Download hypercarddatabas00sutt - Calhoun: The NPS
Transcript
•••-:-*" WM 1MBW &&ss ibwt.^u.i^w»' ' ; NAVAL POSTGRADUATE SCHOOL Monterey , California THESIS HYPERCARD DATABASE TECHNOLOGY AS APPLIED TO A THREAT EVALUATOR REFERENCE TOOL by Frank E. Sutton March 1991 Thesis Advisor: Co-Advisor: Approved B.B. Giannotti B. A. Frew for public release; distribution is unlimited. T254582 Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE REPORT SECURITY CLASSIFICATION la. RESTRICTIVE MARKINGS lb. Unclassified 2a SECURITY CLASSIFICATION AUTHORITY 2b. DCLASSIFICATION/DOWNGRADING SCHEDULE i PERFORMING ORGANIZATION REPORT NUMBER(S) . 3 NAME OF PERFORMING ORGANIZATION 6a. 6b. DISTRIBUTION/ AVAILABILITY OF REPORT Approved for public release; distribution . unlimited. MONITORING ORGANIZATION REPORT NUMBER(S) OFFICE SYMBOL NAME OF MONITORING ORGANIZATION 7a (If Applicable) Naval Postgraduate School is Naval Postgraduate School 37 ADDRESS 6c Ja. 1 1. 7b. Monterey, CA 93943-5000 NAME OF FUNDING/SPONSORING ORGANIZATION ADDRESS 8c. and ZIP code) (city, state, TITLE (city, state, ADDRESS (city, state, Monterey, 6b. and ZIP code) CA 93943-5000 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER OFFICE SYMBOL (If Applicable) and ZIP code) 10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO (Include Security Classification) HYPERCARD DATABASE TECHNOLOGY AS APPLIED TO A THREAT EVALUATOR REFERENCE TOOL 12. 13a. 16. 17. PERSONAL AUTHOR(S) Sutton, Frank E. TYPE OF REPORT 13b. Master's Thesis FROM SUPPLEMENTARY NOTATION The views expressed in this thesis Defense or the U.S. Government. COSAT1 CODES GROUP FIELD 1 9 ABSTRACT ( Continue . TIME COVERED DATE OF REPORT March 1991 (year, month.day) 15. PAGE COUNT 65 are those of the author and do not reflect the official policy or position of the 1 8. SUBGROUP on reverse 14. TC if necessary SUBJECT TERMS (continue on reverse if necessary and identify Department of by block number) HyperCard, Hypertext, Tactical Action Officer, Paperless Ship and The paperless ship concept proposed by identify by block number) VADM Metcalf has been advocated at the highest levels in the Navy. ARGOS is a prototype multi-media database system under development at the Naval Postgraduate School in support of this superior concept. This thesis has implemented a tactical evaluation and assistance tool called Threat Evaluator that can be used as an additional module to the ARGOS that a Tactical Action Officer attainable in a system 20. is required to perform during normal watchstanding evolutions. DISTRIBUTION/AVAILABILITY OF ABSTRACT 2 D SAME AS RPT 1 . NAME OF RESPONSIBLE INDIVIDUAL 1473, 84 It demonstrates the advanced capabilities MAR 22b. 83 APR edition ABSTRACT SECURITY CLASSIFICATION Unclassified DT1C USERS B. B.Giannotti DD FORM of the evaluation and information keeping duties implemented with economical, off-the-shelf technology. UNCLASSIFIED/UNLIMITED 22a. many system or as a stand alone application. Threat Evaluator automates may be used TELEPHONE (Include (408) 646-3390 until exhausted All other editions are obsolete Area Code) 22c. OFFICE SYMBOL CSGg SECURITY CLASSIFICATION OF THIS PAGE Unclassified Approved for public release; distribution is unlimited. HyperCard Database Technology As Applied To A Threat Evaluator Reference Tool by Frank Erwin Sutton Lieutenant, United' States Navy B.S., United States Naval Submitted in partial fulfillment Academy, 1984 of the requirements for the degree of MASTER OF SCIENCE IN INFORMATION SYSTEMS from the NAVAL POSTGRADUATE SCHOOL March 1991 David R. Whipple, Chairman, Department Sciences n of Administrative ABSTRACT The at the paperless ship concept proposed by highest levels in the Navy. system under development at the ARGOS VADM Metcalf has been advocated is a prototype multi-media database Naval Postgraduate School in support of this superior concept. This thesis has implemented a tactical evaluation and assistance tool called Threat Evaluator that can be used as an additional module to the ARGOS system or as a stand alone application. many of the evaluation and information keeping duties that a Tactical Action Officer is Threat Evaluator automates required to perform during normal watchstanding evolutions. demonstrates the advanced capabilities attainable economical, off-the-shelf technology. in in a It system implemented with /AJk TABLE OF CONTENTS I. INTRODUCTION 1 II. PROBLEM STATEMENT 3 III. SOLUTION 7 IV. A. HARDWARE SOLUTION 7 B. SOFTWARE SOLUTION 9 1 Development Environment 2. Application Solution 9 11 IMPLEMENTATION A. OVERVIEW B. STARTUP SCREEN AND MAIN MENU CARDS C. INFORMATION CARDS D. SEARCH AND INDENTIFY FUNCTION E. TAO STATUS BOARD F. TACTICAL ALGORITHMS G. INTER-STACK BACKGROUND BUTTONS 13 13 14 15 17 18 20 20 V. LESSONS LEARNED 22 VI. CONCLUSIONS 24 APPENDIX A SCRIPTS FOR THREAT EVALUATOR 26 APPENDIX B THREAT EVALUATOR USER'S MANUAL 38 LIST OF REFERENCES 55 BIBLIOGRAPHY 56 INITIAL DISTRIBUTION LIST 57 IV ACKNOWLEDGEMENTS I would the future. first like to Most thank Cdr B.B. Giannotti for his guidance and vision of importantly, I would like to thank my wife, Theresa, and children Christopher and Sarah. Their patience and support compare. was beyond I. In the United States INTRODUCTION Navy there are several watch stations that require a substantial investment in both time and energy to not only develop the skills and knowledge base, but also One Officer (CO). Officer (TAO). weapons in the is the The TAO is trust of the Commanding Action that of Tactical has the authority to engage the enemy and release absence of the CO. The Navy organization manual [Ref.l] states TAO: Basic Function. commanding employment and b. and of the most critical positions the following duties of the a. to earn the confidence When assigned, the Tactical Action Officer officer's representative concerning the tactical the defense of the unit. Duties, Responsibilities, and Authority. The TAO is responsible for the safe and effective operation of the combat systems and for any other duties prescribed by the commanding officer. Circumstances permitting, the promptly and precisely special orders and the commanding Currently, that much TAO shall carry out shall report deviations to officer. of the data required by a TAO is contained in publications must be manually assimilated. This can take an inordinate amount of time find critical information. Manual data retrieval to methods typically increase the probability of selecting incorrect data which, in turn, results in an erroneous evaluation. Other information required by a sheets and written on status boards. current or may be Many forgotten altogether. TAO is contained on turnover times this information is not kept This can result in critical and/or perishable information being lost during the normal watch to watch turnover. These problems can be solved with development of an application greatly assist TAO TAO's in their duties must accomplish in his or her the searching of data to current status of that would by automating the myriad functions that a normal watch These would include duties. match an emitter with a platform or having available the all ships' weapons and engineering systems. This application, Threat Evaluator, would be developed in accordance with the Argos architecture [Ref. 2]. This architecture specifies a multi-media interface that provides access to a real time database. and audio to achieve the The environment whose in Apple's be quite efficient which Threat Evaluator was developed is Hypertalk™. Information on HyperCard User's Guide [Ref in the 3]. this is is HyperCard™, environment can production of the prototype application. that Threat Evaluator Microsoft disk operating system implementation throughout the The purpose of graphics This environment proved Evaluator and HyperCard operate on Apple Macintosh™ important point text, most desirable interface possible. scripting language be found to in This application interface would support (MSDOS) 1 An computers. can be converted for use on any platforms which would facilitate its fleet. this thesis is to demonstrate the feasibility of a tactical evaluation tool that will aide in the identification of platforms that possible threat to U.S. forces. The Threat The tool will also give the ship's information so that tactical decisions can be TAO may pose relevant made knowing all a own required information. •HyperCard™ and Hypertalk™ Incorporated. are trademarks of Apple Computer PROBLEM STATEMENT II. One of the most important qualifications and subsequent duties of a Surface Warfare Officer is that of TAO. officer can achieve resulting It from is training, acquired also quite an identifiable achievement a officer is the pinnacle qualification that a junior knowledge and CO can bestow; capable of fighting the ship It is . proclaiming that a junior CO The in battle. trust that conducts the qualifying process puts great trust in each of the officers that he or she qualifies. Stringent qualification requirements and thorough knowledge of own ship and other potentially hostile ship's characteristics and capabilities are essential to proficiency and success as a Although the TAO TAO. position is quite important and essential, after the qualification process has been completed there conducted to maintain usually left to proficient is each this TAO is little Continued training high degree of readiness. with little rote memorization. or no guidance. This process may continuous training is Normal means of keeping be helpful in the short term, but must be continually refreshed in order to keep the knowledge base readily available and current in memory. It is memorized and hostile, or potentially hostile, ships notice. The will to train be memorized. is often difficult for the hampered by The unappealing volumes TAO to keep current easily accessible at a the sheer mass of data that contain the data learned to use. Methods that will give the data moments that must must also be more appeal and even an means of learning required knowledge would pique all exciting interest while being functional and informative. Another problem encountered in the normal watch duties of the time consuming evaluation of each emitter signal detected. TAO is The usual flow the of information starts with the detection of an emitter by the Electronic Warfare (EW) suite aboard After the initial detection, search algorithms on the detection equipment attempt to make a match with the signal detected. This search usually may takes longer than desired and algorithm process. itself may The search matches not be optimal resulting in a slow search and retrieval is reference volumes. also conducted manually This is done consuming and prone number of erroneous The whole process whom work for the is of primary concern. available for correlation of essential environment. tactical information that the TAO, for threat evaluation By TAO its Of note, there is initial identification very nature, must have this (NWP), overall are used to information while in a limits the flow of critical to support the decision making process. hard copy in affects the defensive posture of a single ship as well as the combat readiness on an The and no quick reference Loss of time conducting manual searches for information contained volumes adversely time Navy Combat Information Center (CIC) recognition training are limited. Naval Warfare Publications search for data that is to errors. of all EW personnel using printed order to reduce the in Current tools available to U.S. watchstanders, by from software searches alone. that result The search result in an incorrect evaluation. entire battlegroup. effective transfer of information during watch continuity. Word of mouth, watch turnover status boards, notes scribbled is crucial to on paper and even seemingly organized notebooks have been the historical means of transferring current tactical as well as material status. effective in an isolated left number of cases, for the Although most part this If are used for turnover information, the notebooks or status boards in a timely matter, or may even be prove essential information is out or altered slightly by the typical watch to watch turnover. updated may totally neglected. notebooks may not be Additional clutter the result of paper turnovers and is leaves the it oncoming watchstander the remaining pile for useful bits of information. data on electronic media is the most sorting Visual means of exchanging efficient choice available. Off the shelf technology can provide significantly more efficient data retrieval and a graphical interface that will aid this entire process. A review of current procedures and number of items • that should first hand experience have revealed be improved for greater efficiency. These Resources are currently manual information retrieval. a are: in nature, often leading to slow, inefficient Unwieldy publications and microfiche are the primary mechanisms for data storage and the only vehicle for training watchstanders. • After qualification, typically have no formal training means of maintaining/improving evaluation as a • TAO's in threat proficiency. Reference and training tools are not centralized, often requiring users to visit various locations to collate/coordinate the tools and information and to have access to the proper equipment. • The lack of user friendly aids to threat evaluation is often frustrating to many TAO's. Automation of many of the manual functions, such as searching databases and recording critical watch information to relieving watchstanders, would greatly improve the efficiency of the evaluation process. that would be of primary concern application. These in There are, however, factors determining the implementation of such an factors are reliability of the hardware system and the ease of use of the application. The more reliability of the system includes many reliable than systems currently in use. items. Preferably, it should be Methods of protecting data and applications from viruses as well as disk, system and application crashes should A be carefully considered. disks, tapes, optical disks, available variety of media Floppy exists for data backup. hard disks and removable hard disks are all readily and accessible. Data updates are of primary concern accurate, time sensitive information to the user. is critical. The importance of having Efficient and easy methods of updating existing information would be important in saving time and effort as well as money. information is Determining the best possible method of delivering updated also a crucial problem. The emphasis on ease of use cannot be over stressed. The goal application intuitive, thereby allowing novice users easy access to If the application requires and its to make the capabilities. enormous manuals and cryptic documentation be read filtered prior to use, then ultimately the product will not be used. Determining which environment will best undertaking. is suit this requirement is an important SOLUTION III. The recommended solution and the focus of this thesis research automation of numerous manual tasks that are conducted by the watchstanders. TAO is the and other Automation of procedures would simplify and streamline the warfighting capability of any warship. The speed at which many of the procedures can be accomplished through automation will significantly increase productivity of a TAO and his/her watch team. This solution is composed of both hardware and software. Both are crucial to ensure successful operation and integration of a total system into the fleet. A. HARDWARE SOLUTION Hardware space of is is vitally scarce. fleet units. important in an enclosed shipboard environment because The smaller A a system micro computer is computers has dropped dramatically affordable. is, the better will support limited space an excellent choice. in recent years Micro computers with speeds purchased for under $3000. it The cost of micro and they have become quite in the 16MHZ-25MHZ Most micro computers contain a can be number of additional features such as sound, expansion slots and network capabilities which ensure a system could be expanded to meet future requirements. The ability of the micro computer to support sound For example, sound can be a Sound critical feature in the is an important evaluation of factor. EW parameters. capability could assist the users in identifying various platforms matching emitter parameters contained on those platforms. by Other implementations of sound, such as acoustic signatures, could be used to further enhance the solution. Speakers and associated sound supporting equipment come included should in the additional equipment in order to first, is micro computer rather than having add to buy an This will provide two benefits: this feature. the elimination of requirements to have the expertise and tools available to install sound equipment; second, the cost of buying required sound equipment would be avoided. The micro computer slightly more expensive that includes itself are added is may be the cost of the sound equipment, and the sound to the price of the previously installed, the result capabilities when in the initial purchase, but installation tools, the installation of the equipment sound micro computer that did not have it an overall lower cost for the one having the capability built into the micro computer. The ability of a micro computer to be expandable selection of a micro computer. is also crucial in the Many micro computers have expansion Expansion