Graphical Evaluation and Review Technique

Last updated

Graphical Evaluation and Review Technique (GERT) is a network analysis technique used in project management that allows probabilistic treatment both network logic and estimation of activity duration. The technique was first described in 1966 by Dr. Alan B. Pritsker of Purdue University and WW Happ. [1] [2]

Contents

Compared to other techniques, GERT is only rarely used in complex systems. Nevertheless, the GERT approach addresses the majority of the limitations associated with PERT/CPM technique. GERT allows loops between tasks. The fundamental drawback associated with the GERT technique is the complex programme (Monte Carlo simulation) required to model the GERT system. Development in GERT includes Q-GERTS - allowing the user to consider queuing within the system.

General GERT rules

GERT uses activity-on-arrow notation only. That means that each activity is described on arrow. The nodes are used to connect activities, but also to determine type and conditions of relations between them.

Each task has two parameters: duration and probability of appearance.

There are three logical operators in GERT which concern activities incoming to the node:

The most common is AND, which means that every incoming activity has to happen before the outcoming one start.

There are also two types of relations that concern activities outcoming from the node:

GERT vs. other network diagrams

It's much less popular than PERT (Program Evaluation and Review Technique) or CPM (Critical Path Method) however, it allows some of those methods limitations to be addressed. The main limitations of PERT or CPM that might be addressed by GERT are:

GERT can help address these but at the cost of more sophisticated diagrams.

Related Research Articles

<span class="mw-page-title-main">Critical path method</span> Method of scheduling activities

The critical path method (CPM), or critical path analysis (CPA), is an algorithm for scheduling a set of project activities. A critical path is determined by identifying the longest stretch of dependent activities and measuring the time required to complete them from start to finish. It is commonly used in conjunction with the program evaluation and review technique (PERT).

A Bayesian network is a probabilistic graphical model that represents a set of variables and their conditional dependencies via a directed acyclic graph (DAG). While it is one of several forms of causal notation, causal networks are special cases of Bayesian networks. Bayesian networks are ideal for taking an event that occurred and predicting the likelihood that any one of several possible known causes was the contributing factor. For example, a Bayesian network could represent the probabilistic relationships between diseases and symptoms. Given symptoms, the network can be used to compute the probabilities of the presence of various diseases.

Project management software are computer programs that help plan, organize, and manage resources.

<span class="mw-page-title-main">Program evaluation and review technique</span> Statistical tool used in project management

The program evaluation and review technique (PERT) is a statistical tool used in project management, which was designed to analyze and represent the tasks involved in completing a given project.

A graphical model or probabilistic graphical model (PGM) or structured probabilistic model is a probabilistic model for which a graph expresses the conditional dependence structure between random variables. They are commonly used in probability theory, statistics—particularly Bayesian statistics—and machine learning.

<span class="mw-page-title-main">Project network</span> Diagram showing the order of activities

A project network diagram is a graph that displays the order in which a project’s activities are to be completed. Derived from the work breakdown structure, the terminal elements of a project are organized sequentially based on the relationship among them. It is typically drawn from left to right to reflect project chronology.

An influence diagram (ID) is a compact graphical and mathematical representation of a decision situation. It is a generalization of a Bayesian network, in which not only probabilistic inference problems but also decision making problems can be modeled and solved.

<span class="mw-page-title-main">MacProject</span> Management application

MacProject was a project management and scheduling business application released along with the first Apple Macintosh systems in 1984. MacProject was one of the first major business tools for the Macintosh which enabled users to calculate the "critical path" to completion and estimate costs in terms of money and time. If a project deadline was missed or if available resources changed, MacProject recalculated everything automatically.

IP traceback is any method for reliably determining the origin of a packet on the Internet. The IP protocol does not provide for the authentication of the source IP address of an IP packet, enabling the source address to be falsified in a strategy called IP address spoofing, and creating potential internet security and stability problems.

<span class="mw-page-title-main">Precedence diagram method</span>

The precedence diagram method (PDM) is a tool for scheduling activities in a project plan. It is a method of constructing a project schedule network diagram that uses boxes, referred to as nodes, to represent activities and connects them with arrows that show the dependencies. It is also called the activity-on-node (AON) method.

