My library button
  • No image available

  • No image available

  • No image available

  • No image available

    Leah M. Roust

     · 1989

    This study evaluates symbols and formats for the F/A-18 Hornet head- up display (HUD) and Attitude Directional Indicator (ADI) for use by pilots in recovering from unusual aircraft attitudes. Two surveys were conducted to collect pilot opinions on various symbols and formats, based on past experimental research and current recommendations. For the HUD symbols according to the amount of information these symbols provide for the pilot while he is in an unusual attitude. In some cases, the pilots also were asked to choose their preferred symbols. The second survey was based on the results of the first and was administered to 56 F/A-18 pilots. These pilots selected their preferred HUD or ADI display formats, choosing one from two to five possibilities in each case. The specific symbols and formats that were evaluated are described in detail. Survey results are provided, and recommendations are made for display implementation and for further research and testing of symbols and formats. Keywords: Jet fighters, Attack bombers, These.

  • No image available

    This study evaluates an inexpensive personal computer access control system that relies on biometric keystroke typing dynamics technology, BioPassword Model 2100 (BioPassword). Enrollment time, verification time, false rejection error rate, false acceptance error rate, and user acceptance were evaluated for this system. The results show that BioPassword provides multilayer security through the inclusion of privilege control, audit functions, passwords, and verification of a personal behavioral characteristic, the rate and variation of typing a given password string. Enrollment and verification times were considered satisfactorily fast. Overall false rejection error rate was 22.5%, while false acceptance error rate was 3.4%. The false rejection error rate for acceptance as a function of trial number from one trial to five trials were 4. 4%, 1.4%, O.7%, O.4%, andO. 3% respectively. These values were achieved under relatively uncontrolled conditions and should be improved on by using recommendations that are included. Users generally reported satisfaction with the system, which should be acceptable as part of an office automation system when used in conjunction with other standard security measures. BioPassword Model 21 00, Biometric technology, Keystroke Typing Dynamics, False Rejection Error Rate, False Acceptance Error Rate, Enrollment Time, Verification Time.

  • No image available

  • No image available

    The Defense Advanced Research Projects Agency (DARPA) Strategic Computing has a goal of developing a large-vocabulary, speaker-independent voice-recognition system for battle management and fleet readiness assessment. One of the primary testbeds for the recognition system will be the command and control operation of the classified database for the Force Requirements Expert System, Hawaii (FRESH). The Naval Ocean Systems Center (NOSC) has designed an unclassified database called Task-Oriented, Naturally Elicited Speech (TONE) which simulates the characteristics of FRESH on a smaller scale. This study assisted NOSC in developing a voice-recognition, man-machine interface that could be used with TONE and upgraded at a later date for FRESH. The study identified more than 600 words that are associated with command and control and provided NOSC with the three most common forms of syntax used by the participants. Keywords: Computational linguistics, Expert system voice recognition, Theses. (kr).

  • No image available

    This thesis provides a specific outline for Republic of China Navy (ROCN) Local Area Network (LAN) development. The current ROCN communication system and its problems are discussed, along with basic concepts of data communication, protocols, standards, and topologies. Token ring and Ethernet topologies are discussed in detail. Objectives and requirements for ROCN LAN systems are documented. These factors, plus security, budget, training and maintenance, reliability, efficiency, survivability, and performance are considered in proposing a methodology for ROCN LAN development. Theses. (FR).

  • No image available

    This study has been conducted to define typical battlefield behaviors for five groups of hostiles and neutrals who might be encountered in combat: (1) Standard Elite Troops, (2) Average Irregulars, (3) Isolated Criminals, (4) Frightened Civilians, and (5) Unfriendly Civilians. Results can be used in modeling computer-controlled hostiles and neutrals (CCH/Ns) in the joint Marine Corps-Navy Team Tactical Engagement Simulator (TTES), a deployable, flexible virtual reality training system. Military personnel and civilian law enforcement officers will use TTES under a wide variety of simulated urban and rural situations to enhance marksmanship skills and to learn to discriminate among possible adversaries, to determine intent and level of hostility, and to decide whether to engage or to withhold fire.

  • No image available

    This study focuses on electronic mail and its applications for the transfer of informal information within the Department of the Navy. Discussion of the Defense Data Network as an evolutionary development in data switching technology is provided for historical perspective. The utility of electronic mail media is evaluated with an emphasis on the human interface. A brief synopsis of electronic mail cost compared with other message delivery media (telephone, postal mail, and AUTODIN) is provided. The technical aspects of electronic mail involving local area networks, the Base Information Transfer System (BITS), and AUTODIN are provided to demonstrate the feasibility of implementing an electronic mail system. Theses. (fr).