Next Article in Journal
Presentation and Elaboration of the Folk Intangible Cultural Heritage from the Perspective of the Landscape
Next Article in Special Issue
Risk Management Practices in Ethiopian Somali Regional State Construction Projects
Previous Article in Journal
Dynamic Analysis of a Steel–Concrete Composite Box-Girder Bridge–Train Coupling System Considering Slip, Shear-Lag and Time-Dependent Effects
Previous Article in Special Issue
Power Plant Construction Projects Risk Assessment: A Proposed Method for Temporary Systems of Commissioning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Buffer Sizing in Critical Chain Project Management by Brittle Risk Entropy

School of Traffic & Transportation Engineering, Changsha University of Science and Technology, Changsha 410114, China
*
Author to whom correspondence should be addressed.
Buildings 2022, 12(9), 1390; https://doi.org/10.3390/buildings12091390
Submission received: 12 July 2022 / Revised: 23 August 2022 / Accepted: 30 August 2022 / Published: 5 September 2022
(This article belongs to the Special Issue Construction Scheduling, Quality and Risk Management)

Abstract

:
In order to solve the problems such as project duration delay caused by unreasonable buffer zone setting, a critical chain buffer zone setting method is proposed based on fragility theory. Firstly, we propose that the construction process is brittle and the brittleness of the construction process was analyzed. Secondly, this paper introduces a risk-integrated impact rate to describe the uncertainty of the construction process and establishes a brittle risk entropy function. Then, it presents entropy models and modification models of project buffers and feeding buffers based on the original Root Square Error Method. Finally, an engineering project was selected as an example, and the simulation was carried out using the Monte Carlo simulation software Crystal Ball, and the resulting method was compared with three buffer zone calculation methods. The results show that the method can effectively reduce the construction period and is effective and practical when compared to the other three buffer calculation methods. The results of the study provide a new way of thinking about buffer settings based on existing critical chain project management methods.

1. Introduction

Project management is a systematic approach that involves planning, organizing, directing, and controlling a project to accomplish certain specific objectives [1]. Its objective is to achieve the dynamic management of the entire project process [2]. In the 1960s, project management was confined to a few areas such as defenses, aerospace and construction engineering [3]. The success of project management in the implementation of a wide range of major projects has made it a global phenomenon. At present, project management is used in a wide range of fields such as software engineering, network communications, the financial industry and even government agencies [4].
With the accelerated pace of society and rapid economic growth, it has always been a common goal to create as much value as possible in the shortest possible time [5]. For builders, a higher production efficiency may mean lower production costs or shorter construction lead times [6]. Production costs are constrained by a number of factors such as policy, market, capital and quality, and there is very limited scope for reduction [7]. Various factors need to be taken into account when compiling the construction schedule [8], and there is more room to maneuver in these factors. As a result, shortening the construction cycle has become an important way to increase productivity.
In practice, there is a problem in shortening the construction cycle. The process of compiling a construction schedule requires an estimate of the duration of the work. Managers usually include a significant amount of safety time to ensure that projects are completed on time, taking into account the uncertainties and potential risks. However, this inclusion of a large amount of safety time tends to accumulate due to deviations and is not conducive to project schedule control, leading to slack between processes and ultimately delays [9]. Although traditional project management techniques have proven to be effective tools for project management, such as the Critical Path Method (CPM) [10] and the Program Evaluation and Review Technique (PERT) [11], these methods are also unable to deal with the situation.
In 1997, Dr. Goldratt, the originator of the Theory of Constraints (TOC), published his book “Critical Chain”. In the book, he introduced TOC to project management [12]. A new approach to project management, Critical Chain Project Management (CCPM), is proposed. By inserting buffers into the project schedule, CCPM ensures that the project will run smoothly and on schedule by absorbing the uncertainty of the project through properly set buffers [13,14,15]. The application of CCPM to project management can significantly improve project performance and there are many examples of successful applications [16]. For example, critical chains are introduced into the turnaround process for IGCC (Integrated Gasification Combined Cycle) plants to minimize the risks associated with refinery accidents [17].There are also practical examples of the application of critical chains to the problem of scheduling resources for multiple projects in the automotive development process [18]. Therefore, experts and scholars have developed a variety of models and calculation methods around project critical chain project management [9]. A central unsolved problem within CCPM is the sizing of buffers, which is the focus of our work.
Accurate buffer calculations are essential for the control of project economics and schedules. Buffer sizes too small can lead to replanning, whereas too large a buffer zone could easily lead to a lack of competitiveness and potential economic loss. As a result, a wide variety of calculation methods and models have been proposed in the literature. Improvements to the current buffer setting have had some effect [19], but there are still some problems. Our work focuses on the following two questions:
  • When considering the uncertainty calculation buffer for the duration of each activity, it is divided into multiple target factors for study. However, the correlation between the various target factors is present and creates a new uncertainty on the duration.
  • Buffers are designed to eliminate schedule risk, which arises from risk factors causing risk incidents. However, most studies have analyzed and quantified various uncertainty factors in terms of project attributes. Few studies have been conducted to calculate buffer sizes from a system perspective.
To address these issues, the article introduces the concept of integrated risk impact rate based on the analysis of the brittleness of the construction process, constructs a brittle risk entropy function for the project construction process from the dimension of the system, and measures the system uncertainty through the brittle risk entropy, avoiding the original singularity of starting from only one factor. The specific flow chart of the method is detailed in Figure 1.
The remainder of this paper is organized as follows. Section 2 reviews the relevant literature. Section 3 focuses on the analysis of brittleness during construction. Section 4 constructs the brittle risk entropy function on the basis of Section 3. Section 5 describes our buffer adjustment method. Section 6 is an application of the method to a specific project for example analysis. Section 7 presents some conclusions and suggestions for future work.

