An investigation of circular, finite queueing systems in amphibious operations.
Abstract
The general unloading phase of amphibious operations is
examined with particular emphasis on the queueing problems that
arise. A model is structured and a computer simulation is provided.
Variables considered are the number of transfer vehicles
and their speed and payload, the number and capacity of loading
and unloading points, and the ship-to-shore distance. Basic
relationships between the variables are examined and an approximating
formula is developed for computing the _time required to
unload a given tonnage of cargo. Applications in operational
planning, system modification, and total system design are outlined.
The impact on system performance of various assumed
distributions of travel time and loading time is discussed.
For systems employing mixed fleets of transfer vehicles, some
basic decision rules are developed as to which vehicles to load
or unload first. Suggestions as to further research and as to
the model's general applicability are included.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Expeditionary Mine Countermeasures (ExMCM) C4I Requirements (Continuation)
Das, Arijit (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N065-AThe ExMCM is a broad program providing an innovative approach to the Mine Warfare mission area, required to operate with both U.S Navy and U.S. Marine Corps forces. The large number of sonar imagery files (from the MK18 ... -
Attitude Dynamics/Control of Dual-Body Spacecraft with Variable-Speed Control Moment Gyros
Romano, M.; Agrawal, B. (2004);The dynamics equations of a spacecraft consisting of two bodies mutually rotating around a common gimbal axis are derived by the use of the Newton–Euler approach. One of the bodies contains a cluster of single-gimbal var ... -
Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation
Cullum, James; Irvine, Cynthia E.; Levin, Tim (International Conference on Warfare and Security (ICIW) Naval Postgraduate School , Monterey, California, USA 8-9 March 2007 pp.33-46, 2007-03-00);The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the ...