SlideShare a Scribd company logo
© Wiley 2010
Chapter 16 – Project
Management
Operations Management
by
R. Dan Reid & Nada R. Sanders
4th Edition © Wiley 2010
© Wiley 2010
Learning Objectives
 Describe project management objectives
 Describe the project life cycle
 Diagram networks of project activities
 Estimate the completion time of a project
 Compute the probability of completing a
project by a specific time
© Wiley 2010
Learning Objectives – con’t
 Determine how to reduce the length of a
project effectively
 Describe the critical chain approach to
project management
© Wiley 2010
Project Management
Applications
 What is a project?
 Any unique endeavor with specific objectives
 With multiple activities
 With defined precedent relationships
 With a specific time period for completion
 Examples?
 A major event like a wedding
 Any construction project
 Designing a political campaign
© Wiley 2010
Project Life Cycle
 Conception: identify the need
 Feasibility analysis or study: costs
benefits, and risks
 Planning: who, how long, what to do?
 Execution: doing the project
 Termination: ending the project
© Wiley 2010
Network Planning Techniques
 Program Evaluation & Review Technique (PERT):
 Developed to manage the Polaris missile project
 Many tasks pushed the boundaries of science &
engineering (tasks’ duration = probabilistic)
 Critical Path Method (CPM):
 Developed to coordinate maintenance projects in the
chemical industry
 A complex undertaking, but individual tasks are
routine (tasks’ duration = deterministic)
© Wiley 2010
Both PERT and CPM
 Graphically display the precedence
relationships & sequence of activities
 Estimate the project’s duration
 Identify critical activities that cannot be
delayed without delaying the project
 Estimate the amount of slack associated with
non-critical activities
© Wiley 2007
Network Diagrams
 Activity-on-Node (AON):
 Uses nodes to represent the activity
 Uses arrows to represent precedence relationships
© Wiley 2010
Step 1-Define the Project: Cables By Us is bringing a new
product on line to be manufactured in their current facility in
existing space. The owners have identified 11 activities and their
precedence relationships. Develop an AON for the project.
Activity Description
Immediate
Predecessor
Duration
(weeks)
A Develop product specifications None 4
B Design manufacturing process A 6
C Source & purchase materials A 3
D Source & purchase tooling & equipment B 6
E Receive & install tooling & equipment D 14
F Receive materials C 5
G Pilot production run E & F 2
H Evaluate product design G 2
I Evaluate process performance G 3
J Write documentation report H & I 4
K Transition to manufacturing J 2
© Wiley 2010
Step 2- Diagram the Network for
Cables By Us
© Wiley 2010
Step 3 (a)- Add Deterministic Time
Estimates and Connected Paths
© Wiley 2010
Step 3 (a) (Con’t): Calculate
the Project Completion Times
 The longest path (ABDEGIJK) limits the
project’s duration (project cannot finish in
less time than its longest path)
 ABDEGIJK is the project’s critical path
Paths Path duration
ABDEGHJK 40
ABDEGIJK 41
ACFGHJK 22
ACFGIJK 23
© Wiley 2010
Some Network Definitions
 All activities on the critical path have zero slack
 Slack defines how long non-critical activities can be
delayed without delaying the project
 Slack = the activity’s late finish minus its early finish
(or its late start minus its early start)
 Earliest Start (ES) = the earliest finish of the immediately
preceding activity
 Earliest Finish (EF) = is the ES plus the activity time
 Latest Start (LS) and Latest Finish (LF) = the latest an
activity can start (LS) or finish (LF) without delaying the
project completion
© Wiley 2010
ES, EF Network
© Wiley 2010
LS, LF Network
Calculating Slack
Activity
Late
Finish
Early
Finish
Slack
(weeks)
A 4 4 0
B 10 10 0
C 25 7 18
D 16 16 0
E 30 30 0
F 30 12 18
G 32 32 0
H 35 34 1
I 35 35 0
J 39 39 0
K 41 41 0
© Wiley 2010
Revisiting Cables By Us Using
Probabilistic Time Estimates
Activity Description
Optimistic
time
Most likely
time
Pessimistic
time
A Develop product specifications 2 4 6
B Design manufacturing process 3 7 10
C Source & purchase materials 2 3 5
D Source & purchase tooling & equipment 4 7 9
E Receive & install tooling & equipment 12 16 20
F Receive materials 2 5 8
G Pilot production run 2 2 2
H Evaluate product design 2 3 4
I Evaluate process performance 2 3 5
J Write documentation report 2 4 6
K Transition to manufacturing 2 2 2
Using Beta Probability Distribution to
Calculate Expected Time Durations
 A typical beta distribution is shown below, note that it
has definite end points
 The expected time for finishing each activity is a
weighted average
 