<span class="mw-page-title-main">Event chain methodology</span> Network analysis technique

Event chain methodology is a network analysis technique that is focused on identifying and managing events and relationship between them that affect project schedules. It is an uncertainty modeling schedule technique. Event chain methodology is an extension of quantitative project risk analysis with Monte Carlo simulations. It is the next advance beyond critical path method and critical chain project management. Event chain methodology tries to mitigate the effect of motivational and cognitive biases in estimating and scheduling. It improves accuracy of risk assessment and helps to generate more realistic risk adjusted project schedules.

Business process discovery (BPD) related to business process management and process mining is a set of techniques that manually or automatically construct a representation of an organisations' current business processes and their major process variations. These techniques use data recorded in the existing organisational methods of work, documentations, and technology systems that run business processes within an organisation. The type of data required for process discovery is called an event log. Any record of data that contains the case id, activity name, and timestamp. Such a record qualifies for an event log and can be used to discover the underlying process model. The event log can contain additional information related to the process, such as the resources executing the activity, the type or nature of the events, or any other relevant details. Process discovery aims to obtain a process model that describes the event log as closely as possible. The process model acts as a graphical representation of the process. The event logs used for discovery could contain noise, irregular information, and inconsistent/incorrect timestamps. Process discovery is challenging due to such noisy event logs and because the event log contains only a part of the actual process hidden behind the system. The discovery algorithms should solely depend on a small percentage of data provided by the event logs to develop the closest possible model to the actual behaviour.

The Technique for human error-rate prediction (THERP) is a technique that is used in the field of Human Reliability Assessment (HRA) to evaluate the probability of human error occurring throughout the completion of a task. From such an analysis, some corrective measures could be taken to reduce the likelihood of errors occurring within a system. The overall goal of THERP is to apply and document probabilistic methodological analyses to increase safety during a given process. THERP is used in fields such as error identification, error quantification and error reduction.

Influence Diagrams Approach (IDA) is a technique used in the field of Human reliability Assessment (HRA), for the purposes of evaluating the probability of a human error occurring throughout the completion of a specific task. From such analyses measures can then be taken to reduce the likelihood of errors occurring within a system and therefore lead to an improvement in the overall levels of safety. There exist three primary reasons for conducting an HRA; error identification, error quantification and error reduction. As there exist a number of techniques used for such purposes, they can be split into one of two classifications; first generation techniques and second generation techniques. First generation techniques work on the basis of the simple dichotomy of ‘fits/doesn’t fit’ in the matching of the error situation in context with related error identification and quantification and second generation techniques are more theory based in their assessment and quantification of errors. ‘HRA techniques have been utilised in a range of industries including healthcare, engineering, nuclear, transportation and business sector; each technique has varying uses within different disciplines.

Arrow diagramming method (ADM) is a network diagramming technique in which activities are represented by arrows. ADM is also known as the activity-on-arrow (AOA) method.

The Graphical Path Method (GPM) is a mathematically based algorithm used in project management for planning, scheduling and resource control. GPM represents logical relationships of dated objects – such as activities, milestones, and benchmarks – in a time-scaled network diagram.

Event tree analysis (ETA) is a forward, top-down, logical modeling technique for both success and failure that explores responses through a single initiating event and lays a path for assessing probabilities of the outcomes and overall system analysis. This analysis technique is used to analyze the effects of functioning or failed systems given that an event has occurred.

<span class="mw-page-title-main">Improved Performance Research Integration Tool</span>

The Improved Performance Research Integration Tool (IMPRINT) is a discrete-event simulation and human performance modeling software tool developed by the Army Research Laboratory and Micro Analysis and Design. It is developed using the .NET Framework. IMPRINT allows users to create discrete-event simulations as visual task networks with logic defined using the C# programming language. IMPRINT is primarily used by the United States Department of Defense to simulate the cognitive workload of its personnel when interacting with new and existing technology to determine manpower requirements and evaluate human performance.

Willard R. Fazar was an American economist, Head of the Program Evaluation Branch at Special Projects Office, U.S. Navy, and author. He is known as one of co-inventors, and key-developers of PERT."

References

  1. Pritsker, A. A. B. (April 1966). "GERT: Graphical Evaluation and Review Technique" (PDF). RM-4973-NASA. National Aeronautics and Space Administration under Contract No. NASr-21. Retrieved 2006-12-05.
  2. Modeling and Analysis Using Q-GERT Networks A. Alan B. Pritsker, 2nd Edition, Wiley, 1979 ISBN   0-470-26648-1