Home

hypercarddatabas00sutt - Calhoun: The NPS

image

Contents

1. ate P PON ANT n by ih a AGA La MT pr RA 1 800 NUS AS NS yan n x b 1 Seedy t br AA astas a LS IT EY Me jd eb pu 4 ur Part aha lt 4 LE 1 6481 09 P m Abd vet pA syn AL os ELT A SN Miete 2223 Se Ans erm age Mater D Ao as als was 1 by as 14 83 a TN en uL ALJAS E YE uh m n P inp da TL B A Aft Qara SEE e 5 a y BPR ety eY y V eol a n DI OT aq ata 0 LEE TE 24 uu es 3 pt L vi 16 A M y 444 dui TU P ta Ja sree PT B O Erie rapido tien ttm d ER Mam te eaten UN y w Uu A BOA LLLI UNS TEM 3 Sy E POTE nux Erde pla a bg A x proa celle 4a tt ux 506 pe yy ys ud Bb fs na 9 9 i vale 168 stb 26 yA okie whe MA TA i y amp T etar bla eun TERRE et Tol rei ton gt tal y OT Aint d oad he A tral iy A fe Rf ra n rd ts Ye i E AA eame e MET SLM TRIB S E A pe AE CPC T C Edw AAA UNES ete Eo NS A iege Hu u A LESEN a e i AC AES ETS E 1 af A 1 ALS JW Aba Tw An
2. i J mo 1 4 4 ky Pople os o mr gt esac von PHP RUE EY ere ys at i mr ccr UE Mr uat fei re eye A EIN E AES nn 3 E NOU E He i ase m U az Hayst En pt Aye THE nt a ree st e yd RN s Eres 14 ewoo tat gy power Ax Cu UE ers i y s M nfi d A a tT V any ag AL 3 MR n e 40 Heder 4 asa uu iM woven ire d UN S d 2a PIG D P v e d ni 51 we IR re 65 TTI TSE 8 Wem e A B ia gears pin iy eru IATA E aS pA TONS COPA TASTE NOG es EC Bha No f diu y Yin DDR PETRUM uw Ws edd a bd sd ey Nub f hse aee bon teo A rA ud du TE FII PT aer ee M qam 1 A ME 2 Va 1 PP yl siria 3 KAT NICOLAS D YA LAE AS La PE PELLIT nator PEE E ET h IO O EE ieee ie TGA Sin Wr cb oo uu Dg Ee DIE a URLE YE 09 fates e E wf Mirean NOTE r r 8 a Ad AR des ET q ieh de n SH tee Adan 44 pat NODE Vx rs y e PHASE ORE at wea Pay EE T ey RE E A qe XP peu nh iE DA i econ CET a ett ow i Re Belew as e ANTI tn e FTT tie etre wt TE M p BE MERE MACC AS uh RES e MAE dy ryt OR fv Sean ENITAN ION EE E 9
3. CERRAR mur NI an FO Ce ver EN RADE ME n y m EES T DC ey Vl suero or Hic QA Ta Cairo oF WEE uvm Sewer Rabe p nu uai Rn EE nas LAT OO Qvi ei LAN n UN eee our te RL pei gests ors tat oa 8 EEG j j ECL AEN x MOUSE e pH EERE PDA A A iuter ae div eg 3 2 Bios Hie ad care ela Ms rase Mv esequi MA S EIE FRAN t y n eg vi M A tA nee A XEM Jp Are Fre TUS Y Gn 5 a PLAT duy eL por cues cise Era M Jet 4 se Ap Ay LAT us t Ne omer ars ATE FED Mu em cond AND vei vy yon ga fati t 05 I hs deed LEN ae pon um Js y valioso CP vid tor EYE O qe FEET q Yo 1 REM RARE RC PARLA S d NY AEN sete Ses os va wh om Wags vi P um 0 vs d SEQUI Pu D qi A yg 2 wie AR PRIA See NAVAL POSTGRADUATE SCHOOL Monterey California HYPERCARD DATABASE TECHNOLOGY AS APPLIED TO A THREAT EVALUATOR REFERENCE TOOL by Frank E Sutton March 1991 Thesis Advisor B B Giannotti Co Advisor B A Frew Approved for public release distribution is unlimited T 28S ID o54508c e ND f PE Unclassified T CLASSIFICATION OF THIS P
4. especially crucial with future modules that supplement the Threat Evaluator application since it is an iterative and continuous development process This standardization would assist the developers in the construction of new modules or data files Important lessons learned include the use of sound and graphics to achieve unique methods of data representation These lessons will provide valuable information for future module development The first lesson learned was in the use of graphics The careful utilization of graphics was determined to be a benefit and not a distraction to the user This determination came from demonstrating the application to interested individuals Graphical representation of familiar objects creates a more acceptable environment to new users of the application Objects that appear in the users normal work routine and duties are taken and represented graphically in the application Implementing this graphic representation into the application results in the user bringing previous knowledge to the application This gives the application an intuitive interface This intuitiveness is highly sought after in an application such as Threat Evaluator The second lesson involved unique benefits of using sound as another means of transmitting information to the user Sound provided the user with a variety of data Digitized sound was used to repeat what main menu function he or she was choosing This supplied the user with an audio confi
5. y v Mane D E m a d LL in A EIS m aw Apte NATL SN teen Vo er ed m ES ins 25 v s Cape gn sped ors amt e 4 ef RAPE me 0 2 asi P 2 eA k E Ei at ah oe afi 1 ipa Beret Ag e pe rH 3 aM Mott 1 OE SAN ES Ud tin these SE ved TRADITI Legh adhe v ri asit 94 L lene sd TO IRE 3 307 Mera D eue hoe tet 444 og ap hits tha be thats Je abe Mu ola n Ned yis sive ven ipta ead Marin Ll Lasas Mee e ES ute mia ANNAN pu stet on a eura cds PEIUS T v M TN 4 mj t ae A T M n ed m a Pa ns ROE ut A Tos Cats eget ahora peer a s EEE EES vi 2 Brad Lar DES a Ou fy LE bi ep y rd d E ai 7 das dab Lie BABEL ating A i ofroi Pae enaere uro OSES IL EEE KE s tod whos adas vt ala ahah sini of ay wanes RC LOT ps e ES LM adi 3 kb bh i ct ph s 5 ee Ie MS m AM 4 a taml ad ho em meas i wd Nue PEERS yuan IAE wn MAC erc A Hep m pra ut mm coms One Y T e iv HERE DE A hee man dhe Oi ab hs tue L7 s iy nb ated t re CAS er pd Py Ce MX 4 al dus JH E Ar Lidia aped i5 12 REATO rem pt
6. Function When assigned the Tactical Action Officer is the commanding officer s representative concerning the tactical employment and the defense of the unit b Duties Responsibilities and Authority The TAO is responsible for the safe and effective operation of the combat systems and for any other duties prescribed by the commanding officer Circumstances permitting the TAO shall carry out promptly and precisely special orders and shall report deviations to the commanding officer Currently much of the data required by a TAO is contained in publications that must be manually assimilated This can take an inordinate amount of time to find critical information Manual data retrieval methods typically increase the probability of selecting incorrect data which in turn results in an erroneous evaluation Other information required by a TAO is contained on turnover sheets and written on status boards Many times this information is not kept current or may be forgotten altogether This can result in critical and or perishable information being lost during the normal watch to watch turnover These problems can be solved with development of an application that would greatly assist TAO s in their duties by automating the myriad functions that a TAO must accomplish in his or her normal watch duties These would include the searching of data to match an emitter with a platform or having available the current status of all ships weapons and engineer
7. Y PO a 4 TES ae E son Am SAG d sen Ant iv S nu 124 477 Pp E wk TERE AMA TUAE cotta ata nt Aun paras ATT mas mmc d A ope I ti 2 Adee Mu ia 4 an iata Las Ad KA dh ener vt PTUS es i e jM V marsala rr arte EVE x 4 s i gt PA DAs Mur we de A M wo Lol n Xr U H Wes MEUM M rid ms aw e arte 1 ue At TII EE MN 9 LA m NEM ERE 55 atajo a OS ye L Mot 7 Meets 44 DET res are LEV aya y qM MR pj shes br ep com TION rbd A 4747 nin M Ey ME Rs a ei AS STR Us NN ee se ep a y sont pe o gt a fo dns Af SS ATT veg vas Mol x U ada 99 240 9 al TE rear An ae P LETTE red ke teat P put v et Aci cert 9 y Le prn s pt cd AA wi Parvo r pagat IL ve M ssh os RA JM egt ft Dhl M Pen Doo ow me OM ire ETA eia BEBE cana mala phon Sree 434 Pss CEN 4 s Ns 1 AP asada Ed euin d anu e NA x ce ERES TE TU CUTE ODIT E RR ESCOGER yv rae 4 0 ru AAA 3 a 712 ve es Ait 4 ey pter beret adios A bie Ma ar NR 12 a 4 ALLA Aad P A Ara aio pa b wn ANAL Ahh ae be ai bod rn MU EE uetus 5 Ds dw iz lt n tant nt
8. amp Cambodia China Fiji India Indonesia Japan North Korea South Korea amp Malaysia Pakistan Papua New Guinea Phillipines Singapore Sri Lanka 28 amp Taiwan Thailand Vietnam New Zealand after ships put return amp Carribean Latin America Argentina Bolivia Brazil amp Chile Colombia Cuba Ecuador Mexico Nicaragua Paraguay Peru Uraguay amp Venezuela after ships get HPopupMenu ships O The mouseV The mouseH if it lt gt O then put item 1 of it into row put item 2 of it into column if row 1 and column 2 then go to card usn end if end if end mouseDown 3 Submarines Button on mouseDown play submarines put United States into submarines put return amp Soviet Union after submarines put return amp NATO Belgium Canada Denmark France Germany Greece amp Iceland Italy Netherlands Norway Portugal Spain Turkey amp United Kingdom after submarines 29 put return amp Warsaw Pact Bulgaria Poland Romania after submarines put return amp Mideast amp North Africa Algeria Egypt Israel Libya amp Syria after submarines put return amp Sub Saharan Africa South Africa after submarines put return amp Asia amp Australasia Australia China India Indonesia A amp Japan North Korea South Korea Pakistan Taiwan after submarines put return amp Carribean amp Latin America Argentina Brazil Chile amp Colombia Cuba Ecuador Per
9. ar LE Li 2e ES OCT Kr gne od pa i es PE J re ber Meg 387 2 pie aves de a Lo 7 f Ct Gees AEN y T p ECT DI f bi Es t dth E OPE E ee P 0 be be mE 5 1 s r A y E L eee e Py 424 ute PF ig tal REEL e rE ung ada e Ai Ti UNE J me M A u ever r Piin sl Ter E eife xu CC c orl tots proa T uy 2 P i a Yrs i oe ve 0 pal ed 2 E 00 of ti 0 4 ot e ort gfe 3 er cur 4 7 TET d Us rl P diee ESI b AE EX LL gi t E q lori P mur eut 1 n i Fa 1 2 2 tin UE aad AE i 4 p Unter E MA Ct as C 1 s ans AOI ETT d 4 ote y TG id AM gs fy Ls p t CORTA do A tA 5 dy AM ale 972 T DERI pn feats et ee Da Un ed EH pe Ghi es satires TARRA Be byl dd uy iet us Dev FE nae yi p ae I e Pf Y B Mr fa prr UP nr LEM Ar eg Ki vn a pH FE drei rae Pan AT as SUI tt ait om nr os os m E gt we FRE SAT 4 EREITEN uto TE nean PM Ch ers N m i CP reo RM 4 aina y ORE Cr ed aaa us 3 dt LAT E sie saigs d fet eral OA D p UR PR HEAP BRI pp M it y As e RES rd dai Ya APERE e
