This document discusses project management techniques like PERT and CPM. It begins by explaining that PERT and CPM help managers plan, schedule, and control projects using limited resources like time, money, staff etc. It then defines key PERT and CPM terms like activities, events, dummy activities and explains how to construct a network diagram. The document also covers topics like calculating earliest and latest times, determining float and slack, identifying the critical path, and using probability in PERT to estimate project duration.
Project Management Techniques ( CPM & PERT Techniques )
A revised PPT from other shared PPT available
Project management is a scientific way of planning, implementing, monitoring & controlling the various aspects of a project such as time, money, materials, manpower & other resources.
By,
Mr. AKARESH JOSE
Kerala Agricultural University
akareshjose@gmail.com
project management-cpm and pert methods for managersNaganna Chetty
A project is a one shot, time limited, goal directed, major undertaking, requiring the commitment of varied skills & resources.
A project:
Has a unique purpose.
Is temporary.
Is developed using progressive elaboration.
Requires resources, often from various areas.
Should have a primary customer or sponsor.
The project sponsor usually provides the direction and funding for the project.
Involves uncertainty.
Project managers work with project sponsors, project teams, and other people involved in projects to meet project goals.
Program: “A group of related projects managed in a coordinated way to obtain benefits and control not available from managing them individually.”
Program managers oversee programs and often act as bosses for project managers.
Project management is “the application of knowledge, skills, tools and techniques to project activities to meet project requirements.”
A project is an interrelated set of activities that has definite starting and ending points and that result in a unique product
or service
• Cuts across organizational lines - they need varied skills of different profession
• Uncertainties like new technology & external environment can change the character of the project
• Personnel, materials, facilities etc. are temporarily assembled to accomplish a goal within a specified time frame and then disbanded
• Upon finish, a project releases lot of resources which were engaged in execution of the project
Critical Path Explained With 7 Q&As and a Free Excel TemplateSHAZEBALIKHAN1
The critical path method is the most used project management technique. Learn the CPM with 7 FAQs ranging from definition to method, process, tests. The attached excel sheet (hyperlinked in the article) explains the implementation of CPM in a project schedule.
Introduction
CPM/PERT or Network Analysis as the technique is sometimes called, developed along two parallel streams, one industrial and the other military.
CPM (Critical Path Method) was the discovery of M.R.Walker of E.I.Du Pont de Nemours & Co. and J.E.Kelly of Remington Rand, circa 1957. The computation was designed for the UNIVAC-I computer. The first test was made in 1958, when CPM was applied to the construction of a new chemical plant. In March 1959, the method was applied to maintenance shut-down at the Du Pont works in Louisville, Kentucky. Unproductive time was reduced from 125 to 93 hours.
PERT (Project Evaluation and Review Technique) was devised in 1958 for the POLARIS missile program by the Program Evaluation Branch of the Special Projects office of the U.S.Navy, helped by the Lockheed Missile Systems division and the Consultant firm of Booz-Allen & Hamilton. The calculations were so arranged so that they could be carried out on the IBM Naval Ordinance Research Computer (NORC) at Dahlgren, Virginia.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Project Management Techniques ( CPM & PERT Techniques )
A revised PPT from other shared PPT available
Project management is a scientific way of planning, implementing, monitoring & controlling the various aspects of a project such as time, money, materials, manpower & other resources.
By,
Mr. AKARESH JOSE
Kerala Agricultural University
akareshjose@gmail.com
project management-cpm and pert methods for managersNaganna Chetty
A project is a one shot, time limited, goal directed, major undertaking, requiring the commitment of varied skills & resources.
A project:
Has a unique purpose.
Is temporary.
Is developed using progressive elaboration.
Requires resources, often from various areas.
Should have a primary customer or sponsor.
The project sponsor usually provides the direction and funding for the project.
Involves uncertainty.
Project managers work with project sponsors, project teams, and other people involved in projects to meet project goals.
Program: “A group of related projects managed in a coordinated way to obtain benefits and control not available from managing them individually.”
Program managers oversee programs and often act as bosses for project managers.
Project management is “the application of knowledge, skills, tools and techniques to project activities to meet project requirements.”
A project is an interrelated set of activities that has definite starting and ending points and that result in a unique product
or service
• Cuts across organizational lines - they need varied skills of different profession
• Uncertainties like new technology & external environment can change the character of the project
• Personnel, materials, facilities etc. are temporarily assembled to accomplish a goal within a specified time frame and then disbanded
• Upon finish, a project releases lot of resources which were engaged in execution of the project
Critical Path Explained With 7 Q&As and a Free Excel TemplateSHAZEBALIKHAN1
The critical path method is the most used project management technique. Learn the CPM with 7 FAQs ranging from definition to method, process, tests. The attached excel sheet (hyperlinked in the article) explains the implementation of CPM in a project schedule.
Introduction
CPM/PERT or Network Analysis as the technique is sometimes called, developed along two parallel streams, one industrial and the other military.
CPM (Critical Path Method) was the discovery of M.R.Walker of E.I.Du Pont de Nemours & Co. and J.E.Kelly of Remington Rand, circa 1957. The computation was designed for the UNIVAC-I computer. The first test was made in 1958, when CPM was applied to the construction of a new chemical plant. In March 1959, the method was applied to maintenance shut-down at the Du Pont works in Louisville, Kentucky. Unproductive time was reduced from 125 to 93 hours.
PERT (Project Evaluation and Review Technique) was devised in 1958 for the POLARIS missile program by the Program Evaluation Branch of the Special Projects office of the U.S.Navy, helped by the Lockheed Missile Systems division and the Consultant firm of Booz-Allen & Hamilton. The calculations were so arranged so that they could be carried out on the IBM Naval Ordinance Research Computer (NORC) at Dahlgren, Virginia.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
PERT-CPM PPT.pptx
1.
2. Introduction
⚫ Any project involves planning, scheduling and controlling a
number of interrelated activities with use of limited resources,
namely, men, machines, materials, moneyand time.
⚫ The projects may beextremely largeand complex such as
constructionof a housing , a highway, a shopping complexetc.
⚫ introductionof new productsand researchand development
projects.
⚫ It is required that managers must have a dynamic planning and
scheduling system to produce the best possible results and also to
react immediately to the changing conditions and make
necessarychanges in the plan and schedule.
3. A convenient analytical and visual technique of PERT and CPM
prove extremely valuable in assisting the managers in
managing the projects.
PERT stands for Project Evaluation and Review
Technique developed during 1950’s. The technique was developed and
used in conjunction with the planning and designing of the Polaris missile
project.
CPM stands for Critical Path Method which was developed by
DuPont Company and applied first to the construction projects in the chemical
industry.
Though both PERT and CPM techniques have similarity in terms of
concepts, the basic difference is; CPM has single time estimate and PERT
has three time estimates for activities and uses probability theory to find
the chance of reaching the scheduled time.
4. Project management generally consists of 4 phases.
Initiating & Planning:
Planning involves setting the objectives of the project. Identifying
various activities to be performed and determining the requirement of
resourcessuch as men, materials, machines, etc.
The cost and time for all the activities are estimated, and a network diagram is
developed showing sequential interrelationships (predecessor and successor)
betweenvarious activitiesduring the planning stage.
Scheduling:
Based on the time estimates, the start and finish times for each activity
are worked out by applying forward and backward pass techniques, critical
path is identified, along with the slack and float for the non-critical paths.
Controlling:
Controlling refers to analyzing and evaluating the actual progress
against the plan. Reallocation of resources, crashing and review of projects
with periodical reportsarecarried out.
5. COMPONENTS of PERT/CPM NETWORK
PERT / CPM networks contain two majorcomponents
i. Activities, and
ii. Events
Activity: An activity represents an action and consumption of
resources (time, money, energy) required to complete a portion of a
project. Activity is represented byan arrow, .
