The Vertex Companies, Inc. - Time Impact AnalysisLisa Dehner
The document provides an overview of nine commonly used time impact analysis methodologies for evaluating construction delay claims. It describes the basic and specific attributes of each methodology, including whether they are retrospective or prospective, observational or modeled, and details of their implementation approaches. Key factors in determining the appropriate methodology include whether the analysis is being conducted during or after a project, and the availability of contemporaneous schedule updates.
Favorite Delay Analysis Methodologies Town Hall SEIChris Carson
Presentation from a Town Hall session to discuss favorite forensic schedule analysis methodologies, based on the Forensic Analysis Recommended Practice from AACE International. The Best Practices and Guidelines for Schedule Impact Analysis project is discussing methods.
Project Controls Expo, 13th Nov 2013 - "Forensic Schedule Analysis – How to F...Project Controls Expo
Structure
1. Introduction
2. Why Do Schedules Become Distorted?
3. Sources to Examine to Find the Truth
4. The Scenarios – 6 Examples of How Schedules Become Distorted
5. Variables to Review
6. Validation Protocols
7. Software Analysis and Metrics
8. Summary and Questions
Construction Delay Analysis, SimplifiedMichael Pink
Learn how to perform a delay analysis in the construction industry. Capture and study your impacts to determine why a project was late. Use this proven method to ensure that you get paid for delays caused by others.
Analyzing data, performance and impacts in constructionMichael Pink
Data management and analysis in the construction industry. Learn how to mine data to effectively manage construction projects, while utilizing data to capture and study variances related to cost and time/delay.
A contemporaneous time impact analysis (TIA) evaluates the impact of potential delays on a construction project schedule. It involves updating the project schedule, inserting a fragnet of delay-causing activities, and comparing the predicted completion dates before and after the delay. Doing a TIA prospectively helps negotiate time extensions and avoid disputes. The presentation defines TIAs, explains how to prepare and analyze them properly according to industry standards, and discusses their benefits for both owners and contractors.
The Vertex Companies, Inc. - Time Impact AnalysisLisa Dehner
The document provides an overview of nine commonly used time impact analysis methodologies for evaluating construction delay claims. It describes the basic and specific attributes of each methodology, including whether they are retrospective or prospective, observational or modeled, and details of their implementation approaches. Key factors in determining the appropriate methodology include whether the analysis is being conducted during or after a project, and the availability of contemporaneous schedule updates.
Favorite Delay Analysis Methodologies Town Hall SEIChris Carson
Presentation from a Town Hall session to discuss favorite forensic schedule analysis methodologies, based on the Forensic Analysis Recommended Practice from AACE International. The Best Practices and Guidelines for Schedule Impact Analysis project is discussing methods.
Project Controls Expo, 13th Nov 2013 - "Forensic Schedule Analysis – How to F...Project Controls Expo
Structure
1. Introduction
2. Why Do Schedules Become Distorted?
3. Sources to Examine to Find the Truth
4. The Scenarios – 6 Examples of How Schedules Become Distorted
5. Variables to Review
6. Validation Protocols
7. Software Analysis and Metrics
8. Summary and Questions
Construction Delay Analysis, SimplifiedMichael Pink
Learn how to perform a delay analysis in the construction industry. Capture and study your impacts to determine why a project was late. Use this proven method to ensure that you get paid for delays caused by others.
Analyzing data, performance and impacts in constructionMichael Pink
Data management and analysis in the construction industry. Learn how to mine data to effectively manage construction projects, while utilizing data to capture and study variances related to cost and time/delay.
A contemporaneous time impact analysis (TIA) evaluates the impact of potential delays on a construction project schedule. It involves updating the project schedule, inserting a fragnet of delay-causing activities, and comparing the predicted completion dates before and after the delay. Doing a TIA prospectively helps negotiate time extensions and avoid disputes. The presentation defines TIAs, explains how to prepare and analyze them properly according to industry standards, and discusses their benefits for both owners and contractors.
Project Controls Expo 09 Nov 2011, London - DELAY AND FORENSIC ANALYSIS By Ro...Project Controls Expo
Delay in Construction Contracts: • On-going phenomenon
• Introduction of Critical Path Method (‘CPM’) • Prospective or retrospective analysis
• Observational or modelled
• Dynamic or Static
• Common Methodologies
Statistical Methods for Construction Delay Analysis IOSR Journals
The occurrence of delay is common in most construction projects, due to various reasons
and causes before or during construction phase. As the delay impact on time and cost overrun,
analyzing of these delay(s) makes easy to give responsibility to concern party. This helps to avoid or
minimize delays in future work. Numerous analytical methods are available for analyzing these
impacts and selection of proper method depends upon: statistical data available, time available,
limitation of method and money available for analyzing. However, information of activities which are
responsible for project delay and their magnitude provides the baseline for investing the cause and
assessing the responsibility for project delay. This paper reviews research methodology suggested for
assessing construction delay factors by analytical methods as well as with the help of computerized
schedule analysis methods. The purpose of this study is to review various analytical & computerized
schedule analysis methods for analysis of construction delay factor.
1. Earned value management (EVM) metrics can help identify specific trades or scopes of work contributing to schedule slippage and poor performance. This allows for targeted mitigation strategies.
2. To effectively use EVM for schedule compression, the baseline schedule needs to be thoroughly coded to allow export and analysis of performance data by trade or work type.
3. Exporting schedule data to a spreadsheet enables pivot tables and charts to examine historical performance trends for each trade. This highlights which trades need additional resources or management to meet goals for schedule compression.
The document discusses baseline scheduling basics and the critical path method (CPM) of scheduling. It covers why schedules are important, different types of schedules and scheduling methodologies. The key aspects of developing a CPM schedule are outlined, including schedule components, logic, and ensuring the schedule is feasible and has buy-in from all parties. Common areas of conflict in scheduling and developing a schedule with the appropriate level of detail and ownership of float are also addressed.
McLachlan Lister provides a range of management consulting and project management services. These are offered either discretely or as an integrated service - you control the depth of our relationship:
On 23 May 2012, McLachlan Lister's Anamaria Popescu made a presentation on "Extensions of Time - Avoiding the Traps or Taking Advantage of Them" in conjunction with well-known Australian law firm Holding Redlich
This document discusses key concepts and processes related to project time management. It defines activities, events, and time management. It describes the schedule management plan and key processes for activity definition including decomposition, planning components, and activity listing. It also covers activity resource estimation, activity duration estimation techniques, imposed dates, schedule network analysis methods, and time estimates. Project scheduling concepts like critical path, float, lags, and the schedule baseline are also summarized.
How to prepare recovery or revised schedule rev.2Abdelhay Ghanem
This document explains how to create a recovery/revised schedule in Primavera. It discusses:
- The meaning of a recovery schedule and who should use this document
- Steps to prepare a recovery schedule including ensuring activities are in sequence, removing finish constraints, and running a retained logic schedule
- Applying global changes such as setting actual dates for completed activities and adjusting durations for in-progress activities
- Using an equation to calculate activity percent complete based on actual start, remaining duration and data date to ensure earned value equals planned value
- Exporting data to Excel to calculate values needed to adjust the schedule and ensure earned value matches planned value.
Quantify Construction Damages related to Delay, disruption, and inefficienciesMichael Pink
Learn how to quantify damages related to delay, disruption and inefficiencies on Construction projects. Convert your delays and impacts into cost claims with this proven process.
McLachlan Lister provides a range of management consulting and project management services. These are offered either discretely or as an integrated service - you control the depth of our relationship:
This document discusses several project scheduling and management techniques including Gantt charts, PERT charts, critical path method, critical chain scheduling, and using project management software. It provides descriptions and examples of each technique. Gantt charts track task progress visually on a timeline. PERT uses statistical analysis to estimate activity durations. Critical path method identifies the longest sequence of tasks. Critical chain scheduling accounts for limited resources by removing buffers and adding buffers to the project schedule. Project management software can help facilitate communications and schedule analysis if used properly.
The ninth lesson of the course on Planning and Managing Software projects (http://emanueledellavalle.org/Teaching/PMSP-2011-12.html) that I give at Politecnico di Milano
This document provides guidance on updating project schedules. It discusses determining the frequency of updates based on schedule purpose and size. It also outlines the process for collecting progress data from the field, office, owners, and subcontractors. The document details how to status the schedule, calculate updates, check for out-of-sequence work, and verify the updated schedule. It provides recommendations for standard schedule analysis for on-time projects and slipped schedules, including reviewing historical trends, the critical path, and more.
The document describes a "claims triage" process used by the authors' company to evaluate new dispute resolution assignments and choose an appropriate analysis methodology. The process involves assembling a team to review background information on the project, dispute, and available data, and discuss which factors outlined in the AACE recommended practice should guide the methodology selection. The goal is to make a careful, well-documented choice that considers lessons learned from similar past cases.
The document outlines a three step approach to eliminating crisis project management: 1) Developing a schedule-driven program, 2) Creating a project management recovery system, and 3) Developing a scheduling recovery system. Step one involves instituting senior management buy-in for dedicated scheduling. Step two develops strategies for addressing delays from various sources. Step three provides checklists for analyzing schedules and suggesting recovery solutions when slippage occurs. The overall approach aims to minimize costs from delays through proactive scheduling, recovery planning, and applying lessons learned from past issues.