6
c
pessimisti
likely
most
4
optimistic
time
Exp.



© Wiley 2007
Calculating Expected Task Times
Activity
Optimistic
time
Most likely
time
Pessimistic
time
Expected
time
A 2 4 6 4
B 3 7 10 6.83
C 2 3 5 3.17
D 4 7 9 6.83
E 12 16 20 16
F 2 5 8 5
G 2 2 2 2
H 2 3 4 3
I 2 3 5 3.17
J 2 4 6 4
K 2 2 2 2
 
6
4 c
pessimisti
likely
most
optimistic
time
Expected



© Wiley 2010
Network Diagram with
Expected Activity Times
© Wiley 2010
Estimated Path Durations through
the Network
 ABDEGIJK is the expected critical path &
the project has an expected duration of
44.83 weeks
Activities on paths Expected duration
ABDEGHJK 44.66
ABDEGIJK 44.83
ACFGHJK 23.17
ACFGIJK 23.34
© Wiley 2010
Adding ES and EF to Network
© Wiley 2010
Gantt Chart Showing Each Activity
Finished at the Earliest Possible Start Date
© Wiley 2010
Adding LS and LF to Network
© Wiley 2010
Gantt Chart Showing the Latest Possible
Start Times if the Project Is to Be
Completed in 44.83 Weeks
© Wiley 2010
Estimating the Probability of
Completion Dates
 Using probabilistic time estimates offers the advantage of
predicting the probability of project completion dates
 We have already calculated the expected time for each activity by
making three time estimates
 Now we need to calculate the variance for each activity
 The variance of the beta probability distribution is:
 where p=pessimistic activity time estimate
o=optimistic activity time estimate
2
2
6
o
p
σ 




 

© Wiley 2007
Project Activity Variance
Activity Optimistic Most Likely Pessimistic Variance
A 2 4 6 0.44
B 3 7 10 1.36
C 2 3 5 0.25
D 4 7 9 0.69
E 12 16 20 1.78
F 2 5 8 1.00
G 2 2 2 0.00
H 2 3 4 0.11
I 2 3 5 0.25
J 2 4 6 0.44
K 2 2 2 0.00
© Wiley 2010
Variances of Each Path through
the Network
Path
Number
Activities on
Path
Path Variance
(weeks)
1 A,B,D,E,G,H,J,k 4.82
2 A,B,D,E,G,I,J,K 4.96
3 A,C,F,G,H,J,K 2.24
4 A,C,F,G,I,J,K 2.38
© Wiley 2010
Calculating the Probability of Completing
the Project in Less Than a Specified Time
 When you know:
 The expected completion time
 Its variance
 You can calculate the probability of completing the project
in “X” weeks with the following formula:
Where DT = the specified completion date
EFPath = the expected completion time of the path







 


