Download hypercarddatabas00sutt - Calhoun: The NPS

Transcript
•••-:-*"
WM 1MBW
&&ss
ibwt.^u.i^w»'
'
;
NAVAL POSTGRADUATE SCHOOL
Monterey
,
California
THESIS
HYPERCARD DATABASE TECHNOLOGY
AS APPLIED TO A
THREAT EVALUATOR REFERENCE TOOL
by
Frank E. Sutton
March 1991
Thesis Advisor:
Co-Advisor:
Approved
B.B. Giannotti
B. A. Frew
for public release; distribution
is
unlimited.
T254582
Unclassified
SECURITY CLASSIFICATION OF THIS PAGE
REPORT DOCUMENTATION PAGE
REPORT SECURITY CLASSIFICATION
la.
RESTRICTIVE MARKINGS
lb.
Unclassified
2a
SECURITY CLASSIFICATION AUTHORITY
2b.
DCLASSIFICATION/DOWNGRADING SCHEDULE
i
PERFORMING ORGANIZATION REPORT NUMBER(S)
.
3
NAME OF PERFORMING ORGANIZATION
6a.
6b.
DISTRIBUTION/ AVAILABILITY OF REPORT
Approved for public release; distribution
.
unlimited.
MONITORING ORGANIZATION REPORT NUMBER(S)
OFFICE SYMBOL
NAME OF MONITORING ORGANIZATION
7a
(If Applicable)
Naval Postgraduate School
is
Naval Postgraduate School
37
ADDRESS
6c
Ja.
1
1.
7b.
Monterey, CA 93943-5000
NAME OF FUNDING/SPONSORING
ORGANIZATION
ADDRESS
8c.
and ZIP code)
(city, state,
TITLE
(city, state,
ADDRESS
(city, state,
Monterey,
6b.
and ZIP code)
CA 93943-5000
PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER
OFFICE SYMBOL
(If Applicable)
and ZIP code)
10.
SOURCE OF FUNDING NUMBERS
PROGRAM
PROJECT
TASK
WORK UNIT
ELEMENT NO.
NO.
NO.
ACCESSION
NO
(Include Security Classification)
HYPERCARD DATABASE TECHNOLOGY AS APPLIED TO A THREAT EVALUATOR REFERENCE TOOL
12.
13a.
16.
17.
PERSONAL AUTHOR(S)
Sutton, Frank E.
TYPE OF REPORT
13b.
Master's Thesis
FROM
SUPPLEMENTARY NOTATION
The views expressed in this thesis
Defense or the U.S. Government.
COSAT1 CODES
GROUP
FIELD
1
9
ABSTRACT ( Continue
.
TIME COVERED
DATE OF REPORT
March 1991
(year,
month.day)
15.
PAGE COUNT
65
are those of the author and do not reflect the official policy or position of the
1
8.
SUBGROUP
on reverse
14.
TC
if necessary
SUBJECT TERMS
(continue on reverse if necessary and identify
Department of
by block number)
HyperCard, Hypertext, Tactical Action Officer, Paperless Ship
and
The paperless ship concept proposed by
identify
by block number)
VADM Metcalf has been advocated at the highest
levels in the
Navy.
ARGOS
is
a
prototype multi-media database system under development at the Naval Postgraduate School in support of this superior concept. This
thesis
has implemented a tactical evaluation and assistance tool called Threat Evaluator that can be used as an additional module to the
ARGOS
that
a Tactical Action Officer
attainable in a system
20.
is
required to perform during normal watchstanding evolutions.
DISTRIBUTION/AVAILABILITY OF ABSTRACT
2
D SAME AS RPT
1
.
NAME OF RESPONSIBLE INDIVIDUAL
1473, 84
It
demonstrates the advanced capabilities
MAR
22b.
83
APR
edition
ABSTRACT SECURITY CLASSIFICATION
Unclassified
DT1C USERS
B. B.Giannotti
DD FORM
of the evaluation and information keeping duties
implemented with economical, off-the-shelf technology.
UNCLASSIFIED/UNLIMITED
22a.
many
system or as a stand alone application. Threat Evaluator automates
may be used
TELEPHONE (Include
(408) 646-3390
until
exhausted
All other editions are obsolete
Area Code)
22c.
OFFICE SYMBOL
CSGg
SECURITY CLASSIFICATION OF THIS PAGE
Unclassified
Approved
for public release; distribution
is
unlimited.
HyperCard Database Technology
As Applied To A
Threat Evaluator Reference Tool
by
Frank Erwin Sutton
Lieutenant, United' States Navy
B.S., United States Naval
Submitted
in partial fulfillment
Academy, 1984
of the requirements
for the degree of
MASTER OF SCIENCE
IN
INFORMATION SYSTEMS
from the
NAVAL POSTGRADUATE SCHOOL
March 1991
David R. Whipple, Chairman, Department
Sciences
n
of Administrative
ABSTRACT
The
at the
paperless ship concept proposed by
highest levels in the Navy.
system under development
at the
ARGOS
VADM Metcalf has been advocated
is
a prototype multi-media database
Naval Postgraduate School
in
support of this
superior concept. This thesis has implemented a tactical evaluation and assistance
tool called Threat Evaluator that can be used as an additional
module
to the
ARGOS
system or as a stand alone application.
many of
the evaluation and information keeping duties that a Tactical Action
Officer
is
Threat Evaluator automates
required to perform during normal watchstanding evolutions.
demonstrates the advanced capabilities attainable
economical, off-the-shelf technology.
in
in a
It
system implemented with
/AJk
TABLE OF CONTENTS
I.
INTRODUCTION
1
II.
PROBLEM STATEMENT
3
III.
SOLUTION
7
IV.
A.
HARDWARE SOLUTION
7
B.
SOFTWARE SOLUTION
9
1
Development Environment
2.
Application Solution
9
11
IMPLEMENTATION
A. OVERVIEW
B. STARTUP SCREEN AND MAIN MENU CARDS
C. INFORMATION CARDS
D. SEARCH AND INDENTIFY FUNCTION
E. TAO STATUS BOARD
F. TACTICAL ALGORITHMS
G. INTER-STACK BACKGROUND BUTTONS
13
13
14
15
17
18
20
20
V.
LESSONS LEARNED
22
VI.
CONCLUSIONS
24
APPENDIX A SCRIPTS FOR THREAT EVALUATOR
26
APPENDIX B THREAT EVALUATOR USER'S MANUAL
38
LIST
OF REFERENCES
55
BIBLIOGRAPHY
56
INITIAL DISTRIBUTION LIST
57
IV
ACKNOWLEDGEMENTS
I
would
the future.
first like to
Most
thank Cdr B.B. Giannotti for his guidance and vision of
importantly,
I
would
like to
thank
my
wife, Theresa, and
children Christopher and Sarah. Their patience and support
compare.
was beyond
I.
In the United States
INTRODUCTION
Navy
there are several watch stations that require a
substantial investment in both time and energy to not only develop the skills and
knowledge base, but also
One
Officer (CO).
Officer (TAO).
weapons
in the
is
the
The
TAO
is
trust
of the
Commanding
Action
that of Tactical
has the authority to engage the enemy and release
absence of the CO. The Navy organization manual [Ref.l] states
TAO:
Basic Function.
commanding
employment and
b.
and
of the most critical positions
the following duties of the
a.
to earn the confidence
When
assigned, the Tactical Action Officer
officer's representative
concerning the tactical
the defense of the unit.
Duties, Responsibilities, and Authority.
The
TAO
is
responsible for the safe and effective operation of the combat
systems and for any other duties prescribed by the commanding
officer.
Circumstances permitting, the
promptly and precisely special orders and
the
commanding
Currently,
that
much
TAO
shall
carry out
shall report deviations to
officer.
of the data required by a
TAO
is
contained in publications
must be manually assimilated. This can take an inordinate amount of time
find critical information.
Manual data
retrieval
to
methods typically increase the
probability of selecting incorrect data which, in turn, results in an erroneous
evaluation.
Other information required by a
sheets and written on status boards.
current or
may be
Many
forgotten altogether.
TAO
is
contained on turnover
times this information
is
not kept
This can result in critical and/or
perishable information being lost during the normal watch to watch turnover.
