Sunteți pe pagina 1din 4

See

discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/274888892

Graphical Evaluation and Review Technique


(GERT): The Panorama in the Computation and
Visualization of Network-Based Project
Management
CHAPTER JANUARY 2014
DOI: 10.4018/978-1-4666-4940-8.ch009

CITATION

READS

65

1 AUTHOR:
Ramesh Kannan
VIT University
11 PUBLICATIONS 6 CITATIONS
SEE PROFILE

Available from: Ramesh Kannan


Retrieved on: 02 January 2016

165

Chapter 9

Graphical Evaluation and


Review Technique (GERT):
The Panorama in the Computation
and Visualization of NetworkBased Project Management
Ramesh Kannan
VIT Chennai, India

ABSTRACT
This chapter focuses primarily on Graphical Evaluation and Review Technique (GERT), one of the
intriguing techniques used for network-based management. It is a stochastic network technique and
has many advantages over the conventional Critical Path Method (CPM) and Programme Evaluation
and Review Techniques used for project management. The formulation of the GERT network for linear
situation can be development by analytical techniques (such as signal flow graph theory); thus for a
non-linear and other complex conditions, the Q-GERT (included Queueing Concepts) is used. To reinforce the importance of GERT and Q-GERT, a firm study is carried out on the limitations of the CPM
and PERT. Thus, a solid comparison of GERT network with the CPM and PERT network is done not
only to emphasize the applicability of the network but also to validate of the network. The scheduling of
concrete formwork systems are considered for the comparison.

DOI: 10.4018/978-1-4666-4940-8.ch009

Copyright 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

Graphical Evaluation and Review Technique (GERT)

INTRODUCTION

PROJECT NETWORK TECHNIQUES

The representation of activities in a project in


the form of network is one of the most important
and simplest techniques adapted in the project
management. The reasons for the adaptation of
network-based project management are

Critical Path Method (CPM)

it can be used to model complex project by


fragmenting into simpler network of interrelated activities of the entire systems,
the computation of the project attributes
requires minimum time and are highly
reliable,
it serves as a better communication aid
among different project associates involved
in the project,
above all it is the best method of data visualisation and specifying data requirement
for the modelling, analysis and design of
multifarious projects.

The network-based project management has


wide range of applications includes Industrial Engineering, production and manufacturing, contract
management, construction project management,
operation research, software project management
and so on (Pristker, 1977). The most popular and
commonly used techniques in the network-based
project management are Critical Path Method
(CPM) and Programme Evaluation and Review
Technique (PERT). However these techniques
have inherent drawbacks that the results obtained
are not highly reliable and thus an intriguing
technique which incorporates the human-factor
(Pristker, 1977) into consideration is needed.
One such network technique is the Graphical
Evaluation and Review Technique (GERT). This
chapter illustrates the advantages of GERT over
CPM and PERT. The GERT technique is applied
to the scheduling of concrete formwork systems
to reinforce the importance of GERT over other
project network techniques.

166

The Critical Path Method (CPM) was first developed by Morgan R. Walker of the Engineering Services Division of DuPont and James E.
Kelly Jr. of Remington Rand in 1957 (Baboulene,
1970). Later was developed considering not only
the logical dependencies between the activities
but also the inclusion of resource related to each
activity. CPM is generally regarded as the activity
oriented networks.
The CPM includes categorization of all activities in the project known as work breakdown
structure by a technique called arrow diagramming
(Martino, 1970), determination of duration of
the activities, determination of critical activities
(activities having maximum duration) and the
formulation of Critical Path (path associated
with the critical activities) in otherwords the path
associated with the longer duration as shown in
Figure 1. Ultimately the network is modeled as a
linear relationship between cost and time.
The most important thing to be considered in
the CPM is that it is can be applied only to the
activities associated with the deterministic durations (Baboulene, 1970). The CPM can be used
to obtain feasible solution for the Least-cost
scheduling. However, CPM accounts only for the
determination of the earliest completion time but
not probable completion time of the project.
Activity-on-arrow technique used to compute
CPM was still in use however the Activity-on-node
is mostly preferred as shown in Figure 2.
The CPM is very effective but suffers seriously on the fact that it requires deterministic
time, however the project durations cannot be
altered or incase of any delay in the project, it is
highly difficult to resolve or retrieve the activities
and sometimes it would even lead to the collapse
of entire network.

13 more pages are available in the full version of this document, which may
be purchased using the "Add to Cart" button on the product's webpage:
www.igi-global.com/chapter/graphical-evaluation-and-review-techniquegert/99457?camid=4v1

This title is available in InfoSci-Books, InfoSci-Security and Forensics,


Science, Engineering, and Information Technology, Advances in Information
Security, Privacy, and Ethics, InfoSci-Select, InfoSci-Select. Recommend this
product to your librarian:
www.igi-global.com/e-resources/library-recommendation/?id=1

Related Content
An Alternative Framework for Research on Situational Awareness in Computer Network Defense
Eric McMillan and Michael Tyworth (2012). Situational Awareness in Computer Network Defense:
Principles, Methods and Applications (pp. 71-85).

www.igi-global.com/chapter/alternative-framework-research-situationalawareness/62376?camid=4v1a
IT Security Policy in Public Organizations
Parviz Partow-Navid and Ludwig Slusky (2008). Information Security and Ethics: Concepts, Methodologies,
Tools, and Applications (pp. 2745-2754).

www.igi-global.com/chapter/security-policy-public-organizations/23253?camid=4v1a
Understanding User Behavior towards Passwords through Acceptance and Use Modelling
Lee Novakovic, Tanya McGill and Michael Dixon (2009). International Journal of Information Security and
Privacy (pp. 11-29).

www.igi-global.com/article/understanding-user-behavior-towards-passwords/3999?camid=4v1a
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids
Syed Naqvi (2008). International Journal of Information Security and Privacy (pp. 54-79).

www.igi-global.com/article/vipsec-virtualized-pluggable-security-services/2476?camid=4v1a

S-ar putea să vă placă și