The document discusses function point analysis, a technique for estimating the size of a software project based on its functionality. It describes how function points are determined based on five parameters that capture a system's functionality. These parameters include external inputs/outputs, internal files, and external interfaces. The number of function points is then adjusted based on other complexity factors to estimate the final size of the project.
Network analysis techniques like CPM and PERT are useful for planning, scheduling, and controlling projects. They define activities, durations, and dependencies using a network diagram. The critical path is identified as the longest sequence of activities to complete the project. Monitoring progress against the network allows managers to focus on critical tasks and adjust resources if needed to minimize delays. While useful for large projects, activity definitions and time estimates require care to apply these techniques accurately.
IRJET- Quality Matrices of Project ScheduleIRJET Journal
This document discusses quality matrices for evaluating project schedules developed using critical path method (CPM) scheduling. It outlines 16 quality matrices for assessing schedule logic, relationships, constraints, float, durations, dates, resources, missed tasks, critical path tests, execution indices and more. Threshold values are provided for each matrix to determine whether the schedule requires further investigation. The matrices are intended to establish a framework for developing high quality, technically sound CPM schedules to help ensure effective project execution and outcomes.
This document discusses different methods for analyzing construction delays. It begins with an overview of forensic schedule analysis and definitions. It then examines the main delay analysis methodologies: as-planned vs as-built, impacted as-planned, time impact analysis, and as-built but for. For each methodology, it outlines the approach, strengths, and weaknesses. It emphasizes that the most suitable methodology depends on the specific project factors and available information. It recommends following industry guidance and notes that facts should take precedence over theoretical analyses. The document aims to provide an unbiased overview of delay analysis options to help practitioners choose the right approach.
The document provides an overview of extension of time claims, including definitions, triggers, contractual completion dates, key components, schedule integrity, documentation requirements, responsibility assignment, analysis techniques, and presentation best practices. An extension of time is a reimbursement of time granted to a contract party to compensate for delays outside their control. Triggers include delays impacting the critical path. Strong documentation and schedule integrity are essential, as is assigning responsibility according to the contract. Various analysis techniques can be used depending on the complexity, including as-planned vs as-built comparisons, windows analysis, and impacted as-planned schedules. Presentation should include documentation, graphical schedule representations, and a concise written explanation.
Project Controls Expo 09 Nov 2011, London - DELAY AND FORENSIC ANALYSIS By Ro...Project Controls Expo
Delay in Construction Contracts: • On-going phenomenon
• Introduction of Critical Path Method (‘CPM’) • Prospective or retrospective analysis
• Observational or modelled
• Dynamic or Static
• Common Methodologies
Statistical Methods for Construction Delay Analysis IOSR Journals
The occurrence of delay is common in most construction projects, due to various reasons
and causes before or during construction phase. As the delay impact on time and cost overrun,
analyzing of these delay(s) makes easy to give responsibility to concern party. This helps to avoid or
minimize delays in future work. Numerous analytical methods are available for analyzing these
impacts and selection of proper method depends upon: statistical data available, time available,
limitation of method and money available for analyzing. However, information of activities which are
responsible for project delay and their magnitude provides the baseline for investing the cause and
assessing the responsibility for project delay. This paper reviews research methodology suggested for
assessing construction delay factors by analytical methods as well as with the help of computerized
schedule analysis methods. The purpose of this study is to review various analytical & computerized
schedule analysis methods for analysis of construction delay factor.
1. Earned value management (EVM) metrics can help identify specific trades or scopes of work contributing to schedule slippage and poor performance. This allows for targeted mitigation strategies.
2. To effectively use EVM for schedule compression, the baseline schedule needs to be thoroughly coded to allow export and analysis of performance data by trade or work type.
3. Exporting schedule data to a spreadsheet enables pivot tables and charts to examine historical performance trends for each trade. This highlights which trades need additional resources or management to meet goals for schedule compression.
The document discusses baseline scheduling basics and the critical path method (CPM) of scheduling. It covers why schedules are important, different types of schedules and scheduling methodologies. The key aspects of developing a CPM schedule are outlined, including schedule components, logic, and ensuring the schedule is feasible and has buy-in from all parties. Common areas of conflict in scheduling and developing a schedule with the appropriate level of detail and ownership of float are also addressed.
McLachlan Lister provides a range of management consulting and project management services. These are offered either discretely or as an integrated service - you control the depth of our relationship:
On 23 May 2012, McLachlan Lister's Anamaria Popescu made a presentation on "Extensions of Time - Avoiding the Traps or Taking Advantage of Them" in conjunction with well-known Australian law firm Holding Redlich
This document discusses key concepts and processes related to project time management. It defines activities, events, and time management. It describes the schedule management plan and key processes for activity definition including decomposition, planning components, and activity listing. It also covers activity resource estimation, activity duration estimation techniques, imposed dates, schedule network analysis methods, and time estimates. Project scheduling concepts like critical path, float, lags, and the schedule baseline are also summarized.
How to prepare recovery or revised schedule rev.2Abdelhay Ghanem
This document explains how to create a recovery/revised schedule in Primavera. It discusses:
- The meaning of a recovery schedule and who should use this document
- Steps to prepare a recovery schedule including ensuring activities are in sequence, removing finish constraints, and running a retained logic schedule
- Applying global changes such as setting actual dates for completed activities and adjusting durations for in-progress activities
- Using an equation to calculate activity percent complete based on actual start, remaining duration and data date to ensure earned value equals planned value
- Exporting data to Excel to calculate values needed to adjust the schedule and ensure earned value matches planned value.
Quantify Construction Damages related to Delay, disruption, and inefficienciesMichael Pink
Learn how to quantify damages related to delay, disruption and inefficiencies on Construction projects. Convert your delays and impacts into cost claims with this proven process.
McLachlan Lister provides a range of management consulting and project management services. These are offered either discretely or as an integrated service - you control the depth of our relationship:
This document discusses several project scheduling and management techniques including Gantt charts, PERT charts, critical path method, critical chain scheduling, and using project management software. It provides descriptions and examples of each technique. Gantt charts track task progress visually on a timeline. PERT uses statistical analysis to estimate activity durations. Critical path method identifies the longest sequence of tasks. Critical chain scheduling accounts for limited resources by removing buffers and adding buffers to the project schedule. Project management software can help facilitate communications and schedule analysis if used properly.
The ninth lesson of the course on Planning and Managing Software projects (http://emanueledellavalle.org/Teaching/PMSP-2011-12.html) that I give at Politecnico di Milano
This document provides guidance on updating project schedules. It discusses determining the frequency of updates based on schedule purpose and size. It also outlines the process for collecting progress data from the field, office, owners, and subcontractors. The document details how to status the schedule, calculate updates, check for out-of-sequence work, and verify the updated schedule. It provides recommendations for standard schedule analysis for on-time projects and slipped schedules, including reviewing historical trends, the critical path, and more.
The document describes a "claims triage" process used by the authors' company to evaluate new dispute resolution assignments and choose an appropriate analysis methodology. The process involves assembling a team to review background information on the project, dispute, and available data, and discuss which factors outlined in the AACE recommended practice should guide the methodology selection. The goal is to make a careful, well-documented choice that considers lessons learned from similar past cases.
The document outlines a three step approach to eliminating crisis project management: 1) Developing a schedule-driven program, 2) Creating a project management recovery system, and 3) Developing a scheduling recovery system. Step one involves instituting senior management buy-in for dedicated scheduling. Step two develops strategies for addressing delays from various sources. Step three provides checklists for analyzing schedules and suggesting recovery solutions when slippage occurs. The overall approach aims to minimize costs from delays through proactive scheduling, recovery planning, and applying lessons learned from past issues.
The document discusses function point analysis, a technique for estimating the size of a software project based on its functionality. It describes how function points are determined based on five parameters that capture a system's functionality. These parameters include external inputs/outputs, internal files, and external interfaces. The number of function points is then adjusted based on other complexity factors to estimate the final size of the project.
Network analysis techniques like CPM and PERT are useful for planning, scheduling, and controlling projects. They define activities, durations, and dependencies using a network diagram. The critical path is identified as the longest sequence of activities to complete the project. Monitoring progress against the network allows managers to focus on critical tasks and adjust resources if needed to minimize delays. While useful for large projects, activity definitions and time estimates require care to apply these techniques accurately.
IRJET- Quality Matrices of Project ScheduleIRJET Journal
This document discusses quality matrices for evaluating project schedules developed using critical path method (CPM) scheduling. It outlines 16 quality matrices for assessing schedule logic, relationships, constraints, float, durations, dates, resources, missed tasks, critical path tests, execution indices and more. Threshold values are provided for each matrix to determine whether the schedule requires further investigation. The matrices are intended to establish a framework for developing high quality, technically sound CPM schedules to help ensure effective project execution and outcomes.
This document discusses different methods for analyzing construction delays. It begins with an overview of forensic schedule analysis and definitions. It then examines the main delay analysis methodologies: as-planned vs as-built, impacted as-planned, time impact analysis, and as-built but for. For each methodology, it outlines the approach, strengths, and weaknesses. It emphasizes that the most suitable methodology depends on the specific project factors and available information. It recommends following industry guidance and notes that facts should take precedence over theoretical analyses. The document aims to provide an unbiased overview of delay analysis options to help practitioners choose the right approach.
