Computational Intelligence - August 2012 - 60

Given that exact optimization techniques are ill-suited
for addressing such large multi-objective problems,
CI methods ... may help to address these challenges.
a nd Billyard [58], and Mazurek and
Wesolkowski [22] developed the Stochastic Fleet Estimation (SaFE) model
that relaxes the closure time constraints
of all tasks, and aggregates multiple scenarios. The relaxation of closure time
constraints removes the scheduling
aspect of the simulation; therefore, only
the number of occurrences and duration
of each type of task is generated for a
given scenario using a Monte Carlo
method. In this way, several scenarios can
be quickly generated, and the average
[22] and variance [13] of the platformspecific task durations can be computed.
The fleets generated using SaFE can be
considered lower bounds on the number
of platforms required to accomplish the
average scenario requirements given that
the tasks are all done one after another
without any delays in between taskings
(which happen frequently in simulations). In addition, many of the features
of a simulation such as time constraints
on tasks [71] and risk assessment [13]
have been adapted within objective
functions applied to SaFE. Work has
been done on using SaFE in a multiobjective optimization framework to
compute fleets that minimize cost, task
durations, risk of failure to meet requirements, and flexibility [13], [22], [71], [72].
Much of the improvement in the
area of combining simulations and optimization will come about with better
computational power. Significant challenges remain in decreasing the computational complexity of hybrid methods
in order to make them viable alternatives at both the strategic and operational levels. A promising avenue for
research would be the use of cloud or
parallel computing [73].
VI. Challenges

The military fleet mix problem presents
many challenges that Computational
Intelligence methods may be well suited
to address.

60

The challenges relating to simulating
combat scenarios are due to: (a) the large
degree of uncertainty given incomplete
knowledge of enemy forces, (b) simulating the actions of each combatant, (c)
blue and red team tactics, and (d) determining probabilities of loss of vehicles
due to enemy (or friendly) fire, necessitating the development of models for
unit loss during combat [74]. The challenge for those researching improved
simulations will be in learning how to
better translate the learned qualitative
assessments of subject matter experts and
decision makers into quantifiable repeatable computer experiments, a challenge
that fuzzy logic along with improved
agent-based models may help to address.
Given that military fleet mix problems are multi-objective in nature, the
challenge in many of those problems is
to identify the objectives to optimize.
Many military fleet mix studies have
used a weighted sum of multiple objectives in order to obtain an optimal solution using exact optimization methods.
The challenge would be to re-cast many
of those studies into multi-objective
ones carefully choosing or re-defining
objectives. CI based multi-objective
optimization methods would be very
good tools to compute non-dominated
solutions, thus providing decision makers with more options from which they
can assess the trade-offs among the
many previously merged objectives.
Furthermore, the challenge then would
be to decide which solutions would be
of interest to decision makers. Bonissione et al. outline many useful methods as
well as future research directions [75].
One of the challenges in computing
an optimal fleet mix is asking the question of what optimal means to a decision
maker. For example, a fleet mix taken
from the non-dominated solution set may
be optimal with respect to some performance and cost measures; however, adding other objectives such as those based

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | AUGUST 2012

on notions of risk, and domestic economic benefit can dramatically change
the make-up of a fleet. Input from decision makers and subject matter experts on
these objectives and how different vehicles relate to them is subjective, therefore
fuzzy logic may be useful in addressing
this challenge. Another related challenge
is establishing the task requirements
(especially the frequency of occurrence).
Modeling those requirements using fuzzy
logic may help in this context.
Furthermore, several challenges remain relating to the translation of military capability requirements into a fleet
mix due to the complexity of military
operations and the uncertainty in future
events. One such challenge is simulating
highly detailed fleet operations in stochastic scenarios over multiple years
using optimization based scheduling
and routing methods. Another challenge
is incorporating these simulations into
an optimization framework to search for
fleets that are optimal with respect to
multiple fleet characteristics such as cost,
risk, robustness, and flexibility. The
problem is further complicated when
expanded to compute fleet mix plans
over multiple decades that are nondominated with respect to multiple
objectives such as cost and risk. Given
that exact optimization techniques are
ill-suited for addressing such large
multi-objective problems, CI methods
based on Genetic Algorithms, Particle
Swarm Optimization, and Approximate
Dynamic Programming may help to
address these challenges.
References
[1] C. P. Cavas. (2010, May). New U.S. navy f leet unaffordable: CBO. Defense News. [Online]. Available: http://
www.defensenews.com/story.php?i=4644394
[2] U.S. Air Force. (2011, Feb.). U.S. Air Force fiscal year
2012 budget estimates: Aircraft procurement. [Online].
Available: http://www.saffm.hq.af.mil/shared/media/
document/AFD-110211-038.pdf
[3] Department of Defense Fiscal Year (FY) 2012 Budget Estimates, Justification Book Vol. I, Aircraft Procurement, Air
Force-3010, Feb. 2011.
[4] R. C. Owen, "The airlift system: A primer," Airpower
J., vol. VIV, no. 3, 1995.
[5] R. Richbourg and W. K. Olson, "A hybrid expert system
that combines technologies to address the problem of military terrain analysis," Expert Syst. Apps., vol. 11, no. 2, 1996.
[6] T. M. Williams, R. P. Gittins, and D. M. Burke, "Replenishment at sea," J. Oper. Res. Soc., vol. 40, no. 10, 1989.
[7] G. G. Brown, C. E. Goodman, and R. K. Wood, "Annual scheduling of Atlantic f leet naval combatants," Oper.
Res., vol. 38, no. 2, 1990.