These problems can be solved with development of an application
greatly assist
TAO
TAO's
in their duties
must accomplish
in his or her
the searching of data to
current status of
that
would
by automating the myriad functions
that a
normal watch
These would include
duties.
match an emitter with a platform or having available the
all ships'
weapons and engineering systems. This
application,
Threat Evaluator, would be developed in accordance with the Argos architecture
[Ref. 2]. This architecture specifies a multi-media interface that provides access
to a real time database.
and audio
to achieve the
The environment
whose
in Apple's
be quite efficient
which Threat Evaluator was developed
is
Hypertalk™. Information on
HyperCard User's Guide [Ref
in the
3].
this
is
is
HyperCard™,
environment can
production of the prototype application.
that Threat Evaluator
Microsoft disk operating system
implementation throughout the
The purpose of
graphics
This environment proved
Evaluator and HyperCard operate on Apple Macintosh™
important point
text,
most desirable interface possible.
scripting language
be found
to
in
This application interface would support
(MSDOS)
1
An
computers.
can be converted for use on any
platforms which would facilitate
its
fleet.
this thesis is to
demonstrate the feasibility of a tactical
evaluation tool that will aide in the identification of platforms that
possible threat to U.S. forces.
The Threat
The
tool will also give the
ship's information so that tactical decisions
can be
TAO
may pose
relevant
made knowing
all
a
own
required
information.
•HyperCard™ and Hypertalk™
Incorporated.
are trademarks
of Apple
Computer
PROBLEM STATEMENT
II.
One
of the most important qualifications and subsequent duties of a Surface
Warfare Officer
is
that of
TAO.
officer can achieve resulting
It
from
is
training, acquired
also quite an identifiable achievement a
officer
is
the pinnacle qualification that a junior
knowledge and
CO can bestow;
capable of fighting the ship
It is
.
proclaiming that a junior
CO
The
in battle.
trust
that conducts the
qualifying process puts great trust in each of the officers that he or she qualifies.
Stringent qualification requirements and thorough knowledge of
own
ship and
other potentially hostile ship's characteristics and capabilities are essential to
proficiency and success as a
Although the
TAO
TAO.
position
is
quite important and essential, after the
qualification process has been completed there
conducted to maintain
usually
left to
proficient
is
each
this
TAO
is
little
Continued training
high degree of readiness.
with
little
rote memorization.
or no guidance.
This process
may
continuous training
is
Normal means of keeping
be helpful
in the short term,
but must be continually refreshed in order to keep the knowledge base readily
available and current in
memory.
It is
memorized and
hostile, or potentially hostile, ships
notice.
The
will to train
be memorized.
is
often
difficult for the
hampered by
The unappealing volumes
TAO
to
keep current
easily accessible at a
the sheer
mass of data
that contain the data
learned to use. Methods that will give the data
moments
that
must
must also be
more appeal and even an
means of learning required knowledge would pique
all
exciting
interest while
being
functional and informative.
Another problem encountered
in the
normal watch duties of the
time consuming evaluation of each emitter signal detected.
TAO
is
The usual flow
the
of
information starts with the detection of an emitter by the Electronic Warfare
(EW)
suite
aboard After the
initial detection,
search algorithms on the detection
equipment attempt to make a match with the signal detected. This search usually
may
takes longer than desired and
algorithm
process.
itself
may
The search
matches
not be optimal resulting in a slow search and retrieval
is
reference volumes.
also conducted manually
This
is
done
consuming and prone
number of erroneous
The whole process
whom work
for the
is
of primary concern.
available for correlation of essential
environment.
tactical
information that the
TAO,
for threat evaluation
By
TAO
its
Of
note, there is
initial identification
very nature,
must have
this
(NWP),
overall
are used to
information while in a
limits the flow of critical
to support the decision
making process.
hard copy
in
affects the defensive posture of a single ship as well as the
combat readiness on an
The
and
no quick reference
Loss of time conducting manual searches for information contained
volumes adversely
time
Navy Combat Information Center (CIC)
recognition training are limited. Naval Warfare Publications
search for data that
is
to errors.
of
all
EW personnel using printed
order to reduce the
in
Current tools available to U.S.
watchstanders,
by
from software searches alone.
that result
The search
result in an incorrect evaluation.
entire battlegroup.
effective transfer of information during
watch continuity. Word of mouth,
watch turnover
status boards, notes scribbled
is
crucial to
on paper and
even seemingly organized notebooks have been the historical means of
transferring current tactical as well as material status.
effective in an isolated
left
number of cases,
for the
Although
most part
this
If
are used for turnover information, the notebooks or status boards
in a timely matter,
or
may even be
prove
essential information is
out or altered slightly by the typical watch to watch turnover.
updated
may
totally neglected.
notebooks
may
not be
Additional clutter
the result of paper turnovers and
is
leaves the
it
oncoming watchstander
the remaining pile for useful bits of information.
data on electronic media
is
the
most
sorting
Visual means of exchanging
efficient choice available.
Off the shelf
technology can provide significantly more efficient data retrieval and a graphical
interface that will aid this entire process.
A
review of current procedures and
number of items
•
that should
first
hand experience have revealed
be improved for greater efficiency. These
Resources are currently manual
information retrieval.
a
are:
in nature, often leading to slow, inefficient
Unwieldy publications and microfiche are the
primary mechanisms for data storage and the only vehicle for training
watchstanders.
•
After qualification,
typically
have no formal training
means of maintaining/improving
evaluation as a
•
TAO's
in threat
proficiency.
Reference and training tools are not centralized, often requiring users to
visit
various locations to collate/coordinate the tools and information and to have
access to the proper equipment.
•
The lack of user
friendly aids to threat evaluation is often frustrating to
many TAO's.
Automation of many of the manual functions, such as searching databases and
recording critical watch information to relieving watchstanders, would greatly
improve the efficiency of the evaluation process.
that
would be of primary concern
application.
These
in
There
are,
however, factors
determining the implementation of such an
factors are reliability of the
hardware system and the ease of
use of the application.
The
more
reliability
of the system includes
many
reliable than systems currently in use.
items.
Preferably,
it
should be
Methods of protecting data and
applications from viruses as well as disk, system and application crashes should
A
be carefully considered.
disks, tapes, optical disks,
available
variety of
media
Floppy
exists for data backup.
hard disks and removable hard disks are
all
readily
and accessible.
Data updates are of primary concern
accurate, time sensitive information
to the user.
is critical.
The importance of having
Efficient
and easy methods of
updating existing information would be important in saving time and effort as
well as money.
information
is
Determining the best possible method of delivering updated
also a crucial problem.
The emphasis on ease of use cannot be over
stressed.
The goal
application intuitive, thereby allowing novice users easy access to
If the application requires
and
its
to
make
the
capabilities.
enormous manuals and cryptic documentation be read
filtered prior to use,
then ultimately the product will not be used.
Determining which environment will best
undertaking.
is
suit this
requirement
is
an important
SOLUTION
III.
The recommended
solution and the focus of this thesis research
automation of numerous manual tasks that are conducted by the
watchstanders.
TAO
is
the
and other
Automation of procedures would simplify and streamline the
warfighting capability of any warship.
The speed
at
which many of the
procedures can be accomplished through automation will significantly increase
productivity of a
TAO
and his/her watch team.
This solution
is
composed of
both hardware and software. Both are crucial to ensure successful operation and
integration of a total system into the fleet.
A.
HARDWARE SOLUTION
Hardware
space
of
is
is vitally
scarce.
fleet units.
important in an enclosed shipboard environment because
The smaller
A
a system
micro computer
is
computers has dropped dramatically
affordable.
is,
the better
will support limited space
an excellent choice.
in recent years
Micro computers with speeds
purchased for under $3000.
it
The
cost of micro
and they have become quite
in the
16MHZ-25MHZ
Most micro computers contain
a
can be
number of
additional features such as sound, expansion slots and network capabilities
which
ensure a system could be expanded to meet future requirements.
The
ability of the
micro computer to support sound
For example, sound can be a
Sound
critical feature in the
is
an important
evaluation of
factor.
EW parameters.
capability could assist the users in identifying various platforms
matching emitter parameters
contained
on
those
platforms.
by
Other
implementations of sound, such as acoustic signatures, could be used to further
enhance the solution.
Speakers and associated sound supporting equipment
come included
should
in the
additional equipment in order to
first, is
micro computer rather than having
add
to
buy an
This will provide two benefits:
this feature.
the elimination of requirements to have the expertise and tools available
to install
sound equipment; second, the cost of buying required sound equipment
would be avoided. The micro computer
slightly
more expensive
that includes
itself are
added
is
may be
the cost of the
sound equipment, and the sound
to the price of the
previously installed, the result
capabilities
when
in the initial purchase, but
installation tools, the installation of the
equipment
sound
micro computer
that did not
have
it
an overall lower cost for the one having the
capability built into the micro computer.
The
ability of a
micro computer to be expandable
selection of a micro computer.
is
also crucial in the
Many micro computers have expansion
Expansion
capabilities available through expansion slots.
slots
provide the means
of installing additional cards that add useful features. These capabilities include
24
bit color, file
requirements
compression and networking.
considered
be
when
is
It
selecting
important that future
micro
a
computer for
implementation.
The
ability of a
essential part of
micro computer
to support
any computer solution. The
between multiple user computers, as well
significant attribute.
A
networking
is fast
ability to share data
becoming an
and resources
as different types of computers,
multi-user environment
is
is
a
necessary for complete
implementation of a solution. Users typically use only a portion of data from the
solution application.
application
may be
the
Examples of multiple users
CO, Executive
on-watch personnel such as those
Officer,
in the
networking capability must be available
8
would use
a solution
Department Heads, TAO's, and
CIC,
in the
that
EW
and
ASW
modules.
micro computer selected.
A
An
is
important part of a hardware solution,
a monitor.
A
monitor
is
addition to the micro computer,
in
essential for displaying data that
the micro computer and solution application.
Over
the last
is
generated from
few years, monitors
have become quite inexpensive. High resolution color monitors can be purchased
for approximately $500.
The
resolution of the monitor
graphics that will be displayed
in the application
important because the
is
must be
clear.
A
thirteen inch
monitor having a 640 by 480 pixel display with 72 dots per inch (dpi) resolution
should be sufficiently high
B.
in resolution to
show
the required graphics.
SOFTWARE SOLUTION
When
considering a specific software environment to be used in the
generation of a solution application, there are a
number of
criteria that
should be
evaluated in order to choose the most desirable option. These criteria can best be
described as features that the environment will support.
development environment include
prototyping capabilities.
These features for a
reusable code, modularity and rapid
Features of the solution application
include:
a
multimedia interface, rapid search, display of windows, graphics, sound, tailored
menu
capabilities
1.
and machine independence.
Development Environment
The software development environment chosen should support two
main
is
features.
The
first is
modular design and the second
by no means an exhaustive
list
is
reusable code. This
of requirements, but these two are certainly
essential to the solution of this specific problem.
The development environment must support
This design will
make
a modular program design.
the expansion of the solution application
9
much
easier to
implement.
Whitten, Bentley, and Barlow [Ref 4] say the following about
dividing a program into modules:
Given these programs, we want
to
break them into manageable
modules around which program specifications
Programmers can then build and
Then modules can be
test
will be written.
each module independently.
integrated according to the structure chart
and tested as a whole program.
This approach to program design would enhance the solution application since
the
program data would lend
the required data
would contain
itself to
would be divided
the information
For example, some of
a modular design.
into countries.
Each of the country modules
on the equipment and platforms owned by that
country.
Reusable code has become a buzzword
community.
Reusable code promotes efficiency
applications or
Reusable code
new modules
still
that will be
some
requires
software development
in the
in the
development of new
add-ons to existing applications.
modification,
however
the savings that such
code generates makes the cost of such changes insignificant when taken
aggregate. Powers, Cheney, and
Crow [Ref
5] state the following:
Systems designers have long been interested
reusable code.
The idea
can be used
many programs,
in
programming and
is
to write general
testing
in the
concept of
purpose modules that
thereby reducing the overall
effort
during
simplifying the on-going maintenance effort.
development and
The
large majority of
program code involves routine processes such as data entry and
verification, file maintenance,
and report writing.
It
should be
possible to create a standard set of modules supporting these
operations that could constitute 70 to 80 percent or
code for a new system.
10
more of
the
in
These two
and reusable code, contribute
factors, modularity
to a rapid
prototyping environment that would support quick delivery of a product to the
Prototyping
fleet.
is
an excellent way
solutions before the final product
2.
is
to
determine additional requirements and
distributed to end users.
Application Solution
This solution application includes a multimedia interface for real time
databases that supports
text,
TAO
required to provide the needed data that a
his/her duties.
These
This capability would be
graphics and audio.
would use
in the
course of
capabilities are also essential in displaying that data in a
timely, easy to assimilate manner.
This application must have a rapid search capability.
perspective this feature
search could
mean
is
From
a users'
quite important. In a tactical environment, a rapid
the difference between the success or failure of a mission.
Vast amounts of data must be searched increasing the need for a search to be
fast
and accurate.
The manner
in
which information
is
displayed
very important.
is
user should be able to easily distinguish different parts or categories
information from one another.
An
ideal
way
to
do
The
of
this is to display the
information in windows that appear as specific queries are selected by the user.
The
solution application
human
factors point of view,
This provides a quick means of assimilating data.
should support
this
method of data
From
display.
a
this is a better interface.
Graphics are an essential part of
used
to
also to
this solution application.
enhance recognition of platforms for training and
make
the interface user friendly.
cannot be underestimated. The easier
11
tactical situations
The power of a user
it is
to
They
are
and
friendly interface
understand and use the application,
the greater value
it
that a user with only
in the
end users as a
tool for accomplishing their
Graphical user interfaces provide clear, concise object relationships
missions.
objects
will provide
modest experience can easily
on the screen guide
associate. Pictures of familiar
a user to operate the application.
A user sees an icon
shape of a missile, he or she should expect information about missiles to
come from using
The
that icon.
desirability of the application.
interface
Sound
is
intuitive
which adds
to the
Considerable thought and study must be
incorporated in the design of an interface.
achieving this desired
is
Graphical capability
is
a
means
to
result.
another method of providing information to the user.
example, sound could be used
to distinguish
For
one level of a program from another
or to provide an audible alarm that will alert the user
if
needed. There are
many
other options that could also employ sound to assist the user.
In order for an application to be adapted to a specific use,
program should be
tailored to support
menus of the
needed functions and information.
Tailored menus allow the user to quickly identify his or her options for
retrieving desired data.
Menus
support the proper setup and flow of information
to the user.
is
It
crucial that the application be
transportable to other hardware.
machine
independent
and
This would then allow the application to be
available on most hardware in use in the
fleet.
True machine independence
provides an application with an enormous platform base upon which to operate.
Access by
all fleet
users increases the ability to develop and capitalize on large
user groups.
12
IV.
A.
IMPLEMENTATION
OVERVIEW
The Threat Evaluator was developed
Macintosh
II
HyperCard comes free as system software with
computer.
Macintosh computers. The assumption
In Threat Evaluator,
with HyperCard.
HyperCard environment on a
in a
in this
all
chapter
is
that readers are familiar
algorithms and modules have been
thoroughly considered throughout the development process.
can be implemented as an additional module
made up of
five
to the
modules and
is
modelled
the U.S.
Argos System or as a stand
Submarine data
file
FFG-7
after a
Threat Evaluator module, the U.S. Aircraft data
file,
file,
class ship
platforms.
design of the Argos system.
date that gives a
platforms that
TAO
may
the
is
file.
The
for future expansion of this
For example, Germany would have
its'
is
the U.S. Surface Ship data
application because every country that has military equipment
information on
There
and the Threat Evaluator Help data
modular design was considered the best option
in a data file.
Threat Evaluator
For the purpose of the prototype, the Threat Evaluator
alone application.
all
its
own
would be modelled
data
file
containing
This modular approach also conforms to the
The Threat Evaluator
is
the
most
tailored tool to
continuous personal training as well as evaluation of
pose a possible threat to the safety of the ship.
HyperCard has met
all
the criteria for the software environment solution.
supports both modularity and reuseable code.
Reuseable code features of
HyperCard support a high percentage of the code needed for development of
the modules.
13
It
all
B.
STARTUP SCREEN AND MAIN MENU CARDS
The
startup screen displays high resolution graphics
soundt to show the
many
and plays digitized
HyperCard and a Macintosh as soon as
capabilities of
A picture of a U.S Aegis cruiser was placed over a background that has
possible.
a marble like appearance. This
was done
to give the user the feeling of
The sound
a warship in a background of space giving a futuristic appearance.
was used
to
welcome
digitized sound.
the user to the Threat Evaluator as well as demonstrate
The command
to play the
sound
is
contained in the card
Farallon™ 2 These sounds were then placed
.
main Threat Evaluator stack
These resources could then be called and played as required.
as resources.
main menu screen. This visual
startup screen dissolves into the
was included
HyperCard.
into the
to
demonstrate one of the
The dividing
line in the center
many
of the screen, above the separation
modeled were
line,
of the main
menu
to give
aircraft button has
an icon
in the
name
or she clicks on that button.
command (XCMD)
popup menus
that generates a
shape of a
jet.
Each of the buttons
is
training portion
The
is
being selected
calls
an external
in the
and submarines buttons are
copyrighted by Farallon Computing Incorporated.
14
three
This was done
popup menu. The countries contained
for each of the aircraft, surface ships
MacRecorder®
used to
displayed to the button.
an additional visual confirmation to the user of what
when he
2
The
is
and submarines. Each of these card
buttons has an associated icon that correlates the
For example, the
screen
has three card layer buttons.
aircraft, surface ships,
effect
screen change features of
distinguish training areas from actual tactical applications.
areas
script.
MacRecorder® by
Digitized sounds for the stacks were installed using the
The
viewing
categorized in accordance with the International Institute for Strategic Studies'
(DSS) yearly publication
This publication provides a well organized
[Ref. 6].
The country and department modeled on
categorization of various countries.
aircraft
and surface ships card buttons
(USN). The United States
is
for the aircraft, surface ships, and submarine
A.
The
manner
menus
are contained in
in
which
to categorize the data within the
specific country or department chosen
the various agencies on the second
menu
second level
to a
from
in the aircraft, surface ships
that first
screen.
menu
For example,
menu
after selection of
menu
is
screen.
The
broken down into
These agencies have control of
the equipment (aircraft, surface ships, submarines) selected
first
Appendix
Threat Evaluator.
popup menus contained
and submarine card buttons take the user
the
scripts
categories provided by the IISS were determined to be a reasonable
Selection of items on the
screen.
and the U.S. Navy
the United States
modeled on the submarines card button. The
is
the
"USN" under
from the
first
menu
the aircraft card button
on
screen, the screen changes to display the types of squadrons
associated naval aircraft.
The user then has access
within each squadron designation.
accordance with Ball [Ref
7].
to the individual aircraft type
These squadron designations are
Representative scripts for the second
card buttons are contained in Appendix A.
menu
in
screen
The second menu screen has
a
horizontal dividing line to differentiate fixed wing aircraft from helicopters.
This provides another visual confirmation
classes are not
C.
all
inclusive but
Squadrons and ship
to represent different
communities.
INFORMATION CARDS
After a specific
main menu screen
On
were chosen
to the user.
aircraft, surface ship or
the user
is
then
shown
submarine
is
chosen from the second
the card with that specific platform.
the card there are features that will be of assistance to the user in
15
categorizing the possible threat to his
own
Capabilities of the platforms are
ship.
The warfare
divided into the four warfare areas modeled.
anti-air
warfare
(ASW), and
(AAW),
electronic warfare
to time constraints.
were placed
anti -surface
(EW). Not
The
actual buttons
menu would have
platforms since the script
that appears
is
new
For example, a surface to
various weapons.
air missile
would
is
Repetition of
purposely done to show the
more than one mode or warfare
in
may
in
remembering the
capabilities of
Appendix
Scripts for the warfare area buttons are contained in
A. Equipment and systems
menus
listed in the
Oliver Hazard Perry class frigate [Ref
9],
area.
also be used in a surface to surface
TAO
assist the
These
cards and easily modified for other
under these warfare menus
system
all
card layer
in the
copied along with the card button.
possibilities of using a certain
repetition
were placed
be tailored for each platform.
to
card buttons can be copied and used in
mode. This
warfare areas were modeled due
background because these labels would be used on
platforms within the stack.
equipment
all
anti-submarine warfare
Labels for the card button associated with the warfare areas
into the
because the popup
(ASUW),
warfare
areas chosen were
for the
F/A-18 Hornet [Ref 8], the
and the Los Angeles class submarine
[Ref 10] were taken from Jane's Fighting Ships and Jane's All The World's
Aircraft.
After a weapon or electronic system
area, a
may
window appears
is
menu
of a warfare
containing specific data and characteristics that a
require for proper tactical evaluation.
being displayed upon the selection of a
determined to be ideal
selected from the
in separating
The windows
menu
item.
system data
TAO
are actually card fields
The use of card
fields
in a logical systematic
and providing a visual consolidation of information for the user.
was
manner
Card
fields
containing data have been locked to prevent inadvertent alteration of the data.
This gives an added measure of security as well as ensuring that data remains
16
intact.
There are many card
given a specific
name and
is
name
is
placed in the script of the applicable
the field
is
displayed,
that
Once
warfare area button.
on each card. Each
fields containing information
can be hidden again by
it
clicking the cursor within the field. This format of displaying data will be useful
in training prospective
training prospective
The method of
TAO's.
TAO's
data display
also useful for
is
since on-line quizzing can be accomplished within
each warfare area.
D.
SEARCH AND IDENTIFY FUNCTION
One
of the most crucial and useful functions available to the
Threat Evaluator application
located on the main
menu
the Search and Identify option.
is
screen for easy access by the user and
TAO
in the
This option
is vital
is
for quick
identification of an incoming threat associated with a particular emitter or
weapon system. The search and
which
is
identify screen contains three card fields,
The name of the hidden card
hidden.
[Ref 11] for the visible fields are found
in
Appendix A. The
compared
the search string that will be
field is "stacks to search".
first field
the hidden field.
added
is
name
Upon
a
match of the search
of the card and the
name of the
returned and displayed in the second visible
The second
field displays the
on which the platform
is
name of the
located.
number of matches displayed
is
string
is
of the
listed in
stack in
and the name of a data
which a match was found
field.
platform and the
These are separated by a
unlimited.
If a
TAO
name and
of the stack
comma and
to click
the information card for that platform
17
name
the
desires further information
on a particular platform, he or she merely uses the mouse
platform's
receives
Additional stacks that are created would merely need to be
to this field.
field, the
Scripts
to all the data card fields
information stacks. The search algorithm will search each stack that
one of
is
on the desired
displayed instantly
by pushing the search
card.
This
is
done so
The card
card and evaluate further matches.
search
is
that the user can return to the search
field displaying the results of the
This routine was considered an
locked to permit the routine to work.
The
essential function of the search card.
TAO
had
to
have the capability to
quickly evaluate the results of the search without having to navigate back through
menus. This routine allows the
TAO to
evaluate in detail the capabilities of each
of the platforms found by the search.
E.
TAO STATUS BOARD
The
TAO
board was created to give a
status
information that was
needed a place
critical for the
to record
The
watch sections.
board
status
required ships' information.
The
TAO
TAO
has available
all
that
is
He
would be pertinent
record
to
or she also
for following
an ideal tool for easy access to
status
that display critical ships information.
assures that the
a place
proper conduct of the watch.
any information
TAO
TAO
board
is
comprised of two cards
The combination of these two cards
data essential to fighting the ship.
cards were determined appropriate to hold
all
the information that
many
The
cards.
be easy to assimilate
first
first
at a glance.
information.
card of the
Weapons
of the screen.
The
TAO
status
The second card was constructed
status
board displays
tactical
to
was important because a
status ordered.
The screen
is
weapons systems'
TAO
in
screen contains
AS W
at the top
must
first
be
essentially divided into three
order to logically collate data. The segment on the
main segments
hold more
combat systems.
and condition of readiness are displayed
position of this
aware of the weapons
TAO
card was chosen to hold general data that would
detailed data regarding the casualties of various engineering and
The
Two
would be of
importance while not requiring an excessive amount of searching by the
through
all
left
of the
related information including associated weapon's systems.
18
Information such as the
mode
of the sonar, water conditions for the day and
torpedo loading data are essential for
ASW operations.
Radio buttons (which are
small round buttons) and text fields were used to accept and display information.
The torpedo tube graphic
serves to give the user a visual reference of which
The segment on
tubes are currently loaded.
the right of the screen contains
information on the installed gun systems. This information would be required in
any
AAW or ASUW engagement.
Information
also displayed through the use
is
of text fields and buttons. The segment on the lower center of the screen shows
the remaining missiles and their respective locations in the magazine.
display gives the
TAO
locations after a firing.
a visual perspective as to the remaining missiles
Each of the
cells contain four buttons,
the three types of rounds (SM-1, blue bird, harpoon) plus an
that
would be generated once
a missile from that cell
was
and
their
each symbolizing
empty
fired.
chosen were representative of the actual rounds and an empty
This
cell
cell
symbol
The symbols
was given an
"x" symbol.