2. Literature Review

The most classical methods for calculating buffer size are the Cut-and-Paste Method (C&PM) [12] proposed by Goldratt and the Root Square Error Method (RSEM) [20] proposed by Newbold based on the Central Limit Theorem. Although the cut-and-paste method (C&PM) is simple and easy to calculate, a linear increase in buffer size occurs as the length of the work chain increases. The Root Square Error Method (RSEM) calculation is more reasonable and does not result in a buffer that is too large or too small, but it is premised on the assumption that the various processes of the project are executed independently of each other, which does not correspond to the reality of the project.
In addition, the calculation of buffers has been studied in depth by many scholars, with most methods improving on the limitations of the above two methods. Tukel et al. [21] incorporated a calculation of the project buffer by analyzing the factors affecting the various processes in the project, taking into account the impact of resource constraints and the complexity of the project network. Zhang Junguang et al. [22] integrated the physical resource tension with the information resource tension and proposed a buffer zone calculation method based on the integrated resource tension. Ghoddousi [23] considered the influencing factors such as network complexity, activity rules, and criticality rules in order to maximize the robustness of buffer scheduling, and used simulations to justify the model. Based on Z-number theory, Zhao [24] proposed a buffer calculation method that takes into account internal process risk, external project risk, and resource risk. Gong Jun et al. [25] used complexity entropy, resource entropy and human factor entropy to measure uncertainty, while fully considering the impact of human behavioral factors on a project’s schedule as a way to set up critical chain buffers. Zhang J.G. [26] developed a quantitative model for the determination of the optimal time window for resource buffering, considering factors such as bottleneck resource sensitivity, idle costs, start-up time flexibility and workflow in critical chains. Sarkar [16] proposes an enhanced Critical Chain Project Management (CCPM) framework by integrating the various uncertainties affecting construction scheduling to improve buffer sizes.
At the same time, a number of scholars have also proposed new rules for calculating buffers, going beyond the limitations of the original the Cut-and-Paste Method (C&PM) and the Root Square Error Method (RSEM), and exploring the calculation of buffers from a wider range of dimensions. Bie [27] analyzed the impact of inter-activity dependencies on project duration performance by integrating the two definitions of dependency and dependency factors, which reflect dependency, into a buffer size approach. Farag [28] proposed a method for calculating buffer zones for construction projects based on fuzzy theory, taking into account the characteristics of the process and its degree of uncertainty. Leng Kaijun [29] proposed a new method for buffer size adjustment using Bayesian networks, considering the risk of activity duration and the risk of multiple resource constraints under uncertainty. Seyed Ashkan et al. [30] proposed project resource reliability analysis to obtain a probability metric that redefines the source of the buffer by using the availability of resources as a random variable for project scheduling. Roghanian [31] introduced a new approach to buffer sizing based on the square and root-square (SSQ) method, taking into account resource constraints and other constraints, using the Resource-Constrained Project Scheduling Problem (RCPSP) model. Bingling She et al. [32] proposed a new method for calculating the buffer size by comparing the incoming chain with a parallel critical chain, while later incorporating the degree of safety beyond the critical chain.

3. Analysis of Brittleness during Construction

As the system evolves and grows in size and number, the interconnections between the constituent elements within the system become more and more intertwined. When a part of a complex system is disturbed by internal or external factors and then fails, it passes down the chain of relationships, causing other parts to be affected, directly or indirectly affecting the whole system and eventually leading to its collapse. This property is known as the brittleness of complex systems [33].
The brittleness of complex systems is characterized by the following.
  • Hiddenness. Brittleness does not manifest itself under normal circumstances. It only becomes apparent when a part of a complex system is disturbed by external factors.
  • Variety. As the brittleness is excited in different times, locations and states, the final manifestation and degree of brittleness also vary.
  • Harmfulness. The first manifestation of brittleness in a subsystem is the disturbance of the links, which reduces the operational efficiency of the whole system.
  • Chainability. When the brittleness of a subsystem is triggered, it will first cause fluctuations in the normal operation of one subsystem, further spreading to other subsystems and eventually leading to the collapse of the whole system.
As a system of engineering involving different kinds of people, materials and machinery, construction projects are complex. We can assume that construction projects are also brittle and have the characteristics described above. In addition, we propose that the brittle structure of complex systems can be classified as brittle risk (system collapse), system structure, brittle accidents, etc. [34] (Figure 2).
We often divide the process of constructing a complete building into sub-projects such as foundation construction, main body construction, decoration construction, and roof construction. By applying the theory of complex system fragility to the construction process and combining it with the traditional Work Breakdown Structure (WBS) in project management, a theoretical system of risk in the construction process from the perspective of fragility can be obtained (Figure 3). The brittle structure model examines the brittle characteristics of risk hazard complex systems from the perspective of coupled inner and outer factors. In fact, this model is used to address the loss of the original state of the system during construction.