Event: An event (or node) will always occur at the beginning and end of an
activity. The event has no resourcesand is represented byacircle. The ith event
and jth event are the tail event and head event respectively.
6. Merge and Burst Events
Oneor moreactivities can startand end simultaneouslyat an event .
Preceding and Succeeding Activities
Activities performed before given events are known as preceding activities, and
activities performed aftera given event are known as succeeding activities.
Activities A and B precedeactivities C and D respectively
.
7. Dummy Activity
An imaginary activity which does not consume any resource and time is called a
dummy activity. Dummy activities are simply used to represent a connection
between events in order to maintain a logic in the network. It is represented by a
dotted line in a network.
8. ERRORS TO BE AVOIDED IN CONSTRUCTING A NETWORK
a.Two activities starting from a tail event
must not have a same end event. To ensure
this, it is absolutely necessary to introduce a
dummy activity, as shown in Figure .
b.Looping error should not be formed in a
network, as it represents performance of
activities repeatedly in a cyclic manner, as
shown below in Figure .
c.In a network, there should be only one
startevent and oneending event as shown
below, in Figure .
d.The direction of arrows should
flow from left to right avoiding
mixing of direction as shown in
Figure .
9. RULES IN CONSTRUCTING A NETWORK
1. No single activity can be represented more than once in a network.
The lengthof an arrow has nosignificance.
2.The event numbered 1 is the start event and an event with highest
number is the end event. Before an activity can be undertaken, all
activities preceding it must be completed. That is, the activities must
followa logical sequence (or – interrelationship) betweenactivities.
3.In assigning numbers to events, there should not be any duplication of
event numbers ina network.
4.Dummy activities must be used only if it is necessary to reduce the
complexityof a network.
5. A network should haveonlyonestarteventand oneend event.
10. Some conventions of network diagram are shown in Figure (a),
(b), (c), (d) below:
11. PROCEDURE FOR NUMBERING THE EVENTS
USING FULKERSON'S RULE
Step1: Numberthe startor initial eventas 1.
Step2: From event 1, strike off all outgoing activities. This would have
made one or more events as initial events (event which do not have
incoming activities). Numberthateventas 2.
Step3: Repeat step 2 for event 2, event 3 and till the end event. The end
event must have the highest number
Example 1:
Draw a network for a house construction project. The sequence of
activities with theirpredecessorsaregiven in Table , below.
12.
13. The network diagram in Figure shows the procedure relationship between
the activities. Activity A (preparation of house plan), has a start event 1
as well as an ending event 2. Activity B (Construction of house) begins at
event 2 and ends at event 3. The activity B cannot start until activity A
has been completed. Activities C and D cannot begin until activity B
has been completed, but they can be performed simultaneously.
Similarly, activities E and F can start only after completion of
activities C and D respectively. Both activities E and F finish at the end of
event 6.
Example 2: Consider the project given in Table 8.2 and construct a
network diagram. Table : Sequenceof Activities for Building
Construction Project
14. Solution:
The activities C and D have a common predecessor A. The network
representation shown in Figure (a), (b) violates the rule that no two activities can
begin and end at the same events. It appears as if activity B is a predecessor of
activity C, which is not the case. To construct the network in a logical order, it is
necessaryto introduce adummy activityas shown in Figure .
15. Example 3:
Construct a network for a project whose activities and their predecessor relationship
aregiven in Table .
Solution: The network diagram for the given problem is shown in Figure
with activities A, B and C starting simultaneously.
16. Example 4: Draw a network diagram for
a project given in Table .
Solution: An activity network diagram describing the project is shown in
Figure , below:
17. CRITICAL PATH ANALYSIS
Thecritical path forany network is the longestpath through theentire network.
Since all activities must be completed to complete the entire project, the length
of the critical path is also the shortest time allowable for completion of the
project.
Thus if the project is to be completed in that shortest time, all activities on the
critical path must bestarted assoonas possible.
Theseactivitiesarecalled critical activities.
If the project has to be completed ahead of the schedule, then the time required
forat leastoneof thecritical activity must be reduced.
Further, any delay in completing the critical activities will increase the project
duration.
18. The activity, which does not lie on the critical path, is called non-critical
activity.
These non-critical activities may havesome slack time.
The slack is the amount of time by which the start of an activity may be
delayed withoutaffecting theoverall completion timeof theproject.
Butacritical activity has noslack.
To reduce the overall project time, it would require more resources (at
extracost) toreduce the time taken by thecritical activities tocomplete.
19. Scheduling of Activities: Earliest Time (TE) and Latest
Time(TL)
Before the critical path in a network is determined, it is necessary to
find the earliest and latest time of each event to know the earliest
expected time (TE) at which the activities originating from the event
can be started and to know the latest allowable time (TL) at which
activities terminating at theeventcan becompleted.
Forward Pass Computations (tocalculate Earliest, TimeTE)
Step 1: Begin from the startevent and move towardstheend event.
Step 2: Put TE = 0 for the startevent.
Step 3: Go to the next event (i.e node 2) if there is an incoming activity for event 2,
add calculateTE of previous event (i.e event 1) and activity time.
Note: If there are more than one incoming activities, calculate TE for all incoming
activities and take the maximum value. Thisvalue is the TE forevent 2.
Step 4: Repeat the same procedure from step 3 till theend event.
20. Backward Pass Computations (to calculate Latest Time TL)
Procedure :
Step 1: Begin from end event and move towards the start event. Assume that
thedirectionof arrows is reversed.
Step 2: Latest Time TL for the last event is the earliest time. TE of the last
event.
Step 3: Go to the next event, if there is an incoming activity, subtract the value
of TL of previous event from the activity duration time. The arrived value is
TL for that event. If there are more than one incoming activities, take the
minimum TE value.
Step 4: Repeatthesame procedurefrom step 2 till thestart event.
21. DETERMINATION OF FLOAT AND SLACK TIMES
As discussed earlier, the non – critical activities have some slack or float.
The float of an activity is the amount of time available by which it is
possible to delay its completion time without extending the overall
projectcompletion time.
tij = duration of activity
TE = earliestexpected time
TL = latestallowable time
ESij = earliest start time of the activity
EFij = earliest finish time of theactivity
LSij = latest start time of the activity
LFij = latest finish time of theactivity
Total Float TFij: The total float of an activity is thedifference between the
lateststart time and theearlieststart time of thatactivity.
TFij = LS ij – ESij ....................(1)
or
TFij = (TL – TE) – tij …………..(ii)
22. Free Float FFij: The time by which the completion of an activity can be
delayed from itsearliestfinish timewithoutaffecting theearlieststart
timeof thesucceeding activity iscalled free float.
FF ij = (Ej – Ei) – tij ....................(3)
FFij = Total float – Head event slack
Independent Float IFij: The amount of time by which the start of an activity
can be delayed without affecting the earliest start time of any immediately
following activities, assuming that the preceding activity has finished at its
latest finish time.
IF ij = (Ej – Li) – tij ....................(4)
IFij = Free float – Tail event slack Wheretail event slack = Li – Ei
The negativevalueof independentfloat isconsidered to bezero.
23. Critical Path:
After determining the earliest and the latest scheduled times for
various activities, the minimum time required to complete the
project is calculated. In a network, among various paths, the
longest path which determines the total time duration of the
project is called the critical path. The following conditions must
besatisfied in locating thecritical path of a network.
Anactivity is said to becritical only if both theconditionsaresatisfied.
1. TL – TE = 0
2. TLj – tij – TEj = 0
Example :
A projectschedule has the following characteristicsas shown in Table
i. Construct PERT network.
ii. Compute TE and TL
for each activity.
iii. Find thecritical path.
24. (i) From thedatagiven in the problem, theactivity network is constructed as
shown in Figure given below
25. (ii) To determine the critical path, compute the earliest time TE and latest
time TL for each of the activity of the project. The calculations of TE and
TLareas follows:,
TocalculateTE forall activities
TE1 = 0
TE2 = TE1 + t1, 2 = 0 + 4 = 4
TE3 = TE1 + t1, 3 = 0 + 1 =1
TE4 = max (TE2 + t2, 4 and TE3 + t3, 4)
= max (4 + 1 and 1 + 1) = max (5, 2)
= 5 days
TE5 = TE3 + t3, 6 = 1 + 6 = 7
TE6 = TE5 + t5, 6 = 7 + 4 = 11
TE7 = TE5 + t5, 7 = 7 + 8 = 15
TE8 = max (TE6 + t6, 8 and TE7 + t7, 8)
= max (11 + 1 and 15 + 2) = max (12, 17)
= 17 days
TE9 = TE4 + t4, 9 = 5 + 5 = 10
TE10 = max (TE9 + t9, 10 and TE8 + t8, 10)
= max (10 + 7 and 17 + 5) = max (17, 22)
= 22 days
TocalculateTL forall activities
TL10 = TE10 = 22
TL9 = TE10 – t9,10 = 22 – 7 = 15
TL8 = TE10 – t8, 10 = 22 – 5 = 17
TL7 = TE8 – t7, 8 = 17 – 2 = 15
TL6 = TE8 – t6, 8 = 17 – 1 = 16
TL5 = min (TE6 – t5, 6 and TE7 – t5, 7)
= min (16 – 4 and 15 –8) = min (12, 7)
= 7 days
TL4 = TL9 – t4, 9 = 15 – 5 =10
TL3 = min (TL4 – t3, 4 and TL5 – t3, 5 )
= min (10 – 1 and 7 – 6) = min (9, 1)
= 1 day
TL2 = TL4 – t2, 4 = 10 – 1 = 9
TL1 = Min (TL2 – t1, 2 and TL3 – t1, 3)
= Min (9 – 4 and 1 – 1) = 0
26.
27. (iii) From the Table , we observe that the
activities 1 – 3, 3 – 5, 5 – 7,7 – 8 and 8 – 10 are
critical activities as their floats are zero.
28. PROJECT EVALUATION REVIEW TECHNIQUE, (PERT)
In the critical path method, the time estimates are assumed to be
known with certainty. In certain projects like research and
development, new product introductions, it is difficult to estimate
the timeof variousactivities.
Hence PERT is used in such projects with a probabilistic method using three time
estimates foran activity, ratherthan a singleestimate, asshown in Figure 8.22.
Optimistic time tO:
It is the shortest time taken to complete the
activity. It means that if everything goes well
then there is more chance of completing the
activitywithin this time.
Most likelytime tm:
It is the normal time taken to complete an activity,
if the activity were frequently repeated under the
sameconditions.
Pessimistic time tp:
It is the longest time that an activity would take to
complete. It is the worst time estimate that an
activity would take if unexpected problems are
faced.
29. Taking all these time estimates into consideration, the expected time
of an activity is arrived at.
Theaverage or mean (ta) valueof
theactivityduration isgiven by,
Thevarianceof theactivity time
iscalculated using the formula,
Probability for ProjectDuration
The probability of completing the
project within the scheduled time (Ts) or
contracted time may be obtained by
using the standard normal deviate
where Te is the expected time of project
completion.
Probability of completing the project
within thescheduled time is,
30. Example
An R & D project has a list of tasks to be performed whose timeestimates are
given in theTable , as follows.
a. Draw the project network.
b. Find thecritical path.
c. Find the probability that the project is completed in 19 days. If the
probability is less than 20%, find the probability of completing it in 24
days.
31. Time expected for each activity is
calculated using the formula (5):
Similarly, the expected time is
calculated for all the activities.
The variance of activity time is
calculated using the formula (6).
Similarly, variances of all the
activitiesarecalculated.
32. Construct a network diagram:
calculate the time earliest (TE) and
time Latest (TL) forall theactivities.
From the network diagram Figure , thecritical path is identified as
1-4, 4-6, 6-7, with a projectduration of 22 days.
33. The probability of completing the project within 19 days is given by, P (Z< Z0)
To find Z0 ,
we know, P (Z <Z Network Model 0) = 0.5 – z (1.3416) (from normal tables, z (1.3416) = 0.4099)
= 0.5 – 0.4099
= 0.0901
= 9.01% Thus, the probabilityof completing the R & D project in 19 days is 9.01%.
Since the probability of completing the project in 19 days is less than 20% As in
question, we find the probability of completing it in 24 days.
34. COSTANALYSIS
The two importantcomponents of anyactivity are thecostand time. Cost is
directly proportional to time and viceversa.
For example, in constructing a shopping complex, the expected time of completion
can be calculated using the time estimates of various activities. But if the
construction has to be finished earlier, it requires additional cost to complete the
project. We need to arrive at a time/cost trade-off between total cost of project and
total time required tocomplete it.
Normal time:
Normal time is the time required to complete
the activity at normal conditions and cost.
Crash time:
Crash time is the shortest possible activity
time; crashing more than the normal time
will increase thedirect cost.
Cost Slope
Cost slope is the increase in cost per unit of
time saved by crashing. A linear cost curve
is shown in Figure 8.27.
35. Example
An activity takes 4 days to complete at a normal cost of Rs. 500.00. If it is possible
to complete the activity in 2 days with an additional cost of Rs. 700.00, what is the
incremental costof theactivity?
Incremental Costor Cost Slope
It means, if oneday is reduced we have tospend Rs. 100/- extra perday.
ProjectCrashing
Procedure for crashing
Step1: Draw the network diagram and mark the Normal time and Crash time.
Step2: Calculate TE and TL for all the activities.
Step3: Find the critical path and other paths.
Step 4: Find the slope for all activities and rank them in ascending order.
36. Step 5: Establish a tabular column with required field.
Step 6: Select the lowest ranked activity; check whether it is a critical activity. If
so,crash theactivity, elsego to the next highestranked activity.
Note: The critical path must remain critical while crashing.
Step 7: Calculate the total cost of project for each crashing
Step 8: Repeat Step 6 until all the activities in the critical path are fully
crashed.
Example
The following Table
8.13 gives the activities
of a construction
projectand otherdata.
If the indirect cost is Rs. 20 perday, crash theactivities to find the
minimum duration of the projectand the projectcostassociated.
37. Solution
From thedata provided in the table, draw the network diagram (Figure 8.28)
and find thecritical path.
From the diagram, we observe that the
critical path is 1-2-5 with projectduration of
14 days
Thecost slope forall activities and their rank
is calculated as shown in Table 8.14
38. The available paths of the network are listed down in Table 8.15
indicating the sequenceof crashing (see Figure 8.29).
The sequence of crashing and
the total cost involved is given
in Table 8.16 Initial direct cost
= sum of all normal costsgiven
= Rs. 490.00
39. It is not possible to crash more than 10 days, as all the activities in
the critical path are fully crashed. Hence the minimum project
duration is 10 dayswith the total costof Rs. 970.00.
Activity
Crashed
Project
Duration
Critical Path Direct Cost in (Rs.) Indirect
Cost in
(Rs.)
Total
Cost in
(Rs.)
- 14 1-2-5 490 14 x 20 =
280
770
1 – 2(2)
2 – 5(2)
2 – 4(1)
3 – 4(2)
10 1 – 2 – 5
1 – 3 – 4 – 5
1 – 2 – 4 – 5
490 + (2 x 15) + (2 x
100) + (1 x 10) + (2 x
20) = 770
10 x 20 =
200
970
43. a. Draw the project networkdiagram.
b. Calculate the lengthand variance of thecritical path.
c. What is the probabilitythat the jobson thecritical path can be
completed in 41 days?