作者:
MENSH, dRThe Author received his B.S. and M.S. degrees in applied physics from Loyola College in Baltimore
Md. and the American University in Washington D.C. He also has completed his course work towards his Ph.D. degree in computer science specializing in the fields of system analysis and computer simulation. He has been employed at the Naval Surface Weapons Center White Oak Laboratory Silver Spring Md. for the past eighteen years in the areas of weapon system analysis and the development of weapon system simulations. Since 1978 he has been involved in the development of simulation tools that can be applied to the solution of shipboard combat system architecture and engineering problems. Currently at the White Oak Laboratory he is responsible for the application of and further development of the single ship combat system simulation.
This paper describes a methodology for setting combat system requirements for all ship classes. The requirements are determined from a battle group perspective. The methodology uses ship damage as a measure of effecti...
详细信息
This paper describes a methodology for setting combat system requirements for all ship classes. The requirements are determined from a battle group perspective. The methodology uses ship damage as a measure of effectiveness for setting combat system requirements. The ship damage data used was derived from the Navy tactical game (NAVTAG). The methodology that determines ship class combat system requirements consists of a set of logical steps that are iterative by design. It provides insight and valid estimates of numerical measures of defined force requirements at several levels. This process is not trivial; the expected level of effort could be significant. The method consists of five basic stages considered necessary to achieve valid results. These stages are (1) determination of force level requirements, (2) determination of force level capability, (3) analysis of force level capability, (4) determination of class requirements by battle overviews, and (5) determination of class requirements — overall. The methodology was used by the combat system master plan (CSMP) manager for determining top level combat system requirements for individual platforms in a battle group. In addition, once levels of combat system performance have been defined, this methodology generates a quantitative data base that becomes a useful tool in ship combat suite selection. Once alternate combat system suites have been defined, these suites can be analyzed in terms of combat system performance capability versus cost.
Prior to the energy crisis of 1973, the U.S. did not have an energy policy. The failure of the American political system to anticipate and respond to the changing facts of energy was an inevitable outcome of the way p...
作者:
MALKOFF, dBMOY, MCWILLIAMS, HLDr. Donald B. Malkoff majored in physics as an undergraduate at Harvard University. He received an M.D. degree from the University of Pittsburgh School of Medicine in 1960. This was followed by an internship and residency in neurology at University Hospital in Ann Arbor
Michigan. He spent several years at the National Institutes of Health engaged in gerontology research has practiced and taught clinical neurology and in 1983 received an M.S. degree in computer science at the University of California San Diego. Currently Dr. Malkoff is employed by the Navy Personnel Research and Development Center in San Diego California where he is senior investigator in a human factor/computer display-and-control project involving the DDG-51 gas turbine propulsion unit. He is a member of the American Academy of Neurology the Society for Neuroscience the American Association for Artificial Intelligence and the Association for Computing Machinery. Dr. Malkoff is certified by the American Board of Psychiatry and Neurology has taught computer science at UCSD and published in several research areas including magnetoencephalography and electron microscopy. His basic interests are in the areas of artificial intelligence and learning expert systems particularly as they apply to the problems of fault-detection and control. Dr. Melvyn C. Moy received his undergraduate training in mathematics and chemistry at the University of Texas
Austin. He studied experimental psychology at the University of Wisconsin Madison receiving his M.S. in 1970 and Ph.D. in 1972. He served as an assistant professor at the University of South Dakota where he taught experimental design and methodology for a year before joining the Navy Personnel Research and Development Center in 1973. His work and research since then spans across many application areas such as the development of manpower planning models for the Navy the design of operational decision aids the human engineering of interactive large-scale war gaming systems and the evaluation o
The ship fire main has undergone considerable development throughout the past 2,000 years, resulting in a system that is critical both for normal ship function and for ship survivability in emergencies. Because of its...
详细信息
The ship fire main has undergone considerable development throughout the past 2,000 years, resulting in a system that is critical both for normal ship function and for ship survivability in emergencies. Because of its complexity, the modern firemain system is highly vulnerable to malfunction and to damage during combat. Firemain fault detection and fault recovery are currently conducted manually by damage control teams. The advantages anddisadvantages of this method are discussed, and alternative methods of fault detection and recovery are explored. An interactive computerprogram is introduced which uses central control over remotely situated valves to facilitate fault detection and recovery, significantly reducing recovery-time and manpower requirements. These reductions may result in savings of lives, ship systems, and ships themselves. The computerprogram is based upon an algorithm which is, in effect, a prescription that can be followed manually by the operator or be completely automated. The color graphic display which is used for monitoring can also be utilized for the training of damage control operators or for the evaluation of other algorithms for firemain control. Alternative firemain hardware and configurations could lead to even more efficient methods of fault detection and recovery as well as improved firemain water supply management in general.
Air cushion vehicles (ACVs) have operated successfully on commercial routes for about twenty years. The routes are normally quite short; the craft are equipped with radar and radio navigation aids and maintain continu...