The document provides an overview of extension of time claims, including definitions, triggers, contractual completion dates, key components, schedule integrity, documentation requirements, responsibility assignment, analysis techniques, and presentation best practices. An extension of time is a reimbursement of time granted to a contract party to compensate for delays outside their control. Triggers include delays impacting the critical path. Strong documentation and schedule integrity are essential, as is assigning responsibility according to the contract. Various analysis techniques can be used depending on the complexity, including as-planned vs as-built comparisons, windows analysis, and impacted as-planned schedules. Presentation should include documentation, graphical schedule representations, and a concise written explanation.
This document discusses various approaches to analyzing delays in construction projects, including As-Planned vs As-Built, Impacted As-Planned, Collapsed As-Built, and Time Impact Analysis using snapshot and window approaches. It defines key delay analysis terms and provides examples of inserting delays into schedules and calculating extension of time and costs using different methods. The preferred approach discussed is window-based Time Impact Analysis, which divides a project into time windows and compares schedules to determine delay impacts at different points in time. Concurrent delays that cannot be separated are generally only entitled to extension of time but not additional costs.
Project Controls Expo - 31st Oct 2012 - Forensic Delay Analysis The Ultimate ...Project Controls Expo
Introduction
1. Why is forensic delay analysis the ultimate test for project controls?
2. Methods of delay analysis
3. Choice of method of delay analysis
4. Demonstration of methods of delay analysis
5. Project controls, data and records for delay analysis
Project Controls Expo - 31st Oct 2012 - Delay Analysis Letting the Evidence S...Project Controls Expo
This document provides an overview of a presentation on delay analysis given by Keith Tregunna, a Director at Knowles. Knowles is a wholly owned subsidiary of Hill International, a large construction consulting firm. The presentation discusses key concepts in delay analysis such as critical path analysis and the importance of proper scheduling and programming techniques according to the Society of Construction Law Delay and Disruption Protocol from 2002. It also provides background on Keith Tregunna and defines important scheduling terms used in delay analysis.
Here are some key BDSM and kink communities on social media:
- BDSM Confessions (Tumblr): An anonymous submission blog for sharing BDSM experiences.
- Bound Bunnies (Tumblr): A SFW blog providing information about BDSM practices.
- BDSM Pet Play (Tumblr and Facebook): Communities focused on animal roleplay.
- General BDSM blogs (Tumblr): Provide education, news and discussions around BDSM.
- BDSM Newbie/Switches/True Life (Facebook): Closed Facebook groups for new and experienced kinksters to connect and learn.
Piezoelectric roads can harvest wasted vibrational energy from passing vehicles and convert it to electricity. They are constructed by embedding piezoelectric generators under asphalt roads. When vehicles pass over, the generators produce electricity from road vibrations. This "green" technology could help meet India's increasing electricity demand and electrify remote areas at low cost. A single lane kilometer of piezoelectric road could generate 44,000 kWh per year, offsetting construction costs within 4 years for large road projects. While maintenance is slightly more complex, piezoelectric roads have proven successful elsewhere and should be adopted in India to boost sustainable development.
The document discusses green road technology and its objectives to reduce pollution, congestion, and environmental impact from road construction and transportation. A green road integrates transportation and ecological sustainability by using alternative construction materials like slag cement and fly ash that cut costs and emissions. It also explores noise-reducing pavements and barriers, permeable surfaces to manage stormwater, and technologies like electric vehicles and wildlife crossings to decrease air and water pollution. The goal is to plan road networks that promote sustainable development both qualitatively and quantitatively.
Este documento presenta un resumen de 3 oraciones o menos del artículo "La sumisión mental: sumisión perfecta" publicado en el número 1 de la revista "Cuadernos de BDSM". El artículo explora la naturaleza de la sumisión mental en el contexto BDSM, describiéndola como un estado mental de profunda entrega, confianza y amor hacia el Amo que trasciende las sesiones individuales. El autor también discute algunas técnicas para lograr este estado, como la introspección, escenas de adoración y
The document describes a five-step plan to modernize roadways called the "Smart Highway" developed by Studio Roosegaarde and Heijmans. The plan includes interactive and sustainable roads that can communicate with drivers and automatically adapt to traffic and weather conditions. It involves glow-in-the-dark lanes, dynamic paint, interactive lights, induction charging lanes for electric cars, and wind-powered lights. The proposal aims to create an innovative and cost-effective design that sparks future innovations for driving while also creating a more beautiful landscape.
Session W2 - Delay Claims and Analysis Based on FIDIC Forms of ContractProject Controls Expo
The document discusses various methods for analyzing delays on construction projects, with a focus on analyzing delays according to FIDIC forms of contract. It begins by defining delay and disruption, and the purposes of extension of time clauses. It then outlines common delay analysis methodologies, including as-planned vs as-built, impacted as-planned, collapsed as-built, and time impact analysis. Finally, it summarizes FIDIC claims provisions and how they relate to extensions of time, costs, and potential claims for profit.
1) The document discusses global trends like urbanization that are contributing to increased urban congestion and presents potential solutions like road space rationing and congestion pricing.
2) It evaluates these approaches and finds that while road space rationing addresses congestion, it is not a long term solution, whereas congestion pricing in Singapore has significantly reduced travel times and increased road safety, but requires costly infrastructure investment.
3) The document concludes that as technologies advance, governments must engage citizens to ensure accountability and transparency, and that developing countries should initially focus on improving public transportation rather than advanced technologies.
This document discusses using plastic waste in road construction. Plastic roads involve mixing shredded plastic waste like plastic bags and bottles with hot bitumen. Field trials show plastic can increase road strength and reduce costs. Advantages include using more plastic waste, reducing bitumen needs, and increasing road strength and lifespan. However, there are also disadvantages like toxic chemicals potentially leaching from the plastic and noxious gas releases during construction. The conclusion is that plastic roads could help strengthen infrastructure while improving the environment if the disadvantages around leaching and emissions can be addressed.
The document discusses user attitudes towards automated highway systems. It found broad acceptance of safety and warning systems, driver assistance systems, and fully automated highways. Acceptance varied between social groups and the different stages of development. Safety and warning systems, which provide information to drivers about road conditions and potential dangers, were already used by 50% of drivers and found useful, reliable, and good value especially for unfamiliar journeys, at night, and on motorways.
Solar Roadways is a completely new and revolutionary technology that would prove itself to be the green technology, saving a lot of fossil fuels and would also be helpful for a much smarter transportation system as it would provide smarter roads.
Solar Roadways - The future transport system ( Seminar report by Swapnil Patw...Swapneil Patwari
A solar roadway is a road surface that generates electricity by solar power photovoltaic cells. One current proposal is for 12 ft x 12 ft (3.658 m x 3.658 m) panels including solar panels and LED sign-age, that can be driven on. The concept involves replacing highways, roads, parking lots, driveways, and sidewalks with such a system. A layer of embedded LEDs will be used to create traffic warnings or crosswalks, and excess electricity could be used to charge electric vehicles or routed into the power grid. The electrical components will be embedded between layers of extremely durable, textured glass. A solar roadway is a series of structurally engineered solar panels that are driven upon. The idea is to replace current petroleum-based asphalt roads, parking lots, and driveways with solar road panels that collect energy to be used by homes and businesses, and ultimately to be able to store excess energy in or alongside the solar roadways. Thus renewable energy replaces the need for the current fossil fuels used for the generation of electricity, which cuts greenhouse gases and helps in sustainable development.
Parking lots, driveways, and eventually highways are all targets for the panels. If the entire United States Interstate Highway system were surfaced with Solar Roadways panels, it would produce more than three times the amount of electricity currently used nationwide. Existing prototype panels consist of three layers. 1. Road surface layer, 2. Electronics layer, 3. Base plate layer. Road Survey of India: India had a road network of over 42,45,805 kilometers in 2011.
In which national highways and state highways cover 0.05% of total road network.
These highways can produce 450TWh of electricity according to references when they are surfaced by solar panels.
But India needs 991TWh of electricity.
This implies that if 0.1% of total road network of India is surfaced with Solar Roadway panels, it would illuminate our nation. CONCLUSION: For roughly the same cost of the current systems (asphalt roads and fossil fuel burning electricity generation plants), the Solar Roadways can be implemented.
No more Global Warming.
Safer driving conditions.
Far less pollution.
A new secure highway infrastructure that pays for itself.
A decentralized, self-healing, secure power grid.
No more dependency on foreign oil.
Types of roads can be classified based on speed and accessibility. The main types discussed are:
1) Freeways have strict rules - they are multi-lane divided roads with no stops or cross traffic and limited access for pedestrians and bicycles. Entrance and exit ramps allow vehicles to safely merge or exit at freeway speeds.
2) Major highways have high speeds like freeways but may have turning lanes and traffic lights or interchanges. Access is partially limited.
3) Minor highways connect residential areas or rural areas and can have divided or undivided lanes with possible stops.
Local streets provide access to properties with full access and slow speeds while collectors and arterials have increasing
The document discusses the basic activities and features of expert systems, including interpretation of data, prediction, diagnosis, design, monitoring, planning, debugging, repair, instruction, and control. It also describes knowledge representation techniques like semantic nets, frames, slots, and forward and backward reasoning. The stages of expert system development include identification, conceptualization, formalization, system design, development, testing and evaluation, and revision. Common programming methods are rule-based, frame-based, procedure-oriented, object-oriented, and logic-based. Expert system building tools include shells that provide basic components like a knowledge base and reasoning engine.