10. on reverse if necessary and identify by block number FIELD GROUP SUBGROUP Hypercard Hypertext Tactical Action Officer Paperless Ship 19 ABSTRACT Con nue on reverse if necessary and iden fy by block number The paperless ship concept proposed by VADM Metcalf has been advocated at the highest levels in the Navy ARGOS isa prototype multi media database system under development at the Naval Postgraduate School in support of this superior concept This thesis has implemented a tactical evaluation and assistance tool called Threat Evaluator that can be used as an additional module to the ARGOS system or as a stand alone application Threat Evaluator automates many of the evaluation and information keeping duties that a Tactical Action Officer is required to perform during normal watchstanding evolutions It demonstrates the advanced capabilities attainable in a system implemented with economical off the shelf technology 20 DISTRIBUTION AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED UNLIMITED SAME AS RPT DTIC USERS Unclassified 222 NAME OF RESPONSIBLE INDIVIDUAL 22b TELEPHONE Include Area Code 2x OFFICE SYMBOL B B Giannotti 408 646 3390 CSGg DD FORM 1473 84 MAR 83 APR edition may be used until exhausted SECURITY CLASSIFICATION OF THIS PAGE All other editions are obsolete Unclassified Approved for public release distribution is unlimited Hypercard Database Technology As Appli
11. that a junior officer can achieve resulting from training acquired knowledge and trust It is also quite an identifiable achievement a CO can bestow proclaiming that a junior officer is capable of fighting the ship in battle The CO that conducts the qualifying process puts great trust in each of the officers that he or she qualifies Stringent qualification requirements and thorough knowledge of own ship and other potentially hostile ship s characteristics and capabilities are essential to proficiency and success as a TAO Although the TAO position is quite important and essential after the qualification process has been completed there is little continuous training conducted to maintain this high degree of readiness Continued training is usually left to each TAO with little or no guidance Normal means of keeping proficient is rote memorization This process may be helpful in the short term but must be continually refreshed in order to keep the knowledge base readily available and current in memory It is difficult for the TAO to keep current all hostile or potentially hostile ships memorized and easily accessible at a moments notice The will to train is often hampered by the sheer mass of data that must be memorized The unappealing volumes that contain the data must also be learned to use Methods that will give the data more appeal and even an exciting means of learning required knowledge would pique interest while being functional and info
12. 5 e 1 lt A er H e y An hi 4 CT t ds MA VA t DT gt n MU TONY pe nr a r qM Dato i a ot J e 1 e A a Pd beak eb 3 Aath yl sity ata ZO Jus Y EN ARIS cbe ry ba gt A se n0 Al a 89 448 Aa m 5 EA CAMP E OS RC HP crie dm 1 pad y Ru EET EUNT d NICE Ut preto relever Ty AU Mb S bia ae e fels a Bam s 5 90 ite y aw Tf RET a o gt J pd 2 tista p e 4 eee piate sa4 DEN DEA tapaba dc N ES VN 4 L 2 LOSS 45 EE Move dioi TOS ERI RE vr 4 all 1 face A e hia Led basa M URBS A e O que rah De ele nm 3 S 4 do x d Ms AM EET RII YARIS La lal va c 4 DIN Ce wee Pear Sa mmo 9 Aas MO as Th Mamah sedere UR 4 4 go Iw AWAY n T TT A dg P R ure a 4 1 Lo 4 TIP Lm Pr 2 s L gt a Ald shoal As MA stare A AF PCS es Op ar tom al Y uer Mo an hM ELT T 0T Nal t MH 4 A toe re LAK me WV gt ip y XY n abt 07 5 Den ME RUTA DT aa ce E o Ta a at us Y ad 2 48 448 OR S de RES X uu yt Y aN AES Aw raed ag pe reek pev hr rd rire eh
13. 9 Ball R E The Fundamentals of Aircraft Combat Surviveability Analysis and Design American Institute of Aeronautics and Astronautics 1985 Jane s All The World s Aircraft 1990 91 81st ed p 449 Jane s Information Group 1990 Jane s Fighting Ships 1990 91 p 724 Jane s Information Group 1990 10 Jane s Fighting Ships 1990 91 p 752 Jane s Information Group 1990 11 Electronic mail interview between Jeanne A E Devoto and the author regarding scripts for search algorithm and clickline function 13 February 1990 12 Goodman Danny The Complete HyperCard 2 0 Handbook 2d ed p 143 Bantam Books 1990 E BIBLIOGRAPHY Aker S Z The Macintosh Bible 3d ed Goldstein amp Blair 1991 Awad E M Management Information Systems Concepts Structure and Applications pp 297 299 Benjamin Cummings 1988 Goodman Paul Power User s Hypertalk Handbook Windcrest 1989 Kroenke D M and Dolan K A Database Processing Fundamentals Design Implementation 3d ed Macmillan publishing company 1988 Waite M Prata S Jones T The Waite Groups Hypertalk Bible Hayden Books 1989 Winkler Dan and Kamins Scot Hypertalk 2 0 The Book Bantam Books 1990 56 INITIAL DISTRIBUTION LIST Copies Defense Technical Information Center 2 Cameron Station Alexandria Virginia 22304 6145 Library Code 52 2 Naval Postgraduate School Monterey California 93943 5002 Dep
14. AGE REPORT DOCUMENTATION PAGE lla REPORT SECURITY CLASSIFICATION Ib RESTRICTIVE MARKINGS Unclassified l SECURITY CLASSIFICATION AUTHORITY DISTRIBUTION AVAILABILITY OF REPORT Approved for public release distribution is unlimited l 2b DCLASSIFICATION DOWNGRADING SCHEDULE 4 PERFORMING ORGANIZATION REPORT NUMBER S MONITORING ORGANIZATION REPORT NUMBER S NAME OF PERFORMING ORGANIZATION 6b OFFICE SYMBOL 7a NAMEOF MONITORING ORGANIZATION Naval Postgraduate School LE Applicable Naval Postgraduate School 3 6c ADDRESS city state and ZIP code ADDRESS avy state and ZIP code Monterey CA 93943 5000 Monterey CA 93943 5000 8a NAME OF FUNDING SPONSORING 6b OFFICE SYMBOL PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION If Applicable 8c ADDRESS city state and ZIP code 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO NO NO ACCESSION NO 11 TITLE Include Security Classification HYPERCARD DATABASE TECHNOLOGY AS APPLIED TO A THREAT EVALUATOR REFERENCE TOOL 12 PERSONAL AUTHOR S Sutton Frank E 13a OF REPORT 13b TIME COVERED 14 DATE OF REPORT ear month day 15 PAGE COUNT Master s Thesis FROM TC March 1991 65 16 SUPPLEMENTARY NOTATION The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U S Government B COSATI CODES 18 SUBJECT TERMS continue
15. After qualification TAO s typically have no formal training in threat evaluation as a means of maintaining improving proficiency e Reference and training tools are not centralized often requiring users to visit various locations to collate coordinate the tools and information and to have access to the proper equipment e The lack of user friendly aids to threat evaluation is often frustrating to many TAO s Automation of many of the manual functions such as searching databases and recording critical watch information to relieving watchstanders would greatly improve the efficiency of the evaluation process There are however factors that would be of primary concern in determining the implementation of such an application These factors are reliability of the hardware system and the ease of use of the application The reliability of the system includes many items Preferably it should be more reliable than systems currently in use Methods of protecting data and applications from viruses as well as disk system and application crashes should be carefully considered A variety of media exists for data backup Floppy disks tapes optical disks hard disks and removable hard disks are all readily available and accessible Data updates are of primary concern to the user The importance of having accurate time sensitive information is critical Efficient and easy methods of updating existing information would be important in saving time
16. Costa Rica Cuba Dominican Republic amp Ecuador El Salvador Guatemala Guyana Haiti Honduras Jamaica Mexico amp Nicaragua Panama Paraguay Peru Suriname Uraguay Venezuela after aircraft get HPopupMenu aircraft 0 The mouseV The mouseH if it lt gt 0 then put item 1 of it into row put item 2 of it into column if row 1 and column 2 then go to card usn end if end if end mouseDown 2 2 Surface Ships Button on mouseDown play surface ships put United States USN USA USCG into ships put return amp Soviet Union after ships put return amp NATO Belgium Canada Denmark France Germany Greece amp Iceland Italy Netherlands Norway Portugal Spain Turkey amp United Kingdom after ships put return Warsaw Pact Bulgaria Czechoslovakia Hungary Poland amp Romania after ships put return amp Mideast amp North Africa Algeria Djibouti Egypt Iran amp Iraq Israel Jordan Kuwait Lebanon Libya Mauritania Morroco Oman Qatar Saudi Arabia Somali Republic Sudan Syria Tunisia amp United Arab Emirates North Yemen South Yemen after ships put return amp Sub Saharan Africa Angola Benin Cameroon Cape Verde amp Ivory Coast Ethiopia Gabon Ghana Kenya Liberia Madagascar Nigeria amp Senegal Sierra Leone South Africa Tanzania after ships put return amp Asia amp Australasia Australia Bangladesh Brunei Burma
17. LEMENTATION 13 A OVERVIEW lee roo ae oo 13 B STARTUP SCREEN AND MAIN MENU CARDS 14 C INFORMATION CARDS 9 9 e ee ON 15 D SEARCH AND INDENTIFY 17 E TAO STATUS BOARD v 99 22202 18 F TACTICAL ALGORLDIBEIINM Seem T 20 G INTER STACK BACKGROUND BUTTONS 20 Vis LESSONS LEARNED 6 0 22 VI CONCLUSIONS a Og eee 24 APPENDIX A SCRIPTS FOR THREAT EVALUATOR 26 APPENDIX B THREAT EVALUATOR USER S MANUAL 38 LIST OF REFERENCES ll Em MEL 55 BIBLIOGRAPHY cle vus UM ic THERE 56 INITIAL DISTRIBUTION LIST 57 ACKNOWLEDGEMENTS I would first like to thank Giannotti for his guidance and vision of the future Most importantly I would like to thank my wife Theresa and children Christopher and Sarah Their patience and support was beyond compare I INTRODUCTION In the United States Navy there are several watch stations that require a substantial investment in both time and energy to not only develop the skills and knowledge base but also to earn the confidence and trust of the Commanding Officer CO One of the most critical positions is that of Tactical Action Officer TAO The TAO has the authority to engage the enemy and release weapons in the absence of the CO The Navy organization manual Ref 1 states the following duties of the TAO a Basic
18. THREAT EVALUATOR USER S MANUAL 38 A INTRODUCTION The Threat Evaluator is an application that automates many of the functions that are required during the normal watchstanding routine of a Tactical Action Officer TAO Threat Evaluator can be implemented as an additional module to the Argos System or as a stand alone application It is the most tailored tool to date that a TAO has available for continuous personal training as well as evaluation of platforms that may pose a possible threat to the safety of the ship To start the Threat Evaluator application double click on the icon shown in Figure 1 F Threat Evaluator Figure 1 Threat Evaluator Icon B MAIN MENU SYSTEM After startup the user is taken to the main menu screen of the Threat Evaluator as shown in Figure 2 From this screen the user has many options available The horizontal dividing line in the center of the screen distinguishes 39 Aircraft Surface Ships Submarines Search and Identify TAO Status Board Tactical Algorithms a o GO MB SE ft c AS 3 xdi 9 rs 4 A ae Que Sin NI a A Benes Figure 2 Main Menu Screen the training portion of the Threat Evaluator application from the tactical portions The upper half of the main menu screen contains the aircraft surface ships and submarines menus which make up the training portion of the application or proceed to specific tactical opera
19. World s Aircraft After a weapon or electronic system is selected from the menu of a warfare area a window appears containing specific data and characteristics that a TAO may require for proper tactical evaluation The windows are actually card fields being displayed upon the selection of a menu item The use of card fields was determined to be ideal in separating system data in a logical systematic manner and providing a visual consolidation of information for the user Card fields containing data have been locked to prevent inadvertent alteration of the data This gives an added measure of security as well as ensuring that data remains 16 intact There are many card fields containing information on each card Each is given a specific name and that name is placed in the script of the applicable warfare area button Once the field is displayed it can be hidden again by clicking the cursor within the field This format of displaying data will be useful in training prospective TAO s The method of data display is also useful for training prospective TAO s since on line quizzing can be accomplished within each warfare area D SEARCH AND IDENTIFY FUNCTION One of the most crucial and useful functions available to the TAO in the Threat Evaluator application is the Search and Identify option This option is located on the main menu screen for easy access by the user and is vital for quick identification of an incoming threat associated with a par
20. al CIL P ford Ju Puls aa zie tein uui s M iy ea 4 Li a H 6 PIRS oe i UA 0 Ty 44 A TIE TTA 5 Sy ae s 4 we L a Sack ag are 9 5 gy Fae seb Tobia a Ayal et a airy Ye BEA Wu t TREG ai o ok A pa pU zm Tou yas NT Tn i 1 A14 4 RAM de es 1 4 al 5 eek dele date LS Po MO el s Jd Aus CHE py of sca al wf aiti PC PUE TD Lua TS Mw qut 9 e ar dis RE OR P A f s cl 3 ay am es q a sz pos ete dem el M de REM e E LE de er 5 w 1 y Deu sis et E mcm M3 LI a 5 EN SON fy etf np Suh n Li Hm min em aa me e ee A TL u M 2 og ay A d v gt e PEG if ere UL 4 L aE RG t A 5 Li 4 a on t LET ED HIN LI ee uM Y fue f p 5 no LUE uir IRE IE el ey A rhe eae Id ES E ex Buc iy 9 e Prud ao ont ECE P PEGI pe j n jose es E
21. aluator 23 VI CONCLUSIONS The development of the Threat Evaluator tool has shown the feasibility of an automated reference and evaluation tool The modular design of the application as well as the quick prototyping aspects of the Hypertalk language show that the Hypercard environment can be both economical and technically sound for future development of projects of this sort Many provisions greatly needed by TAO s have been incorporated into the Threat Evaluator These features can be fine tuned and tailored as further iterations of the application are developed The storage media most likely to be of greatest benefit for the Threat Evaluator is compact disk read only memory optical storage CD ROM This would be best for a number of reasons First the CD ROM disks will hold about 550 megabytes of data This large volume is necessary to hold all of the data that is required for a fully implemented Threat Evaluator application and data files Once Threat Evaluator has been completely implemented every country that has military equipment would be represented by a module that contained information on that equipment Today the only true alternative for this amount of data is CD ROM Second distribution of CD ROMs would be easy Cognizant agencies would merely send new CD ROMs to fleet units as updates to the data files are required Users would then be able to return the old CD ROM for proper destruction or sanitization of data Third distribut
22. amp Permit after ssn put return amp Seawolf after ssn put return amp Skipjack after ssn 32 put return amp Sturgeon after ssn get HPopupMenu ssn O The mouseV The mouseH if it lt gt O then put item 1 of it into row put item 2 of it into column if row 3 and column 1 then push card go to stack u s submarines end if end if end mouseDown C CODE FOR THE PLATFORM CARDS 1 F A 18 Hornet on mouseDown put Guns 20mm Machine Gun into aaw put return amp Missiles Sidewinder Sparrow after get HPopupMenu aaw 0 The mouse V The mouseH if it lt gt 0 then put item 1 of it into row put item 2 of it into column 38 if row 1 and column 2 then show card field 20mm else if row 2 and column 2 then show card field sidewinder else show card field sparrow end if end mouseDown 2 Oliver Hazard Perry FFG 7 on mouseDown put Missiles Standard Missile into aaw put return amp Guns 76mm 20mm CIWS after aaw get HPopupMenu aaw 0 The mouseV The mouseH if it lt gt 0 then put item 1 of it into row put item 2 of it into column if row 1 and column 2 then show card field standard missile else if row 2 and column 2 then show card field 76mm else show card field 20mm CIWS end if end mouseDown 3 Los Angeles SSN 688 on mouseDown 34 put Missiles Harpoon Tomahawk into asuw put return amp Torpedos Mk 48 af
23. and effort as well as money Determining the best possible method of delivering updated information is also a crucial problem The emphasis on ease of use cannot be over stressed The goal is to make the application intuitive thereby allowing novice users easy access to its capabilities If the application requires enormous manuals and cryptic documentation be read and filtered prior to use then ultimately the product will not be used Determining which environment will best suit this requirement is an important undertaking SOLUTION The recommended solution and the focus of this thesis research is the automation of numerous manual tasks that are conducted by the TAO and other watchstanders Automation of procedures would simplify and streamline the warfighting capability of any warship The speed at which many of the procedures can be accomplished through automation will significantly increase productivity of a TAO and his her watch team This solution is composed of both hardware and software Both are crucial to ensure successful operation and integration of a total system into the fleet A HARDWARE SOLUTION Hardware is vitally important in an enclosed shipboard environment because space is scarce The smaller a system is the better it will support limited space of fleet units micro computer is an excellent choice The cost of micro computers has dropped dramatically in recent years and they have become quite affordable Mic
24. artment of the Navy 1 Naval Sea Systems Command Attn Mr Phil Styles Code CEL TDI Washington DC 20362 5101 Commander Surface Warfare Development Group Naval Amphibious Base Little Creek Norfolk Virginia 23521 OP 73 Navy Department 1 Pentagon Washington DC 20350 Mr Bob Shaffer 1 Director Navy Tactical Support Activity Washington Navy Yard Washington DC 20374 Dean B Frew Code 05 1 Naval Postgraduate School Monterey California 93943 Prof C T Wu Code 52Wq 1 Naval Postgraduate School Monterey California 93943 CDR B B Giannotti Code CSGg 2 Naval Postgraduate School Monterey California 93943 57 10 Mr Corky Stradling Naval Oceans Systems Center 3990 Old Town Avenue Suite 107C San Diego California 92110 Lt Frank E Sutton 2116 Commodore Court Virginia Beach Virginia 23452 58 Thesis 566676 rs w 9 Sutton wpercar catabase technology as applied to a Threat Evaluator reference tool
25. con shown in Figure 21 This button returns the user to the previous screen ie Figure 21 The Return Icon 11 Print The Print command will be accessed through the icon shown in Figure 22 This allows the user to print items if required 53 Figure 22 The Print Icon 12 Return to Main Menu Button The Return to Main Menu button will be accessed through the icon shown in Figure 23 This allows the user to return to the main menu screen fron any location in the Threat Evaluator This gives easy access to the main menu by Figure 23 The Return to Main Menu Button a single click on the mouse 54 9 LIST OF REFERENCES Chief of Naval Operations OPNAV Instruction 3120 32B Standard Organization and Regulations of the U S Navy 26 September 1986 Giannotti G CDR and Duffy Kevin LT ARGOS Design and Development of Object oriented Event driven Multimedia Database Technology in Support of the Paperless Ship Masters Thesis Naval Postgraduate School Monterey CA December 1988 Apple Computer Inc HyperCard User s Guide 1990 Whitten J L Bentley L D and Barlow V M Systems Analysis amp Design Methods 2d ed p 659 Irwin 1989 Powers M J Cheney P H and Crow G Structured Systems Development Analysis Design Implementation 2d ed p 508 Boyd amp Fraser 1990 International Institute for Strategic Studies The Military Balance 1989 1990 Brassey s 198
