adaptation of system x computer-assisted project management … · 2016. 6. 3. · tableofcontents...

234
ADAPTATION OF SYSTEM X COMPUTER-ASSISTED PROJECT MANAGEMENT EXERCISES FOR USE AT THE NAVAL POSTGRADUATE SCHOOL Herbert Henry Joseph Nicholson

Upload: others

Post on 19-Feb-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • ADAPTATION OF SYSTEM X COMPUTER-ASSISTEDPROJECT MANAGEMENT EXERCISES FOR USE AT

    THE NAVAL POSTGRADUATE SCHOOL

    Herbert Henry Joseph Nicholson

  • i ibrar¥MAVAL POSTGRADUATE

    SCHOOIi

    tfONTEHEY. CALIF- 93940

  • 1 fl II fl I P r^ t n r" a n 1 1 a i r pi\j h y ri L i U u B J l\H U U H I L U 1

    1

    Monterey, California

    ADAPTATION OF SYSTEM X COMPUTER-ASSISTEDPROJECT MANAGEMENT EXERCISES FOR USE AT

    THE NAVAL POSTGRADUATE SCHOOL

    by

    Herbert Henry Joseph Nicholson

    Thesis Advisor: R. M. Hanna

    June 1973

    T

    Approved ^on. public xdLzjaAz; diA&iihutlon. untlrnlte.d.

  • Adaptation of System X Computer-Assisted

    Project Management Exercises For Use at

    the Naval Postgraduate School

    by

    Herbert Henry Joseph NicholsonCommander, United States Navy

    B.S., Naval Postgraduate School, 1972

    Submitted in partial fulfillment of the

    requirements for the degree of

    MASTER OF SCIENCE IN MANAGEMENT

  • c.

  • ' R ' RY

    HOOD

    ABSTRACT

    System X is a series of project management oriented case studies

    supported by an interactive time-sharing computer program simulating the

    analysis and evaluation of a hypothetical surface-to-surface guided mis-

    sile system acquisition program. The computer-assisted exercises

    operate from baseline data supplied by a data base, along with system

    parameters set by the user, in order to compute various deterministic

    statistics regarding system performance and system costs. The system

    parameter values may be readily changed and the computations repeated.

    A desired result may be obtained by repeated iterations of the process.

  • TABLE OF CONTENTS

    I. INTRODUCTION 6

    II. OVERALL DESCRIPTION OF SYSTEM X 8

    III. DESCRIPTION AND COMPOSITION OF COMPUTERPROGRAMS 13

    A. CONTROL PROGRAMS 13

    1. SYSTEM Program 13

    •. ,

    ' 2. INCENT Program — : —15

    3. PROGPL Program 16

    B. ANALYTICAL MODELS 17

    1. Mission Simulation Model 17

    2. Force Structure Effectiveness Model 17

    3. Logistics Model 18

    4. Life Cycle Cost Model 18

    5. Availability Model 19

    6. Capability Model 20

    7. Reliability Model 21

    8. Contractor Incentive Contract Model 22

    9. Program Planning Model 24

    C. DATA FILES 27

    1. Baseline Data File 27

    2. Input Reports Data Files 28

    IV. SYSTEM IMPLEMENTATION 30

    3

  • V. USE OF EXERCISES IN CONJUNCTIONWITH CURRICULA 33

    VI. CONCLUSIONS AND RECOMMENDATIONS 38

    APPENDIX A. EXERCISE INPUT BASELINE DATA FILES 40

    APPENDIX B. EXERCISE INPUT REPORTS DATA FILES 41

    APPENDIX C. COMMAND AND CONTROL PROGRAM (SYSTEM) 4 2

    APPENDLX D. COMMAND AND CONTROL PROGRAM (INCENT) 64

    APPENDIX E. COMMAND AND CONTROL PROGRAM (PROGPL) 76

    APPENDIX F. ANALYTICAL MODELS REQUIRED BY COMMANDAND CONTROL PROGRAMS 98

    APPENDIX G. TYPING CONVENTIONS AND SAMPLE EXERCISE- 99

    LIST OF REFERENCES 109

    INITIAL DISTRIBUTION LIST 112

    FORM DD 1473 113

  • LIST OF TABLES

    I. System X Exercises 9

    II. Table of Relevancy to Systems Acquisition

    Management Curriculum 36

  • I. INTRODUCTION

    System X is a management training device based on the life cycle

    of a hypothetical surface-to-surface tactical missile system. A series

    of exercises construct situations similar to those facing Department of

    Defense weapon system project managers. The exercises are related to

    management decision-making problems encountered in organization,

    financial management, contract administration, technical performance,

    requirements changes, and personnel management. The set of related

    case studies is an approach to the problem of developing, within the

    Department of Defense, qualified and competent managers in the field of

    weapon system acquisition [Ref. 1] . Each case builds on the previous

    case in order to provide a continuous evolution in the life cycle of the

    missile system. The case method is designed to provide the student

    user with a learning tool that he may use to derive an appreciation of the

    effect of managerial decisions on the solution of problems in the weapons

    system acquisition process. The use of a "real world" scenario in the

    cases provides a management training technique applicable for use either

    in conjunction with appropriate courses in a management curriculum or

    as a laboratory exercise used as a supplement to an overall curriculum

    in systems acquisition management.

    Development of System X commenced in 1967 as a result of a con-

    tract to Peat, Mar-wick Management Systems Company for the former

  • Defense Weapons System Management Center, Wright -Patterson Air

    Force Base. The development of the system was completed in July 1972

    for use in the five-month course in Systems Management conducted at

    the Defense Systems Management School, Fort Belvoir, Virginia.

  • II. OVERALL DESCRIPTION OF SYSTEM X

    System X is a continuum of 30 exercises or case studies which en-

    compass the life cycle of the CONQUEROR surface-to-surface missile

    system. The missile system is comprised of an amphibious vehicle,

    transporter, and the surface-to-surface tactical missile. The case

    studies present situations during five phases of the life cycle: conceptual

    activities, development, production, deployment, and retirement. Of

    the 30 exercises, 15 make use of a computer operating in a real-time

    interactive mode with the user, in order that he may manipulate the large

    amounts of data contained in a data base maintained within computer

    memory. The list of exercise titles and those which are computer-

    assisted are shown in Table I. The remainder of this thesis will concern

    itself only with the computer-assisted exercises.

    The computer programs have been modified for use with an IBM

    System/360 Model 67 Time Sharing System using the CP/CMS (Control

    Program/Cambridge Monitor System) set of control and service programs,

    interactive with an IBM 2741 Communication Terminal. The purpose of

    CP/CMS is to create an environment in which many users can simultane-

    ously carry out a wide range of data processing applications on a single

    computing system. In addition, each user can initiate, monitor, and

    terminate his particular application by carrying on a command/response

    type dialog or conversation with the system. CP/CMS consists of two

    8

  • SYSTEM X EXERCISES

    EXERCISENUMBER

    Conceptual Activities

    1

    2

    3

    4

    . . 5

    6

    TITLE

    *

    9

    10

    11

    12

    * 13

    14

    Development

    * 15

    16

    Mission Analysis

    Measure of Effectiveness and Economy

    Sensitivity Analysis

    Contingency Analysis

    Systems Requirement

    Establishment of a Program Office

    System Specification

    Procurement Concept

    Project Master Plan

    Validation Phase

    S/PO Management Information System

    System Engineering

    System Support Concepts

    System Test & Support Demonstration

    Structuring Incentives

    Source Selection

    17 Incentive Contract Negotiation

    * computer assisted exercise

    TABLE I

  • EXERCISENUMBER

    18

    19

    * 20

    * 21

    * 22

    Production

    * ,-.., 23

    24

    * 25

    26

    * 27

    * 28

    Deployment

    * 29

    Retirement

    30

    TITLE

    Development Decision

    Contractor Management Information System

    Technical Problem

    Engineering Change Proposal

    Production Decision

    Training Requirements

    Production Control Systems

    Reprogramming

    Second Source Decision

    Field Support Decision

    Operational Availability and Logistic Support

    Modification Decision

    Transitional Activities

    * computer assisted exercise

    TABLE I (cont.)

    10

  • major components: a control program (CP-67) and a monitor (CMS).

    The control program creates the time-sharing part of the environment,

    which enables many users to simultaneously perform work. The monitor

    creates the conversational part of the environment, which enables a user

    to directly monitor his work by conversing with the system [Ref. 2].

    All exercises require the use of a System X command and control

    program, a number of data sets, and a number of analytical models.

    The purpose of the command and control programs is to direct the pro-

    cessing sequence of the analytical models, establishthe exercise data

    bases, and to provide for interface commands between the user and the

    analytical models.

    There are three such command and control programs used, depending

    on the exercise desired. They have been named SYSTEM, INCENT, and

    PROGPL. The SYSTEM program is used for command and control of exer-

    cises 3,4,5, 12, 13, 20, 23, 27, 28, and 29. The INCENT program is

    used for command and control of the incentive contracting models used

    in exercises 15 and 17. The PROGPL program is used for command and

    control of the program planning models utilized with exercises 21, 22,

    and 25. A more detailed description of the command and control programs

    will be given in the next section.

    The analytical models receive input from the data base which can be

    altered at the computer terminal. When satisfactory alteration of the

    data is completed, an EXECUTE command is issued allowing the analytical

    models to be executed in the order prescribed by the exercise. Following

    11

  • the execution of the analytical models, the program returns to the com-

    mand level. The user can then select output reports. The output reports

    are printed at the computer terminal by a report generator using the data

    stored in the data base.

    The programs used for the computer-assisted exercises make use

    of two types of input data files: baseline data files and reports data

    files. The baseline data files contain data which are read into the pro-

    gram COMMON arrays for use by the analytical models. More than one

    baseline data file may be used by an exercise. The input reports data-

    files, containing reports formats information, cross references of

    variables position, and editing information are combined into one random

    access output report file by a control program subroutine. A more de-

    tailed description of each of the above files will be given in the next

    section.

    12

  • III. DESCRIPTION AND COMPOSITION OF COMPUTER PROGRAMS

    A. CONTROL PROGRAMS

    These programs control the processing sequence and act as an inter-

    face between the user and the computational models. The control pro-

    grams are arranged into a main driver program and a number of subroutines

    to perform specialized procedures. All subroutine calls and execution

    are transparent to the user. _ • '.'"' -""'

    1. SYSTEM Program

    After loading the SYSTEM program into main memory and start of

    execution, the user is prompted for the exercise number desired. The

    exercise number is then validated. If valid, the position of the exercise

    number in a list is used as an index to determine the number of baseline

    input data files and the input reports data files to be read. A message

    will be printed if the exercise number is not one of the valid numbers in

    the list and the user will be prompted for another number. Subroutine

    DATAX is executed to read baseline input data files required. The files

    required for each exercise are contained in Appendices A and B.

    The data is saved in COMMON arrays. The input data files

    have a special format in order that various types of data may be combined

    into a single file. Data types recognized are floating point decimal,

    exponential, and alphanumeric data. Messages indicating successful

    reading of the data files are output to the user's terminal.

    13

  • The user is then prompted for a decision reply to indicate

    whether or not a detailed list of variables is desired. A response of YES

    will cause a list of parameters which the user may change to be printed.

    Any other response sets a switch to suppress printing of the variables.

    Subroutine MAKERM is then called to prepare the reports data

    file for later use in the printing of exercise reports. The input to the

    subroutine consists of three reports data file types: (1) Formats Data,

    (2) Reports Cross-reference Data and (3) Editing Data. The input Reports

    Data Files read are written on a random access file which has been ••.• : ,

    created by the computer operating system. The output consists of the

    Reports Data File which contains a copy of the data in each of the input

    data files. The first record of the random access file contains three

    values indicating to the control program the starting record of the three

    types of data. A message indicating successful reading of the input

    Reports Data Files and creation of the random access file is output to

    the user's terminal.