This document provides information about the CS 331 Data Structures course. It includes the contact information for the professor, Dr. Chandran Saravanan, as well as online references and resources about data structures. It then covers topics like structuring and organizing data, different types of data structures suitable for different applications, basic principles of data structures, language support for data structures, selecting an appropriate data structure, analyzing algorithms, and provides an example analysis of a sample algorithm's runtime complexity.
Observability – the good, the bad, and the uglyTimetrix
This document discusses observability and incident management. It notes that incidents are expensive and reduce credibility. Common causes of outages include changes, network failures, bugs, human errors, hardware failures, and unspecified issues. The timeline of an outage includes detection, investigation, escalation, and fixing. Many companies have a "zoo" of monitoring solutions that are difficult to manage. Common anti-patterns include an exponential growth of metrics that nobody understands. The document advocates focusing on key performance indicator metrics and using time-series databases, distributed tracing, and machine learning to more quickly detect anomalies and reduce incident timelines. It describes an open source project called Timetrix that combines metrics, events and traces for improved observability.
Cybernetics in supply chain managementLuis Cabrera
This document discusses the role of operations research and simulation modeling in developing a cybernetic dynamic simulation model of a manufacturing supply chain system. It notes that production planning is a key but complex component that benefits from mathematical algorithms and computer modeling. Simulation allows analyzing complex systems with many variables and obtaining solutions that aren't possible with closed-form equations. The document provides examples of why simulation is useful and discusses representing real-world processes and testing different configurations and policies.
Seminar given by Marco Montali on 31/05/2016 at the Department of Computer Science, University of Verona. Title: Data-aware business - balancing between expressiveness and verifiability.
Observability - The good, the bad and the ugly Xp Days 2019 Kiev Ukraine Aleksandr Tavgen
Talk about approaches to an observability. Do we need millions of metrics? Anomalies vs regularities? Can Machine Learning help us? Some abilities of Flux language by InfluxData
It covers general problem of creating monitoring and observability without killing your Ops motivation team with False Positives and unexplained alerts.
Problems on this side, pitfalls, anti-patterns, and how to make it right.
How to manage a monitoring zoo. Spaghettification of dashboards. Why Uber needs 9 billion metrics (¯\_(ツ)_/¯) and why this is antipattern. Metrics as a stream of data. We talk about new Flux language from InfluxDb. A bit of time series analysis and defining of pipelines in Flux for metrics data. Drunkyard walk on your metrics or why to measure a randomness.
'A critique of testing' UK TMF forum January 2015 Georgina Tilby
This presentation draws upon the 'Critique of Testing' Ebook that was discussed at January's UK TMF forum. The slides explore the fundamental concepts of test case design and provide a detailed analysis of each method in terms of them.
Overview of schedule and cost risk analysis methodology for aerospace industry.
For more information how to perform schedule risk analysis using RiskyProject software please visit Intaver Institute web site: http://www.intaver.com.
About Intaver Institute.
Intaver Institute Inc. develops project risk management and project risk analysis software. Intaver's flagship product is RiskyProject: project risk management software. RiskyProject integrates with Microsoft Project, Oracle Primavera, other project management software or can run standalone. RiskyProject comes in three configurations: RiskyProject Lite, RiskyProject Professional, and RiskyProject Enterprise.
The document discusses quantitative risk analysis methods for space system projects using an event chain methodology. It describes defining events and event chains that can impact a project, analyzing their probabilities and relationships, and using Monte Carlo simulation to assess their cumulative effects over time. A project example illustrates defining activities, assigning risks and mitigation efforts as events, tracking performance against the original estimate, and regularly reassessing events based on new data. The methodology aims to help project managers better understand project uncertainties and risks.
Semantic CEP with Reaction RuleML, Keynote at 8th International Web Rule Symposium (RuleML 2014) @ ECAI 2014, Prague, Czech Republic, August 18-22, 2014
Using InfluxDB for Full Observability of a SaaS Platform by Aleksandr Tavgen,...InfluxData
Aleksandr Tavgen from Playtech, the world’s largest online gambling software supplier, will share how they are using InfluxDB 2.0, Flux, and the OpenTracingAPI to gain full observability of their platform. In addition, he will share how InfluxDB has served as the glue to cope with multiple sets of time series data, especially in the case of understanding online user activity — a use case that is normally difficult without the math functions now available with Flux.
The document discusses machine learning and data science concepts. It begins with an introduction to machine learning and the machine learning process. It then provides an overview of select machine learning algorithms and concepts like bias/variance, generalization, underfitting and overfitting. It also discusses ensemble methods. The document then shifts to discussing time series, functions for manipulating time series, and laying the foundation for time series prediction and forecasting. It provides examples of applying techniques like median filtering to smooth time series data. Overall, the document provides a high-level introduction and overview of key machine learning and time series concepts.
This document provides an overview and introduction to the concepts taught in a data structures and algorithms course. It discusses the goals of reinforcing that every data structure has costs and benefits, learning commonly used data structures, and understanding how to analyze the efficiency of algorithms. Key topics covered include abstract data types, common data structures, algorithm analysis techniques like best/worst/average cases and asymptotic notation, and examples of analyzing the time complexity of various algorithms. The document emphasizes that problems can have multiple potential algorithms and that problems should be carefully defined in terms of inputs, outputs, and resource constraints.
Simulation involves developing a model of a real-world system over time to analyze its behavior and performance. The key aspects covered in this document include defining simulation as modeling the operation of a system over time through artificial history generation and observation. Simulation models can be used as analysis and design tools to predict the effects of changes to a system before actual implementation. Discrete event simulation is discussed as a common technique that models systems with state changes occurring at discrete points in time. The document also outlines the steps in a typical simulation study including problem formulation, model conceptualization, experimentation and analysis.
Data structures and algorithms Module-1.pdfDukeCalvin
This document provides an introduction to the course "Introduction to Data Structures and Algorithms". The course objectives are for students to learn basic static and dynamic data structures, analyze algorithms in terms of time and memory complexity, and understand the advantages and disadvantages of different algorithms and data structures. The document then discusses what algorithms are, their key characteristics, and why understanding algorithms and data structures is important for solving computational problems efficiently. It also defines what data structures are and why they are needed to organize large amounts of data.
The document discusses several methodologies for systems development including structured systems analysis and design methodology (SSADM), systems development life cycle (SDLC), the waterfall model, data-centered approach, object-oriented approach, prototyping, and soft systems methodology (SSM). Each methodology has a different focus such as logical processes, sequential phases, data modeling, reusable objects, or unstructured problem solving. The document also introduces concepts like the unified modeling language, CATWOE analysis, and rich pictures used in various methodologies.
Using Time Series for Full Observability of a SaaS PlatformDevOps.com
Aleksandr Tavgen from Playtech, the world’s largest online gambling software supplier, will share how they are using InfluxDB 2.0, Flux, and the OpenTracingAPI to gain full observability of their platform. In addition, he will share how InfluxDB has served as the glue to cope with multiple sets of time series data.
This document provides a summary of recent literature related to scheduling problems, with a focus on problems involving multiple parallel machines or devices. It discusses surveys and articles on scheduling problems in various contexts like industry, cloud/edge computing, and mobile networks. The document aims to give a comprehensive overview of the different approaches and algorithms used to address scheduling problems in emerging fields driven by technological progress, such as modern factories, mobile networks, cloud computing, and fog/edge computing. It observes that heuristics and approximate algorithms are increasingly important for scheduling problems due to the complexity introduced by uncertainties.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Comparative analysis between traditional aquaponics and reconstructed aquapon...
SanDiegoPresentation
1. A New Paradigm for
Delay Analysis
The Hybrid Dynamic Simulation Engine
Anders Axelson
Director, Pezala Consulting
Melbourne, Australia
Marriott Marquis Marina
San Diego CA
16 January 2015
pezalaconsulting
2. Data Inputs Into a Delay Analysis
• Consider the Data Required to Perform a Delay
Analysis…
• There are three types of inputs into setting up a
network model for delay analysis -
• Planning (including estimating and modelling)
• Factual
• Legal
pezalaconsulting
3. Data Inputs Into a Delay Analysis
Recorded Progress
Measurements
Facts About
Causative Events
Estimated Durations
Other Constraints on the
Network Model:
Availability
Precedence
Resource Gang Sizes
Resource Pool Sizes
Unary
WBS
FACTUAL INPUTS
PLANNING/ MODELLING
INPUTS
LEGAL INPUTS
Excusability
Causal Chain Initiation
and Severance
Factual Deeming
Provisions
Resolution of Concurrency
Cases
“Float” Ownership
SCHEDULING
Forward Pass
Backward Pass
Resource Levelling
Heuristic
Standard of Proof
SIMULATING
RESULTS
START
pezalaconsulting
4. Legal Aspects of Delay Analysis
• Consider the usual way in which the law deals with matters of causation
• Identifying dominant/ proximate cause
• A matter of common sense (cf. juries, drunk driver)
• Problems arise when the court has difficulty discriminating between two or more causes that have equal
causative potency…
• “Concurrent” causes - a special rule is required (cf. wills)
• Concurrency problems recur in different areas of law.