26. e NONEM ala UD tim rsh 4 44471545 a a Y 5 Wate clang fg ado um i an Jot y e de sd vs 4 Pus t etn 0 cs Wels al uai lee sal dE 19 44 elas 15 pa Ara A ada i a sial lt 1 quei eta ANE 2 jam 99 ell iv vM ya ny Kris Ur AA An MSN eT iA aMata eae tet d m ta i AA Sat UE ata TALAR ve T AXE E aj 55 SPIRI vd veste ae he gy s ot ayer E MM Je du quee nip Bp d Sup E Cod Ea M gt el e ES aah 22n 4 AA RE Sf uite dim E RTI yen M YN is 444 t hes by rs Yu To EIUS ah dob Te 4 V M 1 ae tohor M 4 pat 4 gt d uu fatal 3 55542 GER Renae a seh BANI tm oed i Mr HH he wt j Ju DE DERE hE X NR hinan e Voi v Bro S pe Sede feim mmm ms y eS TUS meer eal teal A ud de Tagus aer ss bad eae i aet xn E met dubi UL hewn exes od PAD ef ALA eri E min ui eS a hr A y nme Ub Co T aerea arf ep NE vH 1U M Us A Vis Ad a Nie dH DAS 1 ni 2 Tiz Dn 4 eur esse Tires A S ys por sos sok eam et ne jfi MA JA ais Hed 5 ss aiu E Is MN H dor E up real PARA UAI able M A 2er FS dde nit D nO TAM M HU bor Un ER pos A E i ty Ens d A ERT ve
27. e Stamp Figure 12 Time Date Stamp Icon 49 2 Rules of Engagement ROE The Rules of Engagement are contained in this section Access to them is achieved by clicking on the icon shown in Figure 13 A time and date stamp function is also avaiable on this screen Figure 13 Rules of Engagement Icon 3 Night Orders The Commanding Officer s night orders are contained in this section Access to them is achieved by clicking on the icon shown in Figure 14 A time and date stamp function is also avaiable on this screen Figure 14 Night Orders Icon 4 TAO Pass Down Log PDL The TAO Pass Down Log is contained in this section Access to it is achieved by clicking on the icon shown in Figure 15 time and date stamp function is also avaiable on this screen 50 Figure 15 TAO Pass Down Log Icon 5 INCSBA The INCSEA signals will be accessed through the icon shown in Figure 16 The module would contain all the signals from the agreement These signals would be displayed either in a list or a specific signal could be decoded as desired The signal would be input by the TAO resulting in the decoded meaning being displayed on the screen This would give the TAO quick access to required information As envisioned signals could also be encoded using this system tool Figure I6 INCSEA Incon 6 Allied Tactical Publication ATP The ATP 1 C signals will be accessed through the icon shown in Figure 17 The module would c
28. e segment on the left of the screen contains ASW related information including associated weapon s systems 18 Information such as the mode of the sonar water conditions for the day and torpedo loading data are essential for ASW operations Radio buttons which are small round buttons and text fields were used to accept and display information The torpedo tube graphic serves to give the user a visual reference of which tubes are currently loaded The segment on the right of the screen contains information on the installed gun systems This information would be required in any AAW or ASUW engagement Information is also displayed through the use of text fields and buttons The segment on the lower center of the screen shows the remaining missiles and their respective locations in the magazine This display gives the TAO a visual perspective as to the remaining missiles and their locations after a firing Each of the cells contain four buttons each symbolizing the three types of rounds SM 1 blue bird harpoon plus an empty cell symbol that would be generated once a missile from that cell was fired The symbols chosen were representative of the actual rounds and an empty cell was given an X symbol The second screen of the TAO status board is divided into two main sections The left side of the screen is the combat systems status and the right side of the screen is the engineering status This information is very important to the TAO because
29. e tailored to support needed functions and information Tailored menus allow the user to quickly identify his or her options for retrieving desired data Menus support the proper setup and flow of information to the user It is crucial that the application be machine independent and transportable to other hardware This would then allow the application to be available on most hardware in use in the fleet True machine independence provides an application with an enormous platform base upon which to operate Access by all fleet users increases the ability to develop and capitalize on large user groups 12 IV IMPLEMENTATION A OVERVIEW The Threat Evaluator was developed in a Hypercard environment on a Macintosh II computer Hypercard comes free as system software with all Macintosh computers The assumption in this chapter is that readers are familiar with Hypercard In Threat Evaluator all algorithms and modules have been thoroughly considered throughout the development process Threat Evaluator can be implemented as an additional module to the Argos System or as a stand alone application For the purpose of the prototype the Threat Evaluator is made up of five modules and is modelled after a FFG 7 class ship There is the Threat Evaluator module the U S Aircraft data file the U S Surface Ship data file the U S Submarine data file and the Threat Evaluator Help data file The modular design was considered the best option for future expan
30. e want to break them into manageable modules around which program specifications will be written Programmers can then build and test each module independently Then modules can be integrated according to the structure chart and tested as a whole program This approach to program design would enhance the solution application since the program data would lend itself to a modular design For example some of the required data would be divided into countries Each of the country modules would contain the information on the equipment and platforms owned by that country Reusable code has become a buzzword in the software development community Reusable code promotes efficiency in the development of new applications or new modules that will be add ons to existing applications Reusable code still requires some modification however the savings that such code generates makes the cost of such changes insignificant when taken in aggregate Powers Cheney and Crow Ref 5 state the following Systems designers have long been interested in the concept of reusable code The idea is to write general purpose modules that can be used in many programs thereby reducing the overall programming and testing effort during development and simplifying the on going maintenance effort The large majority of program code involves routine processes such as data entry and verification file maintenance and report writing It should be possible to create a standard set o
31. ed To A Threat Evaluator Reference Tool by Frank Erwin Sutton Lieutenant United States Navy B S United States Naval Academy 1984 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN INFORMATION SYSTEMS from the NAVAL POSTGRADUATE SCHOOL March 1991 David R Whipple Chairman Department of Administrative Sciences ABSTRACT The paperless ship concept proposed by VADM Metcalf has been advocated at the highest levels in the Navy ARGOS is a prototype multi media database system under development at the Naval Postgraduate School in support of this superior concept This thesis has implemented a tactical evaluation and assistance tool called Threat Evaluator that can be used as an additional module to the ARGOS system or as a stand alone application Threat Evaluator automates many of the evaluation and information keeping duties that a Tactical Action Officer is required to perform during normal watchstanding evolutions It demonstrates the advanced capabilities attainable in a system implemented with economical off the shelf technology 111 TABLE OF CONTENTS I INTRODUCTION T Ts LEER OE 1 PROBLEM STATEMENT ese erre 3 SOLUTION e 7 A HARDWARE SOLUTION 0 005 7 B SOFTWARE SOLUTION 339 Geese do 9 1 Development Environment 5 9 2 Application Solution ccs coc E e 11 IV IMP
32. eedwater Ongoing O Ongoing Time Started T Time Started Freshwater Lube Oil onboard Number and Types of sonarbouys available Number Number Number Figure 10 Combat Systems Engineering Screen F TACTICAL ALGORITHMS Tactical Algorithms are accessed through the main menu screen This is a module that would greatly assist the TAO in weapons selection and employment Tactical Algorithms would provide the user with a method of quickly calculating the probability of a kill against a particular target with a selected ship s weapon This would then aid the TAO in determining the optimum weapon mix and release point against the target 48 G EASY ACCESS BUTTONS Throughout the Threat Evaluator the TAO has access to a number of buttons These buttons provide access to certain modules and functions which include Battle Orders Rules of Engagement Night Orders TAO Pass Down Log INCSEA signals Allied Tactical Publication signals Find function Help stack Home stack access Return Print and Return to Main Menu commands These features are described in detail in the following sections 1 Battle Orders The Commanding Officers battle orders are contained in this section Access to them is achieved by clicking on the icon shown in Figure 11 Within the screen is an icon that will give a time and date stamp if required This icon is shown in Figure 12 Figure 11 Battle Orders Icon PAR Con Time Dat
33. es TENTE t 24 pate Tr ad itte atte t v 5 Foa RO ti DSA etr n te D 1 MT A PENE te a 0 E HE es 9 ELD PE Qin PE En yg 070510 a futt cote i ary pig oie wey Mise T4 ICI Vid eot as A Wi 4 ADOS af y bye do LL DM E Cum ut a n art dieit da T i eate eto n eft ELE e a HT HIE on 0 zs 2 Uic D D D H 2 H Ke m PUE Hp iud PERITI T ue qe cie ms o nde ES ba Du AED Ves Hl t ri re A 1 n fan JU Gs ta Ai FER 22 f 4 e er m LI Og Tees 4 LE 124 134 UN Lu 11 A 7 m L s PN TUS ED yer 2 A Mit T el S ny 4 1 n 6 we a HEEL GU OR n perad Y PESTO shauna iras ou y piv JD ID 4 Y 4 E y esa O vsus tad qo 1 f DES bes hia DAY y n das d 5 tre din d E 17 Hp dT fear st A y ts E 4 fa oUm T Piso EP A N f A hosii tans t g 4 i e Ze vu fibers ea ELA 434 j 2 UE IAS AA ALE Y VEEP 212a E sli HII ine d P m 10 Le att tor d
34. f modules supporting these operations that could constitute 70 to 80 percent or more of the code for a new system 10 These two factors modularity and reusable code contribute to a rapid prototyping environment that would support quick delivery of a product to the fleet Prototyping is an excellent way to determine additional requirements and solutions before the final product is distributed to end users 2 Application Solution This solution application includes a multimedia interface for real time databases that supports text graphics and audio This capability would be required to provide the needed data that a TAO would use in the course of his her duties These capabilities are also essential in displaying that data in a timely easy to assimilate manner This application must have a rapid search capability From a users perspective this feature is quite important In a tactical environment a rapid search could mean the difference between the success or failure of a mission Vast amounts of data must be searched increasing the need for a search to be fast and accurate The manner in which information is displayed is very important The user should be able to easily distinguish different parts or categories of information from one another ideal way to do this is to display the information in windows that appear as specific queries are selected by the user This provides a quick means of assimilating data The solution applicati
35. hout having to navigate back through menus This routine allows the TAO to evaluate in detail the capabilities of each of the platforms found by the search E TAO STATUS BOARD The TAO status board was created to give a TAO a place to record information that was critical for the proper conduct of the watch He or she also needed a place to record any information that would be pertinent for following watch sections The TAO status board is an ideal tool for easy access to all required ships information The TAO status board is comprised of two cards that display critical ships information The combination of these two cards assures that the TAO has available all data essential to fighting the ship Two cards were determined appropriate to hold all the information that would be of importance while not requiring an excessive amount of searching by the TAO through many cards The first card was chosen to hold general data that would be easy to assimilate at a glance The second card was constructed to hold more detailed data regarding the casualties of various engineering and combat systems The first card of the TAO status board displays tactical weapons systems information Weapons status and condition of readiness are displayed at the top of the screen The position of this was important because a TAO must first be aware of the weapons status ordered The screen is essentially divided into three main segments in order to logically collate data Th
36. ing systems This application Threat Evaluator would be developed in accordance with the Argos architecture Ref 2 This architecture specifies a multi media interface that provides access to a real time database This application interface would support text graphics and audio to achieve the most desirable interface possible The environment in which Threat Evaluator was developed is Hypercard whose scripting language is Hypertalk Information on this environment can be found in Apple s Hypercard User s Guide Ref 3 This environment proved to be quite efficient in the production of the prototype application The Threat Evaluator and Hypercard operate on Apple Macintosh computers An important point is that Threat Evaluator can be converted for use on any Microsoft disk operating system MSDOS platforms which would facilitate its implementation throughout the fleet The purpose of this thesis is to demonstrate the feasibility of a tactical evaluation tool that will aide in the identification of platforms that may pose a possible threat to U S forces The tool will also give the TAO relevant own ship s information so that tactical decisions can be made knowing all required information Hypercard and Hypertalk are trademarks of Apple Computer Incorporated PROBLEM STATEMENT One of the most important qualifications and subsequent duties of a Surface Warfare Officer is that of TAO It is the pinnacle qualification
37. ion disks would be read only memory Fleet personnel would not be able to alter the information contained on the CD ROM This ensures that all units will have the same data files Finally optical disks are quite sturdy and are not easily damaged by normal day to day use This will provide protection of the data as it is in transit to the user facility 24 Future areas of study directly relating to the Threat Evaluator application include Development of a module that incorporates probability of kill algorithms to generate a recommendation to the TAO Development of a module that incorporates the signals and data in volumes one and two of ATP 1 C Development of a module that incorporates the INCSEA signals e Determination of which storage media is truly best for this application to include CD ROM tape drives and removable hard disks The development of the Threat Evaluator supports the Argos environment and the concept of a paperless ship It provides the TAO with an exceptional tool for analysis of tactical operations It also provides the user with a method of clear and concise information transfer between watch sections 25 APPENDIX A SCRIPTS FOR THREAT EVALUATOR A CODE FOR THE MAIN MENU SCREEN POPUP MENUS 1 Aircraft button on mouseDown play aircraft put United States USN USAF USA USMC USCG NOAA into aircraft put return amp Soviet Union after aircraft put return amp NATO Belgiu
38. le to the TAO It is ideal for easy access to all required perishable own ships information This portion of the Threat Evaluator provides routinely needed data to the TAO and provides continuity in watch to watch turnovers The TAO status board is comprised of two cards that display critical ships information The combination of these two cards ensures that the TAO has available at his fingertips all essential data for fighting the ship The first card of the TAO status board displays tactical weapons systems information This card is shown in Figure 8 Weapons status and the condition a OActive Passive Number of rounds pesas loaded 000 1 Types of mds 76 VTIR KD v 02 Illum El PorChaflauncher Starboard Chaff Launcher 3 Port Armed Stbd Armed ER Port Chaff Stbd Chaff Figure 8 TAO Status Board Screen 46 of readiness that the ship is in are displayed at the top of the screen Changes to these are accomplished by clicking the cursor on the desired button The rest of the screen is divided into three main segments The segment on the left of the screen contains ASW data and information on the specific ASW weapons systems of the ship Information such as the search mode of the sonar water conditions for the day and torpedo loading data are input by typing the information in the spaces provided or by clicking on the appropriate buttons The segment on the right of the screen contains informati
39. m On the card there are features that will be of assistance to the user in 15 categorizing the possible threat to his own ship Capabilities of the platforms are divided into the four warfare areas modeled The warfare areas chosen were anti air warfare AAW anti surface warfare ASUW anti submarine warfare ASW and electronic warfare EW Not all warfare areas were modeled due to time constraints Labels for the card button associated with the warfare areas were placed into the background because these labels would be used on all platforms within the stack The actual buttons were placed in the card layer because the popup menu would have to be tailored for each platform These card buttons can be copied and used in new cards and easily modified for other platforms since the script is copied along with the card button Repetition of equipment that appears under these warfare menus is purposely done to show the possibilities of using a certain system in more than one mode or warfare area For example a surface to air missile may also be used in a surface to surface mode This repetition would assist the TAO in remembering the capabilities of various weapons Scripts for the warfare area buttons are contained in Appendix A Equipment and systems listed in the menus for the F A 18 Hornet Ref 8 the Oliver Hazard Perry class frigate Ref 9 and the Los Angeles class submarine Ref 10 were taken from Jane s Fighting Ships and Jane s All The
40. m Canada Denmark France Germany Greece amp Iceland Italy Luxembourg Netherlands Norway Portugal Spain Turkey amp United Kingdom after aircraft put return amp Warsaw Pact Bulgaria Czechoslovakia Hungary Poland amp Romania after aircraft put return amp Mideast amp North Africa Algeria Bahrain Djibouti Egypt amp lIran lraq Israel Jordan Kuwait Lebanon Libya Mauritania amp Oman Qatar Saudi Arabia Somali Republic Sudan Syria Tunisia amp United Arab Emirates North Yemen South Yemen after aircraft put return amp Sub Saharan Africa Angola Benin Botswana Burkina Faso 26 Burundi Cameroon Cape Verde Central African Republic Chad Congo amp Ivory Coast Equatorial Guinea Ethiopia Gabon Ghana Guinea amp Guinea Bissau Kenya Liberia Madagascar Mali Mozambique Nigeria amp Senegal Seychelles Sierra Leone South Africa Tanzania Togo Uganda amp Zaire Zambia Zimbabwe after aircraft put return amp Asia amp Australasia Afghanistan Australia Bangladesh amp Brunei Burma Cambodia China India Indonesia Japan North Korea amp South Korea Laos Malaysia Mongolia Nepal Pakistan Papua New Guinea amp Phillipines Singapore Sri Lanka Taiwan Thailand Vietnam New Zealand after aircraft put return Carribean amp Latin America Argentina The Bahamas Belize amp Bolivia Brazil Chile Colombia
41. olution of the monitor is important because the graphics that will be displayed in the application must be clear A thirteen inch monitor having a 640 by 480 pixel display with 72 dots per inch dpi resolution should be sufficiently high in resolution to show the required graphics B SOFTWARE SOLUTION When considering a specific software environment to be used in the generation of a solution application there are a number of criteria that should be evaluated in order to choose the most desirable option These criteria can best be described as features that the environment will support These features for a development environment include reusable code modularity and rapid prototyping capabilities Features of the solution application include a multimedia interface rapid search display of windows graphics sound tailored menu capabilities and machine independence 1 Development Environment The software development environment chosen should support two main features The first is modular design and the second is reusable code This is by no means an exhaustive list of requirements but these two are certainly essential to the solution of this specific problem The development environment must support a modular program design This design will make the expansion of the solution application much easier to implement Whitten Bentley and Barlow Ref 4 say the following about dividing a program into modules Given these programs w
42. on should support this method of data display From a human factors point of view this is a better interface Graphics are an essential part of this solution application They are used to enhance recognition of platforms for training and tactical situations and also to make the interface user friendly The power of a user friendly interface cannot be underestimated The easier it is to understand and use the application 11 the greater value it will provide end users as a tool for accomplishing their missions Graphical user interfaces provide clear concise object relationships that a user with only modest experience can easily associate Pictures of familiar objects on the screen guide a user to operate the application A user sees an icon in the shape of a missile he or she should expect information about missiles to come from using that icon The interface is intuitive which adds to the desirability of the application Considerable thought and study must be incorporated in the design of an interface Graphical capability is a means to achieving this desired result Sound is another method of providing information to the user For example sound could be used to distinguish one level of a program from another or to provide an audible alarm that will alert the user if needed There are many other options that could also employ sound to assist the user In order for an application to be adapted to a specific use menus of the program should b
43. on on the gun systems aboard the ship The information such as number of rounds and the status of the chaff can be changed by typing the information into the spaces available or by clicking on the desired buttons The segment on the lower center of the screen shows the remaining missiles and their locations in the magazine This information is required to provide the TAO a current missile magazine inventory update The button shown in Figure 9 will take the user to the second screen of the TAO status board Figure 9 Combat Systems Engineering Icon The second screen of the TAO status board is divided into two sections The left section on the screen is the combat systems status and the section on the right of the screen is the engineering status The material condition of these two areas can effect the combat readiness and therefore the survivability of a ship in combat If there is any degradation in the equipment then the TAO must be 47 aware of what is not working and what effect its failure has on the combat readiness of the ship Information such as this is input by typing the information into the appropriately labelled spaces available or by clicking on the desired buttons The Combat Systems and Engineering status screen is shown in Figure 10 Combat Systems Casualties Maintenance Splint Plant SSDG online due to Casualties F Gas Turbine online Fuel onboard OCSOT Last Completed Last Completed F
44. ontain all the signals from the ATP 1 C as well as the information describing general maneuvers These signals would be displayed either in a list or a specific signal could be decoded as desired The signal would be input by the TAO resulting in the decoded meaning being displayed on the screen This would give the TAO quick access to required information As envisioned signals could also be encoded using this system tool 5 A completely integrated fully implemented module would also provide the user with a complete maneuvering board solution i e course and speed to station Figure 17 ATP Icon 7 Find The Find function will be accessed through the icon shown in Figure 18 The application will query the TAO as to what platform he wishes to view The TAO then inputs a name i e Los Angeles and the Find function will take the user to that card Figure 18 Find Icon 8 Help The Help stack will be accessed through the icon shown in Figure 19 This contains useful information on operation of the Threat Evaluator If a user does not remember the function of an specific icon then the help stack would assist him or her in determining its use 52 Figure 19 Help Stack Icon 9 Home Stack The Home stack will be accessed through the icon shown in Figure 20 This takes the user to the home card of the Hypercard environment Figure 20 Home Card Icon 10 Return The Return command will be accessed through the i
45. orders and PDL cards were constructed in the same format A scrolling field was chosen to hold the data This field can expand as the amount of data grows The field will hold a total of 30 000 characters Ref 12 A button prints the time and date into the field when required by the user The time date stamp was considered necessary so that the user could identify any new entries since the last time he she read the file The INCSEA background button displays a card that defines the future use of this module The module would contain all the signals from the INCSEA agreement These signals would be displayed either in a list or a specific signal could be encoded decoded as required The signal would be input by the TAO 20 resulting in the encoded decoded signal displayed on the screen Construction of this module is a follow on to this thesis The ATP 1 C background button displays a card that defines the planned future use of this module This module will contain all the signals from the ATP 1 C volume I and These signals would be displayed either in a list or a specific signal could be encoded decoded as required The signal would be input by the TAO resulting in the encoded decoded signal displayed on the screen This module is also a follow on effort to this thesis 21 V LESSONS LEARNED There are several lessons learned from the development of the Threat Evaluator application tool Programming and interface standardization is
46. orm An example of an aircraft card is shown in Figure 5 42 XQ E gt SS dO 4 DAA s DES ON 8 e ue N Ne Q se y Q Ss de AL tA N SONS SOS VA ARR SDS cp 7 ry SS AV 06 BER q e m 0 d Nene iy ey DS e e e L a AD e NEG 9 FARE ues PSOSM Yd ARS NINA Aoi TE AS ES SAFE eC NA e G Figure 5 Aircraft Data Card On the card features that will be of assistance to the user are divided into four warfare areas These areas are anti air warfare AAW anti surface warfare ASUW anti submarine warfare ASW and electronic warfare EW There are many other warfare areas however since this is a prototype application only four were chosen to demonstrate the concept Repetition of the equipment that appear under these menus is purposely done to show the possibilities of using a certain system across warfare areas An example of this is a surface to air missile that may also be used in a surface to surface mode After a system is selected from the menu of a warfare area a window appears Figure 6 that contains specific data and characteristics that a TAO may require for tactical evaluation To close the window simply click on the window with the Cursor 43 2A E X 2224 2 fs a 7 TUR Mags UW Figure 6 Information Window D SEARCH AND IDENTIFY FUNCTION One of the most useful functions
47. osture of a single ship as well as the overall combat readiness on an entire battlegroup The effective transfer of information during watch turnover is crucial to watch continuity Word of mouth status boards notes scribbled on paper and even seemingly organized notebooks have been the historical means of transferring current tactical as well as material status Although this may prove effective in an isolated number of cases for the most part essential information is left out or altered slightly by the typical watch to watch turnover If notebooks are used for turnover information the notebooks or status boards may not be updated in a timely matter or may even be totally neglected Additional clutter is the result of paper turnovers and it leaves the oncoming watchstander sorting the remaining pile for useful bits of information Visual means of exchanging data on electronic media is the most efficient choice available Off the shelf technology can provide significantly more efficient data retrieval and a graphical interface that will aid this entire process A review of current procedures and first hand experience have revealed a number of items that should be improved for greater efficiency These are e Resources are currently manual in nature often leading to slow inefficient information retrieval Unwieldy publications and microfiche are the primary mechanisms for data storage and the only vehicle for training watchstanders e