The second screen of the
The
left
screen
side of the screen
is
is
TAO status board
the
the engineering status.
is
combat systems
divided into two main sections.
status
This information
is
and the right side of the
very important to the
TAO
because the material condition of either of these two areas directly affects the
combat readiness and the
survivability of a ship in combat.
degradation in the equipment, then the
TAO
working and what
on the combat readiness of the
Card
text fields
effect
its'
failure has
were considered necessary
must be aware of what
to
19
is
not
ship.
hold information on what
equipment has a casualty, what effect the casualty has overall and what,
scheduled maintenance.
any
If there is
if
any,
F.
TACTICAL ALGORITHMS
A
This module has not been developed.
future possibilities. Ideally,
would
it
kill
The
TAO
indicating
(Pk) against a particular target with a
This would then give the
release point against that target and the
engagement.
was placed here
should be capable of using tactical algorithms that
calculate the probability of
selected ship's weapon.
stub
TAO
the
number of weapons
would then have
a solid
optimum weapon
any given
to use in
recommendation on which
to
base his final decision.
INTER-STACK BACKGROUND BUTTONS
G.
There are a number of references which a
with.
These written orders should be
TAO
must read and be familiar
easily accessible to the
TAO
each of the modules of Threat Evaluator, the
TAO. Throughout
has access to a number of
background buttons. The background buttons of note are Battle Orders, Rules of
Engagement (ROE), Night Orders, Pass Down Log (PDL), INCSEA
signals
and
Allied Tactical Publication (ATP) signals.
Battle orders,
same format.
A
ROE,
night orders and
scrolling field
was chosen
expand as the amount of data grows.
characters [Ref 12].
A
required by the user.
The
user could identify any
module.
The
cards were constructed in the
to
hold the data.
field will
hold a
This field can
total
of 30,000
button prints the time and date into the field
time/date stamp
new
was considered necessary so
entries since the last time he/she read the
The INCSEA background button
this
PDL
when
that the
file.
displays a card that defines the future use of
The module would contain
all
the signals from the
agreement. These signals would be displayed either in a
list
INCSEA
or a specific signal
could be encoded/decoded as required. The signal would be input by the
20
TAO,
resulting in the encoded/decoded signal displayed on the screen.
this
module
is
a follow-on to this thesis.
The ATP- 1(C) background button
future use of this module.
ATP- 1(C) volume
I
and
II.
displays a card that defines the planned
This module will contain
by the TAO, resulting
is
all
the signals from the
These signals would be displayed
specific signal could be encoded/decoded as required.
This module
Construction of
in the
The
either in a
signal
list
or a
would be input
encoded/decoded signal displayed on the screen.
also a follow-on effort to this thesis.
21
LESSONS LEARNED
V.
There are several lessons learned from the development of the Threat
Evaluator application
Programming and
tool.
interface standardization
is
especially crucial with future modules that supplement the Threat Evaluator
application since
standardization
data
files.
it is
would
an
iterative
and continuous development process.
developers in the construction of
assist the
This
new modules
or
Important lessons learned include the use of sound and graphics to
achieve unique methods of data representation.
These lessons will provide
valuable information for future module development.
The
graphics
first
was determined
determination
Graphical
was
lesson learned
to
in the
use of graphics. The careful utilization of
be a benefit and not a distraction
came from demonstrating
representation
to the user.
the application to interested individuals.
of familiar objects creates a more acceptable
environment to new users of the application.
Objects that appear in the users'
normal work routine and duties are taken and represented graphically
application.
in the
Implementing
This
this
in the
graphic representation into the application results
user bringing previous knowledge to the application.
application an intuitive interface.
This intuitiveness
is
This gives the
highly sought after in an
application such as Threat Evaluator.
The second
lesson involved unique benefits of using sound as another
of transmitting information to the user.
Sound provided
of data. Digitized sound was used to repeat what main
was choosing. This supplied
actions.
The
means
the user with a variety
menu
function he or she
the user with an audio confirmation of his or her
Computer generated sound was used
differentiation of digitized
after the first
main menu
screen.
sound and computer generated sound gives the
22
user the positive reinforcement that he or she
in a different part of the
The demonstration of both types of sound lends
application.
sound capabilities and
The
is
their further
was
third lesson learned
in constructing the
single stack.
expansion into other areas of
the proper
Threat Evaluator.
However,
this
most convenient and cost
Initially,
A modular
this application.
method of program and data design
Threat Evaluator began as a
became cumbersome and changes
often difficult to incorporate.
credibility of the
to the stack
concept of data was determined as the
effective method.
For future additions
to the Threat
Evaluator, modularization would facilitate the replacement of old data
new
ones.
were
files
This modular concept allows a specific program area or data
with
file to
be worked and updated as necessary, then easily reintroduced into the main
application.
fleet as
This method will reduce the code necessary for implementation in
opposed
The
to a
system that was not of a modular composition.
fourth lesson learned
application's operation.
was
to include proper
Appendix B contains a
user's
documentation for the
manual
that describes the
operation of Threat Evaluator. This documentation assists the user in the proper
operation of the functions and features of Threat Evaluator.
23
VI.
CONCLUSIONS
The development of the Threat Evaluator
automated reference and evaluation
tool.
shown
tool has
the feasibility of an
The modular design of
the application
as well as the quick prototyping aspects of the Hypertalk language
show
that the
HyperCard environment can be both economical and technically sound for future
development of projects of
this sort.
Many
provisions greatly needed by
have been incorporated into the Threat Evaluator.
TAO's
These features can be
fine
tuned and tailored as further iterations of the application are developed.
The
storage media most likely to be of greatest benefit for the Threat
Evaluator
would be
is
compact disk read only memory
optical storage
number of reasons.
CD ROM
best for a
550 megabytes of
is
data.
First, the
This large volume
is
(CD ROM).
disks will hold about
necessary to hold
all
of the data that
required for a fully implemented Threat Evaluator application and data
Once Threat Evaluator has been completely implemented, every country
military equipment
would be represented by
on
Today
that equipment.
ROM.
required.
CD ROMs
CD ROMs
on the
Fleet personnel
CD ROM.
day use. This
that has
amount of data
is
CD
Cognizant agencies
easy.
to fleet units as updates to the data files are
CD ROM
Third, distribution disks
would not be able
This ensures that
Finally, optical disks are quite sturdy
to
would be
files.
that contained information
Users would then be able to return the old
destruction or sanitization of data.
memory.
module
the only true alternative for this
Second, distribution of
would merely send new
a
This
all
for proper
would be read only
to alter the information contained
units will
have the same data
files.
and are not easily damaged by normal day
will provide protection of the data as
facility.
24
it
is in
transit to the user
Future areas of study directly relating to the Threat Evaluator application
include:
•
Development of a module
that incorporates probability of kill algorithms to
generate a recommendation to the
•
Development of a module
TAO.
that incorporates the signals
and data
in
volumes
one and two of ATP 1(C).
•
Development of a module
•
Determination of which storage media
include
CD ROM,
that incorporates the
is
INCSEA
signals.
truly best for this application to
tape drives and removable hard disks.
The development of
the Threat Evaluator supports the
and the concept of a paperless
provides the
ship.
It
for analysis of tactical operations.
It
clear and concise information transfer
Argos environment
TAO with an
exceptional tool
also provides the user with a
between watch
25
sections.
method of
APPENDIX A
SCRIPTS FOR THREAT EVALUATOR
A.
CODE FOR THE MAIN MENU SCREEN POPUP MENUS.
1.
Aircraft button
on mouseDown
play aircraft
put "United
States,USN,USAF,USA,USMC,USCG,NOAA"
into aircraft
put return
&
"Soviet Union" after aircraft
put return
&
"NATO,Bdgium,Canada,Denmark,France,Germany,Greece,"
&"Iceland,Italy,Luxembourg,Netherlands,Norway,Portugal,Spain,Turkey,'
&"United Kingdom"
put return
&
&"Romania"
put return
&
after aircraft
"Warsaw Pact,Bulgaria,Czechoslovakia,Hungary,Poland,"-.
after aircraft
"Mideast
&
North Africa,Algeria,Bahrain,Djibouti,Egypt,"-.
&"Iran,Iraq,Israel,Jordan,Kuwait,Lebanon,Libya,Mauritania,Morroco,"-.
&"Oman, Qatar, Saudi Arabia,Somali
Republic,Sudan,Syria,Tunisia,"-.
