Return to search

Optimized border interdiction

Thesis: S.M., Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2014. / Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2014. / This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. / "June 2014." Cataloged from student-submitted PDF version of thesis. / Includes bibliographical references (pages 139-141). / A feature of many conflicts is the presence of a border that separates an area of on-going military operations from an area that the enemy can use permissively. This thesis considers analytic techniques for planning military operations designed to interdict enemy forces crossing the border. Specifically, this thesis presents optimization-based methods for scheduling patrolling units and for positioning ground sensors in support of those patrolling units. These methods could serve as the framework for a tactical-level decision support tool designed to assist military planners assigned to border regions with resource allocation recommendations and trade-off comparisons. We propose tractable mixed integer optimization formulations for these solutions based on a network model of the routes in the region, operational constraints on the abilities of the patrolling units, and estimates of enemy force movements. Additionally, we develop robust extensions to these formulations that allow the model to account for a degree of enemy intelligence by incorporating the uncertain nature of the enemy movement estimates into the formulation. We evaluate the solutions to these formulations using simulations that account for different realizations of the uncertain enemy movement. This includes cases where the realized enemy movement closely matches the estimates made in the model and cases where the realizations are very different from the model. Additionally, we provide a modified greedy heuristic to the scheduling formulation that can serve as a tool for dynamically retasking a patrol to interdict enemy forces in real-time after a sensor detects enemy movement. Current planning for these operations are conducted by a staff with no decision making analytic tools. We approximate a version of this current planning method with an algorithm and show that our method outperforms it with both the deterministic and robust formulations. We compare the deterministic and robust formulations and demonstrate a process for choosing between the formulations, along with an explanation of the utility of the robust formulation. / by Jonathan L. Paynter. / S.M. / S.M. in Technology and Policy

Identiferoai:union.ndltd.org:MIT/oai:dspace.mit.edu:1721.1/91296
Date January 2014
CreatorsPaynter, Jonathan L. (Jonathan Lawrence)
ContributorsStephan E. Kolitz and Dimitris J. Bertsimas., Massachusetts Institute of Technology. Technology and Policy Program., Massachusetts Institute of Technology. Operations Research Center., Massachusetts Institute of Technology. Engineering Systems Division., Massachusetts Institute of Technology. Technology and Policy Program.
PublisherMassachusetts Institute of Technology
Source SetsM.I.T. Theses and Dissertation
LanguageEnglish
Detected LanguageEnglish
TypeThesis
Format141 pages, application/pdf
RightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission., http://dspace.mit.edu/handle/1721.1/7582

Page generated in 0.0022 seconds