    A call to Subroutine COMMAN is then made. Inputs to this

    subroutine are mainly in the form of commands. These commands enable

    the user to control the actions of the computer programs. Certain com-

    mands, such as DISPLAY and REPORT, cause the reading of input from

    the Reports Data File and the output of information on the terminal. The

    subroutine also performs initialization actions. Additional subroutines

    called by Subroutine COMMAN provide for analysis of the user's command

    and to provide for the necessary actions dictated by the user's command.

    14

  • Examples of valid commands are REPORT, CHANGE, DISPLAY, and EXECUTE.

    Detailed information concerning the commands is available in Ref. 3.

    A command of EXECUTE causes return to the SYSTEM program

    which then calls the necessary analytical models required for the particu-

    lar exercise, in the prescribed order of execution. The program is ter-

    minated by use of the command STOP. A listing of the SYSTEM program

    is shown as Appendix C.

    2. INCENT Program

    ,. < /;.• • - A control program similar to that used inthe SYSTEM program is

    used with slight modifications as the Incentive Contract Negotiation

    program. This program, INCENT, is used with exercises 15 and 17.

    Files required for this program are shown in Appendices A and B. A list

    of variable parameters for these exercises is printed automatically,

    eliminating the requirement for a response from the user for such a listing.

    Minimum, maximum, and present value of the variable parameter may be

    determined by use of the DISPLAY command. Only the present value of

    the parameter may be changed by the use of the CHANGE command. The

    new value is required to be within the range indicated for that parameter.

    Subroutine RUN calls the analytical model-subroutine ICM. A

    non-standard return is provided to enable the program to bypass the

    printing of a requested report if Subroutine ICM discovers an illegal set

    of conditions in the user's parameter settings. Additional detailed in-

    formation concerning the program is available in Ref. 3. A listing of the

    INCENT program is shown as Appendix D.

    15

  • 3. PROGPL Program

    The third command and control program, PROGPL, is similar in

    operation to the previous two. This program is used with exercises 21,

    22, and 25. The main program is similar to that found in the SYSTEM

    program. A new subroutine, NETWRK, is included to provide initializa-

    tion for the Program Evaluation and Review Technique (PERT) network.

    Two different networks are provided and are initialized from the baseline

    data base. The Engineering Change Proposal model, which forms the

    analytical model' for exercise 21 , is executed by a call to Subroutine

    PROCOS. Display or change of the current network may be accomplished

    by the command DISPLAY NET or CHANGE NET respectively. The use of

    the RESET command resets the network to its original value. Subroutine

    DATE provides for conversion of dates from calendar form to serial dates

    and vice versa. Provision is made for leap years. There is provision

    for a total of 200 activities in the PERT network. The report available

    is a specialized report known as an "Activity Schedule Report." Several

    format options are provided which are a representation of the PERT net-

    work or a part of the network. The user may request all activites be

    printed, only the critical path activities, or specify particular activities

    to be printed

    .

    For exercises 22 and 25, execution is accomplished by a call

    to the Production Planning model, COSMOD. This model is similar in

    nature to those analytical models found with the SYSTEM program.

    16

  • Additional detailed information concerning the program is available in

    Ref. 3. A listing of the PROGPL program is shown as Appendix E.

    B. ANALYTICAL MODELS

    There are ten different analytical models currently associated with

    the System X exercises. A brief description of the models and the com-

    mand and control program for which it is available will be given below.

    A list of analytical. models, required for each command and control pro-

    gram is shown in Appendix F. ••' -:

    1 . Mission Simulation Model

    The primary functions of the Mission Simulation model (MISSIM)

    are to evaluate the effectiveness of the vehicle, transporter, and missile

    (VTM) against each type of target and to evaluate the expected VTM

    storage/launch unit and missile requirements for each type of target that

    is engaged. One VTM unit consists of 6 launchers, 40 missiles, 40

    warheads, and associated support equipment. The effectiveness and re-

    quirements are calculated on a per target basis. Overall levels of VTM

    requirements and effectiveness are subsequently calculated by the Force

    Structure Effectiveness model. A detailed description of the model is

    contained in Refs. 4 and 5.

    2 . Force Structure Effectiveness Model

    The primary purpose of the Force Structure Effectiveness model

    is to extend the results of the Mission Simulation model in order to deter-

    mine force level requirements for VTM units. This information is

    17

  • subsequently used in the Life Cycle Cost model to produce system life

    cycle costs. The detailed description of the model is contained in Refs.

    6 and 7

    .

    3. Logistics Model

    The Logistics model (LOG) computes a series of logistics re-

    quirements which are used to determine support costs using the Life

    Cycle Cost model. The model receives most of its input from the base-

    line data base, and from the output of the Force Structure Effectiveness

    model. In the model sequence, the position of the Logistics model is

    fixed, executing after the Force Structure Effectiveness model and before

    the Life Cycle Cost model. The model is divided into a series of modules,

    each of which computes a separate logistics support requirement for the

    missile system. Some of the model input is general to the extent that

    it is used in more than one module. Other input is module dependent,

    being peculiar to only one module. Additional information concerning the

    model is contained in Refs. 8 and 9.

    4. Life Cycle Cost Model

    The purpose of the Life Cycle Cost model (LIFE) is to calculate

    and display the time-phased cost elements of research and development,

    procurement, and operation and maintenance for the system life cycle.

    The model uses parametric cost estimating relationships, learning curves,

    and other cost factors which are sensitive to parameters contained in the

    System X case studies. The model utilizes escalating factors which cause

    the cost elements to increase at specific points in the life of the project.

    18

  • The Life Cycle Cost model is never executed by itself in the

    exercises. Rather, it depends upon the output of the other models either

    directly or indirectly. Depending upon the exercise, the specific models

    to be executed are called by the control program. In the calling sequence,

    however, the Life Cycle Cost model is always executed last, either after

    the Logistics Model or the Force Structure Effectiveness model.

    The model is both resource-oriented (facilities and manpower)

    and functionally oriented (training and support' equipment) . The three

    classes of cost are broken down further into subcategories taking into

    consideration the orientations mentioned above. The model calculates,

    for the three major cost categories, discounted life-cycle costs as well

    as the undiscounted cost. The detailed description of the model is con-

    tained in Ref s . 10 and 11.

    5. Availability Model

    The Availability model (AVAIL) computes operational availability

    for the missile system and its sub-systems where operational availability

    is defined as the probability that the system (or sub-system) will be

    capable of operating at or above its required level of performance if called

    upon to do so at a random point in time [Ref. 12]. Availability, as it is

    addressed in this model, is degraded by operational time lost due to

    preventive maintenance, corrective maintenance, and overhauls.

    The model receives all its input from the baseline data set and

    does not depend on the output of any other model. In the model sequence,

    the Availability model is run before the Mission Simulation model. Its

    19

  • order in the sequence with regard to the Capability and Reliability models

    is unimportant. The availabilities computed by the model are used as

    input by the Force Structure Effectiveness model and the Life Cycle Cost

    model. A more complete description of the model and its parameters is

    contained in Refs. 12 and 13.

    6. Capability Model

    The purpose of the Capability model (CAPAB) is to provide realis-

    tic performance measurements (capabilities) of the missile and its trans-

    porter. The Capability model is subdivided into four major submodels

    which interact with each other.

    The Missile Performance submodel is the largest and most com-

    plicated of the individual submodels. This submodel simulates the flight

    of the missile from launch to target, gathering performance statistics

    during the missile's flight. The missile's thrust profile is divided into

    three basic segments: boost phase, sustain phase, and glide phase.

    The missile is directed toward the target through an inertial

    guidance system which may be assisted by laser-beam illumination of the

    target. During the flight of the missile, the Guidance System submodel

    detects deviations from the optimal trajectory and attempts to make the

    corresponding flight corrections. The inertial guidance system can be

    designed to provide a certain level of predefined targeting accuracy.

    The transporter of the Conqueror missile is an integral part of

    the overall missile delivery system. The Transporter Speed and Distance

    submodel defines the vehicle cruise speed, swim speed, and cruise distance

    20

  • The Reaction Time submodel provides for a summation of the

    individual sub-system reaction times in terms of both initial firing and

    retargeting, and repeat firings. A more complete description of the

    parameters involved in the submodels and the equations required for

    calculation of the output values is contained in Refs. 14 and 15.

    7. Reliability Model

    The Reliability model (RELIB) computes reliability for the Con-

    queror missile. The missile target engagement sequence can be divided

    into three steps: pre-ignition, ignition, and in-flight. Reliabilities

    associated with the last two steps, ignition and in-flight, are addressed

    in this model. Pre-ignition reliability is computed as missile availability

    in the Availability model. The Reliability model computes: (i) missile in-

    flight reliability at various specified ranges, up to and including maximum

    range, (2) guidance subsystem in-flight reliability at maximum range,

    (3) propulsion subsystem in-flight reliability at maximum range, and

    (4) missile propulsion subsystem ignition reliability.

    The Reliability model is exercised, in sequence, after the

    Capability model, from which time of flight data are obtained. The com-

    puted output of the Reliability model can be used directly, for example,

    to examine the sensitivity of life cycle cost to changes in missile sub-

    system mean time between in-flight failures. The output is also used

    as input to the Mission Simulation model, where missile reliability im-

    pacts upon the effectiveness of the missile when engaging targets. A

    further description of the model is contained in Refs. 16 and 17.

    21

  • 8. Contractor Incentive Contract Model

    The purpose of the Contractor Incentive Contract model (ICM)

    is to perform a contractor oriented analysis of a proposed incentive

    contract. This analysis is done with contractor information not normally

    available to the government including: contractor profit strategy, con-

    tractor estimated cost to produce, and cost-performance curves on each

    performance parameter which is incentivized in the contract.

    Utilizing this contractor supplied information, the basic incen-

    ;.'...-tiye. contract, as defined. by specific parameter values supplied by the ,

    student user or instructor/monitor, is pursued according to one of five

    contractor oriented profit strategies: (1) the maximization of incentive

    fee in dollars, (2) the maximization of incentive fee as a percent of

    sales, (3) the maximization of performance for a given incentive fee,

    (4) the maximization of performance for a given fee percentage of sales

    (where sales is the sum of development cost and the total incentive fee) ,

    and (5) the maximization of performance for a given cost overrun. Evalu-

    ative information is supplied to the user in the form of output reports.

    These include costs, performance achieved, fees or profits, and the

    relative value of additional incentive fee on that parameter. Ten individual

    parameters are available as potential parameters for incentivation. The

    user may define which, if any, of the parameters for which he may desire

    to establish incentive values. The relationship between fee and perform-

    ance is established by specifying the incentive fee value at minimum,

    22

  • maximum, and target performance values. A linear relationship is used

    for the share-lines connecting target performance with the maximum and

    minimum values of performance.

    For each of the incentivized parameters, the contractor is as-

    sumed to have knowledge of the performance value he may obtain by

    investing additional development dollars in the parameter. This is re-

    ferred to as the contractor's cost-performance curve. The contractor

    must meet the specification value in the contract for all parameters.

    This specification' value is' referred to as the minimum performance point.-

    The contractor's cost to obtain the minimum performance point is included

    in the lump sum known as the "cost to develop a minimum performance

    system." The cost-performance curve for the individually incentivized

    parameters is not defined at performance points less than the minimum

    performance value. From the minimum performance value, additional

    development dollars spent on each incentivized parameter will result in

    increased performance levels up to a maximum achievable performance

    level. At this maximum level, the contractor believes that additional

    development dollars will not produce any significant increase in per-

    formance. Hence, the cost-performance curve is asymptotic to the

    maximum performance level line. The determination of how the contractor

    will trade-off receivable- fees is referred to as his profit strategy.

    The initial baseline values for the incentive fees have all been

    set to zero, in effect, indicating that no parameters have been incentivized.

    The minimum acceptable performance has been established for each

    23

  • parameter. Unless the parameter is incentivized, the contractor will

    produce the minimum performance value for that parameter. Minimum

    performance points are fixed and may not be varied during the exercise.

    Target performance points may be set at values within the defined ranges.

    Additional information concerning contract structure, contractor's structure,

    parameters, and graphs of the multiple incentive contract share-lines

    are contained in Refs. 18 and 19.

    9 . Program Planning Model

    .-^•':";''Vv:;The' ; Program Planning model is divided into two independent V-.

    submodels. One submodel, the Schedule submodel, is PERT oriented

    and performs network calculations to produce time scheduling information.

    The user may utilize the scheduling submodel to evaluate alternative

    production networks encountered in the project management of the

    Conqueror missile system program. The Cost submodel is oriented to

    the production planning process and consolidates the planning costs

    associated with the various management decisions and provides cost

    reports to the user. This submodel allows the user to aggregate the many

    varied cost inputs from the production process to produce information-

    oriented reports for use in managing the production program.

    The Schedule submodel (PROCOS) takes, as input, activities

    in a PERT-oriented network and computes, as output, the early start

    date, late start date, early finish date, late finish date, and the slack

    for each of the activities in the network. The user is not allowed to

    alter the activity arrangement or sequence in the network. He may,

    24

  • however, alter activity durations. The basis of the network calculations

    is a topological sort. The critical path for the network selected is

    indicated by those activities which have the smallest (or largest negative)

    slack. Those activities on the critical path are indicated on the output

    reports with an asterisk.

    Subroutine DATE is required to convert dates from standard

    notation into a serial date required for mathematical manipulation. This

    conversion is reversible for use in the output reports. The serial date is

    relative to a given zero-date which has been selected as 1 January' 1950.

    Three reports are available in exercise 21. The use of the com-

    mand REPORT ALL will list all activities in the current network. The

    command REPORT CRITICAL will list all activities on the critical path in

    chronological order. The command REPORT n, where n represents one or

    more activities, allows the printing of only the selected activites.

    For exercises 22 and 25, the Program Planning model uses the

    second independent submodel, COSMOD. In the process of production

    planning, the manager is faced with a variety of problems which focus

    upon three major types of decisions. These are: (1) production go-ahead

    date, (2) the delivery date of the first production unit, and (3) the pro-

    curement quantity of the units over the time frame of the production phase.

    An error checking routine is used to check to make sure no production

    orders are requested in years prior to one year after the Go-ahead Decision

    was given and that the production capacity is not exceeded by the pro-

    duction order quantity. If an error of this nature is found, an error message

    25

  • is printed at the terminal indicating the current production go-ahead date

    and which production orders violate the production capacity constraint

    for each year. In order to assist in making the above decisions, the

    submodel accumulates costs, for later use in various output reports, in

    the three major categories of Research, Development, Test and Evaluation

    (RDT&E) , Production, and Operation and Maintenance.

    The unit costs exhibit an inflationary trend over the years.

    There is, however, a "learning curve" associated with the production

    hi 'the items which will allow fewer people and facilities to produce the

    same quantity of output. In later production years, the interaction of the

    learning curve and inflation allow optimal production of lot sizes smaller

    than the lot sizes in the initial production years.

    Both exercise 22, the Production Decision exercise, and exer-

    cise 25, the Reprogramming exercise, use the Cost submodel as the

    analytical model. However, in the System X time frame, the baseline

    cost values used with exercise 25 have significantly changed. At this

    point in the life cycle, most RDT&E and certain production funds have

    been expended. The majority of the production engineering cost and

    Long Lead Time Item costs have been obligated. These items will no

    longer be affected by any production decisions. Procurement costs have

    been increased by six percent.

    There are 86 parameters available to the user. Parameter 1

    refers to the Production Start-up Date. Parameter 2 is the number of

    months between the Production Start-up Date and the first unit delivery.

    26

  • The remainder of the parameters, 3 through 86, refer to the unit quantity

    of the six possible hardware end items to be produced in a given year.

    Additional detailed material concerning the Program Planning models,

    including tables of topological sequence numbers for the PERT networks,

    category cost matrices, and baseline parameter values are contained in

    Refs. 20 and 21.

    C..

    DATA FILES .-•,.'••

    The input data files contain the baseline data values used as input

    through the COMMON arrays by the analytical models and the input re-

    ports data files which form the basis for the random access reports data

    file used in the printing of the various output reports.

    1 . Baseline Data File

    One or more baseline data files are read into the computer pro-

    gram COMMON arrays before any analytical models are executed. The

    files contain initialization data values in several different formats:

    floating point decimal, alphanumeric, and exponential formats. After

    initialization of the master array, V, the values from the baseline data set

    are read into specific locations in the V array. Only a portion of the

    locations in the V array have baseline data values assigned. The remain-

    der are reserved for values entered by the user or those values computed

    during execution of the analytical models. The baseline data values are

    therefore inviolate and allow resetting of all values to the original base-

    line values by use of the command RESET.

    27

  • 2 . Input Reports Data Files

    These files contain three types of data files: (1) Reports Formats

    Data Files, (2) Reports Cross-reference Data Files (also known as

    Variables Data Files), and (3) Editing Data Files. The formats used for

    printing the reports of an exercise are contained in the Reports Formats

    Data File. The format for each report are placed in the file in the

    sequence in which they will be used to print the report. A record placed

    after the final format for each report containing the characters END

    .•signify- the end of. the-' report formats. . .-. ' ;.'»*.•»«;»• •;*?; •'^.-/••.v.^-- - : - J-^.;:-^:

    -: .-.,

    The Reports Cross-reference Data File is used in conjunction

    with the Reports Formats File. The file contains data which indicate to

    the control program which master array location values are to be printed

    in each report and the appropriate formats record in the Reports Format

    File to be used.

    The Editing Data File is used to supply information for the

    parameters which may be changed by the user. One record is used for

    each changeable parameter. Each record contains four data elements:

    parameter description, minimum permitted value of the parameter, maxi-

    mum permitted value of the parameter, and the position of the parameter

    value in the master array. This data file is referenced by the command

    and control program each time the user attempts to change the value of

    one of the parameters. The new value is compared with the permitted

    maximum and minimum values and rejected if it is outside the permitted

    28

  • range. The last record of each edits data file contains the characters

    END. Complete documentation concerning the data base is contained in

    Refs. 22 through 28.

  • IV. SYSTEM IMPLEMENTATION

    The requirement for conversion of the computer program was due to

    the incompatibility of various commands in the original version, used in

    conjunction with a General Electric Model GE-635 computer, with the

    commands required by the IBM System/360 computer. The differences in

    •FORTRAN language options allowed by the compilers used with the

    General Electric and IBM systems also required changes in order to

    make the programs compatible for use on the Naval Postgraduate School's

    IBM System/360 computer. A discussion of the overall types of changes

    along with specific examples of changes required is made below.

    In the original version, the programs for a typical exercise were

    arranged in the form of a series of overlays, which are logically independent

    sections of the entire program. Each section could then be brought into

    computer memory as required. In the IBM System/360, as installed at

    the Naval Postgraduate School, each program using the system is treated

    as a sequence of 4096-byte units called "pages." By dividing programs

    into pages, processor storage can be allocated in page (4096-byte) in-

    crements. This eliminates the requirement for the program to be divided

    into logically independent sections. The programs were converted into

    main programs and associated subroutines called either by a main program

    or by another of the subroutines used by the main program.

    30

  • In the original version, the General Electric GE-635 FORTRAN

    language compiler allowed each overlay to either return to the main pro-

    gram or for control to be passed to another overlay by the use of a CHAIN

    statement. All CHAIN statements have been converted to a RETURN

    statement, causing a return of control to the calling main program or

    subroutine. In the Naval Postgraduate School IBM System/3 60 FORTRAN

    compiler, initialization of variables is not automatically performed. It

    .•• is, therefore, imperative that all variables be initialized in some manner

    • prior to their use. The dimension of arrays whose values are passed as

    an argument in a subroutine call statement must be equivalent in both

    the calling program and the subroutine.

    One major problem with the original version was the amount of disk

    storage space required to store the 43 data files required to provide the

    data base. The Baseline Data Files comprised the largest volume of

    records required to be stored. Originally, the Baseline Data Files were

    comprised of 5102 80-character records. By a conversion of the Baseline

    Data Files into a format which allows a number of data values to be used

    in each 80-character record, a reduction of over 82 percent, to 909 80-

    character records, in total record length was achieved.

    The computer Operating System Library contains a number of sub-

    routines which are available for use under CMS. The DEFINE subroutine

    defines FORTRAN disk files that may be accessed randomly and makes a

    correspondence between a CMS file and a FORTRAN logical unit number.

    Before each READ or WRITE (or PRINT) statement, the record number must

    31

  • be set to the record desired. After the execution of the READ or WRITE

    statement, the record number is automatically incremeted to point to the

    next record in the file [Ref. 2]. This Operating System Library subroutine

    is used to form the random access file, FT09F001 , used as the output

    reports data file. Upon the user command STOP, a call is made to two

    other Operating System Library subroutines; the ERASE subroutine which

    removes the random access file, FT09F001, from the user's directory and

    to the EXIT subroutine which causes termination of the program.

    Prior to conducting a computer-assisted exercise the user should

    familiarize himself with the material contained in the appropriate Student

    Exercise Booklet, Computer Operations Guide, and Computer User's

    Guide for the particular exercise to be conducted. Instructors/Monitors

    will find additional material concerning the case contained in the In-

    structor's Guide Booklet for the particular exercise. Appendix G presents

    typing conventions and sample exercise commands, reports and messages

    32

  • V. USE OF EXERCISES IN CONJUNCTION WITH CURRICULA

    The case study method and management game simulation are used

    extensively at the Naval Postgraduate School as well as other colleges

    and universities. The System X project management exercises encompass

    both the case study and the simulation methods. The exercises consider

    the project manager from the viewpoint of the management scientist who

    utilizes mathematics, models, and computers to aid him in making optimum

    decisions. The exercises allow a management student who has studied

    the principles involved in project management to apply those principles

    to the decision-making involved in a hypothetical project. The case

    study method utilized is augmented through the use of the computer which

    serves as an aid to the user in order to manage the data base. The com-

    puter develops reports, makes computations, and makes data comparisons.

    Instructional methods and materials must include not only the cases

    themselves and the use of the computer but also must include lectures,

    seminars, discussions, and workshops.

    There are a number of alternatives for use of the set of exercises

    comprising the life-cycle of the project. The first of these alternatives

    is to use the System X exercises to formulate a Directed Study course

    conducted over a one academic quarter time frame. This course could be

    conducted on either a Pass/Fail basis or as a graded course. The use of

    the exercises as an unstructured learning experience would lend itself

    33

  • to the use of the Pass/Fail system of grading, whereas conducting the

    course on a graded basis would require a subjective grade to be deter-

    mined by the instructor team. Within the framework of a Directed Study,

    the exercises may be handled in a number of ways. The simplest of

    these is to use the exercises as an acquisition overview with the mis-

    sile system scenario as a "typical" weapon system acquisition. In this

    case, the computer would receive only limited use in exploring the al-

    ternative decisions available in each case. In its most elementary form,

    this would require only the use of the baseline data values and a limited

    number of iterations, changing only a limited number of parameter values

    in order to arrive at the general changing trend of the output values

    rather than continuing the process to determine a near optimum solution.

    This may be expanded as required to illustrate the principles and problems

    involved at each stage of the acquisition process.

    A second alternative is to utilize specific exercises or groups of

    exercises in conjunction with appropriate courses throughout the curricu-

    lum. This could be accomplished during the actual period of a particular

    course to illustrate or provide examples of situations related to the

    material for which instruction is being provided. Alternatively, selected

    exercises could be conducted at the beginning of an academic quarter in

    lieu of course instruction normally conducted at that time. This alter-

    native has the disadvantage of tending to compress the material scheduled

    to be taught in that quarter into a shorter time frame. If exercises are

    to be conducted in addition to regularly scheduled material, consideration

    34

  • to assignment of laboratory-type credit for the time expended should be

    made. Table II depicts the relevancy of the various System X exercises

    for applicability to courses within the Systems Acquisition Management

    curriculum, as contained in the Naval Postgraduate School catalog for

    1972-1974.

    Thirdly, the set of exercises could be used as the basis for a group

    thesis project simulating the project management roles required in the

    operation of a project office managing the acquisition of a major weapon

    system. A disadvantage to this replacement of the individual thesis is

    that it eliminates the student's option on selection of a thesis topic.

    In addition, considerable modification of the scenario and cases would

    be required to fit the Navy environment in a manner justifying the

    experience as a thesis project.

    It is possible to use some of the System X case exercises in other

    than a quantitative way. A number of the case exercises, particularly

    those which are not computer-assisted, may lend themselves as cases

    in behavioral or management theory studies. The selection of these type

    cases from the entire package may be found useful in studies involving

    organizational behavior and human factors. This relationship is shown

    in Table II. A synopsis of prior case material to the one selected may

    be required in order for the student to have sufficient background on

    which to evaluate the selected case. A discussion of the impact of

    recent political, economic, technological, and social factors on the case

    may be worthwhile within the selected courses of instruction.

    35

  • TABLE OF RELEVANCY TO SYSTEMSACQUISITION MANAGEMENT CURRICULUM

    NPS COURSENUMBER* RELEVANT EXERCISE NUMBERS

    MN 4145 1,2,3,4,5

    SM 3301 9, 18

    SM 3302 6, 8, 9, 10, 18, 25, 30

    SM 3304 ••.

    .!8,. 25

    SM 3305 11, 19, 21, 24

    SM 4301 7, 8, 10, 12, 14, 20, 21, 22, 29

    SM 4302 9, 10

    SM 4303 8, 15, 17

    SM 4304 16, 2 6

    SM 4305 13, 23, 25, 27, 28

    * Naval Postgraduate School Catalog for 1972-1974.

    TABLE II

    36

  • There are possibilities for use of the System X case studies outside

    of the Systems Acquisition Management curriculum. An examination of

    the relevancy of the exercises to other curricula should be the subject

    of further investigation.

    37

  • VI. CONCLUSIONS AND RECOMMENDATIONS

    Based on the alternatives contained in the previous section, it is

    considered that the project management exercises which comprise System

    X are suitable for use within a management curriculum by students at the

    Naval Postgraduate School. Within the Systems Acquisition Management

    curriculum the following recommendations are made for use of the System

    X exercises.

    The System X exercises should be used within "the Systems Acquisi-

    tion Management curriculum to formulate a Directed Study course to be

    graded on a Pass/Fail basis. The course should be conducted over at

    least a one academic quarter time frame in the latter third of the curricu-

    lum. The exercises to be conducted should include as a minimum those

    which concern themselves with the Conceptual, Development, and Pro-

    duction phases of the system life cycle as shown in Table I. The course

    must be supported by a team of instructors/monitors knowledgeable and

    experienced in project management to allow a wide spectrum of back-

    ground, expertise, and opinion to be available to the student.

    In the event that the above course of action is impracticable, it is

    alternatively recommended that selected exercises be used in conjunction

    with existing courses in the curriculum. Individual cases may be found

    useful in conjunction with courses in Project Management, Systems

    Analysis, Project Information Systems, Systems Engineering Management,

    38

  • Procurement Planning and Negotiation, and Logistic Support. The

    relevancy of individual exercises to courses within the Systems Acquisi-

    tion Management curriculum is contained in Table II.

    39

  • APPENDIX A. EXERCISE INPUT BASELINE DATA FILES

    EXERCISENUMBER FILETYPE IDENTIFIER

    3 FT03F001 FT03F002

    4 FT03F001 FT03F002

    5 FT03F001 FT03F002

    12 FT03F001 FT03F002

    13 FT03F001 FT03F002 FT03F003.»

    >'vi5.'-'; ••'".-•.' '': ';';•.•.• ::/. . . F.T1DF001

    17 FT10F001

    20 FT03F001 FT03F002

    21 FT10F002

    22 FT10F003

    23 FT03F001 FT03F002 FT03F003

    25 FT10F004

    27 FT03F001 FT03F002

    28 FT03F001 FT03F002

    29 FT03F001 FT03F002

    40

  • APPENDIX B. EXERCISE INPUT REPORTS DATA FILES

    EXERCISENUMBER FILETYPE IDENTIFIER

    3 FT02F001 FT02F002 FT02F003

    4 FT02F001 FT02F002 FT02F003

    5 FT02F001 FT02F002 FT02F003

    12 FT02F004 FT02F005 FT02F006

    13 FT02F007. FT02F008 FT02F009

    :

    is-:-'" FT01F001 FT01F002 FT01F003

    17 FT01F001 FT01F002 FT01F003

    20 FT02F010 FT02F011 FT02F012

    21 FT04F001 FT04F002 FT04F003

    22 FT04F004 FT04F005 FT04F006

    23 FT02F013 FT02F014 FT02F015

    25 FT04F007 FT04F008 FT04FC09

    27 FT02F016 FT02F017 FT02F018

    28 FT02F019 FT02F020 FT02F021

    29 FT02F022 FT02F023 FT02F024

    41

  • oaooooooooooooaoooooooaooooooooooooauoooooo'^"•iNnisj- m ur^cuL^o—^MrnvrLn -ur^- oo .—t «.\i c) -^-u^f^- loc^o—UJ LUxT•iiUftU -

  • 00UJ X-I ZCQ ..... i-«

    CC CJLU -* O CM

    UJX UJUJ 00

    UJz QC-»_IMr-

    1

    LU>—1»-<

    + CO— U.•« (— • 2.2:—

    XHc *£ ujzxtxZ --> _}

  • oooooo ooooooooooooooooooooooooooooooooooooo

    OOOOOO ^CJOOOOCJOOOOOOOOOOCJOOOOOOOOOOOOOOOOUOQ000-)00000000 VJ^^^^^WJoOOOOOl^OO^OQUJc^OOVJ^i^urji^^OOOO.O^^V)^^^^^^^^>>->>>-> >•>>•>->>•>->->>>>>->>•>->•>>>>.>>.>->.>.>.>>.>.>->.>.>>.>.>.OOOOoOOOOOOO °r>00 00C/)0000O000O0 000000o0 00O')00 00O0O000 00^)0OO0O0O')O0O0 00o0 00o'J0000 00O0 00

    o00

    rvj

    > _Ju. ••

    t-. C7

    *"-* ~^

    o or* o«_« U.h- o< o

    oou.cr>

    o

    UJSI— CJ LU _)U_ UL 1-1 00 —•» *. q LL

    -» •» >-» CLO - ULLH 2 h-.—

    «

    •.*-« •- £X-»* * *- H- QC OZ** > LO ST Q.3* * >-t O, > 2. • oo luH** .*• UJO (_) l_) •-» U-OO L_> QC«—** — —I—

    »

    h- LL —•-• Q.2:** 0»-i O— — -»IL • Z O0C** --I LLO —• O O O OCNJ> » LUO LU* * — - h- -o r\j— so r^ »-LU 51 h-

    c\J id* * s »U II — II t « u_

  • OOOOOOOOOOOO'JUOOOOOOOO JOm rn rnmm ^j- -^ •>co to i/) to co co to co oo •>>">->->->->->->->>>>->>>>>->->>-cococ)coco^0i/)cocococoi/)cocococococococococ/)

    coQ.LU

    . a ' scooOCXcl-h

    a: ->oco^:

    Q.cx

    —* * cX-«(• * Z »LU>th-** ••—z-»(-o* * q;o2S* * am cox

    LU* * Q.n}-Ov|z* « lu^-xs:•-«* * cx.>oUH-* * •"-«:o * * z: 2: ^ lo oO* * OQco^O IICX* -ft SS^LLI II

    o

    CO

    m

    o

    oa

    II —

    o

    z ••O0>inLU

    +COo2T

    o>o -CNJCO

    ooa

    o

    ooLL

    oh-u_

    LU

    x2:oCCLL

    QO

    a- a- _joj oloco uaaiii-0LU** S: Q,

  • OOOOOOOOOUOOQOOOOOOOOOOOOOQOUOOOOOOOOOOOOOOOOOOOr-*i\j c^ ^r in ^o i^ oo u^o—« c\j tm^ in o^ cni ^l ^r a> >o r— aj u>oooc«aoajcocoOTajaDU>tA^(^(>^(^cr'y, ^ooooooooou^^r-i^i^r-irw--i-4-

    cor—

    o

    CT>

    CJ

    CO

    CO

    " LU CO-CO X •^. LU«y. H-

    x ^.O H*

    aO xai- z

    wo:—I -J •»LU_I_I-.H- -< ** a.o

    ^^.co^glo"

    ^o^^^dSS-Jai^oao-o^aco— a. ^o.u.cxxa.o-ocx-Q.u.ocua.ouucxo

    —i—a^u-u—— >^>-x 2m^Lu_jni_h-4-5.*> ^a)^cxi_u ••W •»- (_>•«• * -* «• (NJ^JJ- -^^ * (Nj-n- * »>4 « rg* « * * «

    o o 00 o 00 o o o

    46

  • jc\i;\ic\jc\jrgA|:Mc\Jc\jc\jrNj^oooooooooooooooooooooooooooooooooooooooooooooooooo oo oo oo oo oo oo oo oooooo i/) ooi/w; oo uooooooooooooooo^o-joo oooooooooooooooooooooooooo ooooooi/joooooooo

    U

    00

    -.,-•••- ; —.-» c n.-»i—'

    ^>—•— _L_ — 1 v>

    xx i I cn—'-< —o—•—'XX • •- - aNtOQJ Z. nOo oooo • •uj« t-._^ a cmQi MHIOOU •ZOO CO 1—1 ••OQ oooOh-.-i.^oouj'—aja: oo ac^* o ooooooooof—H-a-Ufix •-< •>.>£ z •ir\ —i •-« r\| cnj

  • OQOOOOOOOOOOOOOOOOOOO'JOOOOOaOOUOOOOOOOOOQOOOQOOO^r^r^»»co"Juu3»ujeoajaoa^c^o-N—>•—

    < "-4 -( .> «C LU LU t^ • • f— IX^» Q.LL o iOLLLno--OH-Lrih-_o . turna-io—au.(juoio-?(J

  • oaooooooooooooooooirvj3P-co'.r>o~^Njrn-r^r\-ur~u3u>'j—«\j

    ro ro c< i rn ( ' i rn rq 'f1 ro rr)mn ro cr) i r) ix ) rq rnoooooooo oooooooooo

    00 00 OO (/) oO OO OO OO OO OO 00 OO i-O OO OO Ul00 OO

    O'-J'-JOOOOOOOOOOOOOOOOCJCJOO^OOOOcM4-^sur^:oc^o^ovirMvru^^jr^'X)u^o^iNf^l xxx xx x xxCO* -ft CC —•« •>—tr-4_J-ft -ft LU •» »v-J»_J_J • •-• tN »-J_XXXXXXXXX ^*-*> -ft ^-*iaji-« •- »-C) o:s- - —4—«—•—•—«—«—1—••-4—oifO--iO ^X-tOXXXXXXXXXX ii

  • OOUOOU'JOOQOOQOOOOaOOOO'JOOOOOOOOOOOOOQOQOO'JUOOOOU

    ooooooooooooooooooooooooocjoooooooooooooooooooooo>*»> >>->>->*>>>->>>->->->->>->->->->->>->>>->->->>>->>->>.>->.>->.>->.>>.>_>.^L^L/)GQi^oo 0")OLU LU O.U U_ LJ CJ ^» (_) XLL. U. LJ -J LL. UJU. U. LJz-JzzzzzH^:MM(ju>-->-•8- —'•«• « fr -« i\J* * -n- n iM-ft- ii- r

  • UOOOOOUQUOOOOOOOOOOOOOOOOUOOyUOOOOQOOOQUOOUQOU'JOr-i/>L/>>->>>->>>->>>->->->->>->>>>•>->'>>>->->->->>->->>>>>->- >->->>->>->•>->>->->OOoOOOLOoOoOoOoOC/Ji/JL/") lyjoOOOOOOOOOO'jo'JLOOOOOoOoOOOOOoOOOOOOOoOl'IOOoOoOOO OOLOlO^JLOOOOOi/JOOOO^OOO

    00

    -J. . .... ...... ^

    •-•^ /••.• *'-'.'; ':' : ' •• '/ :-> "'.'•;; f> ..-.; •.; ' ''.•'['f ':'":

    •"• " ?v~ "-.*"•• "

    M OLU LU LU U> -3 Z3 O «^H-»-« 4-4 LU < LU —I — > < LUh-H-LU t— LO m >-h > LJ»-«aLJ2: •-(-< oo lu */) i— »oo3-13 -13 LU OarZ LU _J O —

    I

    -J OLU-^—.;>o o .2 u o. •—

    LL • OLUCO i—O —I LU t—m —I O O -2hi-u. h-o/j i— rtr— . :> acoo m lu cv» — oo •—O-iLULULU X—»—•!— •• "J UJ t— 2 "—' X— -»t— "IS\ -JLU I— i£LT\ < —If— —»H- 1—-4 ->U.IO>uO^H_l-—-ic£:ai— lu< + 2:20-^00 + z^»-«q:oo:lu< • +_ju_^lo + _j •—• hq„i---zOJjaQHZ XiToo •^O—l— —• • —i_J— IZ< •>rri>.>— • —.>*-> QI-inZlLIZ2M

  • OaOOOUOOOOUOOOOOOOOQOOOOOQOQOODOOOyQ -4) so r— r*» p—p— r~r— p>- r— r~-p- cu coco ooou ujco jo couo cr*y lt> o^cr> cr>cr> c^ c* u^c_»OOOOOOOOOOOOOQOOOOUUOOQOyOOOQOOOOOoooooooooooooooooo^)oooooooo^/>ooooooooi/)oooooooooooou)oooo oooooooo>•>>->->->->->->•>•>->•>•>•>->'>•>•>•>'>•>•>•>->->->-?•>->->->-?•>*(/) c/> oo i/) t/ > oo oo oo i/)oo oo oo oo oo oo oo o' > oo ^ > oo oo oo oo oo oo oo oooo oooo ooooi/)oo

    OOOOOOOOOOOO—

    «

    , \jrON3-Ln.or-oou'v'j—

  • LnininLn»™LnLCv.rwinuYr>LninLnLnini™^^oooooooooooooooououuocjoooooooucjoooouuouoSoSooSSS

    ooUJ

    CD<ex

    LU

    2 INJ>- CXH-.C0LUOO OOO O^—'tNI iQNQW Oh-CX h- OOJ »LULLJ — • (— 0JH-CX2 »0- •"-< (XUMU.OO(/iMh-Cl.MaC£ Q.»-u.ccLuc^hnaaujMjxMMMMZMj[XJctoJo^xj^'-' ,-i< ,-|CLOzaJC£-iiX(jJHe)uaiujaiiuuj

    o* # •-" «-«••«• Lt^« su-jt- r- «••«• o « «• «•

  • ooouoouoooooooooooooooooooooooooooooooooooooao

    ooooooooooooooooooooooooooooooooooooooooooooooVOoooOOOoO'^o^yy^oo^oOt^oOOOoOOOoooooooooOoooooOOO^ooo^^oOOOoooo^

    00 o0 ooWoo ^0 oo V) oo oo 00 00 00 00 oo^oooOoOOOooW oo oo oo oo oo oo 00 i/}ooooo000o0(y)ooooo0ooo0oo 00/70000

    ooex .UJ

    H- UJUJ ,S - ..-.,.->• ' ;• -.--J-. . ••:;...'.:. • v ' '•••'.:• v . 3:«— :„:'. .:-.;- •;.;

    •• ..»>< ^ •' :j '.••'• ".•."•••'. ' o- h- ' • •*a:< — a _j- o>SI 5T LL -J-S.O.oo —«r0u_ •> «- oo a: z>OOcx- 51 fNJ < 'J>Jf—cj< 3 x > zruiCLCL Q O MQC>2>-< U_ •» >- 00 ^•»•.. 3: < di-«

    ~»#-ft uz — oo s o~.00 -ft -ft H-O O r^ Q O i/)ZiIJw#* 3a: -^ I mt— »-. ltv uj ii h-J-ft-ft U_ - O'JJ UJ OO _)•-« O-j-ft-H-^ca—i •» uj i—q u r-i——' uj2: -ft*- ajo: r\j-^.^o oi- -< --}(• -ft x>a: wOiLH oo I c£0.-i 2T STai q£ H—

    t

    —4^f-->:-Z: ••UJ UJLH «-3\ —• Q *.-»*-»Q m«mLU» 1JJ ooh aic\ia:t— si- hoo -"-X-ftftf—O Z^iX -2 'X 00 ~Z. || || Q_ "Q.2:- Z O— h- H-h-o-K- ft acoix -

  • 000000000000000000000000000000300000000000000000i^:n^Or^o^rgoijf\ic\jcm Ai .* • ! + . LU • • . ^>. . -u. .22 .. .«"• • ; QC *^ ** * ••

    * •. O a. -"* *^—.-4(C) LU «•» CM -—4r-

    1

    2 en >-# • COw ~ • LU >HHCMf— H- > ». o> O exii _> • cc o• V>00 _D- Uh- < LU _J LJ ••LU2

    l_3 -—t,

    ii— 2 -s < 2 r-0<2X-L2 • a.a ~4 • • luoj >-* •• JLU J> —

    ;>C • (Y M fX -aaLL OCLLL^H-«CXILLXLI.-.-'-

  • OOOOOQUOOUQOUOOOQu^vur^o^cj^O'-^iNiov^"^^^^^ 1-->—

    <

    mtnmLrvLn oo^sO-o^-O^o^o^r—ooo vooo^o -0*00 oooooooooooqcjoooooooooooooooooocyioooooooooooooooooooooooo

    oooOoOOOoO oooooo oOOOoOoooo i/)00 oooo

    ooooooooooooooooooooooor\jm^^v0r~^C7*O--'r\|rno—iT

    %Q -O O ^J O -O ^0O -O

  • COu0L/0O0o0(^t/)c/)C/>!y}t/)U0i/)O0^

    CO(XLU

    t—LU

    -

    o. . ex cqlu xa . ..-. ...... h>. .o••••. ' aj •

    UJO •< _|- "-_j '3'

    cX< —* O ~s 2: u- xu cj LU ua^: -h X o^s. — exs:< -j s >-y_ •. —

    .

    I/) (XXt/>CX 2- f\l <U< -J X > !J>Q.Q. Q OZm LL . > LU•»•»••' jE j.a.a.a-t-oi-2.oov)cx x2.

  • oooooooooooooouoouoo'Jooujooooouocjuoaoooaooooooooro^Lnur-rou^o—i^'.nNFLnvur^u;T\o^c\jro^Lnvur^ CZJ C^> CJ3 d> C^ CZ3 CT> ^-3O d5 C_? CI> CI3 C^> CZ> CJ 0> t—> C2) C5 C^> C^> CJ C^> t_? CD C3 CJ c^ CZ> CZ> CT> CJ3 C^> C33 CJ> C_>oooooo^oi/)ooooooooo'jv/oooooooooooooo'>ooooo')oooooooooooo ooooooooooooooooooooooo-j^oooooooooooooooo>>>>>>>->->;>->>;>->>->->>>->>->>>->;>->>-;>->>->->;>->->-;>->>>>->->;>->>->-.>-CO 00 00OOoOOOOOoOOOOOOOOO 00 00 I/")./) I/)OOOOOOOOoO OOOOoOOOOO OOOOoO*^OoOoOoOOOOOOOoO 00^) OO^I OOOO oOoOCOOO

    CNJ

    LLI

    a.

    QC

    OO

    O cc °-z x Z~. „ f- a. ro—« _L LJ CJ O •• CT»

    ^_ »- r- o -4" rq u.lu h- »-* m • lh • *oo zoisq r\jLn>oo o -lu i- - QCH- ZU. • _j ocNjLUC?Lum

  • 0O0000O0OO3000000UO0Q000O0Q000

    i^r^r^f^i^r^r^r^i^ajococojaojuo'JoaoooajcDcocDQOfJOcouuaaooooooooooooooooooooooooooooooooooool/)goooooooool/}oogooogoool^oOoologogogooooooooooooooooooooo>->">->>->->->->>->->->->>>>>>->>->->->->•>->->>.>.i/) oo oo oo oo oo oo oo oo v~> oo oo co oo oo oo oo 00 oo oo cooo oo oo oo oooo oo go go

    oooooooooooooooo—

    * f\j i n ^r - 1 -o r«- 'o tr>o —* cm rn -r u \ -oCM AJ r\| c\j c\J

    '\l r\| nj (\j v-qmm rn rr) rn . O

    00 CO GO CO 00 'JO CO -O CO X) '73 CO CO GO CO COooooooooooooooooooo/joooooooooooo oOgooooooogooogo

    OOV>GOGOGOOOGO 00 oO 00 0)00 0000 0000

    >u

    CM

    o—Ju.

    3DCX

    (M O

    OCCa ex

    3O

    * oCM O

    u_

    u • a:h- j-O —4 h- LU

    .O ;U_ . ... . •—«• ' •* . CM • •' 2 '—m *»• <CM m *-— •00 N» V. OLU >.-H vj- X X H-V) LU-J LU l-2-f- za. 1—• UUOU. 21 O LUO LU

    »

    —I (J)2U DM^-i H-O 5:•• < 2f< Z 00 cX <LU > ju(X'-'u.'-| u.zocj.ij. zoau.zuuj

    00aLUX

    • •»

    oLUO00 (^

    LTV

    ooo

    00

    lu"

    3-J<>

    o

    CC

    3ol-H

    LL

    zaoo

    u-£: r«-o1—0 ocn3X ~ c_j OUOf— «X V.\—K -K- •»X'--,,-| *:a.

  • uor-co

    OVJOooooo

    OOOO

    ooo0>O~«

    00 CO COooooooooo>>->OOOOOO

    ooo

    00 CO 00OOOOOOOOO>•>>OOOOOO

    ooo

    COCO JOooooooooo

    OOOOOO

    oooooo>o

    oocoooooooooooo

    lOoocO

    oooommmmoo co no cooooooooo oooo>• >•>->•OO OOOOOO

    oooin sar-in in incooo'JJooooooooo

    oooooo

    OOOOCULT i—i

    » LLzmo Z—fOCM oH- - •> o

    zo

    ex3o

    cjo

    ro

    (_J ~»

    ccoO H->—» 00LL 2

    <

    o ^*OU> II

    l-OOoo *fNJ - »

    lu.Xvu ^lu^-*"*^ uj—«"v.3 11 oo—-«i—CtUJ

    a-

    LU-W-

    Z-K"•1*

    3#U*cu-ft-

    O-M:OO*

    COaLUcc

    • •»

    oujoO05IoO iNZCt

    •••-HLU» t—CL

    -»l—

    o>q:ujLLLU3*•!— -J- s:<II OJ>

    .»LT>0^—

    I— \— h-h- I— I—

  • OOOOOOOOUOOQOOOOOOOOOOOOUOOOOOOOOOOOOUOOOOOOOOOOOOeOaJCOaDCUCOa^U^O^U^O^a^C^U^U^U^OOOOOOOOQO—*^^'—co'JOcowjucoa3^cocoa3cocouja3aDu>a^u^c^cr>c^OOOOC_JU>Ot_)OOOOCJO(-)t_JOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO:j(yi>> >>->->->>>•>>>->->->>>->->->->•>>•>>->->>>->->->->>>->>->->->->->>•>->->-COLOLOooo')t/)c/)C/lLOuOi/)(y)oo.: ,.. . .,. ... .-^.. . ...... O.

    O r\i —•^ — r\|~l UJ w

    . • . •. .."••; .."'.." -• .;-' .- ' o. • . -uu'••; '-•••'•':•

    •• a "•*.'• • '. ". • '•* : z • oh- < z

    cc <-I Z O . QCV. -! O LU •

    —I UJ

    p- -— • -J

    . _J ~ zLO z 2: 5 ><

    —»• UJ1

    i/>

    X 1—

    1

    .—

    1

    U«-• ccVr» LU-4* X

    e- LU

    00 «£- a •O-J— LU LU•o to o —imz z> o

    <

    • oQ -O

    LU- Z• >-v-< olui—«t/)i_ r^ 00 *-* •—' >LJ2l UU LJ•—it—njU oOH- O H-

    Z * "^ —< LJ-,0 h- a 1 < oc lu — o

    2: —» CC o OOI LU LL M < Z XLUUj£< .

  • ooourornrqrct>cjm^>

    oooo000000 00

    00000000

    oooo

    ooooOOOO OOOO

    OOOO OOOO

    OO r_>cr>o—

    ooooooooo

    OOOO 00

    ooooc\irn

    oooOOOOOO

    00 oooo

    ooo; •tnx. • * • . ... , .* , -.

    ,'' ' . O »co ' * ;

    »..—1 •% —

    »

    m. oo • a-in CMO »• -»ro •^ »>~«o cr*in CO • •'P) or-l —-om • ro o~*%« UOtM •• — mm>o -~» o o o U_ T^fM ~- CM uo—o z o ^ »co • + i— t—nT—* —* o o^O fc » —+ Um . ro oom—»H- )( o -h »s0 • •>< o 00 o«-» i— >; au« •• -• o t_t (_j —»^» •->u z—

    ^ UJCM CO ou «-» — mo ii•o o o »-i o * *o o •" >~* CJ>C0-«OX ci^.^i. •—.^mmo — L'> ••+ + •••O ""Z Z 1— II Ztt*UJ>'ZrIl'-'N •—»!*- .—«UJ .«—( | j_jH-n-trftrnuj(_)-*LU—(UUJi-i II o—»oo ^-«-«--{S-CI.^>l_J >NCLO'-y>~, f>- II -J m ou. o. "lu-— ii —^—< —

    i

    a.—«"Njo~^

    hm *i •—i—«^C

  • OOOOQOOOOOOOOOUOOOr- r- r~ x> co co ca oo cu co x> oo co ^ v> u^ o cacr>cT>cna^'J^u^uv'^uAU^u> '^CTv O>oooooooooooooooooou ) co oo co v) is) co co co co w) co *si co co co co to

    co (/> co i/) co i/)c > co co to iy} cnjm »5; + U\U\:?_>-«UJ «IMCM • It IIOQ.UJ •ir\LMiJ + D—-,-a.-o-»• 5Zt-"< •^mz(Mr\i>5:or-m2

    II lu ii no n il r*-»-'^i_;--->cLi^:t-HHi-'j|-i->Oi-

  • OOOOOQOOOOOOOOOOOOOOOOOOOOOOOOOOQOOOOOOUOOO

    000000000 300 000000000 000000000000000 00oooooooooooooooooooooooooooooooaoooooooooooOOOOOOOLJOLJUOLJOOUOOLJOOUOLJOOOLJOOOOOLJOOOOLJ OOOLJ

    zLUo

    I/)

    Xu

    Xo

    in

    * za u_

    2. 00

    <

    00o _J LJz LJ Q.LU ex zQ. H- »Q. 2 s< O u_

    O 00u

    Q a.Z z< uo h-z 13< <a;2: CO

    a CXUJ

    tf # # >tt * -# 2I-H- —-»-oo

    f«L>x—

    1

    NfX

    r- •r-(\jo^co,—-- IJJ LL/i:

    0"»

    >M

    64

  • ooooooooouoooooo OOOOOOOOOOOOOOOOOOOOOOOOOOOO4-lo sur*-coy^cj'-^rMin^r^^jr^ »L^o.^Nio^NrinNor^cuu>o—rinsur~^jN^j^c\jn)vrLn-ur»'

    ooooojooooooooooooooooooooooooooooooooooooooOOOOOOOOOC5000QOO oooooooooooooooooooooooooooo

    (Sl OLU O

    N»H 2 Om \o to oCO O'J —1 KLU •LU t— LU> rOZ oo - *»t—

    «

    LU >-H •» >

    H- »H J m LUZ - O *k COLU -« »-a^5:UCDCQ^SOJUI-UOt-UU _JLJCO_Jt_JLU_ILJ

    - \u^u. ^uj-d. xu

  • 0O0000000OQ0OO0O0003U00000U00 ouooooooooooooooootiN 0'^'Ni'ri-TLno (>-cotr>o--, fx-)'ri h- I- CM -•^ «7- 'Icnjq a O < LU

    x. • -< a a. •• o•UJ-»_J

    CJ . -. U.O 2 UJ CD .e._,;> - CX 0£ <

    t***-iu. o o ocm •> a. o tttl > *

    x**0—

    ^

    -z-ou. Z>0- ZOU. 2 LU "'JiS^TTj» # LL -U _j LU*-*-* LU^~» LU" a: «-:( lt\xll.x _i

    H#»UU.U .\JUJr-l-l -ItM - -JO-* —

    *

    •-•- ul! *-7Vtft3** 2LU0OLUZ II II

    0**2 OCMU.hhw«-

  • ooooooouoooooooaoouoooQuorn rr) rq rn ro (^ ) nT ^- ^r ^ >r -T ~r vr vr s3" ^n iA^ lt\ in u » ir\ lt> u-»ooooooocjoooooooooooooooooUO 'J'JUOO OL_> OUOOO ~ 00>vQ3 \^>H-

    (_)

    u_

    2:•.

    cX>a2

    00

    aa.

    00

    o

    uu.

    XOa.LUex

    ~ vOu r-4 uh- -*••?-•

    Z> 0001 XrM 00•» > X«£-«--H- (X Z«-< Ow^^-LU -O»-•«•-«•> -^.— l

    LU

    cC tt # - vOO^S CCa.-* •«• -• —''V. CX.U L_) (_JOX'-,-^^ lNJ'--»323_JZ-^33^i--«-ZLUOOoO_ar— h-*-"-'aj-j(--«-2. 2:a.ov-a.< uj^:-i— 11_J **(_) >-,l-

  • oooooooooooooooouuoooooaooooaoooooooo-^cmcm -r u\ o r- oocj> o—< 'Men or- co j> Or-»iMr- -u.^lj^ - \j-n-rir\C0C0C0 00O)C0C0C0CD00CM^^^U>CriU,^JiU4QOOOOQOOOO- ^ XU + —

    CMZ CX < — LL+ *-» < >Z-(Z—> > zo— •cm—• —.--toouj— «. (— —O

    v0< +Z>(^Q^Z-(Z H-LTl>|— > -J-^Q. II >— Ct.iX.h--0 CX LJ —

    O

    1-*

    H- >(>! LU—«-_ia.%._JO-ii -if ZZo0>•)«• «-zo o -<(Xtt^s: Lu-JiHXi >r

  • OOOOOOOQOOOUOOOQOOOQOOOOOQOOOOUOOaOUOOU'JOgOOOOQOvo p» -J3 —» cm n i sj- u •> o r— •xi g>o —« 'Si c i u^o •—' cm .-o o—ttMro-Tn -or~cxxj>

  • OOOQOOaOOQCJOOOOOOOOOOOOOOOOOOOOOOQOOOQOO oooooo•T'r\^ur^- joct>o —^jr--cao'>o—iw •< -»- -8- cC »•h-* •«• -•< •« ** a- h-# ^ lo>;

    LU* *> LUvJ-22* «• 2>- »-"«••«-'> rx.(—!?{— (XO-rt-^ 02 LUO-tf-tt 002ai »{ >{• cc 2; *cu-«- •«• cos:-if* -ft- —'O00 -»•« 00O

    r^

    ***

    OOO

    70

  • OOOOOOOOOOOOOOOOOOOOQOOOOOO'JOOO'JOOOOOOOOOOaO

    oooooooooooooooooooaooaooooooog^ooooooooooooo22222222 222222 22222222 2222222222222222222222

    cc

    1 •-•

    •••-• •. .5

    a. •.:••••• .•.-.. - >-4

    >» —I . —I <t o21r-l < X fN| »-• CM CO "f tj

  • OUOOOOOOOOaOOOOOOOOOOOQOOOOOOOOOOOOOOOOOOOOQOOOO>0 en cp c^ cr* q> ct> cr> tr*cr>oooooooooO'-

    - N ..-.-. • - .-.*'f' -

    :

    ,-5''' *

    • ;? .f;.Vi?'.'•;'.

    '.> •"?; ''-;::':; >'* '.'v >' :V->

    -^:;..- U! '^^^;v^^w^^#fi«^*7;Vv^ '. :: ':''

    -it- * -8- -*...«.

    -H- 1/) ^ .» .. ...... « ..a*-iM • a: ** .*• . •. ...XI* -*X .c^xxxixxxx- •••.ttittttO . " *-4r-t~4 ~4.-4.-4 ^-t^XZ** *" •* ** ** ** *" •*'•• ** •"*""4 •• . •" " *",•" '%.'•'": '*' '.

    ' •>« -a- a :*•'.• •' - >3:"^ txlixr- anx '••. - •• ..' !•...'• . •• \:.-'.-*(_)"«'*UJ uj JL-l-X XXX XXu_ -^ -;t- i_j •> •«»••- •»••« " •>—•

    ^^-n-z • • -Is-. -.x-i-x • XXX XX • •. . ; /. ,' • ..-, ..••.. • . ,'••:.. •.|_ #.>(... „_4_|_:-> - o co x x -i < ^ *•_j*-i;oo — mj xxx xxx xx-j-a-it-cx. fl •• ••••• •»*>• •» •«-< i/>2 -«!(• 2: —• • ^oia wuj cloj »• ?••~J* * •• O ir\xxxxxxxx -«^^ -J -

  • OOOQOOOOaOOOOOOOOaOOOOOOOOOOQOUOOQOOQOOOOOOUQOOO^^'^r^'^r^^^r^t\jr^cNjfNJiN4rs|r^ogf\ji\i(^cr)nirorr(n>ro^rofn_j*; • II 00 ii • II GO-JOOLO.—o • _i • II v» -*_io ~»lj>o~>u-^-u.u-

    m-R- CJ u\

  • OOOOOOUUOO'JOOQOQOOOQOQOOOOOOOOOcj _^ cm " i vj-m su r*- '-u o> '-> '-' cmm -3" in ^u r- cu y\o ~< i nj ro >rm -u r- „x) er>O

    oooaooQOooooouo'JooyooooaaGocjoooUUUUUOUUUUOUUUUUUU'JUUOUUUUUUUUU

    ooooooooooooooo—irgrn^rinor-GOLrxj'—icMCM-rtn

    -r^r-Tsj-'T^j---rsj-srinmmLnininoooooooooooooooO O v_> i_>OO t_>oooo t_>

    r-o—4•»

    NO

    NO oII

    r-(

    1

    •»—

    <

    ino

    »

    f-i

    c* »»

    1

    -t• o

    LU .-4

    _J *»

    •r*-rO->« o•—lr-4Q>-d •»Z cm.-4m-^ »•

    aIL)

    f-cxooo<LU

    LULULU>00

    in.

    o

    LUOO

    II

    <LU

    >

    cr>(\)

    CM+

    OOLi.

    r-l<

    K *oo-U.-•

    I—O2-i-HLU

    oOQ

    LULU0000

    -£00CM

    X- o ..• ", • .

    '••.':».• '•• •' •>: .•"""«;:'•':. •• .-IS .

    '•

    OOr-»

    . x ... ..'"• o '. •• . -. .*• *"-. *

    •»

    . -of*- _- .•:••:• LU- • • '" •OOLJa.

    z:«~ »"»

    • Qi •i

    > O00 inUQ. oo

    >0 OOt-O 1—

    t

    "•

    00 -ft "ft LO —-i|-"-< •LL—< H-Z~3'-, ~5LU'-,2 I—^Z II HOZZ. .w»-i >-> . 11 . t-

  • oooooooooo ooooooo 0000000000000000or»-aou>o—iv\jnxru\ or-ooc/>o-H*—3 h- -ft -Si" O • (—* * a: ^TNt 1-- '"*'-' M 3—•—f-LU hMlh-ZZ ID**-" 2 3**ZLU|| II — W^ :2 L_ ,I^< .j_< ^.o>cQ-'i-

  • OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOJ—nMrn^TX\-Or>-co(-nO'^(Mn)^)-a\^)^-coo,>^—•c\|Ct)>3-Lnvyr»-. aja>O^r\irr)>nn-0P-OOOOOOOOO'-t-H—*— * :£ * lu2 * •*o * * oo< ~» ^O

    * o * r\JI—^ZitOLUO so-K-

    •—t -Ji- a£oocr> ~.<if- Z * LU< -O m -* z* x-q^- *_rO* < -ii- lu >a:xa:* -J* < (XLULU*Q.#lihXUJZ>* * U< -^ s,

    in

    I

    ccLUCQ

    21

    ZX—

    • o lu3 OO

    c* o *-«a: o

    a: x a:LU I— co lu lu

    co x2T LU O LU02: -Z m O Q

    W- O •"-<LU —I

    I/) J— — 00OO OC i-4 Z LUa:z i-i o — >-• —

    i

    liiX-O. OX »-4XLUlM »m LU * LL ^LU «lu ouJ O •» * • Z

    • mu_>-< ot-HO houj •»- inn-—"!— ujqh^ • •#T*LLa a'—l-J-— »-^_l I— II .O II LUOr--—m< +

    <

    rM

  • ooocotT»0rOcr>oooouoxccxO-U-O

    ooo

    ooooooouoXXX0,00

    OOOOOU^O—t'M^r- 03 CO 'DUOOOOOOOOOOOouoooxxxxxOO.Q.O-1L

    00

    o•»

    . .: •• 3; ... !• •• :•••"

    '.... 'to •' • ;

    Q..-'*.* '."' ''.'. ' y ' •.* *•*".' . .?•'-• :

    -

    ••''.';'

    • ''*''•'" 'V-;

    :

    :.

    '-*. :

    .'

    .''' •• '.'

    LUXO ' • •-. ' '.- *—. " • •' •- • •' '." ''LU

    . . ^ *• 00 •w — .-. . . * ' • * . • . '

    .. u . - • ;• • • hr« ' • : •; '• •••: .•.-••-.u. ...... .••..'*. •*.

    '•''••' Z ". .*: .' ' . • .. •'••' •' : ;.- •• '; » •.•• u .' ' ••; .'. .-.'t*' :: • • ,'-' ':'

    '

    '"•' '• •'•'. '•'•: .*."• '..'

    •» oX o ro> LL —m *.oO o MZo —. -H «_»•—

    1

    O. O 1- >Uz —4 LL LL »•* •* •*»

    2. ^-4 LU ^^r-4

    LL II u OOOO f— —1 >—

    «

    —z •• —» 21 < •—

    t

    oO O v£>-•» r^^. a < r-^CD V) O. LU «-» in 2

    -»-K- # X a— z «: "-* * > O X—Hi- •« LU in (— -— —

    Z* -ii —4 u ~>u. -;s- •}(• > . CO m> < O* -)«• t-LU 1— LL -••—f-Jt- * •» O ^ Of-< • LL LO- 7» -«•!!- Z —-4^ -ft- OLLQ

    om —

    <

    LU* —

    »

    —JLU r-»X^^ »-«-d"+ ^:cm—4—* - UCM

    H--SS- %. »»2 • O^LUOOO—

    »

    yoooou ooa 0^* h-,> «- —- nU OOU—« CJvO

    OU ou

    77

  • oooooooooooooo-j-in*ors-coa>or*-co co co co co co cr« cr> c/> u> c u> er*OOOOOOOOOOOOOOooooooooooooooUQUUQUOQUQUUUUcx cx cx or. oi cc oi ix" a: a: X cX cX cxaaQ.aaa.Q.aao.Q.aaQ.

    ooooooooooooooooooooooooa) cr> o—' c\jm vj- ^n o r- 03 cr>o ~* '^ co o "-•U1^'JOOOOOUOOO'-tHHHH'-(-l'HHHiN^OO—(—( H^-H^r-t-tHH-fHH^HHHH^^-^-Hooooooooooooooooooooooooauuouuouuuuuuuouuouuuuuu0£cxa:cXO£cXac:cxcXcxcxcxcxxa:cXfX^a£^cxaccxcxCLCXcxo_c^a.a.cxo_CLCxo_a.u.Q_cxQ_Q_cxo_cxa_o_a.

    oooooo

    '—>'—«—I —4 ,-4 —4ooooooouoauocXcXcXrxcxcxQ.Q.O.Q.CLCL

    CO

    3:00a.UJCX

    oCUoOaIX.

    2L-

    JCXa

    oOaa.

    CXUJ

    00

    ooa.

    2T

    > LL >-

    CO o OO OLU t— (_) rq aOO u_ Q_ -^» CJ

    o 2T a mO Q. LU »i i— • i.-H 2! _l l_J o m s:« •» I—

    <

    H- o -« -***>-* CX UL O —. LL > tt i!- Zu.m > < o «» —• # * U•»*—

    *

    00 1— —* * * o 2: - st -a- »-ht- -a LJ CX OOft- ft- CQ in 2: 11 Q ii- * 00Jhh a. o "-•if- ft- CX »t 2: — -4 it -vr CXs; • •. *£ a, -Jft- ft LU ii • ••

    •^ •»-;v it- uj

    u_o> •* UJ . »-}$•->(-> z ^ »«i_> » S-iS- » >—»u_ s: cL _jft- ft- •» — z >rro LU 3C -«•« «^

    —«u_ •» u_ ..ft- ft- .-» OZ z c —

    «

    O —' •)!• )> O -^ ->OCNIh- oO o Zft-itm enex 0— »«o -J it- «- 0^

  • OOOOOOOOO'JOOOOUOOOOOOOOOOUOOOOOOOOOOU'JQ'JUOOQ

    r^H™|H'^'-oo —o a 1-!ornt-Lj -o i uf-i—

    0^rOCD>C> —->-(V% ^-'(_d*.C0—» »-» -

    a.

    <UJ-J

    CM ZZm Ocr« 2

    t— ozDin

    ST*-1 C£UJr— *-V0h- II ZJ>^)I— II

    II

    a:UJ

    u.<

    a:-

    1

    a.

    -U-UJ

    aor-

    or-O

    UJc_o

    o

    iX

    CO

    UJ ZZ h-ujtij -z._i_j ay <

    a:

    _j —1 _j —1 it —«^ *-•^ -J

    OCON • ICM-^LUl/)

    t— o.^ •--* a •—O-J II ^LJliJU. CO

    r^-2: 11 >-h>^_3 >>-LHUJ-^ < II ZS

  • OU'JOOOOOOOUOOOOQOOOOOOOOOOUOOOOOOOUQOOOOOOOOOQQOl^i^[>-N(^r-Nr'CQa3^a)OTa)o ,X)a3^T>^o^^(> (J, tri0^u,a< OQOO «.»»•...•. -—i^i!- >; a. - ocox X-J

  • OOOOOOOUOOOQOOOOOOOOOOOOOO'JOOOOOQOOOOQOOOOOOOyoU0'- -J^CMrMNrm-ur- x>L^o^r^)xrin4Jr^a;Lr>o^"nrnvr>3" n inmm in -n'-n -O ^OO-O-OOQOcMCMrMfMCMCMCMCM'M MC\JCM^cMC\jc\ir\|^

  • UOOOOQQOUOOOOOOOOOO'JOaOOOQOOOOOOOOOOQOco cr»o >-* i m rr"i ^r tr\ --u r- cq u^o—^muvtim o r- or^r^i^i^r^r^i^r>-[^t^ooooooDa3cx)ooaja3oou> u> u> u>'>cr'(^(7*u^^ooocjoo(\jfNjrN (Nl^^^rvlfNCN|.>Jf\l«N-^'Ni-\jrvjf\jr\jt\jt\jr\|f\jr\i \|i\ir\jc\i00 —^

    a -«.--*QH ••

    2! C\J

    to.

    a:oXI

    <LU

    LU

    00-J—

    00 _JLJa. — O OO-J

    OO

    l"J r>) •T uvn SJ r*> LJ-nrxj 00LJ O O (JO

    —I rHHr-(00c\im

    00

    82

  • oooooooooooooouooooouooooooooouoouoooooo oooouooovTUA^oi^oocr>cj'^(\j(')Nr i^^r^wu,, 0'-^'NJ(^i'C" i-r\^ur-aDLr'0---*>Airoi^-yL>cnc_"-«o4r^or^-ju:j^o—

    r^rH^-»^H'-4r-l/)>-4n>l-HJCU_3X --Z>lUmOOJU->i£

    oiu_js:oH-20sO_»^2:iXH-u.3.x H-^t-x^-'f-a ti uj lulu 1—tar-t^H-

    iX^T-S.Xi—^ iX (X I—<

  • OOOUOUOOUOOUOOQOOOOOOOOQOOOOOOOOOOOOOOUOOOOOOOOQ

    fO ro on rn rr> rOluH- SOQ- II O LU 2: - O u 1 1 00 a. a o»«-y "—' ^LU «£_ — U I r->l> , 1 V. 7''—

    t

    nSS^z'V^S^z 11 - H-Mui^igir • |--fJ „V5^^^ , -Si, o"5

    ^ CNJIM CNJ (NJCNJ ^

    O^ o 00 00 o o 00

    84

  • oooooooooooO—tcMCUvj-m^r-uj^or—t^^^-l.—« r—cx>

    •-^in •»

    ^ *osin-*

    —-a* •»-»(>")vJ-02T

    icneno;(}«• >X 2-0 •>2n|-

    UJ-«- * -CC OO^* *2;-* * XUJZ.-OH^H—•if •«• z-^a^^^ ••I— -Jt -ft •'-'IS-S || o-»—»>—< II O-P

    a-* i(-az a:ov i o^hho:cx# •>;- 2l.cmujoo^o lu

    -»tt H-c\J~tO — "OO uj-»co--n-UJ-M- {{• ^ \j D—

  • oooouooooooouuooooooououooQooooooooooaoooouooooou^intr\inu^LnvO^^

  • oooooouoooooaouuoooooOOaOOOOUr4HHHH-(H^Wr-tiMiM(Nin in ua lt\ u > inm lt\ ir> u -\ in in u •» tn '-n inmm in inmOOOOOOOOOOOOOOOCJOOOOOuuuuouuououuouuouuuuoCLc£CLOCc£.CLcCc£CCcCCCCLc£.r vj- -r -4" -4" nm mun ^a~\moooooooooooooooaoooooooooUQUOUUUUUQUUUUUOUUUUQUUUUcccccca:cccca:cx.x.ccccccc^.ccaiia:cc accede ^cccccccc

    to

    X

    .UJ3:CO-Q.LU

    LU'

    ' • » ' ' - ' ;-'

    e ••'.,, -*J;-. •••

    '*-*- • '•* ,* '. . V•-Z —

    '

    i/> ». «q.