 2
P
σ
EF
D
time
standard
path
time
expected
path
time
specified
z
P
T
path
of
variance
σ 2
Path 
© Wiley 2010
Example: Calculating the probability of
finishing the project in 48 weeks
 Use the z values in Appendix B to determine probabilities
 e.g. probability for path 1 is
Path
Number
Activities on Path Path Variance
(weeks)
z-value Probability of
Completion
1 A,B,D,E,G,H,J,k 4.82 1.5216 0.9357
2 A,B,D,E,G,I,J,K 4.96 1.4215 0.9222
3 A,C,F,G,H,J,K 2.24 16.5898 1.000
4 A,C,F,G,I,J,K 2.38 15.9847 1.000
1.52
4.82
weeks
44.66
weeks
48
z 







 

© Wiley 2010
Reducing Project Completion
Time
 Project completion times may need to
be shortened because:
 Different deadlines
 Penalty clauses
 Need to put resources on a new project
 Promised completion dates
 Reduced project completion time is
“crashing”
© Wiley 2010
Reducing Project Completion
Time – con’t
 Crashing a project needs to balance
 Shorten a project duration
 Cost to shorten the project duration
 Crashing a project requires you to know
 Crash time of each activity
 Crash cost of each activity
Crash cost/duration = (crash cost-normal cost)/(normal time – crash time)
© Wiley 2007
Reducing the Time of a Project (crashing)
Activity Normal
Time (wk)
Normal
Cost ($)
Crash
Time
Crash
Cost ($)
Max. weeks
of reduction
Reduce cost
per week
A 4 8,000 3 11,000 1 3,000
B 6 30,000 5 35,000 1 5,000
C 3 6,000 3 6,000 0 0
D 6 24,000 4 28,000 2 2,000
E 14 60,000 12 72,000 2 6,000
F 5 5,000 4 6,500 1 1500
G 2 6,000 2 6,000 0 0
H 2 4,000 2 4,000 0 0
I 3 4,000 2 5,000 1 1,000
J 4 4,000 2 6,400 2 1,200
K 2 5,000 2 5,000 0 0
© Wiley 2010
Crashing Example: Suppose the Cables By
Us project manager wants to reduce the new
product project from 41 to 36 weeks.
 Crashing Costs are considered to be linear
 Look to crash activities on the critical path
 Crash the least expensive activities on the critical
path first (based on cost per week)
 Crash activity I from 3 weeks to 2 weeks $1000
 Crash activity J from 4 weeks to 2 weeks $2400
 Crash activity D from 6 weeks to 4 weeks $4000
 Recommend Crash Cost $7400
 Question: Will crashing 5 weeks return more in
benefits than it costs?
© Wiley 2010
Crashed Network Diagram
© Wiley 2010
The Critical Chain Approach
 The Critical Chain Approach focuses on project due dates rather than on
individual activities and the following realities:
 Project time estimates are uncertain so we add safety time
 Multi-levels of organization may add additional time to be “safe”
 Individual activity buffers may be wasted on lower-priority activities
 A better approach is to place the project safety buffer at the end
Original critical path
Activity A Activity B Activity C Activity D Activity E
Critical path with project buffer
Activity A Activity B Activity C Activity D Activity E Project Buffer
© Wiley 2007
Adding Feeder Buffers to Critical Chains
 The theory of constraints, the basis for critical chains, focuses on
keeping bottlenecks busy.
 Time buffers can be put between bottlenecks in the critical path
 These feeder buffers protect the critical path from delays in non-
critical paths
© Wiley 2010
Project Management within
OM: How it all fits together
 Project management techniques provide a structure
for the project manager to track the progress of
different activities required to complete the project.
Particular concern is given to critical path (the
longest connected path through the project network)
activities.
 Any delay to a critical path activity affects the project
completion time. These techniques indicate the
expected completion time and cost of a project. The
project manager reviews this information to ensure
that adequate resources exist and that the expected
completion time is reasonable.
© Wiley 2010
Project Management OM
Across the Organization
 Accounting uses project management (PM)
information to provide a time line for major
expenditures
 Marketing use PM information to monitor the
progress to provide updates to the customer
 Information systems develop and maintain
software that supports projects
 Operations use PM to information to monitor
activity progress both on and off critical path
to manage resource requirements
© Wiley 2010
Chapter 16 Highlights
 A project is a unique, one time event of some duration
that consumes resources and is designed to achieve an
objective in a given time period.
 Each project goes through a five-phase life cycle: concept,
feasibility study, planning, execution, and termination.
 Two network planning techniques are PERT and CPM. Pert
uses probabilistic time estimates. CPM uses deterministic
time estimates.
 Pert and CPM determine the critical path of the project and
the estimated completion time. On large projects, software
programs are available to identify the critical path.
© Wiley 2010
Chapter 16 Highlights con’t
 Pert uses probabilistic time estimates to determine the
probability that a project will be done by a specific time.
 To reduce the length of the project (crashing), we need
to know the critical path of the project and the cost of
reducing individual activity times. Crashing activities that
are not on the critical path typically do not reduce
project completion time.
 The critical chain approach removes excess safety time
from individual activities and creates a project buffer at
the end of the critical path.
Homework Hints
 Problems 16.1-2: Use CPM deterministic
model (A). [10 points]
 Problems 16.4-8: Use CPM probabilistic
model (A). Use the AON diagram for 16.4.
[20 points]
 Problems 16.9-10: Use CPM deterministic
model (A). Crash the project one week at
a time—find the lowest cost task to reduce.
Watch for the creation of additional critical
paths. [10 points]