4. Brittle Risk Entropy Function

4.1. The Concept of Brittle Risk Entropy

In the construction process of a project, the whole construction process is considered as a complex system and one part of it can be considered as a subsystem. The subsystem is equally brittle due to the presence of low access to resources, high project complexity and construction plane constraints. A subsystem is in an abnormal state when it is unable to complete a predetermined goal within a specified time, which defines the subsystem as being in a state of collapse [35].At this point, what we mean by predetermined objectives is that the cost of the project is controlled, the schedule meets the expected planning and the quality meets the original requirements [36]. Delays due to the occurrence of subsystem fragility are taken as an indication of the fragility of the subsystem. The greater the degree of delay, the greater the subsystem fragility.
Define the system S = S 1 , S 2 , S 3 S n . The probability of a subsystem S i collapsing is f S i , which is also a function of the fragility measure of the subsystem, 0 f S i 1 . The extent of impact of subsystem S i crash on a system S crash is p i . At this point, the probability of collapse and the impact factor of the subsystem are normalized. The crash utility factor for the subsystem can be obtained as follows.
q i = f s i × p i i = 1 n f s i × p i
By Shannon’s entropy theory [37], entropy is invoked as a unit of measure for system chaos and disorder. Define the brittleness risk entropy of the subsystem S i as follows.
H S i = q i ln f S i
The average of the brittleness measure functions of brittle events in the space of utility coefficients is defined as the brittleness risk entropy of the system [38]. In summary, the brittleness risk entropy of the system is calculated as shown in Equation (3).
H S = i = 1 n H S i = i = 1 n f S i × p i i = 1 n f S i × p i × ln f S i

4.2. Combined Risk Impact Rate

In order to calculate the probability of a subsystem collapse, we propose the concept of combined risk impact rate, which is used to describe the degree of combined impact of risk considering the combined effect of risk uncertainty and correlation. The formula for calculating the overall risk impact rate can be derived from the idea of the “overall project risk value” in the risk estimation concept, which is the sum of the weights of the individual risk factors multiplied by the probability of occurrence and then multiplied by the level of impact for major construction projects [39,40]. The formula is shown below.
C i = X i × ψ i × Y i
where C i is the combined risk impact ratio; X i is the probability of occurrence of a brittle event affecting the subsystem S i ; Y i is the degree of progress affecting subsystem S i ; ψ i is the weight of the impact of this risk event.
We combined multiple vulnerability incidents with each other to obtain an overall risk value for the subsystem.
C = X 1 m × ψ m m × Y m 1

4.2.1. Calculate the Probability of a Risk Occurring and the Degree of Its Impact

The probability of a risk occurring is often described by a random number simulation [41]. Randomness determines the uncertainty, the unpredictability, in the process of generation [42]. Random numbers are data-generated randomly and independently of human factors within a certain range. Many scholars have used random numbers to simulate the uncertainty of risk with good results [43,44]. We simulated the probability of occurrence of risk factors by using random numbers, which were generated by a random number generator obeying a normal distribution between satisfying (0, 1). The final random number obtained forms X 1 m X 1 , X 2 , X 3 X m .
The effect of a risk can be divided into two outcomes, worse than expected and not worse than expected. When the outcome is worse than expected it is recorded as zero. When it is not worse than expected it is recorded as one. On the basis of statistical theory, with reference to historical data and expert experience, it is possible to obtain a range of conceptual distributions expected for the various outcomes. We compared the size of the random number simulation risk probability with the expected range of probability distributions to derive a good or bad impact effect of the risk. The individual impact effects were formed into an impact effect matrix Y m 1 Y 1 , Y 2 , Y 3 Y m T .

4.2.2. Calculation of Risk Weights

For the allocation of risk weights, we established a judgement matrix based on the IAHP method [45] to obtain the relative risk weights of risk incidents. The method can effectively avoid the problems of high subjectivity and non-consistency. The specific steps are as follows.
Step 1. A comparison matrix was constructed. The degree of impact of the various risks is identified using a three-scale approach.
Step 2. Construct the judgment matrix, the formula for which is given in (6).
b i j = r i r j l m k m 1 ,   |   r i < r j ( r j r i l m ( k m 1 ) + 1 ) 1 ,   |   r i r j
where r i = j = 1 n a i j , l m = r m a x r m i n , r m a x = max r i , r m i n = min r i , k m = r m a x r m i n .
Step 3. Calculate the fitted consistency matrix.
p i j = 10 d i j
d i j = 1 m k = 1 m log b i k log b j k
Step 4. Calculate the relative risk weights of risk incidents.
Ψ i = j = 1 m p i j m i = 1 m ( 1 m j = 1 m p i j )
The relative risk weights for a construction segment m are as follows.
ψ m × m = ψ 11 0 0 ψ m m

5. Buffer Sizing Method Based on Brittle Risk Entropy

We now describe the uncertainty of the internal risk of complex systems with the help of brittle risk entropy, based on the Root Square Error Method. The Root Square Error Method is based on the central limit theorem [20]. Its proposition is to determine the safe time of the process by calculating the variance and to calculate the buffer size by twice the standard deviation of the link. This fully satisfies the rules of fuzzy time accumulation. The principle is shown in the Figure 4. The specific calculation formula is as follows.
B u f f e r = 2 i = 1 n ( Δ t i 2 ) 2 = i = 1 n Δ t i 2
where, Δ t i is used to indicate the safety time of individual tasks on or off the critical chain.
We have divided the buffer settings into two parts, one for the project buffer and the other for the feeding buffer.
The project buffer size is calculated from Equation (11).
P B = 1 + H S i = C C σ i 2
where P B is the project buffer, C C is the set of processes in the critical chain, H S is the critical chain system brittleness risk entropy and σ i is the safety time of activity i.
The feeding buffer size is calculated by Equation (12).
F B k = 1 + H S k j = N C C k σ j 2
where F B k is the feeding buffer of the Kth non-critical chain, N C C k is the set of processes on the Kth non-critical chain, H S k is the system brittleness risk entropy of the Kth non-critical chain, and σ j is the safety time of activity j.
The feeding buffer size derived according to Equation (12) may be large, causing resource conflicts when the buffered non-critical chains sink into the critical chains. Therefore, we needed to make corrections to the size of the project buffer. The correction was made by passing the free time differences of the processes at the end of the non-critical chain through the feeding buffer, while the remaining values of the buffers in each non-critical chain were incorporated into the project buffer. The specific steps are as follows.
Step 1. We can compare the magnitude of the free time difference between the end process on a non-critical chain and the value of the feeding buffer, and take the smaller as the correction value for the feeding buffer on this chain. The relevant formula is as follows.
F B k j = min F B k , F F p
F F p = m i n E S A j E F P
where F F p is the free time difference of the last process P on the Lth non-critical chain, F B k j is the lesser of F B k and F F p to avoid resource conflicts causing changes to the critical chain, E S A j is the earliest start time of process j and E F p is the earliest end time of process P.
Step 2. The remaining buffer value for the Lth non-critical chain can be calculated from Equation (15).
Δ t L = F B L F F p
where F B L is the feeding buffer of the Lth non-critical chain.
Step 3. As a result, we can derive a revised value for the project buffer in the critical chain.
P B j = P B + L Δ t L
where L Δ t L is the sum of the remaining buffer values.

6. Application

Now we illustrate the process based on the brittle risk entropy model described in the previous section with a case study.

6.1. Information of the Project

The project consisted of 17 activities, each requiring 3 resources (r1, r2, r3) and a resource limit of (6, 8, 5). Specific information about each activity in the project is shown in Table 1. The network plan diagram is shown in Figure 5.
The activity times E θ i were estimated using a trapezoidal whitening power function [46], while the safety time σ i was estimated using fuzzy theory [47]. Information on the activity time is shown in Table 2, where t i indicates the consistent duration value for process i at a 95% completion rate. As the project was executed due to the existence of resource conflicts, an adjusted network plan diagram (Figure 6) for the project can be obtained using a heuristic algorithm based on a critical chain identification model with multiple resource constraints. The adjusted network plan diagram shows that the critical chain is A–C–B–D–F–G–H–I–L–M–N–O–Q, with a desired total duration of 28.17 days.

6.2. Application of the Brittleness Risk Entropy Function

The range of probability distributions expected for the outcome of various risks can be obtained by experts in conjunction with historical statistics. Firstly, we used a random number generator to generate random numbers to simulate the likelihood of a risk occurring. Secondly, we determined the impact of the risk with the help of the probability distribution range. Finally, the risk weights were combined to calculate the combined impact rate of the risks. The following was used as an example to calculate the combined impact rate of risk for activity A.
The probability distribution of activity A (Table 3) can be obtained from the historical data and expert opinion. We used a random number generator to generate a set of random numbers as X = 0.83 ,   0.52 ,   0.56 ,   0.48 ,   0.48 , and then we compared the random numbers with Table 3, from which we could obtain the effect of risk as Y = 1 , 1 , 1 , 0 , 1 T . Similar to the previous, we chose 1000 groups for the randomized trial, which yielded many group randomization numbers and risk impact effects.
In order to assign weights to the impact of risk events on Activity A, four experts were invited to rank the importance of the most likely risk incidents B1 to B5 in Activity A respectively. Using Equations (7)~(10), a matrix of relative risk weights for Activity A can be obtained.
Ψ 5 × 5 = 0 . 291 0 0 0 0 0 0 . 299 0 0 0 0 0 0 . 141 0 0 0 0 0 0 . 219 0 0 0 0 0 0 . 057
We can use Equation (6) to find the combined impact rate C for a combination of 1000 random numbers, taking the median of which is the actual risk combined impact rate for activity A. Similarly, the combined impact rate of risk for other activities can be found (Table 4).
We used the Delphi method to identify the extent, P i , to which a subsystem crash affects a system crash. Eight experts were invited. Firstly, we obtained initial comments from the experts. Then, we collated, summarized and tallied the data. After that, anonymous feedback was given to the experts for a second opinion. Finally, the extent of impact P i was determined (Table 4).

6.3. Calculation of Buffer Size

The critical chain activities included A, C, B, D, F, G, H, I, L, M, N, O and Q. The project buffer value P B was calculated as 7.845 d according to Equation (11). The non-critical chain activities included E, P, J and K. The feeding buffer was calculated according to Equation (12), which gave a feeding buffer of 1.644 d for the non-critical chain E, 2.157 d for the non-critical chain P and 3.388 d for the non-critical chain P–J–K.
We tried to avoid problems such as resource conflicts and aborts during critical chains. Based on Equations (13)~(16), the remaining buffering of possible non-critical chains was calculated and considered for correction. In this case, the feeding buffers were all less than the free time difference, their remaining buffers were all zero and there was no remaining buffer for non-critical chains.
The project buffer values F B calculated above were set at the end of the critical chain. The feeding buffer values F B 1 , F B 2 , F B 3 from the above calculation were set at the end of the non-critical chains E, P, and P–J–K respectively. The specific location of the setting is shown in Figure 7. The adjusted network plan diagram gives a desired total duration of 36 d.

