An exploratory analysis of littoral combat ships' ability to protect expeditionary strike groups
Efimba, Motale E.
MetadataShow full item record
This thesis uses an agent-based simulation model named EINSTein to perform an exploratory study on the feasibility of using Littoral Combat Ships (LCSs) to augment or replace the current defenses of Expeditionary Strike Groups (ESG). Specifically, LCS's ability to help defend an ESGs in an anti-access scenario against a high-density small boat attack is simulated. Numbers of CRUDES (CRUiser, DEStroyer, Frigate) ships are removed and LCSs are added to the ESG force structure in varying amounts to identify force mixes that minimize ship losses. In addition, this thesis explores various conceptual capabilities that might be given to LCS. For example, helicopter/Unmanned Combat Aerial Vehicles (helo/UCAVs), Stealth technology, close-in high volume firepower, and 50+ knot sprint capability. Using graphical analysis, analysis of variance, and large-sample comparison tests we find that being able to control aircraft is the most influential factor for minimizing ship losses. Stealth technology is another significant factor, and the combination of the two is highly effective in reducing ship losses. Close-in high volume firepower is effective only when interacting with helo/UCAVs or stealth. 50+ knot sprint capability is potentially detrimental in this scenario. An effective total sum of CRUDES ships and LCS is between five and seven platforms.
Approved for public release; distribution in unlimited.
Showing items related by title, author, creator and subject.
Meyer, J.; Harrington, W.; Agrawal, B.N.; Song, G. (1998);This paper presents the results of positive position feedback (PPF) control and linear–quadratic Gaussian (LQG) control for vibration suppression of a ﬂexible structure using piezoceramics. Experiments were conducted on ...
Effective electronic security: process for the development and validation from requirements to testing Prokop, James A. (Monterey California. Naval Postgraduate School, 2013-06);An electronic physical security system will often fail to meet user expectations or even basic needs. The inability to easily determine if the system is effective is a key symptom of this failure. This paper explored the ...
Miller, Gregory A.; Giachetti, Ronald E. (2014);This paper incorporates what is termed an inquiry model into a model of information warfare. An inquiry model describes an organization?s belief system, often unarticulated, about how they process information and make ...