More Related Content

Similar to OPM101Chapter16_001 (2).ppt

Pertcpm projectmanagement-120628224438-phpapp02
Pertcpm projectmanagement-120628224438-phpapp02Pertcpm projectmanagement-120628224438-phpapp02
Pertcpm projectmanagement-120628224438-phpapp02
kongara
 
Project Management
Project Management Project Management
Project Management
Bilal Mustafa
 
Activity Diagram.pptx
Activity Diagram.pptxActivity Diagram.pptx
Activity Diagram.pptx
Dr.Sanaz Zolfaghar Tehrani
 
Pert & cpm project management
Pert & cpm   project managementPert & cpm   project management
Pert & cpm project management
Rahul Dubey
 
Pert cpm
Pert cpmPert cpm
Pert cpm
Ann vasquez
 
Pert cpm
Pert cpmPert cpm
Pert cpm
Ann vasquez
 
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docxSAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
rtodd599
 
Introduction to Project Management
Introduction to Project Management Introduction to Project Management
Introduction to Project Management
Joshua Miranda
 
C10 project management
C10 project managementC10 project management
C10 project management
hakimizaki
 
C10 project management
C10 project managementC10 project management
C10 project management
hakimizaki
 
Project Management & Engineering Economics
Project Management & Engineering EconomicsProject Management & Engineering Economics
Project Management & Engineering Economics
Deepak Paithankar
 
Chapter 6 project management
Chapter 6 project managementChapter 6 project management
Chapter 6 project management
Shadina Shah
 
Project Management.pptx
Project Management.pptxProject Management.pptx
Project Management.pptx
GerardoPerezGallardo
 
Cpm n pert lecture 1
Cpm n pert lecture 1Cpm n pert lecture 1
Cpm n pert lecture 1
adeelmunir158
 
NETWORK SCHEDULING TECHNIQUES Of software
NETWORK SCHEDULING TECHNIQUES Of softwareNETWORK SCHEDULING TECHNIQUES Of software
NETWORK SCHEDULING TECHNIQUES Of software
xainkhan8
 
Chap003
Chap003Chap003
Chap003
soumya.parhi
 
Ch3 proj.mgt
Ch3 proj.mgtCh3 proj.mgt
Ch3 proj.mgt
videoaakash15
 
Network analysis cpm module3 ppt
Network analysis cpm module3 pptNetwork analysis cpm module3 ppt
Network analysis cpm module3 ppt
ahsanrabbani
 
