TITLE

Network Analysis on a Microcomputer

AUTHOR(S)
Heap, John P.
PUB. DATE
November 1986
SOURCE
Management Services;Nov86, Vol. 30 Issue 11, p18
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Most people involved within management services will have come across the use of project network management techniques either within their work or as part of their training. Most people are familiar with the concepts involved although few use networks as an integral part of their work. Using network techniques to plan and control a large project involves a basic series of steps. In practice, with a large network, the updating and re-analysis of a large network may be so time consuming that results are out of date by the time they can be produced. Thus the network becomes useful as an initial planning medium but often ineffective as a control mechanism. This updating and re-analysis phase is the major strength of the computerized network analysis packages. When the project is underway, the package will allow one to enter details of the current date and of the progress of activities and will then reanalyze the network to show the effects on float values and possibly on project completion. Because the computer produces these updated analyses very quickly, it is possible to take corrective action much more quickly in the event of the project falling behind its scheduled dates.
ACCESSION #
12701942

 

Related Articles

  • SCHEDULING PROJECT NETWORKS WITH RESOURCE CONSTRAINTS AND TIME WINDOWS. Bartusch, M.; Möhring, R. H.; Radermacher, F. J. // Annals of Operations Research;1988, Vol. 16 Issue 1-4, p201 

    Project networks with time windows are generalizations of the well-known CPM and MPM networks that allow for the introduction of arbitrary minimal and maximal time lags between the starting and completion times of any pair of activities. We consider the problem to schedule such networks subject...

  • AACE International Recommended Practice 49R-06 Identifying the Critical Path and AACE International Recommended Practice 26R-03 Scheduling Specification Models. Schumacher, Hannah E.; Calvey, Timothy T. // AACE International Transactions;2009, pPS.01.1 

    The article presents the recommended practice 26R-03 of the AACE International for identifying the critical path for project construction. An overview of the recommended practice is presented which determines the critical path that is used to break down a project into component activities. It...

  • AN ALGEBRA FOR THE ANALYSIS OF GENERALIZED ACTIVITY NETWORKS. Elmaghraby, Salah E. // Management Science;Apr1964, Vol. 10 Issue 3, p494 

    This paper generalizes the approach of activity networks, exemplified by PERT and CPM, to networks in which activates and events occur probabilistically and contain logical relationships of a more complicated nature. For example, from a specific event some activities are undertaken with...

  • Current Delay Analysis Techniques and Improvements. Mohan, Satish B.; Al-Gahtani, Khalid S. // Cost Engineering;Sep2006, Vol. 48 Issue 9, p12 

    Although, ‘but-for,’ and ‘windows’ methods are widely used in analyzing delays on construction projects, these methods suffer from several weaknesses, and need improvement. This article discusses some improvements to the currently used delay analysis techniques. An...

  • Use of Relational Databases in Forensic Delay Analysis. Evrenosoglu, Faik Burak // AACE International Transactions;2008, p1 

    The article discusses the significance of critical path method (CPM) schedules and the CPM scheduling software such as Microsoft Access in forensic delay analysis. It states that the use of this relational database will enhance the analysis and allows the analysts to focus on the facts...

  • The evolution of the world trade web: a weighted-network analysis. Fagiolo, Giorgio; Reyes, Javier; Schiavo, Stefano // Journal of Evolutionary Economics;Aug2010, Vol. 20 Issue 4, p479 

    This paper employs a weighted network approach to study the empirical properties of the web of trade relationships among world countries, and its evolution over time. We show that most countries are characterized by weak trade links; yet, there exists a group of countries featuring a large...

  • IMPLEMENTING THE CRITICAL PATH METHOD IN A LARGE ORGANIZATION. Law, C. E.; Lach, D. C. // CORS Journal;Mar66, Vol. 4 Issue 1, p35 

    This paper describes the necessary steps in the preparation, planning, selection of test projects, organization, training and communication, for the effective implementation and maintenance of the critical path method in a large organization. Critical path is regarded as an integrated system...

  • Network Analysis and Design for Tickets Sales, Inc. Gendron, Michael; Jarmoszko, A. T. // Journal of Information Systems Education;Fall2005, Vol. 16 Issue 3, p259 

    This case is for the senior-level data communications class within a business school setting. It requires abbreviated strategic and business analysis, which serves the instructional purpose of making explicit the linkages between the business-needs of an organization and the technology required...

  • A decrashing algorithm for CPM networks.  // Management Services;Mar1978, Vol. 22 Issue 3, p14 

    In most processes one of the prime factors that must be considered is the cost function. The reduction of costs should therefore be of interest to management in general. This paper does not endeavour to look at all the aspects of cost reduction, but concentrates on a method that optimizes...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics