Improving Intercontinental Ballistic Missile Maintenance Scheduling Through the Use of Location Analysis Methodologies

Improving Intercontinental Ballistic Missile Maintenance Scheduling Through the Use of Location Analysis Methodologies

Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-2006 Improving Intercontinental Ballistic Missile Maintenance Scheduling Through the Use of Location Analysis Methodologies Dale L. Overholts II Follow this and additional works at: https://scholar.afit.edu/etd Part of the Management and Operations Commons Recommended Citation Overholts, Dale L. II, "Improving Intercontinental Ballistic Missile Maintenance Scheduling Through the Use of Location Analysis Methodologies" (2006). Theses and Dissertations. 3426. https://scholar.afit.edu/etd/3426 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. IMPROVING INTERCONTINENTAL BALLISTIC MISSILE MAINTENANCE SCHEDULING THROUGH THE USE OF LOCATION ANALYSIS METHODOLOGIES THESIS Dale L. Overholts II, Capt, USAF AFIT/GLM/ENS/06-11 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the United States Government. AFIT/GLM/ENS/06-11 IMPROVING INTERCONTINENTAL BALLISTIC MISSILE MAINTENANCE SCHEDULING THROUGH THE USE OF LOCATION ANALYSIS METHODOLOGIES THESIS Presented to the Faculty Department of Operational Sciences Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Science in Logistics Management Dale L. Overholts II, BS Capt, USAF March 2006 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/GLM/ENS/06-11 IMPROVING INTERCONTINENTAL BALLISTIC MISSILE MAINTENANCE SCHEDULING THROUGH THE USE OF LOCATION ANALYSIS METHODOLOGIES Dale L. Overholts II, BS Capt, USAF Approved: // Signed// Marvin A. Arostegui, Lt Col, USAF (Advisor) Date Assistant Professor of Logistics Management // Signed// John E. Bell, Major, USAF (Member) Date Assistant Professor of Logistics Management AFIT/GLM/ENS/06-11 Abstract The events of September 11, 2001 raised concerns about our nation’s ability to protect its citizens, structures, and resources from the mounting threat of terrorism. As a result, the United States has taken drastic measures to enhance security practices in many facets of our lives. Senior leaders have questioned whether mandated security levels used for nuclear weapons activities are sufficient to protect our nuclear assets from damage, destruction, or theft. These concerns have resulted in major changes to Department of Defense and Air Force security instructions. Security instruction supplements have increased the number of security personnel required during nuclear weapon activities and have reduced security response times to possible hostile events at ICBM launch facilities. In light of these security supplements, ICBM maintenance units must explore new methods for developing daily maintenance schedules to sustain current levels of weapon system readiness. This research seeks to provide missile maintainers with such a tool. The problem of maximizing missile maintenance activities is modeled as a two- stage heuristic that utilizes maximal covering location problem techniques to produce feasible solutions. Maintenance activities are assigned to one of 18 maintenance categories. Each category is given specific weights according to mission impact, amount of pre-maintenance coordination required, and the published maintenance priority system. The first stage of the model seeks to identify which security umbrellas maximize the total weighted sum of all feasible maintenance activities that require security forces support. The only stage-one constraint is the number of supportable security umbrellas iv available. The second stage of the model creates a maintenance schedule by maximizing the weighted sum of all maintenance activities at launch facilities that fall within the security umbrellas determined by stage one. Constraints for stage two include availability of maintenance teams, security personnel, and security force response times. The final model solution selects and schedules required maintenance at open holes and penetrated launch facilities that maximize the total weighted sum of all feasible maintenance events falling within the assigned security umbrellas. To complete the daily schedule, maintenance schedulers assign any unused maintenance teams to those maintenance activities not requiring security forces support. Scheduling effectiveness is determined by comparing the research model solutions to the results of actual maintenance activities accomplished at Francis E. Warren AFB, WY, from May 1 through May 26, 2005. Additionally, sensitivity analysis is used demonstrate the effects of adjusting security force response times and the number of security umbrellas on the type and number of maintenance activities that can be performed. Missile maintenance and security forces managers can use this information to determine a feasible security combination that fulfills prescribed security requirements, while sustaining current weapon system readiness levels. v Acknowledgements First and foremost, I would like to thank God for his guidance and intervention. Without it, none of this would have been possible. Many thanks to the members of the Twentieth Air Force Logistics Division; their support helped make the dream of getting selected for AFIT a reality. I would also like to thank my advisor, Lt Col Marvin Arostegui, and my reader, Major John Bell. They provided the insight needed to get this thesis started, the guidance to help it take shape, the reassurance to keep me motivated, and the pressure to get it done on time. Thanks to the folks from 20 AF, 90 MXG, and 790 MSFS; specifically, Major Seaberg, Capt Filler, Capt McDonald, Capt Wickberg SMSgt Gregorsok, MSgt White, MSgt Halvorson, SSgt Boje, SSgt Martinez, and Mr. Lewis. Without their assistance and data, this project would have never gotten off of the ground. A special thanks goes out to SMSgt Mike Dawson, who kept poking and prodding until I finally decided to take on this thesis topic. His continued input kept me up to date with the happenings of the ICBM community and his guidance helped shed new light on potential model improvements. Most of all, I would like to thank my wife and sons for their continued support throughout this 18-month adventure. You stayed in my corner even when I didn’t take the time to notice--I cannot begin to express my appreciation for the sacrifices you have made. Your patience and understanding really helped me get through this program. I love you! vi Table of Contents Page Abstract........................................................................................................................... iv Acknowledgments........................................................................................................... vi List of Figures...................................................................................................................x List of Tables ..................................................................................................................xi I. Introduction .............................................................................................................1 Background..............................................................................................................1 Problem Statement.................................................................................................. 6 Research Questions..................................................................................................7 Investigative Questions...................................................................................7 Scope and Limitations..............................................................................................8 Overview................................................................................................................10 II. Literature Review...................................................................................................12 Introduction............................................................................................................12 Definitions..............................................................................................................12 DoD and Air Force Nuclear Weapons Guidance...................................................13 Previous ICBM Maintenance and Security Initiatives...........................................15 Current Scheduling Practices.................................................................................20 Incorporating Location Analysis into Maintenance Scheduling............................22 Early Contributions to Location Analysis..............................................................24 Modern Facility Location Methodologies .............................................................28 Evolution of the Maximal Covering Location Problem (MCLP)..........................32 Problem Solving Techniques .................................................................................37 Classifications of Optimization Models.................................................................38

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    148 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us