&"United Arab Emirates,North Yemen,South Yemen"
put return
&
after aircraft
"Sub-Saharan Africa,Angola,Benin,Botswana,Burkina Faso,"-
26
&"Burundi,Cameroon,Cape Verde, Central African Republic,Chad,Congo,"-.
&"Ivory Coast,Equatorial Guinea,Ethiopia,Gabon,Ghana,Guinea,"-.
&"Guinea-Bissau,Kenya,Liberia,Madagascar,Mali,Mozambique,Nigeria,"-.
&"Senegal,Seychelles,Sierra Leone,South Africa,Tanzania,Togo,Uganda,"-.
&"Zaire,Zambia,Zimbabwe"
put return
&
"Asia
&
after aircraft
Australasia,Afghanistan,Australia,Bangladesh,"-.
&"Bnmei,Burma,Cambodia,China,India,mdonesia,Japan,North Korea,"-.
&"South Korea,Laos,Malaysia,Mongolia,Nepal,Pakistan,Papua
New
Guinea,'
&"Phillipines,Singapore,Sri Lanka,Taiwan,Thailand,Vietnam,New Zealand"after aircraft
put return
&
"Carribean
&
Latin America,Argentina,The Bahamas,Belize,"-
&"Bolivia,Brazil,Chile,Colombia,Costa Rica,Cuba,Dominican Republic,"-.
&"Ecuador,El Salvador,Guatemala,Guyana,Haiti,Honduras,Jamaica,Mexico,"
&"Nicaragua,Panama,Paraguay,Peru,Suriname,Uraguay, Venezuela"-,
after aircraft
get HPopupMenu(aircraft,0,The
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
if
1
(row =1) and (column =2) then
go
end
end
mouseV,The mouseH)
to card "usn"
if
if
end mouseDown
27
2.
Surface Ships Button
on mouseDown
play "surface ships"
put "United
States,USN,USA,USCG"
into ships
put return
&
"Soviet Union" after ships
put return
&
"NATO,Belgium,Canada,Denmark,France,Germany,Greece,'
&"Iceland,Italy,Netherlands,Norway,Portugal,Spain,Turkey,"-.
&"United Kingdom"
put return
& "Warsaw
&"Romania"
put return
after ships
&
Pact,Bulgaria,Czechoslovakia,Hungary,Poland,"-.
after ships
"Mideast
&
North Africa,Algeria,Djibouti,Egypt,Iran,"-i
&"Iraq,Israel,Jordan,Kuwait,Lebanon,Libya,Mauritania,Morroco,Oman,"-
&"Qatar,Saudi Arabia,Somali Republic,Sudan,Syria,Tunisia,"-.
&"United Arab Emirates,North Yemen,South Yemen"after ships
put return
&
"Sub-Saharan Africa,Angola,Benin,Cameroon,Cape Verde,"^
&"Ivory Coast,Ethiopia,Gabon,Ghana,Kenya,Liberia,Madagascar,Nigeria,'
&"Senegal,Sierra Leone,South Africa,Tanzania" after ships
put return
&
"Asia
&
Australasia,Australia,Bangladesh,Brunei,Burma,"-i
&"Cambodia,China,Fiji,India,Indonesia,Japan,North Korea,South Korea,"-
&"Malaysia,Pakistan,Papua
New
Guinea,Phillipines,Singapore,Sri Lanka,"-
28
&"Taiwan,Thailand,Vietnam,New Zealand"
put return
&
"Carribean
&
after ships
Latin America,Argentina, Bolivia, Brazil,"-.
&"Chile,Colombia,Cuba,Ecuador,Mexico,Nicaragua,Paraguay,Peru,Uraguay,'
&"Venezuela"
after ships
get HPopupMenu(ships,0,The
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
if
mouse V,The mouseH)
1
(row =1) and (column =2) then
go to card "usnl"
end
end
if
if
end mouseDown
3.
Submarines Button
on mouseDown
play "submarines"
put "United States" into submarines
put return
&
"Soviet Union" after submarines
put return
&
"NATO,Belgium,Canada,Denmark,France,Germany,Greece,'%
&"Iceland,Italy,Netherlands,Norway,Portugal,Spain,Turkey,%
&"United Kingdom"
after
submarines
29
put return
&
"Warsaw Pact,Bulgaria,Poland,Romania"
put return
&
"Mideast
&" Syria"
after
&
submarines
&
"Sub-Saharan Africa,South Africa"
put return
&
"Asia
&
after
submarines
Australasia,Australia,China,India,Indonesia,"-.
&"Japan,North Korea,South Korea,Pakistan,Taiwan"
&
submarines
North Africa,Algeria,Egypt,Israel,Libya,"-i
put return
put return
after
"Carribean
&
after
submarines
Latin America,Argentina,Brazil,Chile,"-.
&"Colombia,Cuba,Ecuador,Peru,Venezuela"
after
submarines
HPopupMenu(submarines,0,The mouseV,The mouseH)
get
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
if
(row =
go
end
end
1
1 )
and (column = 1 ) then
to card "subs"
if
if
end mouseDown
B.
CODE FOR THE DEPARTMENT/SQUADRON/SHIP TYPE
MENUS
1.
Aircraft
on mouseDown
30
put "FA- 18" into va
HPopupMenu(va,0,The mouseV,The mouseH)
get
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
if
1
(row =1) and (column =1) then
push card
go
end
end
to stack "u.s. aircraft"
if
if
end mouseDown
2.
Surface Ships
on mouseDown
put "CG,Bdknap,Leahy,Ticonderoga" into crudes
put return
&
"CGN,Bainbridge,California,Long Beach,Truxton,"-.
&"Virginia" after crudes
put return
&
"DD,Spruance"
put return
&
"DDG,Adams,Arleigh Burke,Coontz,Kidd"
put return
&
"FF,Bronstein,Glover,Knox" after crudes
put return
&
"FFG,01iver Hazard Perry"
after crudes
31
after crudes
after crudes
HPopupMenu(crudes,0,The mouseV,The mouseH)
get
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
if
1
(row = 6) and (column =2) then
push card
go
end
end
to stack "u.s. surface ships"
if
if
end mouseDown
3.
Submarines
on mouseDown
put "Ethan Allen" into ssn
put return
&
"Glenard
put return
&
"Los Angeles"
put return
&
"Narwhal"
put return
&
"Permit" after ssn
put return
&
"Seawolf" after ssn
put return
&
"Skipjack" after ssn
P.
Lipscomb"
after ssn
after ssn
after ssn
32
put return
&
"Sturgeon" after ssn
HPopupMenu(ssn,0,The mouseV,The mouseH)
get
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
1
(row = 3) and (column =1) then
if
push card
go
end
end
to stack "u.s.
submarines"
if
if
end mouseDown
CODE FOR THE PLATFORM CARDS
C.
1.
F/A-18 (Hornet)
on mouseDown
"Guns,20mm Machine Gun"
put
put return
get
&
into
aaw
"Missiles,Sidewinder,Sparrow" after aaw
HPopupMenu(aaw,0,The mouseV,The mouseH)
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
1
33
(row =1) and (column = 2) then
if
show card
field
= 2) and (column = 2) then
else if (row
show card
else
end
"20mm"
field
show card
"sidewinder"
field
"sparrow"
if
end mouseDown
Oliver Hazard Perry (FFG-7)
2.
on mouseDown
put "Missiles, Standard Missile" into
put return
aaw
& "Guns,76mm,20mm CIWS"
after
aaw
HPopupMenu(aaw,0,The mouse V,The mouseH)
get
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
if
(row =
1
1
and (column = 2) then
)
show card
else if (row
field "standard missile"
= 2) and (column = 2) then
show card
else
end
field
show card
"76mm"
field
"20mm CIWS"
if
end mouseDown
3.
Los Angeles (SSN 688)
on mouseDown
34
put "Missiles,Harpoon,Tomahawk" into asuw
put return
&
"Torpedos,Mk-48"
after
asuw
HPopupMenu(asuw,0,Tne mouseV,The mouseH)
get
if it
<>
then
of
it
into
row
put item 2 of
it
into
column
put item
if
1
(row =1) and (column = 2) then
show card
field
else if (row = 1)
show card
show card
else
end
field
"harpoon"
and (column = 3) then
"tomahawk"
field
"mk-48"
if
end mouseDown
D.
