Kyle Lin ; This study aims to develop a mathematical model to describe the interactions between defense contractors and the government, in order to estimate cost and schedule for developing a technologically advanced weapon system. The research goal is twofold: (1) Explain why the development of a new weapon system is often subject to cost overrun and schedule delay; and (2) Identify market mechanisms to improve the efficiency of the bidding and contracting process in order to better manage risk. ; Naval Research Program ; Prepared for: N98, Mr. Christopher Marsh
The government runs a program to develop a technologically advanced weapon system. In the competition phase, the government provides initial funding to several defense contractors to develop system prototypes. Based on the demonstration of these prototypes, the government selects one defense contractor as the sole source to produce the final product. We develop a mathematical model to describe this process. By analyzing the model and conducting a numerical study, we find three main reasons why such a program often suffers delay and cost overrun. First, the selected contractor tends to be luckier than usual in the competition phase, so the government tends to overestimate its capability. Second, once a contractor becomes the sole source, their goal is to complete the scheduled tasks within each fiscal year on time, but not to deliver the final product as soon as possible. Third, the contractor may be motivated to exert extra effort during the competition phase in order to improve their chance of getting selected as the sole source, which may result in an overly optimistic estimation on program completion time. Based on a cost structure, our model offers recommendations on the optimal length of the competition phase and the number of contractors to invite, in order to minimize the program completion time and total cost. ; OPNAV N98 2000 Navy Pentagon Rm 5C469 Washington DC, 20350 ; Approved for public release; distribution is unlimited.
The government runs a program to develop a technologically advanced weapon system. In the competition phase, the government provides initial funding to several defense contractors to develop system prototypes. Based on the demonstration of these prototypes, the government selects one defense contractor as the sole source to produce the final product. We develop a mathematical model to describe this process. By analyzing the model and conducting a numerical study, we find three main reasons why such a program often suffers delay and cost overrun. First, the selected contractor tends to be luckier than usual in the competition phase, so the government tends to overestimate its capability. Second, once a contractor becomes the sole source, their goal is to complete the scheduled tasks within each fiscal year on time, but not to deliver the final product as soon as possible. Third, the contractor may be motivated to exert extra effort during the competition phase in order to improve their chance of getting selected as the sole source, which may result in an overly optimistic estimation on program completion time. Based on a cost structure, our model offers recommendations on the optimal length of the competition phase and the number of contractors to invite, in order to minimize the program completion time and total cost. ; OPNAV N98. ; Approved for public release; distribution is unlimited.
Radio-controlled improvised explosive devices (RCIEDs) have been a major weapon of choice by the insurgents in Operation Iraqi Freedom since 2003. One effective way to prevent an RCIED attack is to use electronic jamming devices to interfere with the communication between the trigger and the bomb itself. Due to power constraints and other considerations, however, a jammer usually cannot jam all triggers simultaneously. In this paper, we develop game-theoretic models to study both active jamming and reactive jamming. For active jamming, we compute the optimal mixed strategy by linear programming; for reactive jamming, we use an iterative method. Finally, we demonstrate the applications of our models with numerical experiments. ; Approved for public release; distribution is unlimited.
Because developing a new weapon system involves advanced technology pertinent to national security, the pricing of such systems primarily relies on cost estimation, as opposed to basic economic principles such as supply and demand. During the R&D period—which can take up to several years—however, the research may hit a roadblock and the various costs may change. As a consequence, such projects are often subject to substantial delays and cost overrun. This project will develop a mathematical model for the interaction among stakeholders in the defense industry, including the government and major defense contractors. The goal is to identify market mechanism to improve the efficiency of the contracting process. These mechanisms could improve the cost estimation process or contracting structure to better manage risk. ; Naval Research Program ; Prepared for: N9 Sponsor, POC: Mr. Chris Marsh
The article of record as published may be found at https://doi.org/10.1016/j.tcs.2020.03.011 ; A set of n boxes, located on the vertices of a hypergraph G, contain known but different rewards. A Searcher opens all the boxes in some hyperedge of G with the objective of collecting the maximum possible total reward. Some of the boxes, however, are booby trapped. If the Searcher opens a booby trapped box, the search ends and she loses all her collected rewards. We assume the number k of booby traps is known, and we model the problem as a zero-sum game between the maximizing Searcher and a minimizing Hider, where the Hider chooses k boxes to booby trap and the Searcher opens all the boxes in some hyperedge. The payoff is the total reward collected by the Searcher. This model could reflect a military operation in which a drone gathers intelligence from guarded locations, and a booby trapped box being opened corresponds to the drone being destroyed or incapacitated. It could also model a machine scheduling problem, in which rewards are obtained from successfully processing jobs but the machine may crash. We solve the game when G is a 1-uniform hypergraph (the hyperedges are all singletons), so the Searcher can open just 1 box. When G is the complete hypergraph (containing all possible hyperedges), we solve the game in a few cases: (1) same reward in each box, (2) k=1, and (3) n=4 and k = 2. The solutions to these few cases indicate that a general simple, closed form solution to the game appears unlikely. ; This material is based upon work supported by the National Science Foundation under Grant No. IIS-1909446. ; This material is based upon work supported by the National Science Foundation under Grant No. IIS-1909446.
This report examines two forms of decoy that may arise in warfare involving improvised explosive devices (IEDs). The first is a fake IED, which costs less than a real IED and wastes the time of route-clearing patrols that investigate it. The second is an understaffed surveillance tower, which may provide some deterrence to insurgent activities, as from the outside the tower appears to be fully operational. For each form of decoy, we formulate mathematical models to study the optimal strategies for both the insurgents and the government forces. We use numerical examples to demonstrate our models, and to point out the situations when these decoys may play a significant role in IED warfare. ; Approved for public release; distribution is unlimited.
Mathematical Methods of Operations Research, V. 68, pp 539-549. ; A target is hidden in one of several possible locations, and the objective is to find the target as fast as possible. One common measure of effectiveness for the search process is the expected time of the search. This type of search optimization problem has been addressed and solved in the literature of the case where the searcher has imperfect sensitivity (possible false negative results), but perfect specificity (no false positive detections). In this paper, which is motivated by recent military and homeland security search situations, we extend the results to the case where the search is subject to false positive detections.