6.4. Comparative Analysis

In order to reflect the adaptability and superiority of our method, the Cut-and-Paste Method (C&PM), the Root Square Error Method (RSEM), and the buffer calculation method proposed by Gong Jun et al. [25] were selected for comparison and analysis with the setup method in this paper. This comparison was carried out using 1000 Monte Carlo simulations with Crystal Ball software, set at a 95% confidence level [48]. The durations of all methods satisfy the triangular distribution. The buffer sizes obtained by each method are shown in Table 5. The probability of completion for the different methods is shown in Table 6.
As can be seen from Table 5, the method used in the paper calculates a shorter planned project completion period than the Cut-and-Paste Method (C&PM) and the method proposed by Gong Jun et al. [25] but is longer than the Root Square Error Method (RSEM). We believe that the reasons for this situation are as follows.
(1)
The Cut-and-Paste Method can lead to excessive buffer settings as the links get longer [49]. This case consisted of 17 activities, which make up a long chain. We used the Cut-and-Paste method to calculate buffers, which can lead to too large a buffer that eventually lasts too long.
(2)
The Root Square Error Method failed to measure project-specific uncertainties [50], resulting in the setting of a small buffer that ultimately led to the original plan to deviating from reality.
(3)
Although the buffer size calculation method proposed by Gong Jun et al. [25] takes into account the uncertainty in the construction process and divides it into multiple objectives for quantification, it does not consider the correlation between the various set objective factors.
(4)
The total duration of project completion under different completion probabilities obtained using this method is better than the other two methods, except for the root variance method. During actual construction, if the buffer size was managed appropriately, the real completion time will be smaller than the simulation prediction. Therefore, it is effective and reasonable to use the improved critical chain approach to project construction schedule management from a systems perspective.

7. Conclusions

From the available literature, the setting of CCPM buffers has mostly been studied having been divided into different attributes [51]. However, this situation does not take into account the correlation between attributes, which can lead to the emergence of new uncertainties. This study proposes a new method for resizing buffers from a system perspective. The method draws on the concept of entropy to measure uncertainty in the progress process. In addition, a brittle risk entropy function has been constructed with the help of the combined risk impact rate, as a way of avoiding the singularity of starting from an attribute. Finally, this paper took a project as an example and compared the effectiveness of the method proposed in this paper, the method proposed by Gong Jun, C&PM and RSEM, and we conclude that the method has a certain degree of effectiveness and feasibility.
This study contributes to CCPM research in the following ways:
(1)
Brittle risk entropy can be used to describe the uncertainty of potential risks within a complex system. There is a great deal of uncertainty in the progress process, which needs to be quantified and described. We were the first to introduce the concept of brittle risk entropy into the determination of project buffers.
(2)
The emergence of new methods has led to new directions for the subsequent development of the theory. The approach to critical chain buffer setting from a system perspective is complemented by our study based on brittle risk entropy.
Because of the huge economic value involved, buffer size settings are critical to CCPM. There should be a direct economic value to the project management company for the work we do, mainly for the following reasons. First of all, the approach we propose is applicable to most projects, especially large and complex ones. Secondly, the conclusions we drew from applying the method to the case in our paper are clearly justified and provide a more accurate and robust estimate of the project’s duration. In the actual project management process, we need to consider both the economic interests of the owner side and the reasonable construction time of the project builder, and the method proposed in this paper can help project companies to avoid the problems of underestimation and overestimation.
We have been too constrained in our study of buffer settings, and in fact the issue can be approached from a number of angles. It is interesting to set up the buffer with the help of entropy theory. In addition, we can also draw on other concepts that can describe uncertainty, such as probabilistic rough sets, cloud models, fuzzy sets, etc., [52]. Undoubtedly, the study of buffers from a systems perspective needs more attention and this will be one of the key directions for future research on buffer settings. Further, we will focus on how the calculation of brittle risk entropy can be fully quantified, which is both a shortcoming of this paper and the focus of our future research.

Author Contributions

Conceptualization, J.-l.P. and C.P.; methodology, C.P.; software, C.P.; validation, C.P.; formal analysis, C.P.; investigation, C.P.; resources, J.-l.P.; data curation, C.P.; writing—original draft preparation, C.P.; writing—review and editing, C.P.; visualization, C.P.; supervision, J.-l.P.; project administration, J.-l.P.; funding acquisition, J.-l.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of Hunan Province, China, grant number 2015JJ2004 and 2021JJ30746.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Acknowledgments