• Legal system is completely deterministic…
• Uncertainty is dealt with by a cascading system of appeals, not hedging bets as to outcomes.
• The place for fuzzy logic/ stochastic/ probabilistic/ Monte Carlo analysis within the context of forensic
scheduling is limited. (cf. sentencing)
• It’s about making determinations, not about probability!
pezalaconsultingpezalaconsultingpezalaconsulting
5. • It is in this context that CPM-based methods can be considered…
• CPM deals with causation problems in the special context of project delay…
• CPM is best regarded as replacing or refining the dominant cause/ proximate cause paradigm
• In this regard, the critical path or critical delay may be deemed to be the dominant/ proximate
cause
• In the context of forensic scheduling, the whole point of CPM is to provide a more objective and
scientific method for identifying the dominant/ proximate cause of a particular delay event,
thereby replacing the impressionistic or “common sense” approaches that courts and tribunals
would otherwise have to rely on.
• In theory at least, this supposedly should reduce the ambiguity and the extent to which
“concurrency problems” arise.
• CPM also ties in well with the deterministic requirement (unlike Monte Carlo method, PERT,
GERT etc.)
Relationship with Law on Causation
pezalaconsultingpezalaconsulting
6. • Computational complexity theory
• Computer science differentiates between….
• Computationally “easy” problems that can be solved by the application of mathematical formulae, algebra or
algorithms that are guaranteed to converge straightforwardly on a solution. Methodologies are either correct or
incorrect. A methodology that produces an incorrect answer in a case can be dismissed as wrong.
• “Puzzle-like” problems that require searching for a solution…
• (a) Problems that can be solved by brute force or a process of elimination. For example, look at every possible
configuration and then eliminate each sub-optimal solution by brute force. (e.g. tic-tac-toe a.k.a. noughts and
crosses there are 39 = 19,683 possible configurations).
• (b) Puzzle-like problems for which the domain of the solution space is too large for a brute force search and so
require the application of a heuristic/ rule of thumb/ artificial intelligence in order to search for the best possible
solution for the computational capacity available (e.g. chess there are 1364 = 196,053,476,430 possible
configurations). Known as “non-polynomial deterministic complete” or “NP-complete” or “NP-hard”.
• Note that numbers are based on factorial number series so the number of items that put it beyond the threshold of
(a) are very modest, even with modern day computers.
• Solutions are either optimal (correct) or sub-optimal (incorrect) but a superior methodology for one case will not
necessarily be a superior methodology in other cases. A methodology that produces an inferior or sub-
optimal solution in a case cannot be dismissed as wrong because it may produce a superior or optimal
solution in another case.
• A schedule without resource levelling is computationally easy. Forward pass and backward pass. This is the same for
all software (save for quirks such as dealing with “ladders”).
• Resource levelling, however, is an NP-hard problem. Requires searching for an optimal solution. No guarantee that
the configuration your software finds for you will be the optimal one.
• More exotic types of constraint are available in some software (e.g. modelling of transition times).
pezalaconsultingpezalaconsulting
Relationship with Computer Science
7. Relationship with Planning and Scheduling
• Consider the difference between planning and scheduling…
• Scheduling…
• A purely mathematical exercise in problem solving,
• Projects are modelled as a network (= network optimization).
• Lends itself to being solved by computational methods (algorithms/ heuristics).
• Minimizing project duration/ makespan (or cost) subject to a set of constraints…
• The work tasks that need to be carried out for the project to be complete (i.e. WBS)
1. The time it takes to complete each work item (i.e. activity durations).
2. The precedence relationships between work items.
3. The availability of resources to complete each work item (i.e. ‘calendars’)
4. Unary decision domain constraints (i.e. SNET, FNLT, SO, FO etc.)
5. Resource gang requirements associated with each activity and resource pool sizes associated with the
whole project.
• More exotic types of constraint are available in some software (e.g. modelling transition times).
pezalaconsultingpezalaconsulting
8. • The complexity of scheduling…
• The work tasks that need to be carried out for the project to be complete (i.e.
WBS)
• The time it takes to complete each work item (i.e. activity durations).
• The precedence relationships between work items.
• The availability of resources to complete each work item (i.e. ‘calendars’)
• Unary decision domain constraints (i.e. SNET, FNLT, SO, FO etc.)
• Resource gang requirements associated with each activity and resource pool
sizes associated with the whole project. —-> NP-hard
• More exotic types of constraint are available in some software (e.g. modelling
transition times).
pezalaconsultingpezalaconsulting
Relationship with Planning and Scheduling
9. • Scheduling:
• Consider t = value of time clock (work front, “time now”, “data date” etc.)
• t versus m diagram
• Scheduling = minimizing m for a fixed value of t
• But delay occurs across multiple values of t
• Delay analysis:
• An extension of scheduling.
• t is changed from a constant to a variable.
• Delay is just the difference in time between two scenarios. So tallying delay between timeframes is computationally
simple.
• Mathematical methods are performed across multiple values of t in order to measure delay.
• Therefore, it is all math and it’s about getting the mathematical methods right (not case law, not art).
• It is only NP-hard to the extent that it incorporates a resource levelling process from the scheduling process.
pezalaconsultingpezalaconsulting
Relationship with Planning and Scheduling
10. Data Inputs Into a Delay Analysis
Recorded Progress
Measurements
Facts About
Causative Events
Estimated Durations
Other Constraints on the
Network Model:
Availability
Precedence
Resource Gang Sizes
Resource Pool Sizes
Unary
WBS
FACTUAL INPUTS
PLANNING/ MODELLING
INPUTS
LEGAL INPUTS
Excusability
Causal Chain Initiation
and Severance
Factual Deeming
Provisions
Resolution of Concurrency
Cases
“Float” Ownership
SCHEDULING
Forward Pass
Backward Pass
Resource Levelling
Heuristic
Standard of Proof
SIMULATING
RESULTS
START
pezalaconsulting
11. Inputs Into Delay Analysis
• Legal Inputs
• The standard of proof (that is, the weight of factual evidence that is
required before a fact can be modelled)
• Which delays are excusable and which are inexcusable
• When causal chains leading to events initiate and when they are
severed
• How concurrency problems are resolved
• How ‘float ownership’ is resolved
• Deeming provisions that relate to how facts are interpreted by the law
(e.g. the postal rule)
pezalaconsultingpezalaconsulting
12. • Factual Inputs:
• Progress records (e.g. activity, percent
complete, recording time)
• Records about the timing of causal events
leading to delay
pezalaconsultingpezalaconsulting
Inputs Into Delay Analysis
13. • Planning Inputs
• Estimating = calculations of activity durations
• Modelling = professional (engineering )judgment
calls about how project is to be represented as
a network
pezalaconsultingpezalaconsulting
Inputs Into Delay Analysis
14. • Planning:
• Estimating activity durations.
• Devising an appropriate network model.
• Quantifying the constraints that apply to the network model that determine
the project makespan.
• Making professional judgement calls about how the work should be
modelled as a network.
• Note that modelling is core competence of the engineering profession
and, as with all professions, entails an aspect of “art”
• The outputs of planning are the inputs of scheduling
pezalaconsultingpezalaconsulting
Inputs Into Delay Analysis
15. Relationship with the Scientific Method
• What is “the scientific method”? (cf. Daubert etc.)
• Misleadingly named - a general set of principles that allow factual conclusions that are objectively grounded (and
therefore legitimate) to be distinguished from illegitimate conclusions that arise from arbitrary, subjectively-grounded art
or from pseudoscience. Basically ensures objectivity and transparency.
• Reproducibility - a result can be reproduced by another who follows the same technique.
• Falsifiability - a conclusion is either correct or incorrect. It is not a case of “there are no right or wrong answers”.
• Other principles that relate to transparency and facilitate reproduction such as full disclosure and peer review.
• cf. Art is subjective. Different for different people. No right or wrong.
• cf. Pseudoscience. Irreproducible or arbitrary methodologies dressed up to look like science. e.g. astrology, homeopathy,
reiki.
• So, for delay analysis to be considered at one with scientific method:
• The same set of inputs (network model, constraints, progress records, and legal inputs) should produce the same
conclusion about EOT.
• The conclusion should be correct irrespective of whether it was reached on behalf of the developer/owner or contractor
pezalaconsultingpezalaconsulting
16. • Conclusion
• Project delay analysis (1) as it currently represented in professional literature (e.g. UK SCL
Protocol and the AACE 29RP-03) and (2) as it is practised by experts around the world fails to
meet basic standards to qualify it as a legitimate field of science which is wholly consistent with
the scientific method.
• Why??
• Multiple solutions (4 methods in the SCL Protocol, 13 in the AACE RP). Only one solution
should be correct for a computational problem that is not NP-hard.
• Lack of falsifiability… there is no right or wrong methodology prescribed… “Well, I applied the
time impact evaluation method. You applied the as-built collapsed method. Your results may be
correct for the method you used and the assumptions you made but mine are correct for the
method I used…”
• Lack of reproducibility. Hiding behind walls of assumptions. Hiding behind software.
• Scientific method implies that, for a given set of inputs (modelling, estimating, recording,
factual, legal) the conclusions that an expert reaches in relation to EOT entitlement should be
the same irrespective of which party the expert is hired by.