PROJ 586 Entire Course NEW
PROJ 586 Entire Course NEWPROJ 586 Entire Course NEW
PROJ 586 Entire Course NEW
shyamuopuoptwelve
 
45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt
45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt
45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt
TinotendaChivese
 

Similar to OPM101Chapter16_001 (2).ppt (20)

Pertcpm projectmanagement-120628224438-phpapp02
Pertcpm projectmanagement-120628224438-phpapp02Pertcpm projectmanagement-120628224438-phpapp02
Pertcpm projectmanagement-120628224438-phpapp02
 
Project Management
Project Management Project Management
Project Management
 
Activity Diagram.pptx
Activity Diagram.pptxActivity Diagram.pptx
Activity Diagram.pptx
 
Pert & cpm project management
Pert & cpm   project managementPert & cpm   project management
Pert & cpm project management
 
Pert cpm
Pert cpmPert cpm
Pert cpm
 
Pert cpm
Pert cpmPert cpm
Pert cpm
 
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docxSAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
SAFEASSIGNCHECKTEST - CSU SAFEASSIGN PLAGIARISM CHECK TOOL.docx
 
Introduction to Project Management
Introduction to Project Management Introduction to Project Management
Introduction to Project Management
 
C10 project management
C10 project managementC10 project management
C10 project management
 
C10 project management
C10 project managementC10 project management
C10 project management
 
Project Management & Engineering Economics
Project Management & Engineering EconomicsProject Management & Engineering Economics
Project Management & Engineering Economics
 
Chapter 6 project management
Chapter 6 project managementChapter 6 project management
Chapter 6 project management
 
Project Management.pptx
Project Management.pptxProject Management.pptx
Project Management.pptx
 
Cpm n pert lecture 1
Cpm n pert lecture 1Cpm n pert lecture 1
Cpm n pert lecture 1
 
NETWORK SCHEDULING TECHNIQUES Of software
NETWORK SCHEDULING TECHNIQUES Of softwareNETWORK SCHEDULING TECHNIQUES Of software
NETWORK SCHEDULING TECHNIQUES Of software
 
Chap003
Chap003Chap003
Chap003
 
Ch3 proj.mgt
Ch3 proj.mgtCh3 proj.mgt
Ch3 proj.mgt
 
Network analysis cpm module3 ppt
Network analysis cpm module3 pptNetwork analysis cpm module3 ppt
Network analysis cpm module3 ppt
 
PROJ 586 Entire Course NEW
PROJ 586 Entire Course NEWPROJ 586 Entire Course NEW
PROJ 586 Entire Course NEW
 
45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt
45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt
45ef51191315a8630a639ff030b4cb67a3df6f49-1657701254277.ppt
 

Recently uploaded

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 

Recently uploaded (20)

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 

OPM101Chapter16_001 (2).ppt

  • 1. © Wiley 2010 Chapter 16 – Project Management Operations Management by R. Dan Reid & Nada R. Sanders 4th Edition © Wiley 2010
  • 2. © Wiley 2010 Learning Objectives  Describe project management objectives  Describe the project life cycle  Diagram networks of project activities  Estimate the completion time of a project  Compute the probability of completing a project by a specific time
  • 3. © Wiley 2010 Learning Objectives – con’t  Determine how to reduce the length of a project effectively  Describe the critical chain approach to project management
  • 4. © Wiley 2010 Project Management Applications  What is a project?  Any unique endeavor with specific objectives  With multiple activities  With defined precedent relationships  With a specific time period for completion  Examples?  A major event like a wedding  Any construction project  Designing a political campaign
  • 5. © Wiley 2010 Project Life Cycle  Conception: identify the need  Feasibility analysis or study: costs benefits, and risks  Planning: who, how long, what to do?  Execution: doing the project  Termination: ending the project
  • 6. © Wiley 2010 Network Planning Techniques  Program Evaluation & Review Technique (PERT):  Developed to manage the Polaris missile project  Many tasks pushed the boundaries of science & engineering (tasks’ duration = probabilistic)  Critical Path Method (CPM):  Developed to coordinate maintenance projects in the chemical industry  A complex undertaking, but individual tasks are routine (tasks’ duration = deterministic)
  • 7. © Wiley 2010 Both PERT and CPM  Graphically display the precedence relationships & sequence of activities  Estimate the project’s duration  Identify critical activities that cannot be delayed without delaying the project  Estimate the amount of slack associated with non-critical activities
  • 8. © Wiley 2007 Network Diagrams  Activity-on-Node (AON):  Uses nodes to represent the activity  Uses arrows to represent precedence relationships
  • 9. © Wiley 2010 Step 1-Define the Project: Cables By Us is bringing a new product on line to be manufactured in their current facility in existing space. The owners have identified 11 activities and their precedence relationships. Develop an AON for the project. Activity Description Immediate Predecessor Duration (weeks) A Develop product specifications None 4 B Design manufacturing process A 6 C Source & purchase materials A 3 D Source & purchase tooling & equipment B 6 E Receive & install tooling & equipment D 14 F Receive materials C 5 G Pilot production run E & F 2 H Evaluate product design G 2 I Evaluate process performance G 3 J Write documentation report H & I 4 K Transition to manufacturing J 2
  • 10. © Wiley 2010 Step 2- Diagram the Network for Cables By Us
  • 11. © Wiley 2010 Step 3 (a)- Add Deterministic Time Estimates and Connected Paths
  • 12. © Wiley 2010 Step 3 (a) (Con’t): Calculate the Project Completion Times  The longest path (ABDEGIJK) limits the project’s duration (project cannot finish in less time than its longest path)  ABDEGIJK is the project’s critical path Paths Path duration ABDEGHJK 40 ABDEGIJK 41 ACFGHJK 22 ACFGIJK 23
  • 13. © Wiley 2010 Some Network Definitions  All activities on the critical path have zero slack  Slack defines how long non-critical activities can be delayed without delaying the project  Slack = the activity’s late finish minus its early finish (or its late start minus its early start)  Earliest Start (ES) = the earliest finish of the immediately preceding activity  Earliest Finish (EF) = is the ES plus the activity time  Latest Start (LS) and Latest Finish (LF) = the latest an activity can start (LS) or finish (LF) without delaying the project completion
  • 14. © Wiley 2010 ES, EF Network
  • 15. © Wiley 2010 LS, LF Network
  • 16. Calculating Slack Activity Late Finish Early Finish Slack (weeks) A 4 4 0 B 10 10 0 C 25 7 18 D 16 16 0 E 30 30 0 F 30 12 18 G 32 32 0 H 35 34 1 I 35 35 0 J 39 39 0 K 41 41 0