All authors would like to express their kindest gratitude to proof-readers and editors.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chitkara, K. Construction Project Management; Tata McGraw-Hill Education: New York, NY, USA, 1998. [Google Scholar]
  2. De Marco, A.; Rafele, C.; Thaheem, M.J. Dynamic management of risk contingency in complex design-build projects. J. Constr. Eng. Manag. 2016, 142, 04015080. [Google Scholar] [CrossRef]
  3. Nicholas, J.M. Project Management for Business and Engineering: Principles and Practice; Elsevier: Amsterdam, The Netherlands, 2004. [Google Scholar]
  4. Ibbs, C.W.; Kwak, Y.H. Assessing Project Management Maturity. Proj. Manag. J. 2000, 31, 32–43. [Google Scholar] [CrossRef]
  5. Peng, J.; Peng, C.; Wang, M.; Hu, K.; Wu, D. Research on the factors of extremely short construction period under the sufficient resources based on Grey-DEMATEL-ISM. PLoS ONE 2022, 17, e0265087. [Google Scholar] [CrossRef]
  6. Segerstedt, A.; Olofsson, T.; Eriksson, P.E. Improving construction supply chain collaboration and performance: A lean construction pilot project. Supply Chain Manag. Int. J. 2010, 15, 394–403. [Google Scholar] [CrossRef]
  7. Zhang, Y. Taking the Time Characteristic into Account of Life Cycle Assessment: Method and Application for Buildings. Sustainability 2017, 9, 922. [Google Scholar] [CrossRef]
  8. Cheng, M.-Y.; Darsa, M. Construction Schedule Risk Assessment and Management Strategy for Foreign General Contractors Working in the Ethiopian Construction Industry. Sustainability 2021, 13, 7830. [Google Scholar] [CrossRef]
  9. Ghaffari, M.; Emsley, M.W. Current status and future potential of the research on Critical Chain Project Management. Surv. Oper. Res. Manag. Sci. 2015, 20, 43–54. [Google Scholar] [CrossRef]
  10. Hegazy, T.; Menesi, W. Enhancing the critical path segments scheduling technique for project control. Can. J. Civ. Eng. 2012, 39, 968–977. [Google Scholar] [CrossRef]
  11. Habibi, F.; Birgani, O.T.; Koppelaar, H.; Radenović, S. Using fuzzy logic to improve the project time and cost estimation based on Project Evaluation and Review Technique (PERT). J. Proj. Manag. 2018, 3, 183–196. [Google Scholar] [CrossRef]
  12. Goldratt, E.M. Critical Chain; North River Press: Great Barrington, MA, USA, 1997; p. 0884271536. [Google Scholar]
  13. Stratton, R. Critical chain project management theory and practice. J. Proj. Manag. Syst. Eng. 2009, 21, 149–173. [Google Scholar]
  14. Kulkarni, A.; Yadav, D.K.; Nikraz, H. Aircraft maintenance checks using critical chain project path. Aircr. Eng. Aerosp. Technol. 2017, 89, 879–892. [Google Scholar] [CrossRef] [Green Version]
  15. Phillis, R.C.D.; Gumede, H. A case study on stoping shift buffering at Impala Platinum: A critical chain project management perspective. J. South. Afr. Inst. Min. Metall. 2011, 111, 793–800. [Google Scholar]
  16. Sarkar, D.; Jha, K.N.; Patel, S. Critical chain project management for a highway construction project with a focus on theory of constraints. Int. J. Constr. Manag. 2021, 21, 194–207. [Google Scholar] [CrossRef]
  17. Bevilacqua, M.; Ciarapica, F.; Giacchetta, G. Critical chain and risk analysis applied to high-risk industry maintenance: A case study. Int. J. Proj. Manag. 2009, 27, 419–432. [Google Scholar] [CrossRef]
  18. Yang, S.; Fu, L. Critical chain and evidence reasoning applied to multi-project resource schedule in automobile R&D process. Int. J. Proj. Manag. 2014, 32, 166–177. [Google Scholar] [CrossRef]
  19. Zhang, J.-W.; Li, R.-N. Review of critical chain project scheduling method. Kongzhi Yu Juece/Control. Decis. 2013, 28, 1281–1287. [Google Scholar]
  20. Newbold, R.C. Project Management in the Fast Lane: Applying the Theory of Constraints; CRC Press: Boca Raton, FL, USA, 1998. [Google Scholar]
  21. Tukel, O.I.; Rom, W.O.; Eksioglu, S.D. An investigation of buffer sizing techniques in critical chain scheduling. Eur. J. Oper. Res. 2006, 172, 401–416. [Google Scholar] [CrossRef]
  22. Zhang, J.; Song, X.; Diaz, E. Project buffer sizing of a critical chain based on comprehensive resource tightness. Eur. J. Oper. Res. 2016, 248, 174–182. [Google Scholar] [CrossRef]
  23. Ghoddousi, P.; Ansari, R.; Makui, A. A risk-oriented buffer allocation model based on critical chain project management. KSCE J. Civ. Eng. 2017, 21, 1536–1548. [Google Scholar] [CrossRef]
  24. Zhao, C.W.; Dong, X.B.; Hong, Q.; Business, S.O. Critical Chain Buffering Calculation Method Based on Z-number Theory. J. Civ. Eng. Manag. 2017. [Google Scholar]
