G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RRA583-1
来源IDRR-A583-1
Graph Theoretic Algorithms for the Ground Based Strategic Deterrent Program: Prioritization and Scheduling
Don Snyder; Christian Johnson; Parousia Rockstroh; Lance Menthe; Bart E. Bennett
发表日期2021-11-08
出版年2021
语种英语
结论

The authors examined three classes of graph topology: a simple topology of parallel chains, random graphs, and scale-free graphs

  • For the simple chain topology, although performing tasks in parallel can theoretically reduce the overall time, it does not do so as much as expected; the likelihood of having at least one bad chain increases with the number of chains.
  • Parallelizing development reduces variance — but also increases end-to-end time — more than expected.
  • Although working tasks in parallel remains desirable, the project manager's expectations for time savings should be tempered.
  • For Erdős-Rényi topology (random graphs), analysis shows the same trade-off between variance and average completion time as seen in the simple chain topology, though it is more subtle. In this case, interlinking paths make it less likely that a single chain will dominate.
  • For the scale-free graph topology, analysis shows that graphs with a single, dominant longest path are much more likely to complete on time than graphs with several parallel paths that may each be critical paths. This result means that the project manager can reduce the overall completion time with only a marginal increase in the corresponding risk by placing important tasks in series with one another.

The authors present a novel numerical approach to find the critical path in a large graph

  • The fastest, and preferred, method to find the critical path uses Chebyshev polynomials as a basis. The other method uses trapezoidal integration but is preferred only when software packages limit the ability to manipulate Chebyshev polynomials.
摘要

During the execution of programs, managers must orchestrate the planning and performance of upwards of tens of thousands of interdependent tasks. Many of these tasks have interdependencies such that failure to meet scheduling expectations in one task can affect the execution of many others. As programs grow larger and the interdependencies of the program activities get complex, tools are needed to introduce more rigor into program management to reduce schedule risk.

,

The Ground Based Strategic Deterrent (GBSD) currently under development — a complete replacement for the aging LGM-30 Minuteman III intercontinental ballistic missile system — is a good example of a large, complex program with numerous interdependent tasks. Given the tight schedule by which GBSD is bound and the numerous organizations participating, it is necessary that the required certification process for nuclear systems proceeds in an efficient manner. In this report, the authors present the underlying rationale behind algorithms already delivered to the GBSD program office that were designed to reduce the likelihood of rework in program execution, provide better insight into schedule risk, and provide insights into how to restructure task dependencies to manage schedule risk. Although the novel methods described in this report were developed for the GBSD program, they are general and can be applied to any program.

目录
  • Chapter One

    Introduction

  • Chapter Two

    Prioritization

  • Chapter Three

    Scheduling

  • Chapter Four

    Resource Constraints

  • Chapter Five

    Analytic Approach for Calculating the Criticality Index

  • Chapter Six

    Conclusions

  • Appendix A

    Equivalence of Representations

  • Appendix B

    The PERT and CPM Algorithms

  • Appendix C

    Proof That Convolution of Independent, Identical Beta Distributions Converges to a Normal Distribution

  • Appendix D

    Derivation of Maximum Order Statistic F

主题Complex Systems Analysis ; Mathematics ; Modeling and Simulation ; Nuclear Deterrence ; Operations Research ; Program Evaluation ; United States Air Force
URLhttps://www.rand.org/pubs/research_reports/RRA583-1.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524623
推荐引用方式
GB/T 7714
Don Snyder,Christian Johnson,Parousia Rockstroh,et al. Graph Theoretic Algorithms for the Ground Based Strategic Deterrent Program: Prioritization and Scheduling. 2021.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RRA583-1.pdf(3930KB)智库出版物 限制开放CC BY-NC-SA浏览
x1636376242655.jpg.p(4KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Don Snyder]的文章
[Christian Johnson]的文章
[Parousia Rockstroh]的文章
百度学术
百度学术中相似的文章
[Don Snyder]的文章
[Christian Johnson]的文章
[Parousia Rockstroh]的文章
必应学术
必应学术中相似的文章
[Don Snyder]的文章
[Christian Johnson]的文章
[Parousia Rockstroh]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RRA583-1.pdf
格式: Adobe PDF
文件名: x1636376242655.jpg.pagespeed.ic.hxIdyjc7Kq.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。