REVISITING COORDINATED SUBMARINE TACTICS USING MODERN COMPUTATIONAL METHODS
dc.contributor.advisor | Chen, Louis | |
dc.contributor.author | Kitten, Spencer A. | |
dc.date.accessioned | 2022-11-17T20:55:26Z | |
dc.date.available | 2022-11-17T20:55:26Z | |
dc.date.issued | 2022-09 | |
dc.identifier.uri | https://hdl.handle.net/10945/71111 | |
dc.description.abstract | Current doctrine has largely discarded the use of coordinated submarine tactics (known as Wolfpack tactics) due to the complexity of inter-pack and intra-pack coordination. However, recent advancements in technology may greatly increase the feasibility of secure communication between submarines operating in a Wolfpack. Agent-based modeling is used to simulate the behavior of submarines operating in a wartime environment at sea. Three secure communication availabilities are represented: no communication between submarines, communication every 10 hours, and constant secure communication. Three types of wartime environments are considered: submarines hunting transiting merchants, submarines hunting transiting warships in an environment with neutral shipping, and submarines hunting transiting warships operating as a Surface Action Group (SAG) with neutral shipping. Effectiveness is measured as “yield,” which is the average number of target kills as a function of the number of submarines in the Wolfpack. The simulation results stress that the success of Wolfpack tactics increasingly depends upon secure submarine communication and situational awareness with the growth of neutral shipping in the wartime environment. | en_US |
dc.publisher | Monterey, CA; Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | REVISITING COORDINATED SUBMARINE TACTICS USING MODERN COMPUTATIONAL METHODS | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Jacobs, Patricia A. | |
dc.contributor.department | Operations Research (OR) | |
dc.subject.author | submarine | en_US |
dc.subject.author | Wolfpack | en_US |
dc.subject.author | coordinated | en_US |
dc.subject.author | attack | en_US |
dc.subject.author | ASUW | en_US |
dc.description.recognition | Outstanding Thesis | en_US |
dc.description.service | Lieutenant, United States Navy | en_US |
etd.thesisdegree.name | Master of Science in Operations Research | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Operations Research | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.identifier.thesisid | 36747 | |
dc.description.distributionstatement | Approved for public release. Distribution is unlimited. | en_US |
dc.identifier.curriculumcode | 525, Undersea Warfare |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works. -
2. NPS Outstanding Theses and Dissertations