.01 19.17 24.34 5.17
7-10 5.17 10.34 17.17 15.51 22.34 6.83
8-11 4.00 17.51 17.51 21.51 21.51 0
9-12 2.17 19.17 24.34 21.34 26.51 5.17
10-12 4.17 15.51 22.34 19.68 26.51 6.83
11-12 5.00 21.51 21.51 26.51 26.51 0
Probability of completing the project in the scheduled completion time of 24 days (since
Ts(12)=24):
Z= 4 -7.17 = -0.8271
34
Ts = 12, Ts =12
E=11.50 L= 20.51.
Z = 12 – 11.50 = 0.123 Z = 12 – 20.51 = -2.1
Example7.5: In the PERT network shown in fig 7.6 , the activity time estimates(in
weeks) are given along the arrows. If the scheduled completion time is 23 weeks,
calculate the latest possible occurrence times of the events. Calculate the slack for each
event and identify the critical path. What is the probability that project will be
completed on the scheduled date ?.
Fig(7.6)
Sol: The expected time of the activities and their variances are computed below.
Activity 2
t0 tm tp te
1-2 3 3 3 3 0
2-3 3 6 9 6 1
2-4 2 4 6 4 4/9
3-5 4 6 8 6 4/9
4-6 4 6 8 6 4/9
5-6 0 0 0 0 0
5-7 3 4 5 4 1/9
6-7 2 5 8 5 1
Table7.11
The earliest occurrence times of the events have been computed on the network of fig
7.6 , taking the earliest time of event 1 as zero. The earliest occurrence time of event 7
is 20. But the scheduled completion time of the project is 23 weeks and hence the latest
occurrence times of the events have been computed taking L(7)=23. Slacks for the event
have been shown along the nodes. Path 1-2-3-5-6-7 is the critical path.
35
Fig(7.7)
Z=1.92.
Probability = 97.26%
Example 7.6: The following table gives data on normal time and cost and crash time
and cost for a project.
Activity Normal Crash
Time (days) Time(Days) Cost
Cost(Rs.) (Rs.)
1-2 6 60 4 100
1-3 4 60 2 200
2-4 5 50 3 150
2-5 3 45 1 65
3-4 6 90 4 200
4-6 8 80 4 300
5-6 4 40 2 100
6-7 3 45 2 80
470
36
The indirect cost per day is Rs .10.
(i). Draw the network for project.
(ii). Find the critical path.
(iii). Determine minimum total time and corresponding cost.
Solution: First the cost slope for each activity and normal direct cost of the project is
calculated. This is shown in the table below.
(i). Next, the network is draw and critical path is determined. This is shown in fig 1.8.
Fig(7.8)
37
References:
[1]. Trietsch, D., & Baker, K. R. (2012). PERT 21: Fitting PERT/CPM for use in the 21st
century. International Journal of Project Management, 30(4), 490–502.
http://doi.org/10.1016/j.ijproman.2011.09.004
[2]. Moder, J. J., Phillips, C. R., & Davis, E. W. (1983). Project Management with CPM,
PERT and Precedence Diagramming. New York. http://doi.org/10.1016/0016-
0032(65)90247-4
[3]. Lu, M., & AbouRizk, S. M. (2000). Simplified CPM/PERT simulation model. Journal of
Construction Engineering and Management, 126(3), 219–226.
http://doi.org/10.1061/(ASCE)0733-9364(2000)126:3(219)
[4]. Swanson, H. S., & Woolsey, R. E. D. (1974). A PERT-CPM tutorial. ACM SIGMAP
Bulletin. http://doi.org/10.1145/1217031.1217043
[5]. Omar, A. (2009). Uncertainty in Project Scheduling--Its Use in PERT/CPM Conventional
Techniques. Cost Engineering, 51(7), 30–34. Retrieved from
http://search.ebscohost.com.ezproxy.liv.ac.uk/login.aspx?direct=true&db=bth&AN=4445
1682&site=eds-live&scope=site
[6]. Mazlum, M., & Güneri, A. F. (2015). CPM, PERT and Project Management with Fuzzy
Logic Technique and Implementation on a Business. Procedia - Social and Behavioral
Sciences, 210, 348–357. http://doi.org/10.1016/j.sbspro.2015.11.378
[7]. Quezado, P. C. A. M., Cardoso, C. R. de O., & Tubino, D. F. (1999). Programação E
Controle Da Produção Sob Encomenda Utilizando Pert / Cpm E Heurísticas. Enegep,
1999, 1–20. Retrieved from
http://www.abepro.org.br/biblioteca/ENEGEP1999_A0381.PDF
[8]. Trietsch, D. (2005). Why a Critical Path By Any Other Namewould Smell Less Sweet?
Towards a Holistic Approach to PERT/CPM. Project Management Journal, 36(1), 27–
36.