  25. Jun, G.; Tao, H.; Lu, Y. Buffer Setting Method of Critical Chain Based on Information Entropy. Acta Autom. Sin. 2019, 45, 1–11. [Google Scholar]
  26. Zhang, J.; Wan, D. Determination of early warning time window for bottleneck resource buffer. Ann. Oper. Res. 2021, 300, 289–305. [Google Scholar] [CrossRef]
  27. Bie, L.; Cui, N.; Zhang, X. Buffer sizing approach with dependence assumption between activities in critical chain scheduling. Int. J. Prod. Res. 2012, 50, 7343–7356. [Google Scholar] [CrossRef]
  28. Farag, M.A.M. A Bridge between Increasing Reliability and Reducing Variability in Construction Work Flow: A Fuzzy-Based Sizing Buffer Model. J. Adv. Manag. Sci. 2014, 2, 287–294. [Google Scholar] [CrossRef]
  29. Leng, K.J.; Shi, W.; Hu, X.J.; Pan, L. Schedule of supply chain management project based on TOC. J. Intell. Fuzzy Syst. 2017, 33, 2801–2809. [Google Scholar]
  30. Zarghami, S.A.; Gunawan, I.; De Zubielqui, G.C.; Baroudi, B. Incorporation of resource reliability into critical chain project management buffer sizing. Int. J. Prod. Res. 2020, 58, 6130–6144. [Google Scholar] [CrossRef]
  31. Roghanian, E.; Alipour, M.; Rezaei, M. An improved fuzzy critical chain approach in order to face uncertainty in project scheduling. Int. J. Constr. Manag. 2018, 18, 1–13. [Google Scholar] [CrossRef]
  32. She, B.; Chen, B.; Hall, N.G. Buffer sizing in critical chain project management by network decomposition. Omega 2021, 102, 102382. [Google Scholar] [CrossRef]
  33. Wu, H.-M.; Jin, H.-Z. Brittleness of complex system based on entropy theory. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/J. Cent. South Univ. (Sci. Technol.) 2009, 40, 347–351. [Google Scholar]
  34. Cao, R.; Jin, H.-Z. Brittleness analysis of complex systems subject to cascading failure. In Proceedings of the 2013 10th IEEE International Conference on Mechatronics and Automation, IEEE ICMA 2013, Takamastu, Japan, 4–7 August 2013. [Google Scholar]
  35. Liu, W.; Xu, L.; Chen, Y. Brittle measurement and evaluation analysis of manufacturing equipment based on brittle risk entropy. Jisuanji Jicheng Zhizao Xitong/Comput. Integr. Manuf. Syst. CIMS 2019, 25, 2820–2830. [Google Scholar]
  36. Liu, J.; Zhang, G.-B.; Li, D.-Y.; Li, Y.; Qian, B.-M. Reliability analysis for multi-state manufacturing system based on brittleness theory. Jisuanji Jicheng Zhizao Xitong/Comput. Integr. Manuf. Syst. CIMS 2014, 20, 155–164. [Google Scholar]
  37. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  38. Xiang, Y.; Mo, R.; Chang, Z.; Qiao, H. Evolution of product module based on complex network brittleness theory. Jisuanji Jicheng Zhizao Xitong/Comput. Integr. Manuf. Syst. CIMS 2016, 22, 1415–1423. [Google Scholar]
  39. Liu, B.; Li, Y.; Xue, B.; Li, Q.; Zou, P.X.; Li, L. Why do individuals engage in collective actions against major construction projects?—An empirical analysis based on Chinese data. Int. J. Proj. Manag. 2018, 36, 612–626. [Google Scholar] [CrossRef]
  40. Miao, J.; Huang, D.; He, Z. Social Risk Assessment and Management for Major Construction Projects in China Based on Fuzzy Integrated Analysis. Complexity 2019, 2019, 2452895. [Google Scholar] [CrossRef]
  41. Voit, E.O.; Schwacke, L.H. Random number generation from right-skewed, symmetric, and left-skewed distributions. Risk Anal. Off. Publ. Soc. Risk Anal. 2000, 20, 59–71. [Google Scholar] [CrossRef]
  42. L’Ecuyer, P. Random numbers for simulation. Commun. ACM 1990, 33, 85–97. [Google Scholar] [CrossRef]
  43. Liu, Y.; Ralescu, D.A. Risk Index in Uncertain Random Risk Analysis. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2014, 22, 491–504. [Google Scholar] [CrossRef]
  44. Tian, J.; Zhao, K. Optimal selection of financial risk investment portfolio based on random matrix method. J. Comput. Methods Sci. Eng. 2020, 20, 859–868. [Google Scholar] [CrossRef]
  45. Li, F.; Phoon, K.K.; Du, X.; Zhang, M. Improved AHP Method and Its Application in Risk Identification. J. Constr. Eng. Manag. 2013, 139, 312–320. [Google Scholar] [CrossRef] [Green Version]
  46. Zhang, W.; Zhu, L.; Zhang, F.; Lou, X.; Liu, C.; Meng, X. Evaluating the liquid path stability of a flow cytometer. Cytom. Part A 2016, 89, 941–948. [Google Scholar] [CrossRef] [PubMed]
  47. Jeong, K.-S.; Lee, K.-W.; Moon, J.-K.; Jeong, S.-Y.; Lee, J.-J.; Kim, G.-H.; Choi, B.-S. Life time estimation of SSCs for decommissioning safety of nuclear facilities. Ann. Nucl. Energy 2012, 46, 244–247. [Google Scholar] [CrossRef]
  48. Leach, L. Schedule and Cost Buffer Sizing: How to Account for the Bias between Project Performance and Your Model. Proj. Manag. J. 2003, 34, 34–47. [Google Scholar] [CrossRef]
