Course of Action (COA) Analysis, Comparison and Selection for Effects Based Space Operations
Small Business Information
DECISIVE ANALYTICS Corporation
1235 South Clark Street, Suite 400, Arlington, VA, 22202
AbstractA critical capability associated with space C2 is the ability to develop and analyze alternative courses of action (COAs) based on SSA and other intelligence sources and clearly define the cost and benefit associated with each option. However, the current COAs are primarily static or template driven responses and are adequate for day-to-day operations, but are insufficient in dealing with new situations that are evolving rapidly. The goal of this SBIR topic, therefore, is to develop a software capability to enable operators to develop and analyze COAs and select best approach for creating/maintaining desired space effects supporting on-going or planned operations. In order to accomplish this goals, the Decisive Analytics Corporation proposes to develop a decision support tool based on the advanced ‘Integer Programming’ mathematical models. The proposed mathematical technique should provide a significant benefit for space C2, since it is well suited for near real-time handling of decision problems with the large number of threats and with many possible alternative threat responses. The proposed decision support tool will provide the following capabilities: 1) Optimization of Blue force responses, 2) Automated iterative mechanism for the use of threat response preferences, and 3) Ability to manage a space threat response database. BENEFIT: This research effort will provide 1) high level of fusion method based on the advanced ‘Integer Programming’ techniques for developing, analyzing, and selecting the best COAs, and 2) the conceptual design of the GUI software for space threat response decision support system. This proposed decision support system’s operational benefits are 1) real time aid for space control decision makers through provision of a set of alternative COAs, 2) obtain optimization outputs with different operators’ threat response preferences, and comprehensive insights, and 3) efficient storage and modification of database and different threat responses.
* information listed above is at the time of submission.