• cf. Failure of single joint experts to take off.
pezalaconsultingpezalaconsulting
Relationship with the Scientific Method
17. Data Inputs Into a Delay Analysis
Recorded Progress
Measurements
Facts About
Causative Events
Estimated Durations
Other Constraints on the
Network Model:
Availability
Precedence
Resource Gang Sizes
Resource Pool Sizes
Unary
WBS
FACTUAL INPUTS
PLANNING/ MODELLING
INPUTS
LEGAL INPUTS
Excusability
Causal Chain Initiation
and Severance
Factual Deeming
Provisions
Resolution of Concurrency
Cases
“Float” Ownership
SCHEDULING
Forward Pass
Backward Pass
Resource Levelling
Heuristic
Standard of Proof
SIMULATING
RESULTS
START
pezalaconsulting
18. • Error is a scientific concept, not necessarily pejorative. It refers to
any discrepancy between anticipated and actual inputs or outputs…
• Estimating error <— inevitable, cannot be helped
• Modelling error <—-professional judgment, inevitable
• Recording error <—- inevitable, but can be minimized
• Methodological error <—- the thing to focus on minimizing !!
• Rounding error <— easy to eliminate
• Legal error <—- can model different scenarios
pezalaconsultingpezalaconsulting
Error in Delay Analysis
19. Conclusions from the UK
• Conclusion
• Described as “dark art” (Barry, Lowsley and Linnett) - I partly agree and partly
disagree.
• See UK cases where delay experts have been criticised:
• Skanska v. Egger - expert criticized for presenting “computer programme logic
demonstrably collided with fact”
• London Borough of Lambeth - adjudicator criticized for performing his own delay
analysis rather than deferring to the parties.
• Great Easter Hotel - expert criticized for a lack of objectivity and producing an
analysis unreasonably favourable to his client
• The fact that there are aspects of error and professional art inevitably needed in
representing a project as a model and that other inputs (legal, factual) are inevitably
subject to error does not excuse a less-than-scientific approach to the computational
methodology.
pezalaconsultingpezalaconsulting
20. AACE and SCL Approaches
• SCL: UK Society of Construction Law (2002) Protocol on Delay and
Disruption
• Four named methods: as-planned versus as-built, as-planned impacted,
as-built collapsed, time impact analysis
• AACE: Recommended Practice 29R-03
• Nine “Method Implementation Protocols” (MIPs):
• Designed to be used in conjunction with PPM software with a single
instance of t (or at least, simple static variance comparisons with no more
than a couple of baselines)
pezalaconsulting
21. •
SCL Method
(SCL Protocol, 2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross
MIP 3.2 Observational/ Static/ Periodic
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-Planned MIP 3.6 Modeled/ Additive/ Single Base
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation
MIP 3.9 Modeled/ Subtractive/ Multiple Base
AACE and SCL Approaches
pezalaconsulting
22. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Time Intervals
Between Iterations
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross Single iteration for
whole project.
MIP 3.2 Observational/ Static/ Periodic Typically months.
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base Typically weeks to
months.
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation
MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Hours.
• Typical time intervals between iterations?
AACE and SCL Approaches
pezalaconsulting
23. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Are Iterations
Automated?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross No.
MIP 3.2 Observational/ Static/ Periodic
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation
MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Yes.
• Are iterations automated?
AACE and SCL Approaches
pezalaconsulting
24. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does the Delay Analysis
Method Incorporate the
Critical Path Method?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross No.
MIP 3.2 Observational/ Static/ Periodic Yes.
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base Partially (only forward pass is
used).
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation Partially (only backward pass is
used).MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Yes.
• Does the method incorporate the critical path method?
AACE and SCL Approaches
pezalaconsulting
25. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does It Take Into Account
Instances When Delays Are
Causally Pre-Empted by
Discrete Events?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross No.
MIP 3.2 Observational/ Static/ Periodic
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base Yes.
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation No.
MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Yes.
• Does the method take into account instances when delays are
causally pre-empted by discrete events?
AACE and SCL Approaches
pezalaconsulting
26. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does It Accurately Account for the Effects of
Delays Occurring At the Same Time?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross No.
MIP 3.2 Observational/ Static/ Periodic Yes - uses critical path to determine which of
continuous delays occurring within same time
window is deemed causative of delay for whole
window.
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base No. All delays are deemed to occur serially. If
delays occur in parallel an arbitrary order needs
to be chosen to model them as events occurring
one after the other if their respective effects are
to be accounted for separately.
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation
MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Yes.
• Does the method accurately account for the effects of delays
occurring at the same time?
AACE and SCL Approaches
pezalaconsulting
27. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does It Accurately Account for the
Effects of Delays Occurring One
After the Other?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross No.
MIP 3.2 Observational/ Static/ Periodic No - if delays occur in same time
window.
Yes - if delays occur in different time
windows.
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base Yes.
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation
MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Yes.
• Does the method accurately account for the effects of delays
occurring one after the other?
AACE and SCL Approaches
pezalaconsulting
28. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does It Take As-
Planned Times
Into Account?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross Yes.
MIP 3.2 Observational/ Static/ Periodic
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation No.
MIP 3.9 Modeled/ Subtractive/ Multiple Base Yes.
Best Practice
Yes.
• Does the method take as-planned times into account?
AACE and SCL Approaches
pezalaconsulting
29. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does It Take As-
Built Times Into
Account?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross Yes.
MIP 3.2 Observational/ Static/ Periodic
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base No.
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base Yes.
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation
MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Yes.
• Does the method take as-built times into account?
AACE and SCL Approaches
pezalaconsulting
30. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does It Take Interim Progress
Measurements Into Account?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross No.
MIP 3.2 Observational/ Static/ Periodic Yes - if time windows are chosen that
coincide with times when progress is
measured.
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base No.
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base Yes - if time windows are chosen that
coincide with times when progress is
measured.
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation No.
MIP 3.9 Modeled/ Subtractive/ Multiple Base Yes - if time windows are chosen that
coincide with times when progress is
measured.
Best Practice
Yes - each part of an activity spanning
between successive progress measurements
is analysed separately.
• Does the method take interim progress measurements into account?
AACE and SCL Approaches
pezalaconsulting
31. SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
Does It Accurately Account for Activity Progress
Between Progress Measurements?
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross No.
MIP 3.2 Observational/ Static/ Periodic Yes - if time windows are chosen that coincide with
times when progress is measured.MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base No.
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base No - adopts a forward stepwise interpolation from start
of window (which assumes that all progress within a
time window is equal to the progress measurement at
the start of the window).
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation No.
MIP 3.9 Modeled/ Subtractive/ Multiple Base No - adopts a backward stepwise interpolation from
end of window (which assumes that all progress within
a time window is equal to the progress measurement at
the end of the window).
Best Practice
Yes - adopts a linear interpolation (takes both the
previous and the next progress measurements into
account and derives an intermediate value on a straight
line basis).
• Does the method accurately account for activity progress between
progress measurements?
AACE and SCL Approaches
pezalaconsulting
32. An Optimal Method of Delay Analysis?
• Key Features:
1. Hybrid (Continuous and Discrete) Timescale
2. Three Delay Types Treated Separately:
A. Discrete Event delays (occur in discrete time)
B. Arc delays (occur in continuous time)
C. Node delays (occur in continuous time)
3. Continuous Delays: Emphasis on Modelling the Path Growth Rate
4. Discrete delays: can be modelled with before versus after comparison using fragnets etc.
5. Incorporation of Interim progress measurements
6. Introduction of the Excusability Coefficient
7. Adapt network so that the path growth rate is a constant for each element
8. Dealing with Concurrent Delay and Float Ownreship in a Sound Manner
pezalaconsulting
33. The Continuous-Discrete Dichotomy
• Some delays occur gradually as a result of work proceeding on activities
at a slower rate than forecast. Such delays occur in ‘continuous time’.
• e.g. excavation - ground harder than expected, contractor waiting for
the release of design information
• Other delays arise from events in ‘discrete time’ - that is, independently
founded events that bring about (or are deemed by the application of
relevant legal doctrine to bring about) an instantaneous change to
downstream scheduled activities planned or forecast for the future.
• e.g. change order to work downstream of current work front.
• Hybrid timescale…
pezalaconsulting
34. The Hybrid Timescale
Hour 1
Time (t)
Hour 2 Hour 3 Hour 4 Hour 5 Hour 6 Hour 7
Continuous Time
Event 1
Event 2
Event 3
Discrete Time
pezalaconsulting
35. The Continuous-Discrete Dichotomy
SCL Method
(SCL Protocol,
2002)
AACE Method
(AACE Recommended Practice 29R-03, 2011)
As-Planned versus
As-Built
MIP 3.1 Observational/ Static/ Gross
MIP 3.2 Observational/ Static/ Periodic
MIP 3.3 Observational/ Dynamic/ Contemporaneous/ As-Is
MIP 3.4 Observational/ Dynamic/ Contemporaneous/ Split
MIP 3.5 Observational/ Dynamic/ Modified or Recreated
Impacted As-
Planned
MIP 3.6 Modeled/ Additive/ Single Base
Time Impact
Analysis
MIP 3.7 Modeled/ Additive/ Multiple Base
As-Built Collapsed MIP 3.8 Modeled/ Subtractive/ Single Simulation
MIP 3.9 Modeled/ Subtractive/ Multiple Base
Best Practice
Discrete
Continuous
• MIPs 3.1 - 3.5 model delay as continuous only
• MIPs 3.6 - 3.9 model delay as discrete only
• Best practice: a hybrid timescale…
pezalaconsulting
36. The Three Types of Delay
• Three types of delay:
• e.g. excavation - ground harder than expected, contractor
waiting for the release of design information
• Other delays arise from events in ‘discrete time’ - that is,
independently founded events that bring about (or are deemed
by the application of relevant legal doctrine to bring about) an
instantaneous change to downstream scheduled activities
planned or forecast for the future.
• e.g. change order to work downstream
• Hybrid timescale
pezalaconsulting
37. The Continuous-Discrete Dichotomy
Set Clocktime = 0
FINISH
Discrete Simulation
Process
yes
yes
no
Is Next Step
Discrete?
Continuous Simulation
Process
no
Has Simulation
Reached End?
Clocktime++
Simulation allows Continuous
and Discrete Steps to be
Interwoven with Each Other…
pezalaconsulting
38. Accounting for Arc and Node Delays
PROJECT
START
PROJECT
FINISH
Logic Link
Task
Milestone
pezalaconsulting
39. PROJECT
START
PROJECT
FINISH
Arc (experiences arc delay)
Arc (does not experience delay)
Node (experiences node delay)
Node (does not experience delay)
Accounting for Arc and Node Delays
pezalaconsulting
40. PROJECT
START
PROJECT
FINISH
Path Growth Rate
of Node is 1 Path Growth Rate
of Arc is n2
Path Growth Rate
of Node is 1
Path Growth Rate
of Arc is n1
Accounting for Arc and Node Delays
pezalaconsulting
41. PROJECT
START
PROJECT
FINISH
Making Task Start Nodes
Separate Elements of
Network So That Node Delay
to Task Start (a.k.a.
“Commencement Delay”)
is Tracked Separately
Accounting for Arc and Node Delays
pezalaconsulting
42. PROJECT
START
PROJECT
FINISH
Making Task Start Nodes
Separate Elements of
Network So That Node Delay
to Task Start (a.k.a.
“Commencement Delay”)
is Tracked Separately
Accounting for Arc and Node Delays
pezalaconsulting
43. The Three Types of Delay
• Discrete Event Delay (on the discrete timescale)
• Arc Delay (on the continuous timescale)
• Node Delay (on the continuous timescale)
•
pezalaconsulting
44. The Three Types of Delay
Arc Delay
• Network delay that arises spontaneously on the work front when a forecast task is carried out at a lower
(or different rate) of progress to that planned or forecast.
• Examples: excavation in tougher than expected geological conditions; a task with lower resource
• Arc delay is meaningfully represented as a path growth rate (q). This is the rate per unit time at which the
activity path that the arc falls on is lengthening. It equals unity minus the progress ratio (r).
• For example, if a task is planned to take 60 working hours and takes 80 working hours, then:
The progress ratio (r) is (60/80) = 0.75.
The rate of path growth (q) = 1 - r =0.25
dp/dt = 1 - dr / dt
The resultant arc delay is 80 - 60 = 20 hours.
• Arc delay from every task or sub-task on a network is derived from a comparison between the planned
or forecast duration, and the actual duration of the task or sub-task.
• Arc delay only occurs in relation to tasks or sub-tasks; never to logic links.
•
pezalaconsulting
45. The Three Types of Delay
Node Delay
• Network delay that arises when waiting for a milestone
to occur or a node to materialize.
• Progress Rate is always 0.
• Path Growth Rate is always 1.
• Examples: waiting for a task to start (“commencement
delay”), waiting for a client to release design information,
waiting for a client to issue free issue materials.
•
pezalaconsulting
46. The Three Types of Delay
Discrete Event Delay
• Network delay that arises spontaneously on the work front when a
forecast task is carried out at a lower (or different rate) of progress to
that planned or forecast
• Causes an instantaneous change to the network or the constraints that
apply to it and arises from a discrete event.
• Associated with causal chains, stemming from a root cause - unless
there is the intervention of a novus actus interveniens that severs the
chain of causation.
• Discrete event can be
• May be represented by fragnets - network fragments that model
instantaneous change.
pezalaconsulting
47. The Three Types of Delay
Forecast Actual PGR
Discrete Delay ∞
Node Delay 1
Arc Delay q ∈ [0,∞)
pezalaconsultingpezalaconsulting
48. Modelling Discrete Delay
• Relatively straightforward comparison - before versus after on a
ceteris parabis basis, such as with a time impact analysis/ MIP 3.7.
• Note role of causal chain theory…
• Unlike node delays and arc delays, discrete event delay is
ascertainable without reference to the critical path.
• Discrete event delay does not show up in an as-planned versus as-
built comparison.
• It is simply the change in terminal-to-terminal length of the longest
path that the event being modelled brings about.
• Discrete change may be modelled by fragnets - fragments of the
network.
pezalaconsulting
49. Modelling Discrete Delay
• Fragnets can be incorporated into the network from project
commencement and then turned on or “activated” when the discrete
event occurs A fragnet means a ‘network fragment’ that is added or
subtracted to a network in order to model the effects of
instantaneous change.
• It is a joined set of network elements - arcs and nodes for a
topological network, or activities and links for a CPM network.
• This way, all data structures needed for the simulation can be
inducted in advance of the simulation All network elements are
incorporated within the topology of a single master network. Change
is then modelled by activating and deactivating elements. A
deactivated element plays no part in critical path calculations..
• Virtually all discrete change can be modelled by fragnets…
pezalaconsulting
51. PROJECT
START
PROJECT
FINISH
Accounting for Discrete Events
Addition of Fragnet…
Arcs and Nodes Are
Incorporated Into The
Network But Are Inactive
Until the Clock Time
Reaches the
Discrete Event Milestone -
Then Are Activated…
Discrete Event
Milestone
pezalaconsulting
52. PROJECT
START
PROJECT
FINISH
Accounting for Discrete Events
Addition of Fragnet…
Arcs and Nodes Are
Incorporated Into The
Network But Are Inactive
Until the Clock Time
Reaches the
Discrete Event Milestone -
Then Are Activated…
Discrete Event
Milestone
pezalaconsulting
53. No Type of Discrete Change Input Data Specified by User How Change is Modelled with Fragnets
1 Add new activity Definition of entire new activity Defined activity is part of fragnet that is initially inactive, but then
activated at the start time of the associated discrete causative event.
2 Subtract activity Activity Specified activity is part of fragnet that is initially active,but then
deactivated at the start time of the associated discrete causative event.
3 Increment task duration (only if no
interim progress measurements)
Task; Amount to add (subtract) to
existing task duration in working
hours
Specified task is duplicated. Duplicate with altered duration is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original is part of fragnet that is
deactivated at the same time.
4 Change task duration (only if no
interim progress measurements)
Task; Duration that replaces
existing duration in hours.
Specified task is duplicated. Duplicate with altered duration is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original is part of fragnet that is
deactivated at the same time.
5 Increment logic link lag Logic Link; Amount to add
(subtract) to logic link lag in
working hours.
Specified logic link is duplicated. Duplicate with altered lag is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original is part of fragnet that is
deactivated at the same time.
6 Change logic link lag Logic Link; Duration that replaces
existing duration in working hours.
Specified logic link is duplicated. Duplicate with altered lag is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original is part of fragnet that is
deactivated at the same time.
7 Change calendar of activity Activity; Define entire new
calendar that replaces specified
Calendar of activity.
Replacement calendar is defined as a separate calendar within the
calendar data set. Duplicate activity with altered calendar is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original activity is part of fragnet
that is deactivated at the same time.
8 Change calendar of logic link Logic Link; Define entire new
calendar that replaces specified
Calendar of activity.
Replacement calendar is defined as a separate calendar within the
calendar data set. Duplicate logic link with altered calendar is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original logic link is part of fragnet
that is deactivated at the same time.
9 Increment task resource
requirement profile
Resource; Amount to increase
gang size of resource
Duplicate task with altered task resource requirement profile is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original task is part of fragnet that
is deactivated at the same time.
10 Change task resource requirement
profile
Resource; New gang size of
resource.
Duplicate task with altered task resource requirement profile is part of
fragnet that is initially inactive, but then activated at the start time of
associated discrete causative event. Original task is part of fragnet that
is deactivated at the same time.
11 Change resource capacity profile Resource; New array of vectors
that defines the resource capacity
function of the resource over the
project range.
Resource is duplicated with altered resource capacity profile in
resource data set. Duplicate task with duplicated version of original
resource capacity profile is part of fragnet that is initially inactive, but
then activated at the start time of the associated discrete causative
event. Original task is part of fragnet that is deactivated at the same
time.
pezalaconsulting
54. Causal Chain Theory
• The modelling of discrete events is governed by theory that mixes legal doctrine with rational scientific logic, known as
causal chain theory. What consequences or ‘knock-on effects’ of a discrete causal event should be attributed to the effects
of the event itself? How far should a chain of causation be inferred, given that ultimately, if one goes back far enough,
everything is just a consequence or knock-on effect of the Big Bang?