SEARCH ALGORITHM CODE
Search script
1.
on returninField
put empty into card field "Found Card List"
set the
lockMessages to true
set the
lockRecent to true
set the
lockScreen to true
put card field "search criteria" into wordToFind
put card field "stacks to search" into stacksList
push
this
card
35
repeat with x =
go stack
unmark
(line
all
1
lines in stacksList
x of stacksList)
cards
mark cards by
finding
repeat with y =
put (the short
the short
number of
to the
wordToFind
to the
1
number of marked
name of marked
name of this
stack
&
card y)
&
cards
","
&
-.
return after foundCardList
end repeat
end repeat
delete last char of foundCardList
pop card
put foundCardList into card field "Found Card List"
set the
lockMessages to
set the
lockRecent to false
set the
lockScreen to false
false
end returninField
2.
Clickline
on mouseDown
get the value of the clickLine
push card
go card (item
1
of
it)
of stack (item 2 of
it)
end mouseDown
3.
Card
Stacks to Search
field "Stacks to
Search" contains the following names:
u.s. aircraft
36
u.s.
surface ships
u.s.
submarines
37
APPENDIX B
THREAT EVALUATOR USER'S MANUAL
38
A.
INTRODUCTION
The Threat Evaluator
an application that automates
is
that are required during the
many
of the functions
normal watchs tan ding routine of a Tactical Action
Officer (TAO). Threat Evaluator can be implemented as an additional module to
the
Argos System or as a stand alone
date that a
TAO
Figure
start the
It is
the most tailored tool to
has available for continuous personal training as well as
evaluation of platforms that
To
application.
may
pose a possible threat to the safety of the ship.
Threat Evaluator application, double click on the icon shown
in
1.
Threat Evaluator
Figure
B.
1
Threat Evaluator Icon
MAIN MENU SYSTEM
After startup, the user
Evaluator as shown
available
The
in
is
Figure
taken to the main
2.
From
this
menu
screen of the Threat
screen the user has
many
options
horizontal dividing line in the center of the screen distinguishes
39
Figure 2 Main
Menu Screen
the training portion of the Threat Evaluator application from the tactical
portions.
The upper
half of the
ships and submarines
main menu screen contains the
menus which make up
aircraft, surface
the training portion of the
application or proceed to specific tactical operations such as Search and Identify,
TAO
Status
Board or Tactical Algorithms. Menus on the upper portion of the
screen are accessed by clicking on the area desired, such as Aircraft, and holding
the
mouse button down
(see Figure 3). This will then
40
show
a
popup menu where
Figure 3 Popup
Menus
selection of a particular country within a geographic region can be
popup menus
made. In the
for each of the aircraft, surface ships and submarines icons,
countries are divided into geographic regions. After the selection of a country,
the user
is
taken to another
menu where
selection of an agency, within the
country selected, that has control of the original type platforms selected
aircraft)
can be made. As shown
agency,
i.e.
"USN" under
in
Figure
the Aircraft
4, after the selection
main menu
of the particular
icon, the screen
display the departments, or squadrons, within the agency.
changes to
The user then has
access to the individual aircraft type within the department or squadron
designation.
41
(i.e.
Figure 4 Department/Agency Screen
C.
AIRCRAFT, SURFACE SHIPS
AND SUBMARINES CARDS
After a specific aircraft, surface ship or submarine
shown
the card with that specific platform.
shown
in
Figure
5.
42
is
chosen the user
An example
is
then
of an aircraft card
is
Figure 5 Aircraft Data Card
On
the card, features that will be of assistance to the user are divided into
These areas are
four warfare areas.
warfare
(ASUW),
anti-air
warfare
application, only four
that
were chosen
a surface to air missile that
is
selected from the
menu of a warfare
To
close the
area, a
window, simply
cursor.
43
a
prototype
Repetition of the
An example
also be used in a surface to surface
click
of this
is
mode. After
window appears
6) that contains specific data and characteristics that a
tactical evaluation.
is
purposely done to show the
is
system across warfare areas.
may
this
to demonstrate the concept.
appear under these menus
possibilities of using a certain
a system
anti-surface
anti-submarine warfare (ASW), and electronic warfare (EW).
There are many other warfare areas, however, since
equipment
(AAW),
TAO may
(Figure
require for
on the window with the
m^mMm^i^mmi
Figure 6 Information
D.
Window
SEARCH AND IDENTIFY FUNCTION
One of
the
most useful functions
Evaluator application
is
that is available to a
the Search and Identify cption.
TAO
in the
This option
Threat
is vital
for
the quick identification of possible threats associated with a particular emitter or
weapons systems.
Figure
The screen
for the Search
7.
44
and Identify screen
is
shown
in
Figure 7 Search and Identify Screen
The search
function
weapon system
that has
is
designed to accept as input the
been
identified.
With
this
name of
a radar or
information the search
algorithm will search each platform card for a match to the system entered by
the user.
Upon
weapon system
a match, the
will
names of platforms which have
be displayed
in a
window
for the
TAO
that emitter or
to view.
If the
TAO
desires further information on a particular platform that has been identified in
the
list,
he or she merely uses the mouse
and the information card of
to click
that platform will
on the desired platform's name
be displayed. The
TAO
can then
evaluate in detail the capabilities of the platform by selecting the appropriate
warfare area as described earlier
Card
in the Aircraft,
section.
45
Surface Ships and Submarines
E.
TAO STATUS BOARD
The
TAO
status
board
is
accessed through the main
exceptional tool available to the
perishable
own
TAO.
ships' information.
provides routinely needed data to the
watch turnovers. The
TAO
critical ships information.
TAO
has available
The
first
status
TAO
board
information. This card
is
status
shown
Figure 8
in
is
and provides continuity
an
these
watch
8.
two cards ensures
to
that the
data for fighting the ship.
tactical
Weapons
status
Status Board Screen
46
in
comprised of two cards that display
board displays
Figure
TAO
is
This portion of the Threat Evaluator
The combination of
TAO
screen and
ideal for easy access to all required
It is
at his fingertips all essential
card of the
menu
weapons systems'
and the condition
of readiness that the ship
is in
are displayed at the top of the screen.
these are accomplished by clicking the cursor on the desired button.
the screen
The
to
rest of
divided into three main segments.
is
The segment on
the specific
Changes
ASW
ASW
the left of the screen contains
weapons systems of
data and information on
Information such as the search
the ship.
mode
of the sonar, water conditions for the day and torpedo loading data are
input
by typing the information
in the
spaces provided or by clicking on the
appropriate buttons.
The segment on
the right of the screen contains information on the
The information such
systems aboard the ship.
status of the chaff
available or
by
the
clicking on the desired buttons.
the lower center of the screen
their locations in the
TAO a
number of rounds and
can be changed by typing the information into the spaces
The segment on
and
as
gun
shows the remaining missiles
magazine. This information
current missile magazine inventory update.
user to the second screen of the
9, will take the
TAO
is
required to provide the
The button shown
in
Figure
status board.
Figure 9 Combat Systems/Engineering Icon
The second screen of the
left
section on the screen
of the screen
is
is
TAO
status
board
is
divided into two sections. The
the combat systems status and the section on the right
the engineering status.
The
material condition of these two areas
can effect the combat readiness and therefore the survivability of a ship
combat.
If there is
any degradation
in the
47
equipment, then the
TAO
in
must be
aware of what
is
not working and what effect
readiness of the ship. Information such as this
is
its'
input
into the appropriately labelled spaces available or
buttons.
The Combat Systems and Engineering
failure has
on the combat
by typing the information
by clicking on the desired
shown
status screen is
in Figure
10.
Status
.Systems
Engineering
ft
6
Combat Systems
Engineering Systems
Casualties:
Casualties:
Planned
Planned
Maintenance:
Maintenance:
®
Capabilities Lost
Splint Plant
SSDG online:
due to Casualties:
Gas Turbine online:
OCSOT
Latt
®
DSOT
Completed^
J
L»st
O
Ongoing
Time Started: [
% Fuel onboard
% Feedwaten
Complete^
Ongoing
] Time
Started:
% Freshwater
[
% Lube Oil onboard:
Number and Types of sonarbouys available:
Average Speed Data
Number
Number
Number
Number
Type:
Type:
Type:
Type:
0001
0100
0200
0300
^^
<£
^
ft
*S
?
Figure 10 Combat Systems/Engineering Screen
F.
TACTICAL ALGORITHMS
main menu
Tactical Algorithms are accessed through the
module
that
would
greatly assist the
Tactical Algorithms
the probability of a
would provide
kill
TAO
in
weapons
the user with a
selection
screen.
This
is
a
and employment.
method of quickly
calculating
against a particular target with a selected ship's weapon.
