Documente Academic
Documente Profesional
Documente Cultură
discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/274888892
CITATION
READS
65
1 AUTHOR:
Ramesh Kannan
VIT University
11 PUBLICATIONS 6 CITATIONS
SEE PROFILE
165
Chapter 9
ABSTRACT
This chapter focuses primarily on Graphical Evaluation and Review Technique (GERT), one of the
intriguing techniques used for network-based management. It is a stochastic network technique and
has many advantages over the conventional Critical Path Method (CPM) and Programme Evaluation
and Review Techniques used for project management. The formulation of the GERT network for linear
situation can be development by analytical techniques (such as signal flow graph theory); thus for a
non-linear and other complex conditions, the Q-GERT (included Queueing Concepts) is used. To reinforce the importance of GERT and Q-GERT, a firm study is carried out on the limitations of the CPM
and PERT. Thus, a solid comparison of GERT network with the CPM and PERT network is done not
only to emphasize the applicability of the network but also to validate of the network. The scheduling of
concrete formwork systems are considered for the comparison.
DOI: 10.4018/978-1-4666-4940-8.ch009
Copyright 2014, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
INTRODUCTION
166
The Critical Path Method (CPM) was first developed by Morgan R. Walker of the Engineering Services Division of DuPont and James E.
Kelly Jr. of Remington Rand in 1957 (Baboulene,
1970). Later was developed considering not only
the logical dependencies between the activities
but also the inclusion of resource related to each
activity. CPM is generally regarded as the activity
oriented networks.
The CPM includes categorization of all activities in the project known as work breakdown
structure by a technique called arrow diagramming
(Martino, 1970), determination of duration of
the activities, determination of critical activities
(activities having maximum duration) and the
formulation of Critical Path (path associated
with the critical activities) in otherwords the path
associated with the longer duration as shown in
Figure 1. Ultimately the network is modeled as a
linear relationship between cost and time.
The most important thing to be considered in
the CPM is that it is can be applied only to the
activities associated with the deterministic durations (Baboulene, 1970). The CPM can be used
to obtain feasible solution for the Least-cost
scheduling. However, CPM accounts only for the
determination of the earliest completion time but
not probable completion time of the project.
Activity-on-arrow technique used to compute
CPM was still in use however the Activity-on-node
is mostly preferred as shown in Figure 2.
The CPM is very effective but suffers seriously on the fact that it requires deterministic
time, however the project durations cannot be
altered or incase of any delay in the project, it is
highly difficult to resolve or retrieve the activities
and sometimes it would even lead to the collapse
of entire network.
13 more pages are available in the full version of this document, which may
be purchased using the "Add to Cart" button on the product's webpage:
www.igi-global.com/chapter/graphical-evaluation-and-review-techniquegert/99457?camid=4v1
Related Content
An Alternative Framework for Research on Situational Awareness in Computer Network Defense
Eric McMillan and Michael Tyworth (2012). Situational Awareness in Computer Network Defense:
Principles, Methods and Applications (pp. 71-85).
www.igi-global.com/chapter/alternative-framework-research-situationalawareness/62376?camid=4v1a
IT Security Policy in Public Organizations
Parviz Partow-Navid and Ludwig Slusky (2008). Information Security and Ethics: Concepts, Methodologies,
Tools, and Applications (pp. 2745-2754).
www.igi-global.com/chapter/security-policy-public-organizations/23253?camid=4v1a
Understanding User Behavior towards Passwords through Acceptance and Use Modelling
Lee Novakovic, Tanya McGill and Michael Dixon (2009). International Journal of Information Security and
Privacy (pp. 11-29).
www.igi-global.com/article/understanding-user-behavior-towards-passwords/3999?camid=4v1a
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids
Syed Naqvi (2008). International Journal of Information Security and Privacy (pp. 54-79).
www.igi-global.com/article/vipsec-virtualized-pluggable-security-services/2476?camid=4v1a