  49. Ghaffari, M.; Emsley, M.W. Buffer Sizing in CCPM Portfolios with Different Resource Capacities. Int. J. Inf. Technol. Proj. Manag. 2017, 8, 40–51. [Google Scholar] [CrossRef]
  50. Zhang, J.; Song, X.; Diaz, E. Buffer sizing of critical chain based on attribute optimization. Concurr. Eng. 2014, 22, 253–264. [Google Scholar] [CrossRef]
  51. Luiz, O.R.; De Souza, F.B.; Luiz, J.V.; Jugend, D. Linking the Critical Chain Project Management literature. Int. J. Manag. Proj. Bus. 2019, 12, 423–443. [Google Scholar] [CrossRef]
  52. Zohrehvandi, S.; Soltani, R. Project scheduling and buffer management: A comprehensive review and future directions. J. Proj. Manag. 2022, 7, 121–132. [Google Scholar] [CrossRef]
Figure 1. The specific flow chart of the method.
Figure 1. The specific flow chart of the method.
Buildings 12 01390 g001
Figure 2. Brittle models of complex systems.
Figure 2. Brittle models of complex systems.
Buildings 12 01390 g002
Figure 3. Construction process of the risk brittle structure model.
Figure 3. Construction process of the risk brittle structure model.
Buildings 12 01390 g003
Figure 4. The principle of the Root Square Error Method.
Figure 4. The principle of the Root Square Error Method.
Buildings 12 01390 g004
Figure 5. Project network plan diagram.
Figure 5. Project network plan diagram.
Buildings 12 01390 g005
Figure 6. Project network plan diagram after adjustment.
Figure 6. Project network plan diagram after adjustment.
Buildings 12 01390 g006
Figure 7. Diagram of buffer setup.
Figure 7. Diagram of buffer setup.
Buildings 12 01390 g007
Table 1. Specific information on each activity.
Table 1. Specific information on each activity.
ActivityPre-Immediate ActivityPost-Immediate Activity Activity Times Resources Required
Most Optimistic TimeMost Probable IntervalMost Pessimistic Timer1r2r3
A B, C2(2.5, 3.5)4220
BAD3(3.5, 4)4.5340
CAE3.5(4, 4.5)5.5464
DBF2(3.5, 4)4.5330
ECF1.5(2, 3)4235
FD, EJ, Q1(1.5, 2.5)3334
GFH2.5(3.5, 4)4.5220
HGI1(1.5, 2.5)3210
IHL1(1.5, 2.5)3231
JFK2(3.5, 4)4.5355
KJQ1.5(2.5, 3.5)4335
LIM1(1.5, 2.5)3221
MLN1.5(2.5, 3.5)3.5220
NMO1(1.5, 2.5)3230
ONQ2(3.5, 4)4.5220
PFQ3(4.5, 5.5)6354
QP, K 1(1.5, 2.5)3200
Table 2. Information on the activity time.
Table 2. Information on the activity time.
Activity Number t i E θ i σ i
A3.732.331.39
B4.2831.28
C5.153.51.65
D4.232.671.56
E3.5821.58
F2.731.51.23
G4.731.7
H2.731.51.23
I2.731.51.23
J4.232.671.56
K3.72.171.54
L2.731.51.23
M3.2521.25
N2.731.51.23
O4.232.671.56
P5.683.672.02
Q2.731.51.23
Table 3. The probability distribution of activity A.
Table 3. The probability distribution of activity A.
Influencing OutcomesB1B2B3B4B5
not worse(0, 0.25](0, 0.4](0, 0.5](0, 0.6](0, 0.2]
worse(0.25, 1)(0.4, 1)(0.5, 1)(0.6, 1)(0.2, 1)
Table 4. Fragility risk entropy calculation results.
Table 4. Fragility risk entropy calculation results.
Activity Number C i P i H S i
A0.3790.0530.048
B0.8880.0040.001
C0.3850.0060.006
D0.4590.0670.060
E0.0920.0750.041
F0.7330.0970.055
G0.8850.0320.009
H0.2370.0970.082
I0.5600.0380.030
J0.3260.0060.005
K0.4630.0720.064
L0.0520.0680.026
M0.3420.1050.095
N0.4010.1050.095
O0.7180.0550.032
P0.2720.0770.068
Q0.4390.0450.040
Table 5. Buffer size from each method.
Table 5. Buffer size from each method.
MethodCritical ChainNon-Critical Chains
PBFB1FB2FB3
C&PM9.1880.651.212.83
RSEM4.9691.582.022.98
Method proposed by Gong Jun [25]10.72.242.864.96
Method for this article7.8451.642.163.39
Table 6. Probability of completion by different methods.
Table 6. Probability of completion by different methods.
Probability/%Completion Period
C&PMRSEMMethod Proposed by Gong Jun [25]Method for This Article
0%44.5732.1737.834.97
10%45.4132.738.4535.59
20%45.5832.8438.5935.75
30%45.7232.9438.6935.85
40%45.8233.0438.7835.95
50%45.9333.1238.8636.04
60%46.0333.1938.9636.14
70%46.1533.339.0636.22
80%46.2633.3939.1736.31
90%46.4733.5539.3236.45
100%47.3934.1339.9837.11
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Peng, J.-l.; Peng, C. Buffer Sizing in Critical Chain Project Management by Brittle Risk Entropy. Buildings 2022, 12, 1390. https://doi.org/10.3390/buildings12091390

AMA Style

Peng J-l, Peng C. Buffer Sizing in Critical Chain Project Management by Brittle Risk Entropy. Buildings. 2022; 12(9):1390. https://doi.org/10.3390/buildings12091390

Chicago/Turabian Style

Peng, Jun-long, and Chao Peng. 2022. "Buffer Sizing in Critical Chain Project Management by Brittle Risk Entropy" Buildings 12, no. 9: 1390. https://doi.org/10.3390/buildings12091390

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop