Record ID | ia:schedulingattack00beck |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/schedulingattack00beck/schedulingattack00beck_marc.xml |
Download MARC binary | https://www.archive.org/download/schedulingattack00beck/schedulingattack00beck_meta.mrc |
LEADER: 02276nam 2200253 a 45 0
001 o640490132
005 19950823090641.0
008 980113s1997 cau b f000|0 eng d
040 $aCMontNP$cCMontNP
100 1 $aBeckman, Philip J.
245 10 $aScheduling attack submarine deployments.
260 $aMonterey, Calif. :$bNaval Postgraduate School ;$aSpringfield, Va. :$bAvailable from National Technical Information Service,$c1997.
300 $axvi, 47 p. ;$c28 cm.
500 $aThesis advisor, Siriphong Lawphongpanich.
500 $aAD-A331 771.
502 $aThesis (M.S. in Operations Research) Naval Postgraduate School, March 1997.
504 $aIncludes bibliographical references (p. 45-46).
520 $aThe Navy's peacetime mission is "to conduct forward presence operations to help shape the strategic environment by deterring conflict, building interoperability, and by responding, as necessary, to fast breaking crises with the demonstration and application of credible combat power." (OPNAV INSTRUCTION 3501.316, February 1995) The ability to carry out this mission hinges on the Navy's ability to maintain ships and submarines forward deployed in regions where such crises may occur. The end of the Cold War and current budget constraints have caused a drawdown in the number of ships and submarines with which to provide forward presence. Coupled with the continued requirement to maintain a certain level of forward presence, this drawdown creates shortfalls when attempting to deploy ships or submarines to fill certain mission requirements. To minimize these shortfalls, this thesis formulates the problem of scheduling attack submarine deployments as an integer program. Due to its size and complexity, heuristic algorithms are developed to provide near-optimai solutions in a reasonable amount of time. In addition to providing near-optimal deployment schedules, results from the algorithms are also useful in evaluating changes in maintenance and operational policies.
592 $adk/dk cc:9116 01/13/98.
650 4 $aDEPLOYMENT.
650 4 $aSCHEDULING.
650 4 $aATTACK SUBMARINES.
926 $aNPS-LIB$bNPSARCHIVE$cB3355$dTHESIS$f1
926 $aNPS-LIB$bDIGIPROJ$cB3355$dTHESIS$eNEVER$f2