详细信息
Air cushion vehicles (ACVs) have operated successfully on commercial routes for about twenty years. The routes are normally quite short; the craft are equipped with radar and radio navigation aids and maintain continuous contact with their terminals. Navigation of these craft, therefore, does not present any unusual difficulty. The introduction of air cushion vehicles into military service, however, can present a very different picture, especially when external navigation aids are not available and the craft must navigate by dead reckoning. This paper considers the problems involved when navigating a high-speed air cushion vehicle by dead reckoning in conditions of poor visibility. A method is presented to assess the ACV's navigational capability under these circumstances. A figure of merit is used to determine the sensitivity of factors which affect navigation such as the range of visibility, point-to-point distance, speed, turning radius and accuracy of onboard equipment. The method provides simplistic but adequate answers and can be used effectively to compare the-capability and cost of alternative navigation concepts.
This paper describes the problems posed by running the UNIX ™ operating system on multiprocessors, as well as some solutions. The resulting systems function like their single-processor counterparts but yield 70 percen...
This paper describes the problems posed by running the UNIX ™ operating system on multiprocessors, as well as some solutions. The resulting systems function like their single-processor counterparts but yield 70 percent better throughput for two-processor configurations. Closely coupled multiprocessor UNIX systems currently run on IBM and AT&T Technologies hardware, but the implementation described in this paper ports to other architectures as well, and the design is not limited to two-processor configurations.
C++ is a superset of the C programming language; it is fully implemented and has been used for nontrivial projects. There are now more than one hundred C++ installations. This paper describes the facilities for data a...
C++ is a superset of the C programming language; it is fully implemented and has been used for nontrivial projects. There are now more than one hundred C++ installations. This paper describes the facilities for data abstraction provided in C++. These include Simula-like classes providing (optional) data hiding, (optional) guaranteed initialization of data structures, (optional) implicit type conversion for user-defined types, and (optional) dynamic typing; mechanisms for overloading function names and operators; and mechanisms for user-controlled memory management. It is shown how a new data type, like complex numbers, can be implemented, and how an “object-based” graphics package can be structured. A program using these data abstraction facilities is at least as efficient as an equivalent program not using them, and the compiler is faster than older C compilers.
The Blit terminal is changing the way we debug C programs. Using multiple virtual terminals on the Blit, a programmer can interact simultaneously with several of the tools needed when debugging. This makes existing to...
详细信息
The Blit terminal is changing the way we debug C programs. Using multiple virtual terminals on the Blit, a programmer can interact simultaneously with several of the tools needed when debugging. This makes existing tools more useful and influences the design of new tools. In particular, the Blit cleanly separates the programmer's communication with a debugger from communication with the program being debugged. Moreover, joff, a debugger for C programs that run in the Blit, demonstrates the advantage of operating a debugger asynchronously with the subject process and the effectiveness of a source-level user interface based on pop-up menus. The graphics user interface supports “pointer chasing” through arbitrary data structures and graphical display of graphics data objects.
We consider the following algorithmic problem, which arises in connection with optimally choosing beam widths and positions for electron exposure of integrated circuit wafers. Let H > 0 be a fixed real number, and ...
We consider the following algorithmic problem, which arises in connection with optimally choosing beam widths and positions for electron exposure of integrated circuit wafers. Let H > 0 be a fixed real number, and let c be a fixed, positive-valued, nondecreasing cost function defined on (0, H ]. An instance of the problem consists of a given range R = [ a, b ] and n given intervals I i = [ a i , b i ], 1 ≤ i ≤ n , each contained in R and of length not exceeding H . A solution (or feasible solution) for such an instance is a collection of segments, S 1 , S 2 , …, S k , each of length at most H and contained in R , such that each given interval is contained in at least one segment and the union of all the segments is R . The goal is to find an optimal solution with respect to c , i.e., a solution for which the sum of the costs of the individual segment lengths is as small as possible. The segments in a solution describe the beam positions and widths, projected on one side of the wafer, and the given intervals correspond to particularly sensitive regions on the layout mask, each of which must be entirely exposed by a single scan. The cost function gives the time required for a single scan of given width, including alignment overhead. Using dynamic programming techniques, we give efficient algorithms anddata structures for solving this problem for several natural classes of cost functions, the most general of which is the class of all concave increasing functions, solved by an algorithm that runs in time O ( n 2 ).
digitized speech can be transmitted over a variety of digital media. An interesting choice is the use of a Local-Area Network (LAN), for which digitized speech is packetized at the transmitter anddepacketized at the ...
digitized speech can be transmitted over a variety of digital media. An interesting choice is the use of a Local-Area Network (LAN), for which digitized speech is packetized at the transmitter anddepacketized at the receiver. Many local-area networks exhibit good throughput but poor delay characteristics; variable or excessive transmission delay can become noticeable and objectionable to the users of such a voice system. A number of simulations were performed to assess the delay characteristics of a Carrier Sense Multiple Access/Collision detection (CSMA/Cd) LAN and of a similar token bus LAN. A comparison of the results shows that the token bus performs somewhat better. The CSMA/Cd LAN's performance was characterized by carrying voice well until a point of collapse is reached; the token bus's performance degraded more continuously. In either case, throughput close to the theoretical capacity of the LAN was found achievable with appropriate techniques.
暂无评论