This would then aid the
TAO
in
determining the
release point against the target.
48
optimum weapon mix and
G.
EASY ACCESS BUTTONS
Throughout the Threat Evaluator, the
These buttons provide access
buttons.
TAO
to certain
has access to a
INCSEA
stack,
Home
signals, Allied Tactical Publication signals,
stack access, Return, Print, and Return to
These features are described
1.
TAO
them
to
the screen
shown
Pass
Down
Find function, Help
Main Menu commands.
following sections.
Battle Orders
The Commanding
Access
in detail in the
of
modules and functions which
include Battle Orders, Rules of Engagement, Night Orders,
Log,
number
in
is
is
Officer's battle orders are contained in this section.
achieved by clicking on the icon shown
an icon
that will give a time
and date stamp
if
in
Battle Orders Icon
Figure 12 Time/Date Stamp Icon
49
Within
required. This icon
Figure 12.
Figure 11
Figure 11.
is
2.
Rules of Engagement (ROE)
The Rules of Engagement
is
are contained in this section.
achieved by clicking on the icon shown in Figure 13.
function
is
on
also avaiable
A time
Access
to
them
and date stamp
this screen.
ROE
Figure 13 Rules of Engagement Icon
Night Orders
3.
The Commanding
Access
to
them
is
Officer's night orders are contained in this section.
achieved by clicking on the icon shown
and date stamp function
is
also avaiable
on
in
Figure 14.
A time
this screen.
Figure 14 Night Orders Icon
4.
TAO
Pass
The
TAO
Down Log (PDL)
Pass
Down Log
is
contained in this section.
achieved by clicking on the icon shown
function
is
also avaiable
on
this screen.
50
in
Figure 15.
A
Access
to
it
is
time and date stamp
Figure 15
The INCSEA
would be displayed
desired.
The
signal
required information.
all
either in a
list
As
shown
in
Figure
These signals
or a specific signal could be decoded as
the
the screen. This
TAO,
resulting in the
would give the
TAO
decoded
quick access to
envisioned, signals could also be encoded using this
tool.
Figure 16
INCSEA
Incon
Allied Tactical Publication (ATP)
The ATP- 1(C)
signals will be accessed through the icon
Figure 17. The module would contain
all
the signals
displayed either
in a list
information.
As
the
TAO,
resulting in the
This would give the
TAO
in
as well
These signals would be
or a specific signal could be decoded as desired.
would be input by
displayed on the screen.
shown
from the ATP- 1(C)
as the information describing general maneuvers..
signal
Icon
the signals from the agreement.
would be input by
meaning being displayed on
6.
Down Log
signals will be accessed through the icon
The module would contain
system
Pass
INCSEA
5.
16.
TAO
The
decoded meaning being
quick access
to required
envisioned, signals could also be encoded using this system tool.
51
A completely
integrated, fully
implemented module would also provide the user
with a complete maneuvering board solution,
Figure 17
i.e.
ATP
course and speed to station.
Icon
Find
7.
The Find
18.
The
The
TAO
function will be accessed through the icon
TAO
application will query the
then inputs a name,
the user to that card.
i.e.
as to
shown
in Figure
what platform he wishes
Los Angeles, and the Find function
to view.
will take
^
Figure 18 Find Icon
8.
Help
The Help
stack will be accessed through the icon
shown
in Figure 19.
This contains useful information on operation of the Threat Evaluator.
If a
user
does not remember the function of an specific icon, then the help stack would
assist
him or her
in
determining
its'
use.
52
Figure 19 Help Stack Icon
9.
Home
Stack
The Home
stack will be accessed through the icon
This takes the user to the
home
shown
in
Figure 20.
card of the HyperCard environment.
B
Figure 20
10.
Icon
Return
The Return command
21.
Home Card
will
be accessed through the icon shown
in
Figure
in
Figure
This button returns the user to the previous screen.
5
Figure 21 The Return Icon
11.
Print
The
22.
Print
command
will
be accessed through the icon shown
This allows the user to print items
if
53
required.
Figure 22 The Print Icon
12.
Return to Main
The Return
shown
in Figure 23.
any location
in the
to
Menu
Button
Main Menu button
will
be accessed through the icon
This allows the user to return to the main
menu
screen fron
Threat Evaluator. This gives easy access to the main
a single click on the mouse.
Figure 23 The Return to Main
54
Menu Button
menu by
REFERENCES
LIST OF
OPNAV
3120.32B, Standard
Organization and Regulations of the U.S. Navy, 26 September 1986.
Chief of Naval Operations
1.
CDR. and
Instruction
ARGOS:
Design and Development
of Object-oriented, Event-driven, Multimedia Database Technology in
Support of the Paperless Ship, Masters Thesis, Naval Postgraduate School,
Monterey, CA., December 1988.
Duffy, Kevin LT.,
2.
Giannotti, G.
3.
Apple Computer,
4.
Whitten, J.L., Bentley, L.D., and Barlow, V.M., Systems Analysis
Methods, 2d
5.
Inc.,
HyperCard Users Guide,
ed., p.
1990.
&
Design
659, Irwin, 1989.
Powers, M.J., Cheney, P.H., and Crow, G., Structured Systems Development,
Analysis, Design, Implementation, 2d ed., p. 508, Boyd & Fraser, 1990.
6. International Institute for Strategic Studies,
The Military Balance 1989-1990,
Brassey's, 1989.
The Fundamentals of Aircraft Combat Surviveability Analysis and
Design, American Institute of Aeronautics and Astronautics, 1985.
7. Ball,
8.
R.E.,
Jane's All The
Worlds Aircraft 1990-91, 81st
ed., p.
449, Jane's Information
Group, 1990.
9. Jane's
Fighting Ships 1990-91,
10. Jane's
p.
Fighting Ships 1990-91,
724, Jane's Information Group, 1990.
p.
752, Jane's Information Group, 1990.
mail interview between Jeanne A. E. Devoto and the author
regarding scripts for search algorithm and clickline function, 13 February
11. Electronic
1990.
12.
Goodman, Danny, The Complete HyperCard 2.0 Handbook, 2d
Bantam Books, 1990.
55
ed., p. 143,
BIBLIOGRAPHY
Aker, S.Z., The Macintosh Bible, 3d ed, Goldstein
Awad, E.M., Management Information
&
Systems..
Blair, 1991.
Concepts, Structure,
and
Applications, pp. 297-299, Benjamin-'Cummings, 1988.
Goodman,
Paul,
Power
User's Hypertalk
Handbook, Windcrest, 1989.
Kroenke, D.M., and Dolan, K.A., Database Processing, Fundamentals, Design,
Implementation. 3d ed., Macmillan publishing company, 1988.
Waite, M., Prata, S., Jones, T., The Waite Groups Hypertalk Bible,
Books, 1989.
Winkler, Dan, and Kamins, Scot, Hypertalk 2.0: The
56
Hayden
Book Bantam Books,
1990.
.
INITIAL DISTRIBUTION LIST
No. Copies
1
Defense Technical Information Center
Cameron
2
Station
Alexandria, Virginia 22304-6145
2.
Library,
Code 52
2
Naval Postgraduate School
Monterey, California 93943-5002
3.
Department of the Navy
Naval Sea Systems Command
Attn: Mr. Phil Styles Code: CEL-TD1
Washington, DC 20362-5101
4.
Commander
1
OP
1
5.
Surface Warfare Development Group
Naval Amphibious Base Little Creek
Norfolk, Virginia 23521
73
Navy Department
Pentagon
Washington,
6.
Mr Bob
DC 20350
Shaffer
1
Navy Tactical Support
Washington Navy Yard
Director
Washington,
7.
Dean
B.
1
Activity
DC 20374
Frew Code: 05
1
Naval Postgraduate School
Monterey, California 93943
Wu Code: 52Wq
Naval Postgraduate School
Monterey, California 93943
8.
Prof. C. T.
9.
CDR B.
B. Giannotti Code:
Naval Postgraduate School
1
CSGg
Monterey, California 93943
57
2
10.
Mr. Corky Stradling
Naval Oceans Systems Center
3990 Old Town Avenue, Suite 107C
San Diego, California 921 10
11.
Lt Frank E. Sutton
2116 Commodore Court
Virginia Beach, Virginia 23452
58
Thesis
S86676
c.l
Thesis
S86676
c.
1
Sutton
HyperCard database
to
technology as applied
a Threat Evaluator
reference tool.
Sutton
"ypercar J database
technology as applied to
a Threat Evaluator
reference tool.