An optimization model for investigating alternative research and development programs of the U.S. Army.

Download
Author
Carney, Thomas Patrick
Date
1971-09Advisor
Sovereign, Michael D.
Metadata
Show full item recordAbstract
A model for investigating alternative research and development programs is formulated. Cost-constrained optimization methods are used in an expected value formulation for systems, which have reached the concept development stage. For the remaining projects, those in basic research and exploratory development, decision rules for altering funding levels are suggested. The principal variables considered in the model are the relative value of a system, a subjective value judgment, the expected life of the system, decision maker time preference, and the cost of the system. A management information system for implementing the model is proposed which allows the user to focus on the trade-off implications of any of the alternatives available for modifying the budget of the R and D program.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Achieving Better Buying Power for Mobile Open Architecture Software Systems through Diverse Acquisition Scenarios
Scacchi, Walt; Alspaugh, Thomas A. (Monterey, California. Naval Postgraduate School, 2017-05); UCI-AM-17-041This research seeks to identify, track, and analyze software component costs and cost reduction opportunities within diverse acquisition life cycle scenarios for open architecture systems accommodating Web-based and mobile ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ... -
Cyber System Assurance through Improved Network Anomaly Modeling and Detection
Bollmann, Chad A. (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N039-AThe objectives of this work were to investigate the source of the dual natures of network traffic (i.e., Gaussian and alpha-stable) in order prove the merit of further development, improvement, and application of non-parametric ...