http://http:// http://www.defensenews.com/story.php?i=4644394 http://www.saffm.hq.af.mil/shared/media/

Table of Contents for the Digital Edition of Computational Intelligence - August 2012

Computational Intelligence - August 2012 - Cover1
Computational Intelligence - August 2012 - Cover2
Computational Intelligence - August 2012 - 1
Computational Intelligence - August 2012 - 2
Computational Intelligence - August 2012 - 3
Computational Intelligence - August 2012 - 4
Computational Intelligence - August 2012 - 5
Computational Intelligence - August 2012 - 6
Computational Intelligence - August 2012 - 7
Computational Intelligence - August 2012 - 8
Computational Intelligence - August 2012 - 9
Computational Intelligence - August 2012 - 10
Computational Intelligence - August 2012 - 11
Computational Intelligence - August 2012 - 12
Computational Intelligence - August 2012 - 13
Computational Intelligence - August 2012 - 14
Computational Intelligence - August 2012 - 15
Computational Intelligence - August 2012 - 16
Computational Intelligence - August 2012 - 17
Computational Intelligence - August 2012 - 18
Computational Intelligence - August 2012 - 19
Computational Intelligence - August 2012 - 20
Computational Intelligence - August 2012 - 21
Computational Intelligence - August 2012 - 22
Computational Intelligence - August 2012 - 23
Computational Intelligence - August 2012 - 24
Computational Intelligence - August 2012 - 25
Computational Intelligence - August 2012 - 26
Computational Intelligence - August 2012 - 27
Computational Intelligence - August 2012 - 28
Computational Intelligence - August 2012 - 29
Computational Intelligence - August 2012 - 30
Computational Intelligence - August 2012 - 31
Computational Intelligence - August 2012 - 32
Computational Intelligence - August 2012 - 33
Computational Intelligence - August 2012 - 34
Computational Intelligence - August 2012 - 35
Computational Intelligence - August 2012 - 36
Computational Intelligence - August 2012 - 37
Computational Intelligence - August 2012 - 38
Computational Intelligence - August 2012 - 39
Computational Intelligence - August 2012 - 40
Computational Intelligence - August 2012 - 41
Computational Intelligence - August 2012 - 42
Computational Intelligence - August 2012 - 43
Computational Intelligence - August 2012 - 44
Computational Intelligence - August 2012 - 45
Computational Intelligence - August 2012 - 46
Computational Intelligence - August 2012 - 47
Computational Intelligence - August 2012 - 48
Computational Intelligence - August 2012 - 49
Computational Intelligence - August 2012 - 50
Computational Intelligence - August 2012 - 51
Computational Intelligence - August 2012 - 52
Computational Intelligence - August 2012 - 53
Computational Intelligence - August 2012 - 54
Computational Intelligence - August 2012 - 55
Computational Intelligence - August 2012 - 56
Computational Intelligence - August 2012 - 57
Computational Intelligence - August 2012 - 58
Computational Intelligence - August 2012 - 59
Computational Intelligence - August 2012 - 60
Computational Intelligence - August 2012 - 61
Computational Intelligence - August 2012 - 62
Computational Intelligence - August 2012 - 63
Computational Intelligence - August 2012 - 64
Computational Intelligence - August 2012 - Cover3
Computational Intelligence - August 2012 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com