48. rcraft surface ships and submarine menus are contained in Appendix A The categories provided by the IISS were determined to be a reasonable manner in which to categorize the data within the Threat Evaluator Selection of items on the popup menus contained in the aircraft surface ships and submarine card buttons take the user to a second level menu screen The specific country or department chosen from that first menu is broken down into the various agencies on the second menu screen These agencies have control of the equipment aircraft surface ships submarines selected from the first menu screen For example after selection of USN under the aircraft card button on the first menu screen the screen changes to display the types of squadrons associated naval aircraft The user then has access to the individual aircraft type within each squadron designation These squadron designations are in accordance with Ball Ref 7 Representative scripts for the second menu screen card buttons are contained in Appendix A The second menu screen has a horizontal dividing line to differentiate fixed wing aircraft from helicopters This provides another visual confirmation to the user Squadrons and ship classes are not all inclusive but were chosen to represent different communities C INFORMATION CARDS After a specific aircraft surface ship or submarine is chosen from the second main menu screen the user is then shown the card with that specific platfor
49. rmation of his or her actions Computer generated sound was used after the first main menu screen The differentiation of digitized sound and computer generated sound gives the 22 user the positive reinforcement that he or she is in a different part of the application The demonstration of both types of sound lends credibility of the sound capabilities and their further expansion into other areas of this application The third lesson learned was the proper method of program and data design in constructing the Threat Evaluator Initially Threat Evaluator began as a single stack However this became cumbersome and changes to the stack were often difficult to incorporate A modular concept of data was determined as the most convenient and cost effective method For future additions to the Threat Evaluator modularization would facilitate the replacement of old data files with new ones This modular concept allows a specific program area or data file to be worked and updated as necessary then easily reintroduced into the main application This method will reduce the code necessary for implementation in fleet as opposed to a system that was not of a modular composition The fourth lesson learned was to include proper documentation for the application s operation Appendix B contains a user s manual that describes the operation of Threat Evaluator This documentation assists the user in the proper operation of the functions and features of Threat Ev
50. rmative Another problem encountered in the normal watch duties of the TAO is the time consuming evaluation of each emitter signal detected The usual flow of information starts with the detection of an emitter by the Electronic Warfare EW suite aboard After the initial detection search algorithms on the detection equipment attempt to make a match with the signal detected This search usually takes longer than desired and may result in an incorrect evaluation The search algorithm itself may not be optimal resulting in a slow search and retrieval process The search is also conducted manually by EW personnel using printed reference volumes This is done in order to reduce the number of erroneous matches that result from software searches alone The whole process is time consuming and prone to errors Current tools available to U S Navy Combat Information Center CIC watchstanders all of whom work for the TAO for threat evaluation and recognition training are limited Naval Warfare Publications NWP are used to search for data that is of primary concern Of note there is no quick reference available for correlation of essential initial identification information while in a tactical environment its very nature this limits the flow of critical information that the TAO must have to support the decision making process Loss of time conducting manual searches for information contained in hard copy volumes adversely affects the defensive p
51. ro computers with speeds in the 16MHZ 25MHZ can be purchased for under 3000 Most micro computers contain a number of additional features such as sound expansion slots and network capabilities which ensure a system could be expanded to meet future requirements The ability of the micro computer to support sound is an important factor For example sound can be a critical feature in the evaluation of EW parameters Sound capability could assist the users in identifying various platforms by matching emitter parameters contained on those platforms Other implementations of sound such as acoustic signatures could be used to further enhance the solution Speakers and associated sound supporting equipment should come included in the micro computer rather than having to buy an additional equipment in order to add this feature This will provide two benefits first is the elimination of requirements to have the expertise and tools available to install sound equipment second the cost of buying required sound equipment would be avoided The micro computer that includes sound capabilities may be slightly more expensive in the initial purchase but when the cost of the installation tools the installation of the sound equipment and the sound equipment itself are added to the price of the micro computer that did not have it previously installed the result is an overall lower cost for the one having the capability built into the micro computer The abilit
52. sion of this application because every country that has military equipment would be modelled in a data file For example Germany would have its own data file containing information on its platforms This modular approach also conforms to the design of the Argos system The Threat Evaluator is the most tailored tool to date that gives a TAO continuous personal training as well as evaluation of platforms that may pose a possible threat to the safety of the ship Hypercard has met all the criteria for the software environment solution It supports both modularity and reuseable code Reuseable code features of Hypercard support a high percentage of the code needed for development of all the modules 13 B STARTUP SCREEN AND MAIN MENU CARDS The startup screen displays high resolution graphics and plays digitized soundt to show the many capabilities of Hypercard and a Macintosh as soon as possible picture of a U S Aegis cruiser was placed over a background that has a marble like appearance This was done to give the user the feeling of viewing a warship in a background of space giving a futuristic appearance The sound was used to welcome the user to the Threat Evaluator as well as demonstrate digitized sound The command to play the sound is contained in the card script Digitized sounds for the stacks were installed using the MacRecorder by Farallon 2 These sounds were then placed into the main Threat Evaluator stack as resources These re
53. sources could then be called and played as required The startup screen dissolves into the main menu screen This visual effect was included to demonstrate one of the many screen change features of Hypercard The dividing line in the center of the main menu screen is used to distinguish training areas from actual tactical applications The training portion of the screen above the separation line has three card layer buttons The three areas modeled were aircraft surface ships and submarines Each of these card buttons has an associated icon that correlates the name displayed to the button For example the aircraft button has an icon in the shape of a jet This was done to give an additional visual confirmation to the user of what is being selected when he or she clicks on that button Each of the buttons calls an external command XCMD that generates a popup menu The countries contained in the popup menus for each of the aircraft surface ships and submarines buttons are 2 MacRecorder is copyrighted by Farallon Computing Incorporated 14 categorized in accordance with the International Institute for Strategic Studies IISS yearly publication Ref 6 This publication provides a well organized categorization of various countries The country and department modeled on the aircraft and surface ships card buttons is the United States and the U S Navy USN The United States is modeled on the submarines card button The scripts for the ai
54. ter asuw get HPopupMenu asuw 0 The mouseV The mouseH if it lt gt O then put item 1 of it into row put item 2 of it into column if row 1 and column 2 then show card field harpoon else if row 1 and column 3 then show card field tomahawk else show card field mk 48 end if end mouseDown D SEARCH ALGORITHM CODE 1 Search script on returninField put empty into card field Found Card List set the lockMessages to true set the lockRecent to true set the lockScreen to true put card field search criteria into wordToFind put card field stacks to search into stacksList push this card repeat with x 1 to the number of lines in stacksList go stack line x of stacksList unmark all cards mark cards by finding wordToFind repeat with y 1 to the number of marked cards put the short name of marked card y amp amp the short name of this stack amp return after foundCardList end repeat end repeat delete last char of foundCardList pop card put foundCardList into card field Found Card List set the lockMessages to false set the lockRecent to false set the lockScreen to false end returninField 2 Clickline on mouseDown get the value of the clickLine push card go card item 1 of it of stack item 2 of it end mouseDown 3 Stacks to Search Card field Stacks to Search contains the following names u s aircraft 36 u s surface ships u s submarines 37 APPENDIX B
55. that is available to a TAO in the Threat Evaluator application is the Search and Identifv option This option is vital for the quick identification of possible threats associated with a particular emitter or weapons systems The screen for the Search and Identify screen is shown in Figure 7 44 4 e ae A TP af A af e 0 de Y J VOICE Enter the name of the system to search for in the text box below mu 1 View the platform by clicking on its name Figure 7 Search and Identify Screen The search function is designed to accept as input the name of a radar or weapon system that has been identified With this information the search algorithm will search each platform card for a match to the system entered by the user Upon a match the names of platforms which have that emitter or weapon system will be displayed in a window for the TAO to view If the TAO desires further information on a particular platform that has been identified in the list he or she merely uses the mouse to click on the desired platform s name and the information card of that platform will be displayed The TAO can then evaluate in detail the capabilities of the platform by selecting the appropriate warfare area as described earlier in the Aircraft Surface Ships and Submarines Card section 45 E TAO STATUS BOARD The TAO status board is accessed through the main menu screen and is an exceptional tool availab
56. the material condition of either of these two areas directly affects the combat readiness and the survivability of a ship in combat If there is any degradation in the equipment then the TAO must be aware of what is not working and what effect its failure has on the combat readiness of the ship Card text fields were considered necessary to hold information on what equipment has a casualty what effect the casualty has overall and what if any scheduled maintenance 19 F TACTICAL ALGORITHMS This module has not been developed A stub was placed here indicating future possibilities Ideally it should be capable of using tactical algorithms that would calculate the probability of kill PK against a particular target with a selected ship s weapon This would then give the TAO the optimum weapon release point against that target and the number of weapons to use in any given engagement The TAO would then have a solid recommendation on which to base his final decision G INTER STACK BACKGROUND BUTTONS There are a number of references which a TAO must read and be familiar with These written orders should be easily accessible to the TAO Throughout each of the modules of Threat Evaluator the TAO has access to a number of background buttons The background buttons of note are Battle Orders Rules of Engagement ROE Night Orders Pass Down Log PDL INCSEA signals and Allied Tactical Publication ATP signals Battle orders ROE night
57. ticular emitter or weapon system The search and identify screen contains three card fields one of which is hidden The name of the hidden card field is stacks to search Scripts Ref 11 for the visible fields are found in Appendix A The first field receives the search string that will be compared to all the data card fields of the information stacks The search algorithm will search each stack that is listed in the hidden field Additional stacks that are created would merely need to be added to this field Upon a match of the search string and the name of a data field the name of the card and the name of the stack in which a match was found is returned and displayed in the second visible field The second field displays the name of the platform and the name of the stack on which the platform is located These are separated by a comma and the number of matches displayed is unlimited If a TAO desires further information on a particular platform he or she merely uses the mouse to click on the desired platform s name and the information card for that platform is displayed instantly 17 by pushing the search card This is done so that the user can return to the search card and evaluate further matches The card field displaying the results of the search is locked to permit the routine to work This routine was considered an essential function of the search card The TAO had to have the capability to quickly evaluate the results of the search wit
58. tions such as Search and Identify TAO Status Board or Tactical Algorithms Menus on the upper portion of the screen are accessed by clicking on the area desired such as Aircraft and holding the mouse button down see Figure 3 This will then show a popup menu where 40 United States Surface Ships Warsaw Pact 1 Mideast O North Africa Submarines Sub Saharan Africa Asia 0 Australasia Cerribean Latin America Search and Identify TAO Status Board Tactical Algorithms Figure 3 Popup Menus selection of a particular country within a geographic region can be made In the popup menus for each of the aircraft surface ships and submarines icons countries are divided into geographic regions After the selection of a country the user is taken to another menu where selection of an agency within the country selected that has control of the original type platforms selected i e aircraft can be made As shown in Figure 4 after the selection of the particular agency i e USN under the Aircraft main menu icon the screen changes to display the departments or squadrons within the agency The user then has access to the individual aircraft type within the department or squadron designation 4 EN XU VOICE Figure 4 Department Agency Screen C AIRCRAFT SURFACE SHIPS AND SUBMARINES CARDS After a specific aircraft surface ship or submarine is chosen the user is then shown the card with that specific platf
59. u Venezuela after submarines get HPopupMenu submarines 0 The mouse V The mouseH if it lt gt 0 then put item 1 of it into row put item 2 of it into column if row 1 and column 1 then go to card subs end if end if end mouseDown B CODE FOR THE DEPARTMENT SQUADRON SHIP TYPE MENUS 1 Aircraft on mouseDown 30 put FA 18 into va get HPopupMenu va 0 The mouseV The mouseH if it lt gt 0 then put item 1 of it into row put item 2 of it into column if row 1 and column 1 then push card go to stack u s aircraft end if end if end mouseDown 2 Surface Ships on mouseDown put CG Belknap Leahy Ticonderoga into crudes put return amp CGN Bainbridge California Long Beach Truxton amp Virginia after crudes put return amp DD Spruance after crudes put return amp DDG Adams Arleigh Burke Coontz Kidd after crudes put return amp FF Bronstein Glover Knox after crudes put return amp FFG Oliver Hazard Perry after crudes 31 get HPopupMenu crudes O The mouseV The mouseH if it lt gt 0 then put item 1 of it into row put item 2 of it into column if row 6 and column 2 then push card go to stack u s surface ships end if end if end mouseDown 3 Submarines on mouseDown put Ethan Allen into ssn put return amp Glenard P Lipscomb after ssn put return amp Los Angeles after ssn put return amp Narwhal after ssn put return
60. uos DN pe p ass uM z et iot nt t IT Ll 5 d bets rire irat eia e ess Pp A 4f d esdie 5 HOY st M ve Kew 4 p y ro F D 14 y I 4 Aa wel Sale eee LET dir no bom eben HP FT jur p Tcp LETT GERE 2 EDUR TRA 10 LARES Er TM ss 4 Ts dew ves iiio care PE OL EN T aoe SUUS m t PAID Le E Fae avs v4 wf vd ile nin arte aca lg ido ani MR ss uS DIM si Ke UE m Y Js Ar eir vidis 4 ns M DIA gt xu A 0 P if 1514 a thi 47 ai DO LH ong da CN IS eir RIAL MA I Ais Lid M f d 4 He u fa oe U 1 H fy 4 9 ie b 46d fiat tr ral Nu DON MAT nay guta s f areas migra f f T E TAL Pu wie phe 1 beg 4 i Aqu reed vog 5 oec ROCA DIET ORS OMS TEP A Loh PRE E etu f tra weavers ILIA J Y Y neq eth wr ni NU nnn opi h ERs eas FPES f Aer y m xu ase 1 EE Lh me DEED 4 xo c A qm o Mtn y QE A Ap EA ther gt v H9 tage AN eor evt SA pd due as EE per Y oe BODL TP tyne E 4 bee T 4 E od E SER AT TER irae E food gio PANTUN ci see H4 ep Ian eire E POLI 4 gt
61. y of a micro computer to be expandable is also crucial in the selection of a micro computer Many micro computers have expansion capabilities available through expansion slots Expansion slots provide the means of installing additional cards that add useful features These capabilities include 24 bit color file compression and networking It is important that future requirements be considered when selecting a micro computer for implementation The ability of a micro computer to support networking is fast becoming an essential part of any computer solution The ability to share data and resources between multiple user computers as well as different types of computers is a significant attribute A multi user environment is necessary for complete implementation of a solution Users typically use only a portion of data from the solution application Examples of multiple users that would use a solution application may be the CO Executive Officer Department Heads TAO s and on watch personnel such as those in the CIC EW and ASW modules A networking capability must be available in the micro computer selected An important part of a hardware solution in addition to the micro computer is a monitor monitor is essential for displaying data that is generated from the micro computer and solution application Over the last few years monitors have become quite inexpensive High resolution color monitors can be purchased for approximately 500 The res

Download Pdf Manuals

image

Related Search

Related Contents

CA Enterprise Log Manager - Manuel de  3M PF400XXL Privacy Computer Filter  AEG aeg11680 Sewing Machine User Manual  

Copyright © All rights reserved.
Failed to retrieve file