• causa proxima est non remota spectatur - spawned ‘reasonable foreseeability’.
• All of the consequential or ‘knock-on’ effects of a discrete event are deemed to vest at the very instant the event occurs,
unless they are supervened by a novus actus interveniens.
• A nail is an intervening or ‘fresh’ event or action that packs enough of a punch to ‘sever’ the discrete event’s ‘chain of
causation’.
• e.g. deliberateness or carelessness (especially negligent or criminal behaviour) - C deliberately deciding to proceed slowly
on additional work..
• The extent of a causal chain is usually resolvable by common sense but sometimes may be disputable.
• e.g. instruction to install a waterproof membrane in a bathroom wall will not be considered a fresh event if the membrane
is already part of the design that a contractor has agreed to build, or if it is to remedy a shortcoming that arises from
shoddy workmanship by the contractor. In such cases the instruction is simply a link in a causal chain that was initiated
earlier. It will, on the other hand constitute a fresh event and found a new causal chain if it arose from, say, a design
change materialising from revised client requirements.
• Causal chains are modelled by adding or subtracting fragnets to and from the network (or possibly, in some instances,
changing the resource capacity profile that pertains to a particular resource).
pezalaconsulting
55. Modelling Continuous Delay
• Path Growth Rate (PGR) is key concept.
• Objective:
• divide the timescales into small intervals,
• identify the delay across the interval
• identify the critical element(s) that are deemed to be causative of delay across the interval (= dominant/
proximate cause)
• apportion blame for the delay to the critical elements
• excusability then considered to determine EOT associated with element
• Just as there is a growth rate for each path, there is also a growth rate for the project makespan as a whole
• If there is only one critical path, m’s growth rate for a small interval dt immediately following an instant on the
time clock t will be the growth rate of the fastest growing critical path.
• The fastest growing critical path can be deduced to have been on the cusp of overtaking the slower-growing
critical paths. The tie occurs only for an instant.
• cf. Daily Delay Measure
pezalaconsulting
56. Modelling Continuous Delay
• For snapshots (with no discrete events), note that there are two criteria for criticality:
• activity must be in progress
• activity must be on the longest path
• But across intervals, however, there are three criteria for determining criticality:
• activity must be in progress
• activity must be on longest path
• activity must be on fastest growing longest path.
• Just as there is a growth rate for each path, there is also a growth rate for the project makespan
as a whole.
• If there is only one critical path, m’s growth rate for a small interval dt immediately following an
instant on the time clock t will be the growth rate of the fastest growing critical path.
• The fastest growing critical path can be deduced to have been on the cusp of overtaking the
slower-growing critical paths. The tie occurs only for an instant
pezalaconsulting
57. Modelling Continuous Delay
Path Length
Path Growth Rate (PGR)
Activity C
Activity A
Activity D
Activity B
only activity that is
critical for the whole interval
only critical at very
start of interval
Four Activities in Progress:
pezalaconsulting
58. Modelling Continuous Delay
• Another way of thinking about the three criteria for interval criticality:
• ‘Triple zero slack’
• Distance between activity and work front = 0 (i.e. activity is in
progress).
• Distance between longest path in network and length of the path
activity is on (i.e. total float, Φ) = 0;
• Distance between path growth rate of activity and path growth rate of
fastest growing critical activity = 0 (i.e. dΦ / dt = 0). This is the first
order derivative of float over time.
• Each of these measurements can be thought of as a kind of ‘slack’.
The concept of ‘critical’ insofar as it pertains to an interval can be
thought of as ‘triple zero slack’ criterion!
pezalaconsulting
59. Accounting for Progress Records
PROJECT
START
PROJECT
FINISH
Path Growth Rate
of Second Segment is n2
Path Growth Rate
of First Segment is n1
Path Growth Rate
of First Segment is m1
Path Growth Rate
of Second Segment is m2
Progress
Record
Progress
Record
pezalaconsulting
62. Excusability
• ‘Excusability’ means the property of whether or not any terminal delays arising
from an element of the network will be ‘excusable’ (i.e. give rise to a concomitant
EOT).
• A mathematical distillation of a contractual concept.
• Based on the contractual EOT provisions.
• Independent from compensability or cost compensation.
• A rational number between 0 and 1. Normally 0 (not excusable) or 1 (excusable).
Intermediate values, however, may arise from a measured mile analysis or
similar.
• The excusability of node delays will often be obvious from the schedule
milestones (e.g. engineer releases design information, owner provides free issue
materials: milestones with exc. = 1).
• (Gross) EOT for Element = (Gross) Terminal Delay * Excusability
pezalaconsulting
63. Concurrent Delay
• Concurrency pertains to an indeterminacy in the context of
determining causation - a failure of the primary system to
isolate a single cause as dominant/ proximate(= identify a
single delay as critical). A special rule is thus required to
resolve this indeterminacy.
• It arises when multiple delays occur at the same time (but not
all delays occurring at the same time are “concurrent” in this
sense).
• Only delays on the continuous time scale can be concurrent.
This is because discrete events are always modelled one after
the other, never together at the same time.
pezalaconsulting
64. • For a single snapshot of time:
• Two criteria for determining the dominant/proximate
cause: (1) in progress and (2) on longest path
• For a small interval of time following a snapshot:
• Three criteria for determining the dominant/ proximate
cause: (1) in progress; (2) on longest path; (3) highest
growth rate of elements satisfying (1) and (2)
• What do we do if these ‘filters’ fail to isolate a single
element of the network?… Need a tiebreak rule…
Concurrent Delay
pezalaconsulting
65. • Potential tiebreak rules…
1. Where multiple elements are concurrently causative of the delay, ‘blame’ for the overall project
delay gets apportioned evenly between the members of the concurrent set.
• Excusability of concurrent set = the mean excusability of the set
2. Where multiple elements are concurrently causative of the delay, ‘blame’ for the overall project
delay gets apportioned to the member(s) of the concurrent set with the highest excusability.
• Excusability of concurrent set = the maximum excusability of the set
3. Where multiple elements are concurrently causative of the delay, ‘blame’ for the overall project
delay gets apportioned to the member(s) of the concurrent set with the lowest excusability.
• Excusability of concurrent set = the minimum excusability of the set
• In my opinion (1) is the best, simplest, and most logical approach. Some contracts, however,
expressly or impliedly specify (2) or (3).
Concurrent Delay
pezalaconsulting
66. • Why in my opinion is the ‘mean’ approach best?
• No two processes are ever truly in tandem and lockstep
• There will always be at least some stochastic variation in which of two
processes is in the lead or on the longest path, even if the average rate
of progress (e.g. concrete curing) of the two processes is tied.
• In this sense, concurrent delay doesn’t really exist. It’s only something
that arises from modelling assumptions.
• It is thus reasonable to assume, absent further progress records, that
for n processes occurring in tandem, each will be on the longest path
1/n of the time and thus causative of 1/n of the terminal delay.
Concurrent Delay
pezalaconsulting
67. Float Ownership
• ‘Float’ in this context really refers to two things:
• Accrued terminal gain
• Contractual milestone contingency
• Computation needs to distinguish between terminal
delay on a net and gross basis, if contractor ‘owns’
float.
pezalaconsulting
68. Time
Discrete
Terminal
Delay
Inexcusable Terminal Discrete Delay
Excusable Terminal Discrete Delay
Discrete
Terminal
Gain
(Discrete Delays)
Overall Discrete Delay: the Sum of
All the Lines (As Applicable)
hours
Presentation of Results
pezalaconsulting
69. Time
Path
Growth
Rate
Excusable Terminal Continuous Delay
Inexcusable Terminal Discrete Delay
(Continuous Delays)
Overall Continuous Delay: the Sum of
the Areas (As Applicable)
0
1
Delay
Gain
Partially Excusable Delay
(Excusability = 0.5)
Concurrent
Delay
Presentation of Results
pezalaconsulting
71. Presentation of Results
Time
Path
Growth
Rate
Excusable Terminal Continuous Delay
Inexcusable Terminal Discrete Delay
(Continuous Delays)
Overall Continuous Delay: the Sum of
the Areas (As Applicable)
0
1
Delay
Gain
Partially Excusable Delay
(Excusability = 0.5)
Concurrent
Delay
Concurrency Treatment:
Even Apportionment
Approach
pezalaconsulting
72. Time
Path
Growth
Rate
Excusable Terminal Continuous Delay
Inexcusable Terminal Discrete Delay
(Continuous Delays)
Overall Continuous Delay: the Sum of
the Areas (As Applicable)
0
1
Delay
Gain
Partially Excusable Delay
(Excusability = 0.5)
Concurrent
Delay
Concurrency Treatment:
Activity with
Minimum Excusability
Deemed to be Dominant/
Proximate Cause of
Terminal Delay
Presentation of Results
pezalaconsulting
73. Time
Path
Growth
Rate
Excusable Terminal Continuous Delay
Inexcusable Terminal Discrete Delay
(Continuous Delays)
Overall Continuous Delay: the Sum of
the Areas (As Applicable)
0
1
Delay
Gain
Partially Excusable Delay
(Excusability = 0.5)
Concurrent
Delay
Concurrency Treatment:
Activity with
Maximum Excusability
Deemed to be Dominant/
Proximate Cause of
Terminal Delay
Presentation of Results
pezalaconsulting