[9]. Assis Mota, A., Mota, L. T. M., & Morelato, A. (2007). Visualization of power system
restoration plans using CPM/PERT graphs. IEEE Transactions on Power Systems, 22(3),
1322–1329. http://doi.org/10.1109/TPWRS.2007.901118
[10]. Zhu, Z., & Heady, R. B. (1994). A Simplified Method of Evaluating PERT/CPM
Network Parameters. IEEE Transactions on Engineering Management, 41(4), 426–430.
http://doi.org/10.1109/17.364568
[11]. Novais, I. F., Jorge, E. M. de F., Junior, C. P. C., & Souza, D. T. (2011). Gerenciamento
De Projeto Otimista (Gpo): Um Método Que Integra Pert/Cpm À Ccpm. Revista de
Gestão E Projetos, 2(2), 150–165. http://doi.org/10.5585/gep.v2i2.25
[12]. Piñeiro Fernández, S. (1995). PERT y CPM: Programación y control de proyectos.
Cuadernos de Estudios Empresariales, (5), 271–292. Retrieved from
http://dialnet.unirioja.es/servlet/articulo?codigo=164224&info=resumen&idioma=SPA
[13]. Simmons, L. F. (2002). Project management-critical path method (CPM) and PERT
simulated with ProcessModel. Proceedings of the Winter Simulation Conference, 2,
1786–1788. http://doi.org/10.1109/WSC.2002.1166468
[14]. Haga, W. A., & Marold, K. A. (2004). A Simulation Approach to the PERT/CPM Time-
Cost Trade-Off Problem. Project Management Journal, 35(1), 31–37.
[15]. NAZARETH, M. M., MELLO, L. C. B. D. B., & CHAKOUR, P. R. (2015). ESTUDO
COMPARATIVO ENTRE PERT/CPM E CORRENTE CRÍTICA. XXXV Encontro
38
Nacional De Egenharia De Produção, 17. Retrieved from
http://www.abepro.org.br/publicacoes/index.asp?ano=2015&area=&pchave=ESTUDO+
COMPARATIVO+ENTRE+PERT%2FCPM+E+CORRENTE+CR%CDTICA&autor=
[16]. Rodrigues, A. G. (1999). SYDPIM integration of SD and PERT/CPM tools: Assessing
Fagan Analysis in a large-scale software project. The 17th International Conference of
the System Dynamics Society, (Forrester 1961), 1–13.
http://doi.org/10.1016/j.dss.2012.05.061
[17]. Davis, G. B. (1963). The Application of Network Techniques (PERT/CPM) to the
Planning and Control of an Audit. Journal of Accounting Research, 1(1), 96–101.
Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=6700824&site=ehost-
live&scope=site
[18]. Nazrul, M., Sharif, M., Draghichi Eugen, . (2012). Project Completion Probability After
Crashing Pert / Cpm Network. Management Of Sustainable Development, 4, 59–63.
[19]. Vanhoucke, M. (2012). The PERT/CPM Technique. Project Management with Dynamic
Scheduling, 11–35. http://doi.org/10.1007/978-3-642-25175-7
[20]. Dane, C. W., Gray, C. F., & Woodworth, B. M. (1979). FACTORS AFFECTING THE
SUCCESSFUL APPLICATION OF PERT/CPM SYSTEMS IN A GOVERNMENT
ORGANIZATION. Interfaces, 9(5), 94–98. http://doi.org/10.1287/inte.9.5.94
[21]. Schonberger, R. J. (1981). Why Projects Are “Always” Late: A Rationale Based on
Manual Simulation of a PERT/CPM Network. Interfaces, 11(5), 66–70.
http://doi.org/10.1287/inte.11.5.66
[22]. Luttman, R. J., Laffel, G. L., & Pearson, S. D. (1995). Using PERT/CPM (Program
Evaluation and Review Technique/Critical Path Method) to design and improve clinical
processes. Quality Management in Health Care, 3(2), 1–13. Retrieved from
http://ovidsp.ovid.com/ovidweb.cgi?T=JS&PAGE=reference&D=med3&NEWS=N&AN
=10141769
[23]. Omar, A. (2009). Uncertainty in Project Scheduling — Its Use in PERT / CPM
Conventional Techniques. Cost Engineering, 51(7), 30–35.
[24]. Marasović, J., & Marasović, T. (2006). CPM/ PERT project planning methods as E-
learning optional support. In SoftCOM 2006 - International Conference on Software,
Telecommunications andComputer Networks (pp. 352–356).
http://doi.org/10.1109/SOFTCOM.2006.329776
[25]. Koehler, A. B., & McClure, R. H. (1979). the Use of Arcs and Nodes for the
Determination of Critical Paths in Pert/Cpm Networks. Decision Sciences, 10(2), 329–
333. http://doi.org/10.1111/j.1540-5915.1979.tb00027.x
[26]. Bendicho Joven, J. (1991). Optimización de la productividad y minimización de holguras
en el PERT/CPM. Tierra Y Tecnología: Revista de Información Geológica. Retrieved
from
http://dialnet.unirioja.es/servlet/articulo?codigo=4040641&info=resumen&idioma=SPA
[27]. Araújo, T. R., Tarrento, G. E., Joaquim Junior, C. F., & Pierre, F. C. (2012). Utilização
Das Técnicas Pert-Cpm Para Redução Do Prazo De Entrega : Estudo De Caso Em Uma
Indústria Automobilística. Tekhne E Logos, 3(14), 13.
[28]. Esen, ., ndo du, . B., & irtilo lu, . S. (200 ). Plann ng a tour sm in ormat on
system by cpm-pert method and sampl ng or mun c pal t es. In 7th International
Scientific Conference on Modern Management of Mine Producing, Geology and
39
Environmental Protection, SGEM 2007. Retrieved from
http://www.scopus.com/inward/record.url?eid=2-s2.0-
84890291516&partnerID=tZOtx3y1
[29]. Woxvold, E. R. A. (1992). Extending MRP II hierarchical structures to PERT/CPM
networks. In Annual International Conference Proceedings - American Production and
Inventory Control Society (pp. 447–451). Retrieved from
https://www.scopus.com/inward/record.url?eid=2-s2.0-
0027012590&partnerID=40&md5=b3d2a29ef6ca4c9eff8b51e4f3a6b0f0
[30]. Rand, G. (2000). Critical chain: the theory of constraints applied to project management.
International Journal of Project Management, 18(3), 173–177.
http://doi.org/http://dx.doi.org/10.1016/S0263-7863(99)00019-8
[31]. Campbell, S. M. (1982). Critical Path Method. Appraisal Journal. Retrieved from
http://search.ebscohost.com.libaccess.hud.ac.uk/login.aspx?direct=true&db=bth&AN=53
63622&site=ehost-live
[32]. 张光发. (2011). 基于PERT与CPM的船舶分段建造计划协调与优化. 大 连 理 工 大 学
学 报.
[33]. Shtub, A. (1997). Project segmentation—a tool for project management. International
Journal of Project Management, 15(1), 15–19. http://doi.org/10.1016/S0263-
7863(96)00017-8
[34]. Abdallah, H., Emara, H. M., Dorrah, H. T., & Bahgat, A. (2009). Using Ant Colony
Optimization algorithm for solving project management problems. Expert Systems with
Applications, 36(6), 10004–10015. http://doi.org/10.1016/j.eswa.2008.12.064
[35]. Gregoriou, G., Kirytopoulos, K., & Kiriklidis, C. (2013). Project management
educational software (ProMES). Computer Applications in Engineering Education, 21(1),
46–59. http://doi.org/10.1002/cae.20450
[36]. Walker II, E. D. (2004). Introducing Project Management Concepts Using a Jewelry
Store Robbery. Decision Sciences Journal of Innovative Education, 2(1), 65–69.
http://doi.org/10.1111/j.0011-7315.2004.00020.x
[37]. Maria, C., & Miranda, G. De. (2003). Sistema de apoio a decisão para seleção de
atividades críticas no gerenciamento de projetos com avaliação multicritério. Review
Literature And Arts Of The Americas, 1–8.
[38]. Ragsdale, C. (1989). The current state of network simulation in project management
theory and practice. Omega, 17(1), 21–25. http://doi.org/10.1016/0305-0483(89)90016-9
[39]. Lewis, J. P. (2007). CHAPTER 6: Scheduling Project Work. In Fundamentals of Project
Management : Fundamentals of Project Management (pp. 69–80). Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=32725622&site=ehost-
live
[40]. Darmody, P. B. (2007). Henry L. Gantt and Frederick Taylor: The Pioneers of Scientific
Management. AACE International Transactions, 15.1–15.3. Retrieved from
http://ezproxy.lib.bbk.ac.uk/login?url=http://content.ebscohost.com/ContentServer.asp?T
=P&P=AN&K=25912748&S=R&D=buh&EbscoContent=dGJyMNLe80SeprQ4zdnyOL
Cmr0mep65SsKa4SLeWxWXS&ContentCustomer=dGJyMPGvrkiwqLFKuePfgeyxw2
DNydIA\nhttp://search.ebscohost.com/log
[41]. Steyn, H. (2001). Comparisons between and combinations of different approaches to
accelerate engineering projects. South African Journal of Industrial Engineering, 14(2),
63–74.
40
[42]. idd, J. B. (1991). Do today’s projects need power ul network planning tools?
International Journal of Production Research, 29(10), 1969. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=5782667&site=ehost-
live
[43]. Kuchta, D. (2001). Use of fuzzy numbers in project risk (criticality) assessment.
International Journal of Project Management, 19(5), 305–310.
http://doi.org/10.1016/S0263-7863(00)00022-3
[44]. Moder, J. J., & Rodgers, E. G. (1968). Judgment Estimates of the Moments of Pert Type
Distributions. Management Science, 15(2), B–76–B–83.
http://doi.org/10.1287/mnsc.15.2.B76
[45]. Alcaide, D., Chu, C., Kats, V., Levner, E., & Sierksma, G. (2007). Cyclic multiple-robot
scheduling with time-window constraints using a critical path approach. European
Journal of Operational Research, 177(1), 147–162.
http://doi.org/10.1016/j.ejor.2005.11.019
[46]. Riggs, L. S. (1989). Risk Management in CPM Networks. Computer-Aided Civil and
Infrastructure Engineering, 4(3), 229–235. http://doi.org/10.1111/j.1467-
8667.1989.tb00022.x
[47]. John, B., Vera, A., Matessa, M., Freed, M., & Remington, R. (2002). Automating CPM-
GOMS. In CHI ’02: Proceedings of the SIGCHI conference on Human factors in
computing systems (pp. 147–154).
http://doi.org/http://doi.acm.org/10.1145/503376.503404
[48]. Kastor, A., & Sirakoulis, K. (2009). The effectiveness of resource levelling tools for
Resource Constraint Project Scheduling Problem. International Journal of Project
Management, 27(5), 493–500. http://doi.org/10.1016/j.ijproman.2008.08.006
[49]. Lei, X. (2011). Assumption analysis and duration simulation of three-point estimate in
PERT technique. In 2011 International Conference on Computer and Management,
CAMAN 2011. http://doi.org/10.1109/CAMAN.2011.5778896
[50]. Galloway, P. D. (2006). Comparative study of university courses on critical-path method
scheduling. Journal of Construction Engineering and Management, 132(7), 712–722.
http://doi.org/10.1061/(ASCE)0733-9364(2006)132:7(712)
[51]. Trietsch, D. (2005). WHY A CRITICAL PATH BY ANY OTHER NAME WOULD
SMELL LESS SWEET? Project Management Journal, 36(1), 27–36. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=16605721&site=ehost-
live
[52]. Yang, J.-B. (2003). Applying the theory of constraints to construction scheduling.
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON
STRUCTURAL AND CONSTRUCTION ENGINEERING.
[53]. Trietsch, D., Mazmanyan, L., Gevorgyan, L., & Baker, K. R. (2012). Modeling activity
times by the Parkinson distribution with a lognormal core: Theory and validation.
European Journal of Operational Research, 216(2), 386–396.
http://doi.org/10.1016/j.ejor.2011.07.054
[54]. Levy, F. L., Thompson, G. L., & Weist, J. D. (1963). The ABCs of the CRITICAL PATH
Method. Harvard Business Review, 41(5), 98–108. Retrieved from
http://liverpool.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=tru
e&db=bth&AN=6770388&site=eds-live&scope=site
41
[55]. Elmaghraby, S. E. (1990). Project bidding under deterministic and probabilistic activity
durations. European Journal of Operational Research, 49(1), 14–34.
http://doi.org/10.1016/0377-2217(90)90117-T
[56]. Al Samman, T. A. S., & Al Brahemi, R. M. R. (2014). Fuzzy PERT for Project
Management. International Journal of Advances in Engineering and Technology, 7(4),
1150–1160. Retrieved from http://www.e-ijaet.org/media/4I22-
IJAET0722555_v7_iss4_1150-1160.pdf
[57]. Ahuja, V., & Thiruvengadam, V. (2004). Project scheduling and monitoring: current
research status. Construction Innovation, 4, 19–31.
http://doi.org/10.1191/1471417504ci064oa
[58]. Mehrotra, K., Chai, J., & Pillutla, S. (1996). A study of approximating the moments of
the job completion time in PERT networks. Journal of Operations Management, 14(3),
277–289. http://doi.org/10.1016/0272-6963(96)00002-2
[59]. Doskočil, R., & Doubravský, K. (2012). Implementation of the PERT Method in MS
Excel. In The 18th International Business Information Management Association
Conference (pp. 1262–1271).
[60]. Davis, E. W. (1975). PROJECT NETWORK SUMMARY MEASURES
CONSTRAINED-RESOURCE SCHEDULING. AIIE Trans.
http://doi.org/10.1080/05695557508974995
[61]. Schrage, L. (1972). Solving Resource-Constrained Network Problems by Implicit
Enumeration-Nonpreemptive Case. Operations Research, 20(3), 668–677.
http://doi.org/10.1287/opre.20.3.668
[62]. Pohl, J., & Chapman, A. (1987). Probabilistic project management. Building and
Environment, 22(3), 209–214. http://doi.org/10.1016/0360-1323(87)90009-6
[63]. utierrez, . J., & ouvelis, P. (1991). Parkinson’s Law and ts mplications or Project
Management. Management Science, 37(8), 990–1001.
http://doi.org/10.1287/mnsc.37.8.990
[64]. Blair, H., Marek, V., & Remmel, J. (2001). Spatial logic programming. Proceedings SCI.
Retrieved from http://www3.cs.uky.edu/~marek/papers.dir/02.dir/spatial1.pdf
[65]. Budd, C. S., & Cooper, M. (2004). A Project Management Approach to Increasing
Agency Margins. Journal of Promotion Management, 11(1), 29–49.
http://doi.org/10.1300/J057v11n01ñ03
[66]. Liu, J. (2012). Schedule Uncertainty Control: A Literature Review. Physics Procedia, 33,
1842–1848. http://doi.org/10.1016/j.phpro.2012.05.293
[67]. Monhor, D. (2011). A new probabilistic approach to the path criticality in stochastic
PERT. Central European Journal of Operations Research, 19(4), 615–633.
http://doi.org/10.1007/s10100-010-0151-x
[68]. Tache, F., & spăşoiu, C.-E. (2013). The Dynamic of Project Monitoring and Evaluation
Mechanisms within Modern Organizations. Review of International Comparative
Management, 14(4), 628–637.
[69]. Elmaghraby, S. E. E., Herroelen, W. S., & Leus, R. (2003). Note on the paper “resource-
constrained project management using enhanced theory o constraint” by Wei et al.
International Journal of Project Management, 21(4), 301–305.
http://doi.org/10.1016/S0263-7863(02)00085-6
42
[70]. Regnier, E. (2005). Hidden Assumptions in Project Management Tools. DRMI
Newsletter, (11), 1–4. Retrieved from
http://www.nps.edu/Academics/Centers/DRMI/docs/1jan05-newsletter.pdf
[71]. PhD, C. S. B., & PhD, M. C. (2008). A Project Management Approach to Increasing
Agency Margins. Journal of Promotion Management. Retrieved from
http://www.tandfonline.com/doi/abs/10.1300/J057v11n01_03
[72]. Bhaskaran, P. (1988). PROGRESS MONITORING FOR A HIGHWAY PROJECT
WITH CPM NETWORK PLAN. Indian Highways, 16(4), 43–52. Retrieved from
http://www.scopus.com/inward/record.url?eid=2-s2.0-
0023993605&partnerID=40&md5=e00344ddaa94fb7e66eaa725222101c7
[73]. Yang, J. (2007). How the Critical Chain Scheduling Method working for construction
projects. Cost Engineering, 49(4), 25–33. Retrieved from
http://140.126.6.125/new/Portals/6/Faculty/Jyh-Bin_Yang/PDF/CE-2007-1.pdf
[74]. Burgber, P. H. (1964). PERT AND THE AUDITOR. Accounting Review, 39(1), 103.
Retrieved from
http://w3.bgu.ac.il/lib/customproxy.php?url=http://search.ebscohost.com/login.aspx?direc
t=true&db=bth&AN=7106861&site=eds-
live&authtype=ip,uid&custid=s4309548&groupid=main&profile=eds
[75]. Simmons, L. F. (2002). PROJECT MANAGEMENT – CRITICAL PATH METHOD (
CPM ). Winter Simulation Conference, 1786–1788.
[76]. Fanli, M., Dalong, T., & Yuechao, W. (2006). Modeling of common organizational
structure for reconfigurable assembly system. In Proceedings of the World Congress on
Intelligent Control and Automation (WCICA) (Vol. 2, pp. 6738–6743).
http://doi.org/10.1109/WCICA.2006.1714388
[77]. Sueyoshi, T. (2000). Stochastic DEA for restructure strategy: an application to a Japanese
petroleum company. Omega, 28(4), 385–398. http://doi.org/10.1016/S0305-
0483(99)00069-9
[78]. Khamooshi, H., & Cioffi, D. F. (2013). Uncertainty in Task Duration and Cost Estimates:
Fusion of Probabilistic Forecasts and Deterministic Scheduling. Journal of Construction
Engineering and Management, 139(5), 488–497.
http://doi.org/10.1061/(ASCE)CO.1943-7862.0000616
[79]. A.a, S., & R.F.b, S. (2015). Developing a novel data envelopment analysis model to
determine prospective benchmarks of green supply chain in the presence of dual-role
factor. Benchmarking, 22(4), 711–730. http://doi.org/10.1108/BIJ-12-2012-0087
[80]. Shabani, A., & Farzipoor Saen, R. (2015). Developing a novel data envelopment analysis
model to determine prospective benchmarks of green supply chain in the presence of
dual-role factor. Benchmarking: An International Journal, 22(4), 711–730.
http://doi.org/10.1108/BIJ-12-2012-0087
[81]. Shabani, A., & Saen, R. F. (2015). Developing a novel data envelopment analysis model
to determine prospective benchmarks of green supply chain in the presence of dual-role
factor. Benchmarking, 22(4), 711–730. http://doi.org/10.1108/BIJ-12-2012-0087
[82]. Weiss, G. (1984). Stochastic bounds on distributions of optimal value functions with
applications to pert, network flows and reliability. Annals of Operations Research, 1(1),
59–65. http://doi.org/10.1007/BF01874452
[83]. Rhee, S.-H. (2004). A Dispatching Rule for Efficient Workflow. Concurrent
Engineering, 12(4), 305–318. http://doi.org/10.1177/1063293X04042471
43
[84]. Mota, A. A., Mota, L. T. M., & Morelato, A. (2004). Dynamic evaluation of
reenergization times during power systems restoration. In Transmission and Distribution
Conference and Exposition: Latin America, 2004 IEEE/PES (pp. 161–166).
http://doi.org/10.1109/TDC.2004.1432370
[85]. Elmaghraby, S. E. (1964). An Algebra for the Analysis of Generalized Activity
Networks. Management Science, 10 (3)(November 2015), 494–514. Retrieved from
http://www.jstor.org/stable/2627427
[86]. Lee, D., Asce, a M., Arditi, D., & Asce, M. (2006). in Stochastic Project Scheduling
Simulation. Journal of Construction Engineering and Management, 132(3), 268.
Retrieved from http://link.aip.org/link/?JCEMD4/132/268/1
[87]. Alzraiee, H., Zayed, T., & Moselhi, O. (2015). Dynamic planning of construction
activities using hybrid simulation. Automation in Construction, 49, 176–192.
http://doi.org/10.1016/j.autcon.2014.08.011
[88]. Arsham, H. (1993). Managing project activity-duration uncertainties. Omega, 21(1), 111–
122. http://doi.org/10.1016/0305-0483(93)90043-K
[89]. Yakhchali, S. H. (2011). A simple approach to project scheduling in networks with
stochastic durations. Proceedings of the World Congress on Engineering 2011, WCE
2011, 1, 560–565. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-
80755123057&partnerID=tZOtx3y1
[90]. Lee, D., & Arditi, D. (2006). Automated statistical analysis in Stochastic Project
Scheduling Simulation. Journal of Construction Engineering and Management, 132(3),
268–277. http://doi.org/10.1061/(ASCE)0733-9364(2006)132:3(268)
[91]. Mota, C. M. de M., de Almeida, A. T., & Alencar, L. H. (2009). A multiple criteria
decision model for assigning priorities to activities in project management. International
Journal of Project Management, 27(2), 175–181.
http://doi.org/10.1016/j.ijproman.2008.08.005
[92]. Maravas, A., & Pantouvakis, J. P. (2012). Project cash flow analysis in the presence of
uncertainty in activity duration and cost. International Journal of Project Management,
30(3), 374–384. http://doi.org/10.1016/j.ijproman.2011.08.005
[93]. Walter, J. G., Christine, S., & Martin, T. (2000). Crashing of stochastic processes by
sampling and optimisation. Business Process Management Journal, 6(1), 65.
http://doi.org/10.1108/14637150010313357
[94]. Ock, J. H., & Han, S. H. (2010). Measuring Risk-associated Activity’s Duration: A Fuzzy
Set Theory Application. KSCE Journal of Civil Engineering, 14(5), 663–671.
http://doi.org/10.1007/s12205-010-1003-x
[95]. Weaver, P. (2008). A Brief History of Scheduling - Back to the Future –. PM World
Today, X(II), 1–18.
[96]. Gong, D., & Rowings, J. E. (1995). Calculation of safe float use in risk-analysis-oriented
network scheduling. International Journal of Project Management, 13(3), 187–194.
http://doi.org/10.1016/0263-7863(94)00004-V
[97]. Chanas, S., & Zieliński, P. (2001). Critical path analysis in the network with uzzy
activity times. Fuzzy Sets and Systems, 122(03), 195–204. http://doi.org/10.1016/S0165-
0114(00)00076-2
[98]. Sinason, D. H., McEldowney, J. E., & Pinello, A. S. (2002). Improving audit planning
and control with project management techniques. Internal Auditing, 17(6), 12–16.
Retrieved from
44
http://pl8cg5fc8w.search.serialssolutions.com.ezproxy1.lib.asu.edu/?ctx_ver=Z39.88-
2004&ctx_enc=info:ofi/enc:UTF-
8&rfr_id=info:sid/ProQ%253Aabiglobal&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.
genre=article&rft.jtitle=Internal+Auditing&rft.atitle=Improv
[99]. Bako, A. (1976). All paths in an activity network. Mathematische Operationsforschung
Und Statistik, 7, 851–858.
[100]. Birrell, G. S. (1980). Construction Planning\= Beyond the Critical Path. Journal Of The
Construction Division Asce, 106(3), 389–407. Retrieved from
http://cedb.asce.org/cgi/WWWdisplay.cgi?5015684
[101]. Vazsonyi, A. (19 0). L’Histoire de randeur et de la Décadence de la Méthode PERT.
Management Science, 16(8), B–449 – B–455. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=7111513&site=ehost-
live
[102]. Vanhoucke, M. (2012). Project Management with Dynamic Scheduling. Project
Management with Dynamic Scheduling, 11–36. http://doi.org/10.1007/978-3-642-25175-
7
[103]. Morris, P. W. G. (2013). Systems Project Management. Reconstructing Project
Management, 27–51. http://doi.org/10.1002/9781118536698.ch3
[104]. André, P., Vanhoucke, M., & Salvaterra, F. (201 ). introdução duração agregada.
Mundo Project Management, 62, 56–65.
[105]. Mahdi, I. M. (2004). A new LSM approach for planning repetitive housing projects.
International Journal of Project Management, 22(4), 339–346.
http://doi.org/10.1016/S0263-7863(03)00071-1
[106]. Ragsdale, C. (1989). The current state of network simulation in project management
theory and practice. International Journal of Management Science, 17(1), 21–25.
[107]. Wei, C.-C., Liu, P.-H., & Tsai, Y.-C. (2002). Resource-constrained project management
using enhanced theory of constraint. International Journal of Project Management,
20(7), 561–567. http://doi.org/10.1016/S0263-7863(01)00063-1
[108]. Benitez Codas, M. M. (1987). Development of project management in Brazil - a
historical overview. International Journal of Project Management, 5(3), 144–148.
http://doi.org/10.1016/0263-7863(87)90018-4
[109]. Yassine, A. (2004). An Introduction to Modeling and Analyzing Complex Product
Development Processes Using the Design Structure Matrix ( DSM ) Method. Urbana, 1–
17. Retrieved from http://ie406.cankaya.edu.tr/uploads/files/Modeling and Analyzing
Complex Product Development Processes Using the Design Structure Matrix.pdf
[110]. Taylor, J. (2006). CHAPTER 6: Network Analysis. Survival Guide for Project Managers,
91–113.
[111]. Tax??n, L., & Lilliesk??ld, J. (2008). Images as action instruments in complex projects.
International Journal of Project Management, 26(5), 527–536.
http://doi.org/10.1016/j.ijproman.2008.05.009
[112]. Bonett, D. G., & Deckro, R. F. (1993). A multinomial project evaluation and review
technique for information systems analysis and design. Information & Management,
25(1), 51–55. http://doi.org/10.1016/0378-7206(93)90025-O
[113]. Birrell, G. S. (1980). Construction Planning—Beyond the Critical Path. Journal of the
Construction Division, 106(3), 389–407. Retrieved from
http://cedb.asce.org/cgi/WWWdisplay.cgi?9725
45
[114]. Elazouni, A. M., & Gab-Allah, A. a. (2004). Finance-Based Scheduling of Construction
Projects Using Integer Programming. Journal of Construction Engineering and
Management, 130(1), 15–24. http://doi.org/10.1061/(ASCE)0733-9364(2004)130:1(15)
[115]. Vanhoucke, M., & Demeulemeester, E. (2003). The application of project scheduling
techniques in a real-life environment. Project Management Journal, 34, 30–42.
[116]. Shou, Y., & Yeo, K. T. (2000). Estimation of project buffers in critical chain project
management. In Proceedings of the 2000 IEEE International Conference on Management
of Innovation and Technology: (Vol. 1, pp. 162–167).
http://doi.org/10.1109/ICMIT.2000.917313
[117]. Basu, A., & Blanning, R. W. (2001). Workflow Analysis Using Attributed Metagraphs.
Proceedings of the 34th Hawaii International Conference on System Sciences, 00(c), 1–9.
http://doi.org/10.1109/HICSS.2001.927235
[118]. Weaver, P. (2006). A brief history of scheduling. myPrimavera Conference. Retrieved
from http://www.mosaicprojects.com.au/Planning.html
[119]. Bowman, R. A. (1994). Stochastic gradient-based time-cost tradeoffs in PERT networks
using simulation. Annals of Operations Research, 53(1), 533–551.
http://doi.org/10.1007/BF02136842
[120]. Tan, W., Jiang, C., Li, L., & Lv, Z. (2008). Role-oriented process-driven enterprise
cooperative work using the combined rule scheduling strategies. Information Systems
Frontiers, 10(5), 519–529. http://doi.org/10.1007/s10796-008-9107-2
[121]. Esogbue, A. O., & Marks, B. R. (1977). DYNAMIC PROGRAMMING MODELS OF
THE NONSERIAL CRITICAL PATH-COST PROBLEM. Management Science, 24(2),
200–209. http://doi.org/10.1287/mnsc.24.2.200
[122]. Yakhchali, S. H., & Ghodsypour, S. H. (2010). Computing latest starting times of
activities in interval-valued networks with minimal time lags. European Journal of
Operational Research, 200(3), 874–880. http://doi.org/10.1016/j.ejor.2009.01.051
[123]. Gras, N. S. B. (1917). Work, wages, and profits. Journal of Applied Psychology (Vol. 1).
http://doi.org/10.1037/h0064346
[124]. MacLeod, K. R., & Petersen, P. F. (1996). Estimating the tradeoff between resource
allocation and probability of on-time completion in project management. Project
Management Journal, 27(1), 26. Retrieved from
http://search.proquest.com/docview/218776691?accountid=10297\nhttp://sfx.cranfield.ac
.uk/cranfield?url_ver=Z39.88-
2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&genre=article&sid=ProQ:ProQ%3Aabi
global&atitle=Estimating+the+tradeoff+between+resource+allocati
[125]. Senthilkumar, V., Varghese, K., & Chandran, A. (2010). A web-based system for design
interface management of construction projects. Automation in Construction, 19(2), 197–
212. http://doi.org/10.1016/j.autcon.2009.10.007
[126]. Kassem, M., Dawood, N., & Chavada, R. (2015). Construction workspace management
within an Industry Foundation Class-Compliant 4D tool. Automation in Construction, 52,
42–58. http://doi.org/10.1016/j.autcon.2015.02.008
[127]. Demeulemeester, E., & Herroelen, W. (1992). A Branch-and-Bound Procedure for the
Multiple Resource-Constrained Project Scheduling Problem. Management Science,
38(12), 1803–1818. http://doi.org/doi:10.1287/mnsc.38.12.1803
[128]. Brown, K. A., & Lee Hyer, N. (2002). Whole-brain thinking for project management.
Business Horizons, 45(3), 47–57. http://doi.org/10.1016/S0007-6813(02)00202-1
46
[129]. Matthews, M. D. (1986). Networking and information management: Its use by the project
planning function. Information and Management, 10(1), 1–9.
http://doi.org/10.1016/0378-7206(86)90056-X
[130]. Wu, Y., Zhuang, X. C., Song, G. H., Xu, X. D., & Li, C. X. (2009). Solving resource-
constrained multiple project scheduling problem using timed colored Petri nets. Journal
of Shanghai Jiaotong University (Science), 14(6), 713–719.
http://doi.org/10.1007/s12204-009-0713-z
[131]. Martinez, J. C., & Knoke, J. R. (1996). Using CPM-chart animation to illustrate the
evolution of schedules. Computing in Civil Engineering (New York), 627–633. Retrieved
from http://www.scopus.com/inward/record.url?eid=2-s2.0-
0029716777&partnerID=40&md5=b5a938f69ae1d9193da1cf4645b32cd7
[132]. Shi, J. J., & Deng, Z. (2000). Object-oriented resource-based planning method (ORPM)
for construction. International Journal of Project Management, 18(3), 179–188.
http://doi.org/10.1016/S0263-7863(99)00013-7
[133]. Chang, T. C., & William Ibbs, C. (1990). Priority ranking-a fuzzy expert system for
priority decision making in building construction resource scheduling. Building and
Environment, 25(3), 253–267. http://doi.org/10.1016/0360-1323(90)90051-R
[134]. Isha Sharma, & Suri, D. P. K. (2011). Schedule Risk Analysis Simulator using Beta
Distribution. International Journal on Computer Science and Engineering, 3(6), 2408–
2414.
[135]. Sánchez-Algarra, P., & Anguera-Argilaga, M. T. (2005). Time management in the cost
evaluation of limited resource programs. Quality and Quantity.
http://doi.org/10.1007/s11135-004-2979-4
[136]. Min, Y., & Shou-Rong, L. (2013). Influence of behavioral factors on project schedule
management: A Monte Carlo method. In 2013 25th Chinese Control and Decision
Conference, CCDC 2013 (pp. 4831–4835). http://doi.org/10.1109/CCDC.2013.6561809
[137]. Dobrilovic, D., Jevtic, V., & Stojanov, J. (2011). Application of modified shortest path
algorithm for project duration assessment. In SACI 2011 - 6th IEEE International
Symposium on Applied Computational Intelligence and Informatics, Proceedings (pp.
495–498). http://doi.org/10.1109/SACI.2011.5873054
[138]. Ash, R. C. (1999). Activity scheduling in the dynamic, multi-project setting:
choosing\nheuristics through deterministic simulation. WSC’99. 1999 Winter Simulation
Conference Proceedings. “Simulation - A Bridge to the Future” (Cat. No.99CH37038),
2(Id), 937–941. http://doi.org/10.1109/WSC.1999.816802
[139]. Frizelle, G. D. M. (1993). Model for maximizing the return on capital projects under
timing uncertainty. International Journal of Project Management, 11(1), 39–47.
http://doi.org/10.1016/0263-7863(93)90008-B
[140]. SUBULAN, K., SALTABAS, A., TASAN, A. S., & GIRGIN, S. C. (2011). MODELING
AND ANALYZING OF A CONSTRUCTION PROJECT CONSIDERING RESOURCE
ALLOCATION THROUGH A HYBRID METHODOLOGY: PETRI NETS AND
FUZZY RULE BASED SYSTEMS. In Proceedings of the 41st International Conference
on Computers & Industrial Engineering (pp. 1045–1050). Retrieved from
http://www.usc.edu/dept/ise/caie/Checked\nPapers\n[ruhi\n12th\nsept]/word\nformat\npa
pers/REGISTRATION\nPAID\nPAPERS\nFOR\nPROCEEDINGS/pdf/335\n17\nMOD
ELING\nAND\nANALYZING\nOF\nA\nCONSTRUCTION.pdf
47
[141]. Lee, D.-E., Bae, T.-H., & Arditi, D. (2011). Advanced Stochastic Schedule Simulation
System. Civil Engineering and Environmental Systems, 29(1), 1–18.
http://doi.org/10.1080/10286608.2011.637623
[142]. Siu, M. F. F., Lu, M., & Abourizk, S. (2015). Bi-level project simulation methodology to
integrate superintendent and project manager in decision making: Shutdown/turnaround
applications. In Proceedings - Winter Simulation Conference (Vol. 2015-January, pp.
3353–3364). http://doi.org/10.1109/WSC.2014.7020169
[143]. Bonett, D. G., & Deckro, R. F. (1993). A MULTINOMIAL PROJECT EVALUATION
AND REVIEW TECHNIQUE FOR INFORMATION-SYSTEMS ANALYSIS AND
DESIGN. Information & Management, 25(1), 51–55. Retrieved from <Go to
ISI>://A1993LK92000005
[144]. Simpson, W. P., & Patterson, J. H. (1996). A multiple-tree search procedure for the
resource-constrained project scheduling problem. European Journal of Operational
Research, 89(3), 525–542. http://doi.org/10.1016/0377-2217(94)00247-9
[145]. Samanta, D., & Tripathy, D. P. (2004). Project planning and scheduling using Pronet.
Journal of Mines, Metals and Fuels, 52(5-6), 73–77.
[146]. Bonett, D. G., & Deckro, R. F. (1993). A multinomial project evaluation and review
technique for information systems analysis and design. Information and Management,
25(1), 51–55. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-
50749132201&partnerID=40&md5=7bacdc34e6f2645b4e5f48b49ea58917
[147]. Vanhoucke, M. (2007). Work continuity optimization for the Westerscheldetunnel project
in the Netherlands. Tijdschrift Voor Economie En Management, 52, 435–449. Retrieved
from http://hdl.handle.net/1854/LU-419379
[148]. Yassine, A. a. (2004). An Introduction to Modeling and Analyzing Complex Product
Development Processes Using the Design Structure Matrix ( DSM ) Method. Quaderni
Di Management (Italian Management Review), (9), 1–17.
[149]. Taylor III, B. W., & Moore, L. J. (1980). R & D PROJECT PLANNING WITH Q-GERT
NETWORK MODELING AND SIMULATION. Management Science, 26(1), 44–59.
Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=7357823&site=ehost-
live
[150]. Corder, S., & Ruby Jr., R. (1993). Microcomputer-based software alternatives for project
management. Journal of Education for Business, 69(1), 56. Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=9310297632&site=eh
ost-live
48
View publication stats