capabilities available through expansion slots. slots provide the means of installing additional cards that add useful features. These capabilities include 24 bit color, file requirements compression and networking. considered be when is It selecting important that future micro a computer for implementation. The ability of a essential part of micro computer to support any computer solution. The between multiple user computers, as well significant attribute. A networking is fast ability to share data becoming an and resources as different types of computers, multi-user environment is is a necessary for complete implementation of a solution. Users typically use only a portion of data from the solution application. application may be the Examples of multiple users CO, Executive on-watch personnel such as those Officer, in the networking capability must be available 8 would use a solution Department Heads, TAO's, and CIC, in the that EW and ASW modules. micro computer selected. A An is important part of a hardware solution, a monitor. A monitor is addition to the micro computer, in essential for displaying data that the micro computer and solution application. Over the last is generated from few years, monitors have become quite inexpensive. High resolution color monitors can be purchased for approximately $500. The resolution of the monitor graphics that will be displayed in the application important because the is must be clear. A thirteen inch monitor having a 640 by 480 pixel display with 72 dots per inch (dpi) resolution should be sufficiently high B. in resolution to show the required graphics. SOFTWARE SOLUTION When considering a specific software environment to be used in the generation of a solution application, there are a number of criteria that should be evaluated in order to choose the most desirable option. These criteria can best be described as features that the environment will support. development environment include prototyping capabilities. These features for a reusable code, modularity and rapid Features of the solution application include: a multimedia interface, rapid search, display of windows, graphics, sound, tailored menu capabilities 1. and machine independence. Development Environment The software development environment chosen should support two main is features. The first is modular design and the second by no means an exhaustive list is reusable code. This of requirements, but these two are certainly essential to the solution of this specific problem. The development environment must support This design will make a modular program design. the expansion of the solution application 9 much easier to implement. Whitten, Bentley, and Barlow [Ref 4] say the following about dividing a program into modules: Given these programs, we want to break them into manageable modules around which program specifications Programmers can then build and Then modules can be test will be written. each module independently. integrated according to the structure chart and tested as a whole program. This approach to program design would enhance the solution application since the program data would lend the required data would contain itself to would be divided the information For example, some of a modular design. into countries. Each of the country modules on the equipment and platforms owned by that country. Reusable code has become a buzzword community. Reusable code promotes efficiency applications or Reusable code new modules still that will be some requires software development in the in the development of new add-ons to existing applications. modification, however the savings that such code generates makes the cost of such changes insignificant when taken aggregate. Powers, Cheney, and Crow [Ref 5] state the following: Systems designers have long been interested reusable code. The idea can be used many programs, in programming and is to write general testing in the concept of purpose modules that thereby reducing the overall effort during simplifying the on-going maintenance effort. development and The large majority of program code involves routine processes such as data entry and verification, file maintenance, and report writing. It should be possible to create a standard set of modules supporting these operations that could constitute 70 to 80 percent or code for a new system. 10 more of the in These two and reusable code, contribute factors, modularity to a rapid prototyping environment that would support quick delivery of a product to the Prototyping fleet. is an excellent way solutions before the final product 2. is to determine additional requirements and distributed to end users. Application Solution This solution application includes a multimedia interface for real time databases that supports text, TAO required to provide the needed data that a his/her duties. These This capability would be graphics and audio. would use in the course of capabilities are also essential in displaying that data in a timely, easy to assimilate manner. This application must have a rapid search capability. perspective this feature search could mean is From a users' quite important. In a tactical environment, a rapid the difference between the success or failure of a mission. Vast amounts of data must be searched increasing the need for a search to be fast and accurate. The manner in which information is displayed very important. is user should be able to easily distinguish different parts or categories information from one another. An ideal way to do The of this is to display the information in windows that appear as specific queries are selected by the user. The solution application human factors point of view, This provides a quick means of assimilating data. should support this method of data From display. a this is a better interface. Graphics are an essential part of used to also to this solution application. enhance recognition of platforms for training and make the interface user friendly. cannot be underestimated. The easier 11 tactical situations The power of a user it is to They are and friendly interface understand and use the application, the greater value it that a user with only in the end users as a tool for accomplishing their Graphical user interfaces provide clear, concise object relationships missions. objects will provide modest experience can easily on the screen guide associate. Pictures of familiar a user to operate the application. A user sees an icon shape of a missile, he or she should expect information about missiles to come from using The that icon. desirability of the application. interface Sound is intuitive which adds to the Considerable thought and study must be incorporated in the design of an interface. achieving this desired is Graphical capability is a means to result. another method of providing information to the user. example, sound could be used to distinguish For one level of a program from another or to provide an audible alarm that will alert the user if needed. There are many other options that could also employ sound to assist the user. In order for an application to be adapted to a specific use, program should be tailored to support menus of the needed functions and information. Tailored menus allow the user to quickly identify his or her options for retrieving desired data. Menus support the proper setup and flow of information to the user. is It crucial that the application be transportable to other hardware. machine independent and This would then allow the application to be available on most hardware in use in the fleet. True machine independence provides an application with an enormous platform base upon which to operate. Access by all fleet users increases the ability to develop and capitalize on large user groups. 12 IV. A. IMPLEMENTATION OVERVIEW The Threat Evaluator was developed Macintosh II HyperCard comes free as system software with computer. Macintosh computers. The assumption In Threat Evaluator, with HyperCard. HyperCard environment on a in a in this all chapter is that readers are familiar algorithms and modules have been thoroughly considered throughout the development process. can be implemented as an additional module made up of five to the modules and is modelled the U.S. Argos System or as a stand Submarine data file FFG-7 after a Threat Evaluator module, the U.S. Aircraft data file, file, class ship platforms. design of the Argos system. date that gives a platforms that TAO may the is file. The for future expansion of this For example, Germany would have its' is the U.S. Surface Ship data application because every country that has military equipment information on There and the Threat Evaluator Help data modular design was considered the best option in a data file. Threat Evaluator For the purpose of the prototype, the Threat Evaluator alone application. all its own would be modelled data file containing This modular approach also conforms to the The Threat Evaluator is the most tailored tool to continuous personal training as well as evaluation of pose a possible threat to the safety of the ship. HyperCard has met all the criteria for the software environment solution. supports both modularity and reuseable code. Reuseable code features of HyperCard support a high percentage of the code needed for development of the modules. 13 It all B. STARTUP SCREEN AND MAIN MENU CARDS The startup screen displays high resolution graphics soundt to show the many and plays digitized HyperCard and a Macintosh as soon as capabilities of A picture of a U.S Aegis cruiser was placed over a background that has possible. a marble like appearance. This was done to give the user the feeling of The sound a warship in a background of space giving a futuristic appearance. was used to welcome digitized sound. the user to the Threat Evaluator as well as demonstrate The command to play the sound is contained in the card Farallon™ 2 These sounds were then placed . main Threat Evaluator stack These resources could then be called and played as required. as resources. main menu screen. This visual startup screen dissolves into the was included HyperCard. into the to demonstrate one of the The dividing line in the center many of the screen, above the separation modeled were line, of the main menu to give aircraft button has an icon in the name or she clicks on that button. command (XCMD) popup menus that generates a shape of a jet. Each of the buttons is training portion The is being selected calls an external in the and submarines buttons are copyrighted by Farallon Computing Incorporated. 14 three This was done popup menu. The countries contained for each of the aircraft, surface ships MacRecorder® used to displayed to the button. an additional visual confirmation to the user of what when he 2 The is and submarines. Each of these card buttons has an associated icon that correlates the For example, the screen has three card layer buttons. aircraft, surface ships, effect screen change features of distinguish training areas from actual tactical applications. areas script. MacRecorder® by Digitized sounds for the stacks were installed using the The viewing categorized in accordance with the International Institute for Strategic Studies' (DSS) yearly publication This publication provides a well organized [Ref. 6]. The country and department modeled on categorization of various countries. aircraft and surface ships card buttons (USN). The United States is for the aircraft, surface ships, and submarine A. The manner menus are contained in in which to categorize the data within the specific country or department chosen the various agencies on the second menu second level to a from in the aircraft, surface ships that first screen. menu For example, menu after selection of menu is screen. The broken down into These agencies have control of the equipment (aircraft, surface ships, submarines) selected first Appendix Threat Evaluator. popup menus contained and submarine card buttons take the user the scripts categories provided by the IISS were determined to be a reasonable Selection of items on the screen. and the U.S. Navy the United States modeled on the submarines card button. The is the "USN" under from the first menu the aircraft card button on screen, the screen changes to display the types of squadrons associated naval aircraft. The user then has access within each squadron designation. accordance with Ball [Ref 7]. to the individual aircraft type These squadron designations are Representative scripts for the second card buttons are contained in Appendix A. menu in screen The second menu screen has a horizontal dividing line to differentiate fixed wing aircraft from helicopters. This provides another visual confirmation classes are not C. all inclusive but Squadrons and ship to represent different communities. INFORMATION CARDS After a specific main menu screen On were chosen to the user. aircraft, surface ship or the user is then shown submarine is chosen from the second the card with that specific platform. the card there are features that will be of assistance to the user in 15 categorizing the possible threat to his own Capabilities of the platforms are ship. The warfare divided into the four warfare areas modeled. anti-air warfare (ASW), and (AAW), electronic warfare to time constraints. were placed anti -surface (EW). Not The actual buttons menu would have platforms since the script that appears is new For example, a surface to various weapons. air missile would is Repetition of purposely done to show the more than one mode or warfare in may in remembering the capabilities of Appendix Scripts for the warfare area buttons are contained in A. Equipment and systems menus listed in the Oliver Hazard Perry class frigate [Ref 9], area. also be used in a surface to surface TAO assist the These cards and easily modified for other under these warfare menus system all card layer in the copied along with the card button. possibilities of using a certain repetition were placed be tailored for each platform. to card buttons can be copied and used in mode. This warfare areas were modeled due background because these labels would be used on platforms within the stack. equipment all anti-submarine warfare Labels for the card button associated with the warfare areas into the because the popup (ASUW), warfare areas chosen were for the F/A-18 Hornet [Ref 8], the and the Los Angeles class submarine [Ref 10] were taken from Jane's Fighting Ships and Jane's All The World's Aircraft. After a weapon or electronic system area, a may window appears is menu of a warfare containing specific data and characteristics that a require for proper tactical evaluation. being displayed upon the selection of a determined to be ideal selected from the in separating The windows menu item. system data TAO are actually card fields The use of card fields in a logical systematic and providing a visual consolidation of information for the user. was manner Card fields containing data have been locked to prevent inadvertent alteration of the data. This gives an added measure of security as well as ensuring that data remains 16 intact. There are many card given a specific name and is name is placed in the script of the applicable the field is displayed, that Once warfare area button. on each card. Each fields containing information can be hidden again by it clicking the cursor within the field. This format of displaying data will be useful in training prospective training prospective The method of TAO's. TAO's data display also useful for is since on-line quizzing can be accomplished within each warfare area. D. SEARCH AND IDENTIFY FUNCTION One of the most crucial and useful functions available to the Threat Evaluator application located on the main menu the Search and Identify option. is screen for easy access by the user and TAO in the This option is vital is for quick identification of an incoming threat associated with a particular emitter or weapon system. The search and which is identify screen contains three card fields, The name of the hidden card hidden. [Ref 11] for the visible fields are found in Appendix A. The compared the search string that will be field is "stacks to search". first field the hidden field. added is name Upon a match of the search of the card and the name of the returned and displayed in the second visible The second field displays the on which the platform is name of the located. number of matches displayed is string is of the listed in stack in and the name of a data which a match was found field. platform and the These are separated by a unlimited. If a TAO name and of the stack comma and to click the information card for that platform 17 name the desires further information on a particular platform, he or she merely uses the mouse platform's receives Additional stacks that are created would merely need to be to this field. field, the Scripts to all the data card fields information stacks. The search algorithm will search each stack that one of is on the desired displayed instantly by pushing the search card. This is done so The card card and evaluate further matches. search is that the user can return to the search field displaying the results of the This routine was considered an locked to permit the routine to work. The essential function of the search card. TAO had to have the capability to quickly evaluate the results of the search without having to navigate back through menus. This routine allows the TAO to evaluate in detail the capabilities of each of the platforms found by the search. E. TAO STATUS BOARD The TAO board was created to give a status information that was needed a place critical for the to record The watch sections. board status required ships' information. The TAO TAO has available all that is He would be pertinent record to or she also for following an ideal tool for easy access to status that display critical ships information. assures that the a place proper conduct of the watch. any information TAO TAO board is comprised of two cards The combination of these two cards data essential to fighting the ship. cards were determined appropriate to hold all the information that many The cards. be easy to assimilate first first at a glance. information. card of the Weapons of the screen. The TAO status The second card was constructed status board displays tactical to was important because a status ordered. The screen is weapons systems' TAO in screen contains AS W at the top must first be essentially divided into three order to logically collate data. The segment on the main segments hold more combat systems. and condition of readiness are displayed position of this aware of the weapons TAO card was chosen to hold general data that would detailed data regarding the casualties of various engineering and The Two would be of importance while not requiring an excessive amount of searching by the through all left of the related information including associated weapon's systems. 18 Information such as the mode of the sonar, water conditions for the day and torpedo loading data are essential for ASW operations. Radio buttons (which are small round buttons) and text fields were used to accept and display information. The torpedo tube graphic serves to give the user a visual reference of which The segment on tubes are currently loaded. the right of the screen contains information on the installed gun systems. This information would be required in any AAW or ASUW engagement. Information also displayed through the use is of text fields and buttons. The segment on the lower center of the screen shows the remaining missiles and their respective locations in the magazine. display gives the TAO locations after a firing. a visual perspective as to the remaining missiles Each of the cells contain four buttons, the three types of rounds (SM-1, blue bird, harpoon) plus an that would be generated once a missile from that cell was and their each symbolizing empty fired. chosen were representative of the actual rounds and an empty This cell cell symbol The symbols was given an "x" symbol. The second screen of the The left screen side of the screen is is TAO status board the the engineering status. is combat systems divided into two main sections. status This information is and the right side of the very important to the TAO because the material condition of either of these two areas directly affects the combat readiness and the survivability of a ship in combat. degradation in the equipment, then the TAO working and what on the combat readiness of the Card text fields effect its' failure has were considered necessary must be aware of what to 19 is not ship. hold information on what equipment has a casualty, what effect the casualty has overall and what, scheduled maintenance. any If there is if any, F. TACTICAL ALGORITHMS A This module has not been developed. future possibilities. Ideally, would it kill The TAO indicating (Pk) against a particular target with a This would then give the release point against that target and the engagement. was placed here should be capable of using tactical algorithms that calculate the probability of selected ship's weapon. stub TAO the number of weapons would then have a solid optimum weapon any given to use in recommendation on which to base his final decision. INTER-STACK BACKGROUND BUTTONS G. There are a number of references which a with. These written orders should be TAO must read and be familiar easily accessible to the TAO each of the modules of Threat Evaluator, the TAO. Throughout has access to a number of background buttons. The background buttons of note are Battle Orders, Rules of Engagement (ROE), Night Orders, Pass Down Log (PDL), INCSEA signals and Allied Tactical Publication (ATP) signals. Battle orders, same format. A ROE, night orders and scrolling field was chosen expand as the amount of data grows. characters [Ref 12]. A required by the user. The user could identify any module. The cards were constructed in the to hold the data. field will hold a This field can total of 30,000 button prints the time and date into the field time/date stamp new was considered necessary so entries since the last time he/she read the The INCSEA background button this PDL when that the file. displays a card that defines the future use of The module would contain all the signals from the agreement. These signals would be displayed either in a list INCSEA or a specific signal could be encoded/decoded as required. The signal would be input by the 20 TAO, resulting in the encoded/decoded signal displayed on the screen. this module is a follow-on to this thesis. The ATP- 1(C) background button future use of this module. ATP- 1(C) volume I and II. displays a card that defines the planned This module will contain by the TAO, resulting is all the signals from the These signals would be displayed specific signal could be encoded/decoded as required. This module Construction of in the The either in a signal list or a would be input encoded/decoded signal displayed on the screen. also a follow-on effort to this thesis. 21 LESSONS LEARNED V. There are several lessons learned from the development of the Threat Evaluator application Programming and tool. interface standardization is especially crucial with future modules that supplement the Threat Evaluator application since standardization data files. it is would an iterative and continuous development process. developers in the construction of assist the This new modules or Important lessons learned include the use of sound and graphics to achieve unique methods of data representation. These lessons will provide valuable information for future module development. The graphics first was determined determination Graphical was lesson learned to in the use of graphics. The careful utilization of be a benefit and not a distraction came from demonstrating representation to the user. the application to interested individuals. of familiar objects creates a more acceptable environment to new users of the application. Objects that appear in the users' normal work routine and duties are taken and represented graphically application. in the Implementing This this in the graphic representation into the application results user bringing previous knowledge to the application. application an intuitive interface. This intuitiveness is This gives the highly sought after in an application such as Threat Evaluator. The second lesson involved unique benefits of using sound as another of transmitting information to the user. Sound provided of data. Digitized sound was used to repeat what main was choosing. This supplied actions. The means the user with a variety menu function he or she the user with an audio confirmation of his or her Computer generated sound was used differentiation of digitized after the first main menu screen. sound and computer generated sound gives the 22 user the positive reinforcement that he or she in a different part of the The demonstration of both types of sound lends application. sound capabilities and The is their further was third lesson learned in constructing the single stack. expansion into other areas of the proper Threat Evaluator. However, this most convenient and cost Initially, A modular this application. method of program and data design Threat Evaluator began as a became cumbersome and changes often difficult to incorporate. credibility of the to the stack concept of data was determined as the effective method. For future additions to the Threat Evaluator, modularization would facilitate the replacement of old data new ones. were files This modular concept allows a specific program area or data with file to be worked and updated as necessary, then easily reintroduced into the main application. fleet as This method will reduce the code necessary for implementation in opposed The to a system that was not of a modular composition. fourth lesson learned application's operation. was to include proper Appendix B contains a user's documentation for the manual that describes the operation of Threat Evaluator. This documentation assists the user in the proper operation of the functions and features of Threat Evaluator. 23 VI. CONCLUSIONS The development of the Threat Evaluator automated reference and evaluation tool. shown tool has the feasibility of an The modular design of the application as well as the quick prototyping aspects of the Hypertalk language show that the HyperCard environment can be both economical and technically sound for future development of projects of this sort. Many provisions greatly needed by have been incorporated into the Threat Evaluator. TAO's These features can be fine tuned and tailored as further iterations of the application are developed. The storage media most likely to be of greatest benefit for the Threat Evaluator would be is compact disk read only memory optical storage number of reasons. CD ROM best for a 550 megabytes of is data. First, the This large volume is (CD ROM). disks will hold about necessary to hold all of the data that required for a fully implemented Threat Evaluator application and data Once Threat Evaluator has been completely implemented, every country military equipment would be represented by on Today that equipment. ROM. required. CD ROMs CD ROMs on the Fleet personnel CD ROM. day use. This that has amount of data is CD Cognizant agencies easy. to fleet units as updates to the data files are CD ROM Third, distribution disks would not be able This ensures that Finally, optical disks are quite sturdy to would be files. that contained information Users would then be able to return the old destruction or sanitization of data. memory. module the only true alternative for this Second, distribution of would merely send new a This all for proper would be read only to alter the information contained units will have the same data files. and are not easily damaged by normal day will provide protection of the data as facility. 24 it is in transit to the user Future areas of study directly relating to the Threat Evaluator application include: • Development of a module that incorporates probability of kill algorithms to generate a recommendation to the • Development of a module TAO. that incorporates the signals and data in volumes one and two of ATP 1(C). • Development of a module • Determination of which storage media include CD ROM, that incorporates the is INCSEA signals. truly best for this application to tape drives and removable hard disks. The development of the Threat Evaluator supports the and the concept of a paperless provides the ship. It for analysis of tactical operations. It clear and concise information transfer Argos environment TAO with an exceptional tool also provides the user with a between watch 25 sections. method of APPENDIX A SCRIPTS FOR THREAT EVALUATOR A. CODE FOR THE MAIN MENU SCREEN POPUP MENUS. 1. Aircraft button on mouseDown play aircraft put "United States,USN,USAF,USA,USMC,USCG,NOAA" into aircraft put return & "Soviet Union" after aircraft put return & "NATO,Bdgium,Canada,Denmark,France,Germany,Greece," &"Iceland,Italy,Luxembourg,Netherlands,Norway,Portugal,Spain,Turkey,' &"United Kingdom" put return & &"Romania" put return & after aircraft "Warsaw Pact,Bulgaria,Czechoslovakia,Hungary,Poland,"-. after aircraft "Mideast & North Africa,Algeria,Bahrain,Djibouti,Egypt,"-. &"Iran,Iraq,Israel,Jordan,Kuwait,Lebanon,Libya,Mauritania,Morroco,"-. &"Oman, Qatar, Saudi Arabia,Somali Republic,Sudan,Syria,Tunisia,"-. &"United Arab Emirates,North Yemen,South Yemen" put return & after aircraft "Sub-Saharan Africa,Angola,Benin,Botswana,Burkina Faso,"- 26 &"Burundi,Cameroon,Cape Verde, Central African Republic,Chad,Congo,"-. &"Ivory Coast,Equatorial Guinea,Ethiopia,Gabon,Ghana,Guinea,"-. &"Guinea-Bissau,Kenya,Liberia,Madagascar,Mali,Mozambique,Nigeria,"-. &"Senegal,Seychelles,Sierra Leone,South Africa,Tanzania,Togo,Uganda,"-. &"Zaire,Zambia,Zimbabwe" put return & "Asia & after aircraft Australasia,Afghanistan,Australia,Bangladesh,"-. &"Bnmei,Burma,Cambodia,China,India,mdonesia,Japan,North Korea,"-. &"South Korea,Laos,Malaysia,Mongolia,Nepal,Pakistan,Papua New Guinea,' &"Phillipines,Singapore,Sri Lanka,Taiwan,Thailand,Vietnam,New Zealand"after aircraft put return & "Carribean & Latin America,Argentina,The Bahamas,Belize,"- &"Bolivia,Brazil,Chile,Colombia,Costa Rica,Cuba,Dominican Republic,"-. &"Ecuador,El Salvador,Guatemala,Guyana,Haiti,Honduras,Jamaica,Mexico," &"Nicaragua,Panama,Paraguay,Peru,Suriname,Uraguay, Venezuela"-, after aircraft get HPopupMenu(aircraft,0,The if it <> then of it into row put item 2 of it into column put item if 1 (row =1) and (column =2) then go end end mouseV,The mouseH) to card "usn" if if end mouseDown 27 2. Surface Ships Button on mouseDown play "surface ships" put "United States,USN,USA,USCG" into ships put return & "Soviet Union" after ships put return & "NATO,Belgium,Canada,Denmark,France,Germany,Greece,' &"Iceland,Italy,Netherlands,Norway,Portugal,Spain,Turkey,"-. &"United Kingdom" put return & "Warsaw &"Romania" put return after ships & Pact,Bulgaria,Czechoslovakia,Hungary,Poland,"-. after ships "Mideast & North Africa,Algeria,Djibouti,Egypt,Iran,"-i &"Iraq,Israel,Jordan,Kuwait,Lebanon,Libya,Mauritania,Morroco,Oman,"- &"Qatar,Saudi Arabia,Somali Republic,Sudan,Syria,Tunisia,"-. &"United Arab Emirates,North Yemen,South Yemen"after ships put return & "Sub-Saharan Africa,Angola,Benin,Cameroon,Cape Verde,"^ &"Ivory Coast,Ethiopia,Gabon,Ghana,Kenya,Liberia,Madagascar,Nigeria,' &"Senegal,Sierra Leone,South Africa,Tanzania" after ships put return & "Asia & Australasia,Australia,Bangladesh,Brunei,Burma,"-i &"Cambodia,China,Fiji,India,Indonesia,Japan,North Korea,South Korea,"- &"Malaysia,Pakistan,Papua New Guinea,Phillipines,Singapore,Sri Lanka,"- 28 &"Taiwan,Thailand,Vietnam,New Zealand" put return & "Carribean & after ships Latin America,Argentina, Bolivia, Brazil,"-. &"Chile,Colombia,Cuba,Ecuador,Mexico,Nicaragua,Paraguay,Peru,Uraguay,' &"Venezuela" after ships get HPopupMenu(ships,0,The if it <> then of it into row put item 2 of it into column put item if mouse V,The mouseH) 1 (row =1) and (column =2) then go to card "usnl" end end if if end mouseDown 3. Submarines Button on mouseDown play "submarines" put "United States" into submarines put return & "Soviet Union" after submarines put return & "NATO,Belgium,Canada,Denmark,France,Germany,Greece,'% &"Iceland,Italy,Netherlands,Norway,Portugal,Spain,Turkey,% &"United Kingdom" after submarines 29 put return & "Warsaw Pact,Bulgaria,Poland,Romania" put return & "Mideast &" Syria" after & submarines & "Sub-Saharan Africa,South Africa" put return & "Asia & after submarines Australasia,Australia,China,India,Indonesia,"-. &"Japan,North Korea,South Korea,Pakistan,Taiwan" & submarines North Africa,Algeria,Egypt,Israel,Libya,"-i put return put return after "Carribean & after submarines Latin America,Argentina,Brazil,Chile,"-. &"Colombia,Cuba,Ecuador,Peru,Venezuela" after submarines HPopupMenu(submarines,0,The mouseV,The mouseH) get if it <> then of it into row put item 2 of it into column put item if (row = go end end 1 1 ) and (column = 1 ) then to card "subs" if if end mouseDown B. CODE FOR THE DEPARTMENT/SQUADRON/SHIP TYPE MENUS 1. Aircraft on mouseDown 30 put "FA- 18" into va HPopupMenu(va,0,The mouseV,The mouseH) get if it <> then of it into row put item 2 of it into column put item if 1 (row =1) and (column =1) then push card go end end to stack "u.s. aircraft" if if end mouseDown 2. Surface Ships on mouseDown put "CG,Bdknap,Leahy,Ticonderoga" into crudes put return & "CGN,Bainbridge,California,Long Beach,Truxton,"-. &"Virginia" after crudes put return & "DD,Spruance" put return & "DDG,Adams,Arleigh Burke,Coontz,Kidd" put return & "FF,Bronstein,Glover,Knox" after crudes put return & "FFG,01iver Hazard Perry" after crudes 31 after crudes after crudes HPopupMenu(crudes,0,The mouseV,The mouseH) get if it <> then of it into row put item 2 of it into column put item if 1 (row = 6) and (column =2) then push card go end end to stack "u.s. surface ships" if if end mouseDown 3. Submarines on mouseDown put "Ethan Allen" into ssn put return & "Glenard put return & "Los Angeles" put return & "Narwhal" put return & "Permit" after ssn put return & "Seawolf" after ssn put return & "Skipjack" after ssn P. Lipscomb" after ssn after ssn after ssn 32 put return & "Sturgeon" after ssn HPopupMenu(ssn,0,The mouseV,The mouseH) get if it <> then of it into row put item 2 of it into column put item 1 (row = 3) and (column =1) then if push card go end end to stack "u.s. submarines" if if end mouseDown CODE FOR THE PLATFORM CARDS C. 1. F/A-18 (Hornet) on mouseDown "Guns,20mm Machine Gun" put put return get & into aaw "Missiles,Sidewinder,Sparrow" after aaw HPopupMenu(aaw,0,The mouseV,The mouseH) if it <> then of it into row put item 2 of it into column put item 1 33 (row =1) and (column = 2) then if show card field = 2) and (column = 2) then else if (row show card else end "20mm" field show card "sidewinder" field "sparrow" if end mouseDown Oliver Hazard Perry (FFG-7) 2. on mouseDown put "Missiles, Standard Missile" into put return aaw & "Guns,76mm,20mm CIWS" after aaw HPopupMenu(aaw,0,The mouse V,The mouseH) get if it <> then of it into row put item 2 of it into column put item if (row = 1 1 and (column = 2) then ) show card else if (row field "standard missile" = 2) and (column = 2) then show card else end field show card "76mm" field "20mm CIWS" if end mouseDown 3. Los Angeles (SSN 688) on mouseDown 34 put "Missiles,Harpoon,Tomahawk" into asuw put return & "Torpedos,Mk-48" after asuw HPopupMenu(asuw,0,Tne mouseV,The mouseH) get if it <> then of it into row put item 2 of it into column put item if 1 (row =1) and (column = 2) then show card field else if (row = 1) show card show card else end field "harpoon" and (column = 3) then "tomahawk" field "mk-48" if end mouseDown D. SEARCH ALGORITHM CODE Search script 1. on returninField put empty into card field "Found Card List" set the lockMessages to true set the lockRecent to true set the lockScreen to true put card field "search criteria" into wordToFind put card field "stacks to search" into stacksList push this card 35 repeat with x = go stack unmark (line all 1 lines in stacksList x of stacksList) cards mark cards by finding repeat with y = put (the short the short number of to the wordToFind to the 1 number of marked name of marked name of this stack & card y) & cards "," & -. return after foundCardList end repeat end repeat delete last char of foundCardList pop card put foundCardList into card field "Found Card List" set the lockMessages to set the lockRecent to false set the lockScreen to false false end returninField 2. Clickline on mouseDown get the value of the clickLine push card go card (item 1 of it) of stack (item 2 of it) end mouseDown 3. Card Stacks to Search field "Stacks to Search" contains the following names: u.s. aircraft 36 u.s. surface ships u.s. submarines 37 APPENDIX B THREAT EVALUATOR USER'S MANUAL 38 A. INTRODUCTION The Threat Evaluator an application that automates is that are required during the many of the functions normal watchs tan ding routine of a Tactical Action Officer (TAO). Threat Evaluator can be implemented as an additional module to the Argos System or as a stand alone date that a TAO Figure start the It is the most tailored tool to has available for continuous personal training as well as evaluation of platforms that To application. may pose a possible threat to the safety of the ship. Threat Evaluator application, double click on the icon shown in 1. Threat Evaluator Figure B. 1 Threat Evaluator Icon MAIN MENU SYSTEM After startup, the user Evaluator as shown available The in is Figure taken to the main 2. From this menu screen of the Threat screen the user has many options horizontal dividing line in the center of the screen distinguishes 39 Figure 2 Main Menu Screen the training portion of the Threat Evaluator application from the tactical portions. The upper half of the ships and submarines main menu screen contains the menus which make up aircraft, surface the training portion of the application or proceed to specific tactical operations such as Search and Identify, TAO Status Board or Tactical Algorithms. Menus on the upper portion of the screen are accessed by clicking on the area desired, such as Aircraft, and holding the mouse button down (see Figure 3). This will then 40 show a popup menu where Figure 3 Popup Menus selection of a particular country within a geographic region can be popup menus made. In the for each of the aircraft, surface ships and submarines icons, countries are divided into geographic regions. After the selection of a country, the user is taken to another menu where selection of an agency, within the country selected, that has control of the original type platforms selected aircraft) can be made. As shown agency, i.e. "USN" under in Figure the Aircraft 4, after the selection main menu of the particular icon, the screen display the departments, or squadrons, within the agency. changes to The user then has access to the individual aircraft type within the department or squadron designation. 41 (i.e. Figure 4 Department/Agency Screen C. AIRCRAFT, SURFACE SHIPS AND SUBMARINES CARDS After a specific aircraft, surface ship or submarine shown the card with that specific platform. shown in Figure 5. 42 is chosen the user An example is then of an aircraft card is Figure 5 Aircraft Data Card On the card, features that will be of assistance to the user are divided into These areas are four warfare areas. warfare (ASUW), anti-air warfare application, only four that were chosen a surface to air missile that is selected from the menu of a warfare To close the area, a window, simply cursor. 43 a prototype Repetition of the An example also be used in a surface to surface click of this is mode. After window appears 6) that contains specific data and characteristics that a tactical evaluation. is purposely done to show the is system across warfare areas. may this to demonstrate the concept. appear under these menus possibilities of using a certain a system anti-surface anti-submarine warfare (ASW), and electronic warfare (EW). There are many other warfare areas, however, since equipment (AAW), TAO may (Figure require for on the window with the m^mMm^i^mmi Figure 6 Information D. Window SEARCH AND IDENTIFY FUNCTION One of the most useful functions Evaluator application is that is available to a the Search and Identify cption. TAO in the This option Threat is vital for the quick identification of possible threats associated with a particular emitter or weapons systems. Figure The screen for the Search 7. 44 and Identify screen is shown in Figure 7 Search and Identify Screen The search function weapon system that has is designed to accept as input the been identified. With this name of a radar or information the search algorithm will search each platform card for a match to the system entered by the user. Upon weapon system a match, the will names of platforms which have be displayed in a window for the TAO that emitter or to view. If the TAO desires further information on a particular platform that has been identified in the list, he or she merely uses the mouse and the information card of to click that platform will on the desired platform's name be displayed. The TAO can then evaluate in detail the capabilities of the platform by selecting the appropriate warfare area as described earlier Card in the Aircraft, section. 45 Surface Ships and Submarines E. TAO STATUS BOARD The TAO status board is accessed through the main exceptional tool available to the perishable own TAO. ships' information. provides routinely needed data to the watch turnovers. The TAO critical ships information. TAO has available The first status TAO board information. This card is status shown Figure 8 in is and provides continuity an these watch 8. two cards ensures to that the data for fighting the ship. tactical Weapons status Status Board Screen 46 in comprised of two cards that display board displays Figure TAO is This portion of the Threat Evaluator The combination of TAO screen and ideal for easy access to all required It is at his fingertips all essential card of the menu weapons systems' and the condition of readiness that the ship is in are displayed at the top of the screen. these are accomplished by clicking the cursor on the desired button. the screen The to rest of divided into three main segments. is The segment on the specific Changes ASW ASW the left of the screen contains weapons systems of data and information on Information such as the search the ship. mode of the sonar, water conditions for the day and torpedo loading data are input by typing the information in the spaces provided or by clicking on the appropriate buttons. The segment on the right of the screen contains information on the The information such systems aboard the ship. status of the chaff available or by the clicking on the desired buttons. the lower center of the screen their locations in the TAO a number of rounds and can be changed by typing the information into the spaces The segment on and as gun shows the remaining missiles magazine. This information current missile magazine inventory update. user to the second screen of the 9, will take the TAO is required to provide the The button shown in Figure status board. Figure 9 Combat Systems/Engineering Icon The second screen of the left section on the screen of the screen is is TAO status board is divided into two sections. The the combat systems status and the section on the right the engineering status. The material condition of these two areas can effect the combat readiness and therefore the survivability of a ship combat. If there is any degradation in the 47 equipment, then the TAO in must be aware of what is not working and what effect readiness of the ship. Information such as this is its' input into the appropriately labelled spaces available or buttons. The Combat Systems and Engineering failure has on the combat by typing the information by clicking on the desired shown status screen is in Figure 10. Status .Systems Engineering ft 6 Combat Systems Engineering Systems Casualties: Casualties: Planned Planned Maintenance: Maintenance: ® Capabilities Lost Splint Plant SSDG online: due to Casualties: Gas Turbine online: OCSOT Latt ® DSOT Completed^ J L»st O Ongoing Time Started: [ % Fuel onboard % Feedwaten Complete^ Ongoing ] Time Started: % Freshwater [ % Lube Oil onboard: Number and Types of sonarbouys available: Average Speed Data Number Number Number Number Type: Type: Type: Type: 0001 0100 0200 0300 ^^ <£ ^ ft *S ? Figure 10 Combat Systems/Engineering Screen F. TACTICAL ALGORITHMS main menu Tactical Algorithms are accessed through the module that would greatly assist the Tactical Algorithms the probability of a would provide kill TAO in weapons the user with a selection screen. This is a and employment. method of quickly calculating against a particular target with a selected ship's weapon. This would then aid the TAO in determining the release point against the target. 48 optimum weapon mix and G. EASY ACCESS BUTTONS Throughout the Threat Evaluator, the These buttons provide access buttons. TAO to certain has access to a INCSEA stack, Home signals, Allied Tactical Publication signals, stack access, Return, Print, and Return to These features are described 1. TAO them to the screen shown Pass Down Find function, Help Main Menu commands. following sections. Battle Orders The Commanding Access in detail in the of modules and functions which include Battle Orders, Rules of Engagement, Night Orders, Log, number in is is Officer's battle orders are contained in this section. achieved by clicking on the icon shown an icon that will give a time and date stamp if in Battle Orders Icon Figure 12 Time/Date Stamp Icon 49 Within required. This icon Figure 12. Figure 11 Figure 11. is 2. Rules of Engagement (ROE) The Rules of Engagement is are contained in this section. achieved by clicking on the icon shown in Figure 13. function is on also avaiable A time Access to them and date stamp this screen. ROE Figure 13 Rules of Engagement Icon Night Orders 3. The Commanding Access to them is Officer's night orders are contained in this section. achieved by clicking on the icon shown and date stamp function is also avaiable on in Figure 14. A time this screen. Figure 14 Night Orders Icon 4. TAO Pass The TAO Down Log (PDL) Pass Down Log is contained in this section. achieved by clicking on the icon shown function is also avaiable on this screen. 50 in Figure 15. A Access to it is time and date stamp Figure 15 The INCSEA would be displayed desired. The signal required information. all either in a list As shown in Figure These signals or a specific signal could be decoded as the the screen. This TAO, resulting in the would give the TAO decoded quick access to envisioned, signals could also be encoded using this tool. Figure 16 INCSEA Incon Allied Tactical Publication (ATP) The ATP- 1(C) signals will be accessed through the icon Figure 17. The module would contain all the signals displayed either in a list information. As the TAO, resulting in the This would give the TAO in as well These signals would be or a specific signal could be decoded as desired. would be input by displayed on the screen. shown from the ATP- 1(C) as the information describing general maneuvers.. signal Icon the signals from the agreement. would be input by meaning being displayed on 6. Down Log signals will be accessed through the icon The module would contain system Pass INCSEA 5. 16. TAO The decoded meaning being quick access to required envisioned, signals could also be encoded using this system tool. 51 A completely integrated, fully implemented module would also provide the user with a complete maneuvering board solution, Figure 17 i.e. ATP course and speed to station. Icon Find 7. The Find 18. The The TAO function will be accessed through the icon TAO application will query the then inputs a name, the user to that card. i.e. as to shown in Figure what platform he wishes Los Angeles, and the Find function to view. will take ^ Figure 18 Find Icon 8. Help The Help stack will be accessed through the icon shown in Figure 19. This contains useful information on operation of the Threat Evaluator. If a user does not remember the function of an specific icon, then the help stack would assist him or her in determining its' use. 52 Figure 19 Help Stack Icon 9. Home Stack The Home stack will be accessed through the icon This takes the user to the home shown in Figure 20. card of the HyperCard environment. B Figure 20 10. Icon Return The Return command 21. Home Card will be accessed through the icon shown in Figure in Figure This button returns the user to the previous screen. 5 Figure 21 The Return Icon 11. Print The 22. Print command will be accessed through the icon shown This allows the user to print items if 53 required. Figure 22 The Print Icon 12. Return to Main The Return shown in Figure 23. any location in the to Menu Button Main Menu button will be accessed through the icon This allows the user to return to the main menu screen fron Threat Evaluator. This gives easy access to the main a single click on the mouse. Figure 23 The Return to Main 54 Menu Button menu by REFERENCES LIST OF OPNAV 3120.32B, Standard Organization and Regulations of the U.S. Navy, 26 September 1986. Chief of Naval Operations 1. CDR. and Instruction ARGOS: Design and Development of Object-oriented, Event-driven, Multimedia Database Technology in Support of the Paperless Ship, Masters Thesis, Naval Postgraduate School, Monterey, CA., December 1988. Duffy, Kevin LT., 2. Giannotti, G. 3. Apple Computer, 4. Whitten, J.L., Bentley, L.D., and Barlow, V.M., Systems Analysis Methods, 2d 5. Inc., HyperCard Users Guide, ed., p. 1990. & Design 659, Irwin, 1989. Powers, M.J., Cheney, P.H., and Crow, G., Structured Systems Development, Analysis, Design, Implementation, 2d ed., p. 508, Boyd & Fraser, 1990. 6. International Institute for Strategic Studies, The Military Balance 1989-1990, Brassey's, 1989. The Fundamentals of Aircraft Combat Surviveability Analysis and Design, American Institute of Aeronautics and Astronautics, 1985. 7. Ball, 8. R.E., Jane's All The Worlds Aircraft 1990-91, 81st ed., p. 449, Jane's Information Group, 1990. 9. Jane's Fighting Ships 1990-91, 10. Jane's p. Fighting Ships 1990-91, 724, Jane's Information Group, 1990. p. 752, Jane's Information Group, 1990. mail interview between Jeanne A. E. Devoto and the author regarding scripts for search algorithm and clickline function, 13 February 11. Electronic 1990. 12. Goodman, Danny, The Complete HyperCard 2.0 Handbook, 2d Bantam Books, 1990. 55 ed., p. 143, BIBLIOGRAPHY Aker, S.Z., The Macintosh Bible, 3d ed, Goldstein Awad, E.M., Management Information & Systems.. Blair, 1991. Concepts, Structure, and Applications, pp. 297-299, Benjamin-'Cummings, 1988. Goodman, Paul, Power User's Hypertalk Handbook, Windcrest, 1989. Kroenke, D.M., and Dolan, K.A., Database Processing, Fundamentals, Design, Implementation. 3d ed., Macmillan publishing company, 1988. Waite, M., Prata, S., Jones, T., The Waite Groups Hypertalk Bible, Books, 1989. Winkler, Dan, and Kamins, Scot, Hypertalk 2.0: The 56 Hayden Book Bantam Books, 1990. . INITIAL DISTRIBUTION LIST No. Copies 1 Defense Technical Information Center Cameron 2 Station Alexandria, Virginia 22304-6145 2. Library, Code 52 2 Naval Postgraduate School Monterey, California 93943-5002 3. Department of the Navy Naval Sea Systems Command Attn: Mr. Phil Styles Code: CEL-TD1 Washington, DC 20362-5101 4. Commander 1 OP 1 5. Surface Warfare Development Group Naval Amphibious Base Little Creek Norfolk, Virginia 23521 73 Navy Department Pentagon Washington, 6. Mr Bob DC 20350 Shaffer 1 Navy Tactical Support Washington Navy Yard Director Washington, 7. Dean B. 1 Activity DC 20374 Frew Code: 05 1 Naval Postgraduate School Monterey, California 93943 Wu Code: 52Wq Naval Postgraduate School Monterey, California 93943 8. Prof. C. T. 9. CDR B. B. Giannotti Code: Naval Postgraduate School 1 CSGg Monterey, California 93943 57 2 10. Mr. Corky Stradling Naval Oceans Systems Center 3990 Old Town Avenue, Suite 107C San Diego, California 921 10 11. Lt Frank E. Sutton 2116 Commodore Court Virginia Beach, Virginia 23452 58 Thesis S86676 c.l Thesis S86676 c. 1 Sutton HyperCard database to technology as applied a Threat Evaluator reference tool. Sutton "ypercar J database technology as applied to a Threat Evaluator reference tool.