  • 17. © Wiley 2010 Revisiting Cables By Us Using Probabilistic Time Estimates Activity Description Optimistic time Most likely time Pessimistic time A Develop product specifications 2 4 6 B Design manufacturing process 3 7 10 C Source & purchase materials 2 3 5 D Source & purchase tooling & equipment 4 7 9 E Receive & install tooling & equipment 12 16 20 F Receive materials 2 5 8 G Pilot production run 2 2 2 H Evaluate product design 2 3 4 I Evaluate process performance 2 3 5 J Write documentation report 2 4 6 K Transition to manufacturing 2 2 2
  • 18. Using Beta Probability Distribution to Calculate Expected Time Durations  A typical beta distribution is shown below, note that it has definite end points  The expected time for finishing each activity is a weighted average   6 c pessimisti likely most 4 optimistic time Exp.   
  • 19. © Wiley 2007 Calculating Expected Task Times Activity Optimistic time Most likely time Pessimistic time Expected time A 2 4 6 4 B 3 7 10 6.83 C 2 3 5 3.17 D 4 7 9 6.83 E 12 16 20 16 F 2 5 8 5 G 2 2 2 2 H 2 3 4 3 I 2 3 5 3.17 J 2 4 6 4 K 2 2 2 2   6 4 c pessimisti likely most optimistic time Expected   
  • 20. © Wiley 2010 Network Diagram with Expected Activity Times
  • 21. © Wiley 2010 Estimated Path Durations through the Network  ABDEGIJK is the expected critical path & the project has an expected duration of 44.83 weeks Activities on paths Expected duration ABDEGHJK 44.66 ABDEGIJK 44.83 ACFGHJK 23.17 ACFGIJK 23.34
  • 22. © Wiley 2010 Adding ES and EF to Network
  • 23. © Wiley 2010 Gantt Chart Showing Each Activity Finished at the Earliest Possible Start Date
  • 24. © Wiley 2010 Adding LS and LF to Network
  • 25. © Wiley 2010 Gantt Chart Showing the Latest Possible Start Times if the Project Is to Be Completed in 44.83 Weeks
  • 26. © Wiley 2010 Estimating the Probability of Completion Dates  Using probabilistic time estimates offers the advantage of predicting the probability of project completion dates  We have already calculated the expected time for each activity by making three time estimates  Now we need to calculate the variance for each activity  The variance of the beta probability distribution is:  where p=pessimistic activity time estimate o=optimistic activity time estimate 2 2 6 o p σ        
  • 27. © Wiley 2007 Project Activity Variance Activity Optimistic Most Likely Pessimistic Variance A 2 4 6 0.44 B 3 7 10 1.36 C 2 3 5 0.25 D 4 7 9 0.69 E 12 16 20 1.78 F 2 5 8 1.00 G 2 2 2 0.00 H 2 3 4 0.11 I 2 3 5 0.25 J 2 4 6 0.44 K 2 2 2 0.00
  • 28. © Wiley 2010 Variances of Each Path through the Network Path Number Activities on Path Path Variance (weeks) 1 A,B,D,E,G,H,J,k 4.82 2 A,B,D,E,G,I,J,K 4.96 3 A,C,F,G,H,J,K 2.24 4 A,C,F,G,I,J,K 2.38
  • 29. © Wiley 2010 Calculating the Probability of Completing the Project in Less Than a Specified Time  When you know:  The expected completion time  Its variance  You can calculate the probability of completing the project in “X” weeks with the following formula: Where DT = the specified completion date EFPath = the expected completion time of the path             2 P σ EF D time standard path time expected path time specified z P T path of variance σ 2 Path 
  • 30. © Wiley 2010 Example: Calculating the probability of finishing the project in 48 weeks  Use the z values in Appendix B to determine probabilities  e.g. probability for path 1 is Path Number Activities on Path Path Variance (weeks) z-value Probability of Completion 1 A,B,D,E,G,H,J,k 4.82 1.5216 0.9357 2 A,B,D,E,G,I,J,K 4.96 1.4215 0.9222 3 A,C,F,G,H,J,K 2.24 16.5898 1.000 4 A,C,F,G,I,J,K 2.38 15.9847 1.000 1.52 4.82 weeks 44.66 weeks 48 z           
  • 31. © Wiley 2010 Reducing Project Completion Time  Project completion times may need to be shortened because:  Different deadlines  Penalty clauses  Need to put resources on a new project  Promised completion dates  Reduced project completion time is “crashing”
  • 32. © Wiley 2010 Reducing Project Completion Time – con’t  Crashing a project needs to balance  Shorten a project duration  Cost to shorten the project duration  Crashing a project requires you to know  Crash time of each activity  Crash cost of each activity Crash cost/duration = (crash cost-normal cost)/(normal time – crash time)
  • 33. © Wiley 2007 Reducing the Time of a Project (crashing) Activity Normal Time (wk) Normal Cost ($) Crash Time Crash Cost ($) Max. weeks of reduction Reduce cost per week A 4 8,000 3 11,000 1 3,000 B 6 30,000 5 35,000 1 5,000 C 3 6,000 3 6,000 0 0 D 6 24,000 4 28,000 2 2,000 E 14 60,000 12 72,000 2 6,000 F 5 5,000 4 6,500 1 1500 G 2 6,000 2 6,000 0 0 H 2 4,000 2 4,000 0 0 I 3 4,000 2 5,000 1 1,000 J 4 4,000 2 6,400 2 1,200 K 2 5,000 2 5,000 0 0
