Optimising Networking in Air Defence Dstl/CP12250 ISMOR 21, September 2004 Jackie Offord - C4/ISTAR Team Policy and Capability Studies

Slides:



Advertisements
Similar presentations
Combining Analysis strands in a Main Gate Submission.
Advertisements

Risk Identification Techniques
Instant Business Improvement “Managing Operational Performance”
System Integration Verification and Validation
Linear Programming.
Environment case Episode 3 - CAATS II Final Dissemination Event Brussels, 13 & 14 Oct 2009 Hellen Foster, Jarlath Molloy NATS, Imperial College London.
Achieving a Cost Effective Live, Virtual and Constructive Training Mix “Helping MOD to make better decisions in an age of uncertainty” Simon Foale Group.
LINEAR PROGRAMMING SIMPLEX METHOD
Evaluation and Reporting ENTC 4060 Project Scheduling.
Coercive Operations and their Influence on the Equipment Programme 20 ISMOR Ben Bolland Mike Purvis.
The application of “Value Engineering” tools to risk assess the outputs of an NSI Graham Sharp Manager, Continuous Improvement Zone ONS, UK
Chapter 2 Linear Programming Models: Graphical and Computer Methods © 2007 Pearson Education.
TRAiDE™ is a trademark of BAE SYSTEMS. US patent applied for. © Copyright BAE Systems All rights reserved 1 Exploiting Modelling to Improve Decision-
SC2 meeting 24 November 2014 Security Measures and Resources Toolbox
Approach to Secure IP Platforms Clarence Pape March 12, 2011.
EDGE™ Concept Level Project Plan P08110 – UAV Based Digital Imaging System David Eells (Mechanical Engineering)
Project Scope Management
Organization Development and Change
10.5 Report Performance The process of collecting and distributing performance information, including status reports, progress measurements and forecasts.
Optimization I Operations -- Prof. Juran. Outline Basic Optimization: Linear programming –Graphical method –Spreadsheet Method Extension: Nonlinear programming.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Capacity Manager.
LEARN. NETWORK. DISCOVER. | #QADexplore Implementing Business Process Management: Steps to Success WCUG – November 18, 2014.
Army Doctrine Publication (ADP) 3-37; and Army
1 1 Slide LINEAR PROGRAMMING: THE GRAPHICAL METHOD n Linear Programming Problem n Properties of LPs n LP Solutions n Graphical Solution n Introduction.
Chapter 4: Beginning the Analysis: Investigating System Requirements
HIGHER/INTERMEDIATE 2 PE  Basketball Structures and Strategies.
Algebra 2 Chapter 3 Notes Systems of Linear Equalities and Inequalities Algebra 2 Chapter 3 Notes Systems of Linear Equalities and Inequalities.
Including a detailed description of the Colorado Growth Model 1.
Arithmetic Sequences and Series. A sequence is arithmetic if each term – the previous term = d where d is a constant e.g. For the sequence d = 2 nd term.
1 REQUIREMENT ENGINEERING Chapter 7. 2 REQUIREMENT ENGINEERING Definition Establishing what the customer requires from a software system. OR It helps.
Concepts of Engineering and Technology Copyright © Texas Education Agency, All rights reserved.
BUSINESS PLUG-IN B15 Project Management.
Certificate IV in Project Management Introduction to Project Management Course Number Qualification Code BSB41507.
Dealing with Policy Change in Education Common borders. Common Solutions. Grant Contract No , MIS-ETC 2674 MANAGE.EDU: Efficient Education.
Energy Consciousness Taking a Systems Approach to Energy Dr. Rachel Leslie Resilience Research Portfolio Manager Defence Science and Technology Laboratory.
Towards Appropriate Selection of Analysis Tools and Methods.
Soldier-Vehicle Integration: a TTCP Approach Michel B. DuCharme 1, Pierre Urgings 2, Mark Unewisse 2, Colin Mooney 3, James Carr 4 1 DRDC, Canada, 2 DSTO,
Dstl is part of the Ministry of Defence © Crown Copyright Dstl 2012 Anticipating the Insurgent Response Fiona Browning Land Battlespace Systems Department.
IT Requirements Management Balancing Needs and Expectations.
Development of Counter Improvised Explosive Device (C-IED) Metrics Simon Crabtree Counter-IED Effects Team ISMOR 2011.
Communications Aspects of the Hungarian NATO Integration and the Defence Reform by Mr. Péter SIKLÓSI, Head of Defence Policy Department, MoD, HUNGARY 25.
1 Handling Uncertainty in the Development and Design of Chemical Processes David Bogle, David Johnson and Sujan Balendra Centre for Process Systems Engineering.
DMO Purpose: Equip and sustain the Australian Defence Force (ADF) and provide advice to Government DMO’s two goals: (i)To deliver projects on time, on.
Insights from the Your Better Life Index Romina Boarini OECD Statistics Directorate Exploring and exploiting quality of life complexity (QoLexity): epistemological,
Optimization I. © The McGraw-Hill Companies, Inc., 2004 Operations Management -- Prof. Juran2 Outline Basic Optimization: Linear programming –Graphical.
Project Portfolio Management Business Priorities Presentation.
Assessing the Military Benefits of NEC Using a Generic Kill-Chain Approach David Nevell QinetiQ Malvern 21 ISMOR September 2004.
Microsoft Office Excel 2013 Expert Microsoft Office Excel 2013 Expert Courseware # 3254 Lesson 4: Custom Formatting and What-If Analysis.
Chapter 2 A systems view of project management. Learning objectives apply systems theory to explain the interrelations between project elements discuss.
Equipment Capability Measurement - An Integrated Approach John MoorePrincipal Consultant, CORDA Ltd Rob Laker Analyst, CORDA Ltd John Roe DD (Capability),
MSA Orientation – v203a 1 What’s RIGHT with the CMMI?!? Pat O’Toole
TAG and MSEsG 18 & 19 th November 2015 Priorities for enhanced information exchange across sectors and borders: State of play and next steps Common Information.
ESD.71 Engineering Systems for Analysis Real Options for Integrating Unmanned Aircraft into the National Airspace System Luke Cropsey 30 November 2007.
Soldier/Vehicle/Communications Integration Marc-André Rochon Technical Specification Lead Integrated Soldier System Project September 21-22, 2010 Château.
Issues in the Validation of Battle Models Presented at 19 ISMOR David Frankis ‘The Barbican’, East Street, Farnham, Surrey GU9 7TB
Knowledge Transfer Networks Accelerating business innovation; a Technology Strategy Board programme Review of Challenges in Modelling and HT Methods for.
UPDATE JUNE  Indigo is designed on the fundamental principles of providing – Efficient and accurate data maintenance tools Ground-breaking optimisation.
The value of Cyber Defense Exercises 1. Purpose and objectives The aim is to improve information assurance in critical infrastructure by :  Better understanding.
4 Chapter 4: Beginning the Analysis: Investigating System Requirements Systems Analysis and Design in a Changing World, 3 rd Edition.
Chapter 2 Linear Programming Models: Graphical and Computer Methods
Analysis Manager Training Module
Development of Counter Improvised Explosive Device (C-IED) Metrics
Air Quality Management Components
The Evidence Framework Approach: Practical Ways of Thinking About Evidence 34th International Symposium on Military Operational Research 18th to 21st.
Sensitivity Analysis and
Release 3 Plan Options Decision
Combatant Design and Fleet Mix Assessment and Optimisation using BAEFASIP Dstl/CP Chris Brett, Dstl, UK Dr Malcolm Courts, BAE Systems Maritime,
Approved for Public Release: Cases , , ,
Optimising Capacity and Competence ISMOR August 2002
Optimization I.
Presentation transcript:

Optimising Networking in Air Defence Dstl/CP12250 ISMOR 21, September 2004 Jackie Offord - C4/ISTAR Team Policy and Capability Studies

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Background Why optimise networking in AD? What is networking in Air Defence (AD)? –5 Network Levels For a range of spend levels, what are the most cost- effective options for networked air defence in terms of their contribution to the protection of –key BLUE assets from RED air threats and –BLUE and neutral air vehicles from BLUE kills?

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Protection Trade Off Protection of BLUE Assets Protection of BLUE and Neutral Aircraft Low Asset Protection & High Aircraft Protection Low Asset Protection & Low Aircraft Protection High Asset Protection & Low Aircraft Protection High Asset Protection & High Aircraft Protection × × × × × × × × × ×

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence The Optimisation Model Quick and Efficient method of finding Optimal Solutions It is set up to: Optimise the AD Protection provided in a phase of a scenario by varying the Deployment of networked AD systems within the constraints of Correct Identification and Cost OR Optimise the AD Correct Identification provided in a phase of a scenario by varying the Deployment of networked AD systems within the constraints of Protection and Cost

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Simplified Solution Space Protection Correct ID Line of constant effectiveness Cost Constraint Deployment Contraint Protection or Correct ID Constraint Protection Optimisation Correct ID Optimisation

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Objective Function 1st Priority –Defend the least well defended asset as much as possible –(Identify the least well identified ‘threat’ as much as possible) 2nd Priority –Defend all assets up to goal values –(Correctly identify all assets up to goal values) 3rd Priority –Increase performance of mix to spend remaining budget

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Results Format Aggregate results Each point is a run with different networking Each series is runs with different initial conditions Individual results Green shows protection provided against each track Purple shows correct ID ability on track Protection Correct ID Track

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Fitness for Purpose Mathematical Programming models have a bad reputation for being ‘black-boxes’ This model overcomes this with: –Simple formulation –Fast run time –Sensitivity analysis –Graphical results presented –Validation Meetings

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Fitness for Purpose Part of a complete methodology –Protection and Correct ID are not strictly linear –No time dimension nor simultaneous attacks –These are dealt with in campaign modelling Weights in objective function validated through sensitivity analysis and military review panel

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Methodology Data Collation Campaign Modelling Scenario Characterisation Optimisation

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Scenario Characterisation Protection Tasks Tracks Phases Systems Blue and Neutral Air Activity Networks Locations

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Data Collection Best available in timeframe Subject Matter Experts –Dstl and Industry Previous and current studies Military and Technical Judgement Panels –Including people with operational experience Trials and Experiments Reviewed by stakeholders

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Campaign Modelling COMAND - Sea/Air CLARION - Land/Air Used to: –Identify key BLUE assets for protection –Test robustness of Optimal Solutions Introduce Time element Introduce Coalition interoperability

© Dstl 2004 Dstl/CP12250 Dstl is part of the Ministry of Defence Summary Quick way of gaining insight into problem –Less than 6 months from conception to working model –Graphical presentation easy to interpret Provides structure and focus to data collection Limitations are understood and where possible mitigated Successful application of optimisation tool in a High Level BOI study