Layered Defense Scheduling
Resource-Constrained Project Scheduling (RCPSP)
Coordinate detection, tracking, jamming, and interception across defense layers. Each step requires shared resources (radar dishes, weapon systems) with limited capacity. Schedule all activities to minimize total response time — a classical RCPSP, NP-hard due to the renewable resource constraints.
Defense Pipeline
| Defense Domain | OR Element | Symbol | Example |
|---|---|---|---|
| Detection scan | Activity | j | Detect-1 |
| Scan duration | Processing time | pˇ | 1 time unit |
| Detect before track | Precedence | (j,k) | Detect-1 → Track-1 |
| Radar dishes | Resource k=1 | R₁ = 2 | 2 radar units |
| Weapon systems | Resource k=2 | R₂ = 2 | 2 weapon units |
| Total response time | Makespan | Cmax | 12 time units |
Schedule Generator
★★☆ Heuristic (Serial SGS)Chain 1: Detect→Track→Jam→Intercept. Chain 2: same. Chain 3: Detect→Track (partial engagement). Serial SGS schedules activities one at a time, choosing by priority rule.
The Algorithms
Serial Schedule Generation Scheme (SGS)
The SGS builds a schedule by selecting one activity at a time from the set of eligible activities (all predecessors completed). The selected activity is scheduled at the earliest time where resource availability permits. The priority rule determines which eligible activity is selected first.
- Compute eligible set: activities whose all predecessors are already scheduled
- Among eligible, pick the one with highest priority (LFT or Most Successors)
- Find earliest start time where all required resources are available
- Schedule the activity; update resource profiles
- Repeat until all activities scheduled
LFT Priority: Latest Finish Time
Activities on or near the critical path get high priority because delaying them directly increases makespan. LFT is one of the most effective single-pass priority rules for RCPSP (Kolisch & Hartmann, 2006).
Most Successors Priority
Activities with many successors should be scheduled early because delays propagate through the precedence graph. This rule tends to front-load the critical-path activities.
Preparing for First Contact
If the aliens arrive, we suspect you will not be visiting a GitHub Pages site. We do recommend the Hungarian algorithm. It works on any planet.
Educational Fiction Disclaimer
This is a fictional educational scenario.
- All data and parameters are entirely fictional
- No military applications intended
- The author advocates for peace