An investigation of circular, finite queueing systems in amphibious operations.
Hey, John Michael
Lindsay, Glenn F.
MetadataShow full item record
The general unloading phase of amphibious operations is examined with particular emphasis on the queueing problems that arise. A model is structured and a computer simulation is provided. Variables considered are the number of transfer vehicles and their speed and payload, the number and capacity of loading and unloading points, and the ship-to-shore distance. Basic relationships between the variables are examined and an approximating formula is developed for computing the _time required to unload a given tonnage of cargo. Applications in operational planning, system modification, and total system design are outlined. The impact on system performance of various assumed distributions of travel time and loading time is discussed. For systems employing mixed fleets of transfer vehicles, some basic decision rules are developed as to which vehicles to load or unload first. Suggestions as to further research and as to the model's general applicability are included.
Showing items related by title, author, creator and subject.
Das, Arijit (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N065-AThe ExMCM is a broad program providing an innovative approach to the Mine Warfare mission area, required to operate with both U.S Navy and U.S. Marine Corps forces. The large number of sonar imagery files (from the MK18 ...
Romano, M.; Agrawal, B. (2004);The dynamics equations of a spacecraft consisting of two bodies mutually rotating around a common gimbal axis are derived by the use of the Newton–Euler approach. One of the bodies contains a cluster of single-gimbal var ...
Performance Impact of Connectivity Restrictions and Increased Vulnerability Presence on Automated Attack Graph Generation Cullum, James; Irvine, Cynthia E.; Levin, Tim (International Conference on Warfare and Security (ICIW) Naval Postgraduate School , Monterey, California, USA 8-9 March 2007 pp.33-46, 2007-03-00);The current generation of network vulnerability detection software uses databases of known vulnerabilities and scans target networks for these weaknesses. The results can be voluminous and difficult to assess. Thus, the ...