    LULU ->-_) O••z r»LO •• LJ_LULU ••QOJ -»z> *"»Z MlO •» >—

    Ct LULU ••< i-LU -h- ZQ ^co LU ••Z -Z LU —» •• —

    »

    II UU'U -z —

    CO00 LULU LL >~z *LU_|LU_J C_> OLU X>>>> z Ui. ».CJ>*Mzzzz -* Z—«cO ^-1— 1 —1-5-COLO LULU • > *>U.LU—ILU_I 1—

    t

    •«*» LU H-O-l-^'-'LOcocULU • •zaou.LU—JLU—) —

    »

    LU »-z< •»5:22:5; O -JO z —

    «

    zzzz*iNjaOlJJ^"-—

  • OOOOUOOOOOOOUOQ'JOOUQOOOO•4- - r-in^intn^in'nLn'riiALn'pi'n^criLnLn^Ln.nu^iALnin000000000000000000000000OUOt-JUUUQOUOUOUOUOOUOUUUUcc.cCcCctaLcccca:cccCa:etLc£r£cccc--<

    C

    QUJ, \ * \

    '

    10Oa.

    Z•>

    X.>to —

    »

    -#•*» LU

    2: 2:X t—

    4

    OO _J

    O •*Q. *->

    oo —

    Xo

    00CO

    00

    UJo

    Xo

    • -•-.

    LU00

    3<

    (XLU>

    OsJ-JS- -tt- —

    »

    cnh:- # ms# >> oo* -h- oo-ss- * —

    i~00

    om :f\JO»

    X LU^ OO iNlLO cc3 —1 LUO _JU. xx^mm

  • OOOOOOOOOQOOOUQUOOUOOOOOOOOOOQOOOOOOOQQOOOOOOOOO^Lnsur^a3L^OHLjH\go)vrLnsor^uuo^o^c/«CT>u^u^0^u^oooOsJOOOQ'OHHHH,^H.^HHHCNjr\jc^ir\LnLnir^Lr\Lr\vO ijo-ooo^ooo^oo^ooo o*-u-OvQOsQso->Ovo a 000000oooooooo ooooOOOOOOOOOOOOOOOOOOOOOOOOOO'-OOOOOOOOOOO^OOOOOOOOOOouuuuouoauuuuuuuQUQuuuuuuuuauauuuuuauuuuuuuuuuauc£QCa:t£rxc£acci:c£C£c£c£ci:ar:a:c£cxa.c£Q:^CLLXQ-CXU.(XLXa_Q_LLCLCXCXU.CVU-LXL^Q^Q.Q.a.U-L^

    o- -«OH —< . ISOM • X

    - OJ2: — —i• Q. -q. LO , w

    6o— —toO > , - u-

    % - • '•• " •'' * :£>2 : ' ' ' '-'

    -

    :2j" '^- ^«sra: lu »-» a._jj— zC lha zoo: ll r-Q. hOO Z

    ;sa »• occ lli to 'ni r*»UJ >OLU I— •>H- i-iOOJ (/) oUJ LL>*^. *-> r-

    < lu_is: •> oc£ Q< X LO o< l-£ ltn:slu_ilo oZ"-o »o

    HCNIZ-J LU- >(XLU >» \|au.uzu>i

    ;2;:2 2 z^ :s « ~ *~ 222.™ .-, *r , ,., .*a 00 o o o o 00 ua

    .rr|-»'• .....

    •*

    i W - "• . -. ..-.XL. . -.•~txLU**"

    X -HXco\lXvU- CO

    89

  • ooooouooooooooooooooqr\im-T-f\-or-ao'j ,r -^^^^vrLaiOLnLOinuvxynLnin^j o^o

    ooooooooaoooooooooooouuouuouuuuuuuauouuuuuccc^(^ccaccCcccc

    (—< OCX —»IT\ — LL >CX • «—1> CO »-1 LU —« 00 LU OO r—OO—• l—oo 0>l •'.JrvlOoOa, i-njXHH>HH'JtMa.£Ur- '/IQ-OJ -JJ'^J^'^

    bSr-JrZ2Z00

  • oooooooooooouoooooayooooouoooooooooooer>o^H l^r,"> o^o ,J, 'JX!J, uocjoououooH'^i-(HH-(HHHH04'>ji\jvO>OsOO-0 o—o +

    2-<

    Oh- ex.

    oa:ooUJa.

    < ^

    au_

    X'JJ

    (X

    oo•—i

    X

    XOhir>»-

    aauiu

    QC

    -J

    CQ•j;

    I—

    <

    <>

    ooo 2.x:•x.< —• u, u_ HlJ-i

    UJ

    aa.UJ

    o

    OoLULtr-I

    I > p-# -it-# *

    o o

    sr-ft-

    ft

    o o O

    mtt MJ>U

    00Q_UJ

    QUJOOau.

    >00Oa

    2lLLoo

    OQ.

    oh-O— -H- ^ <

    00«- *-. ^ -;(. cu_j* -:; qc•.-« ^^ UJ

    j * ^ >••«• «• -z* «• ~*— -if- rr meg* ^ o( * o^x * -st- -oo -it- * "-»

    oLJ

    3O

    SODinO'Na.—^UJ

    o<-»o—• ~i

    (MtNlOO

    hQL_ia[: z.scc x

    uj-it-* "Oiv. ujniZ-K- -ii- XUJ N«—.-,{. •}»• ^:z oi_) ja ^

    Z}##Z3:Z0000o0-it-0 'OOO^J—io

    oo

    91

  • ro

    ZD

    • UJooIX)

    a:a.

    omo

    UJoo •

    II II x

    in

    i—uO -I

    \

    -" Qro lu• oooa.2:+

    ml-H

    Q•—iCMrO*> •

    ujouO^l

    -<

    ll

    OO

    —I S.r>

    00 2 •LXO i—

    i

    h-luloo q: oi- -o a. •LUO o -«SZI-O — 2— I^o

    fT)-^ •» • i-IMHQ.- r-io^^-s-" •+ 2:-^ * • || t-ioo\h- Ot~ + X

    CM• 00

    LUO —

    »

    ZLLrOO»»«-H+ + 0'> ^...•||t-iC/)>^h-0t~ + X'-«'-^O» LO-3)LU »»^-^—• -hSI SI— 00>~< JY— 3 II —1« II CO— C?3"-

  • ooooooooooooooooqoooooooooooooooooooooooooooooooCO 00 CO coco Bfaoa^cr^^^^ocn^ONUQOOOOOOOOH-HHH ,-(r^_»r-.• _l ou ex

    QMJJ • LOO!.!- LUu.d _i oza >_i < z< -•- < O > «3(XLU _Jll> Z • 1 O LU— CO -OJZ — Q- ~x -^m ^ r*-Q< oo..uj - f\j -q. '\j>--.,x >-oot—co.z ii -^ • co r>» »--•-)

    -^•-* LUH- •» t QoOZ—»LU CNJO.(0 O Q-LUt-i I— O •—-•00>3C?H-t- —.—• ^Zl OS U— cr> oo -cX•>_) luQ .z: -£ co •• ra< 2T co _J cX -t0~«LL,(X '!.>-< '—"—'X LL 2^ 0>"—•ii'—< >—< ;> >-» >—IO Q- U_ CO •—• >-t •—«-•-«•—« >—!-—il_J CO -—

    «

    Q_| «, Qi•••>*> —'-J- O ouoos:x a: t- h-

    «-» -«. 5:^:2: 5:

  • QO'OOOOOOaoOOOOOOUOUOOQOOOOOOOOQOOO'JUOUOOUOOOOOOO

    co»03cocococucocococooo3oaj'Jocox'Dao000 0 lO- J Z m s 2 a < •-• > •>— h- 20 > > in lu —

    t-urn -(•-•-4>»2:oor^ d • -f i— • —1 i— oI— -» * • Z Q •-« Q— O a:—• »-h ai • \- ~Z.-'LU O — O ^ >-i hhQt- XZ h-Z < -'^:-j(— >—uch-w— -

  • OQOO OOOOOOOOOOOOOOOOOO^J'OOOOOOOOOOOOOOOOOOOOOOO

    oo co co co coaoaoOToou;coToaooo^o3^^^'X>a3a)^cr>^ !^a^u^c/v7\0-> *.h- x-im-o o xix xxx xx . ••

    C£->fr * X • —«—t-H i-li—«»-« -H'HX •>f - .*£# * oo "•.".»•' ».•.•.'••.».. ..,-4 „*••.'f- •~»"*X >X>~> LUX Ql^ • .-. VJ*t5-tX UJ iXi -L.-L.J_ J_X'»-*-'/ : -...•'• r- XXX XXX XX

    h--)f-#00 - ~»-H~4 —I—4—( —t —IXOO-ft "Jr

    •.»..». •.•.*.«. _)» —

    <

    j.(- -Ji- a. - ocox x_i ->—«- >ajii)2UJX lu »ao« • ^HHHHHH-t^Hii x uX *-"«• !!• < ^-Z2 •«*>. »•.•.•.•.•»••* ^r-t-H ». e>H- f--«--}?--^ LT\OZ3 ••- 2.DSO^ -v. r-^'-J_J_jUJO0'-t (M -*£.

    CC

  • > v-

    inCM

    oO h-O CM O -*o o in ~*

    org o *»• o m(_> h- *"» rr)>>-^ • >*£ •(_)—

  • oooooooooouooooooooooooooooooooouoooooooor^r>-t^.rs-r-r-r>-r*-aoa3cocococococxjouco(-f> u> 3Mj> tr, cr>u> u,«(j^(wr>oooo oooooo—»»-t'-HOOCJOC_)OOOOOC_>OOOOC_JOOOOOOOOOOOO^-(^-l—l^HHHHHr-I^H^uuuuuuuuuuuuuuuuuuuuuuuuuuuouuauuuuauuuuuoca:a:c£oca:a:c£c£ulict> _jq^h—,_j (_>_ oz>cr>z)'jNa:CT>3

  • APPENDIX F. ANALYTICAL MODELS REQUIRED BYCOMMAND AND CONTROL PROGRAMS

    CONTROL PROGRAM ANALYTICAL MODEL TITLE SUBROUTINE NAME

    SYSTEM Mission Simulation

    Force Structure

    Effectiveness

    Life Cycle Cost

    . .• Logistics

    ^.^•vAvailability -. - .:•;

    "•" Capability

    Reliability

    MISSIM

    FORCE

    LIFE

    LOG . ..

    : AVAIL .

    CAPAB

    RELIB

    INCENT Incentive Contract ICM

    PROGPL Engineering ChangeProposal

    Program Planning

    PROCOS

    COSMOD

    98

  • APPENDIX G. TYPING CONVENTIONS AND SAMPLE EXERCISE .

    Typing Conventions

    The following typing conventions apply to the use of all computer-

    assisted exercises. Input is accepted from the user's terminal only at

    certain points of the computer exercise. Every user input line must be

    terminated by pressing the RETURN key. No data transmission of the

    line typed will take place until the RETURN signal has been received by

    .the computer. If errors are noticed in the line,being. typed before the

    RETURN key is pressed, the errors can be corrected by the user. The @

    character is interpreted to mean "delete the last character typed"; @@

    will delete the last two characters, and so on. Spaces are counted as

    characters. The BACKSPACE key should not be used. The use