  • 34. © Wiley 2010 Crashing Example: Suppose the Cables By Us project manager wants to reduce the new product project from 41 to 36 weeks.  Crashing Costs are considered to be linear  Look to crash activities on the critical path  Crash the least expensive activities on the critical path first (based on cost per week)  Crash activity I from 3 weeks to 2 weeks $1000  Crash activity J from 4 weeks to 2 weeks $2400  Crash activity D from 6 weeks to 4 weeks $4000  Recommend Crash Cost $7400  Question: Will crashing 5 weeks return more in benefits than it costs?
  • 35. © Wiley 2010 Crashed Network Diagram
  • 36. © Wiley 2010 The Critical Chain Approach  The Critical Chain Approach focuses on project due dates rather than on individual activities and the following realities:  Project time estimates are uncertain so we add safety time  Multi-levels of organization may add additional time to be “safe”  Individual activity buffers may be wasted on lower-priority activities  A better approach is to place the project safety buffer at the end Original critical path Activity A Activity B Activity C Activity D Activity E Critical path with project buffer Activity A Activity B Activity C Activity D Activity E Project Buffer
  • 37. © Wiley 2007 Adding Feeder Buffers to Critical Chains  The theory of constraints, the basis for critical chains, focuses on keeping bottlenecks busy.  Time buffers can be put between bottlenecks in the critical path  These feeder buffers protect the critical path from delays in non- critical paths
  • 38. © Wiley 2010 Project Management within OM: How it all fits together  Project management techniques provide a structure for the project manager to track the progress of different activities required to complete the project. Particular concern is given to critical path (the longest connected path through the project network) activities.  Any delay to a critical path activity affects the project completion time. These techniques indicate the expected completion time and cost of a project. The project manager reviews this information to ensure that adequate resources exist and that the expected completion time is reasonable.
  • 39. © Wiley 2010 Project Management OM Across the Organization  Accounting uses project management (PM) information to provide a time line for major expenditures  Marketing use PM information to monitor the progress to provide updates to the customer  Information systems develop and maintain software that supports projects  Operations use PM to information to monitor activity progress both on and off critical path to manage resource requirements
  • 40. © Wiley 2010 Chapter 16 Highlights  A project is a unique, one time event of some duration that consumes resources and is designed to achieve an objective in a given time period.  Each project goes through a five-phase life cycle: concept, feasibility study, planning, execution, and termination.  Two network planning techniques are PERT and CPM. Pert uses probabilistic time estimates. CPM uses deterministic time estimates.  Pert and CPM determine the critical path of the project and the estimated completion time. On large projects, software programs are available to identify the critical path.
  • 41. © Wiley 2010 Chapter 16 Highlights con’t  Pert uses probabilistic time estimates to determine the probability that a project will be done by a specific time.  To reduce the length of the project (crashing), we need to know the critical path of the project and the cost of reducing individual activity times. Crashing activities that are not on the critical path typically do not reduce project completion time.  The critical chain approach removes excess safety time from individual activities and creates a project buffer at the end of the critical path.
  • 42. Homework Hints  Problems 16.1-2: Use CPM deterministic model (A). [10 points]  Problems 16.4-8: Use CPM probabilistic model (A). Use the AON diagram for 16.4. [20 points]  Problems 16.9-10: Use CPM deterministic model (A). Crash the project one week at a time—find the lowest cost task to reduce. Watch for the creation of additional critical paths. [10 points]