Simulating Military Radio Communications Using Speech Recognition and Chat-Bot Technology
|
|
|
- Hortense Cain
- 9 years ago
- Views:
Transcription
1 Simulating Military Radio Communications Using Speech Recognition and Chat-Bot Technology Donald J. Stoner, Louis Ford, And Mark Ricci The Titan Corporation Orlando, Florida In the real world commanders and soldiers use their radio networks to communicate with each other, issue orders, and deliver reports. However, most modern training simulations provide no mechanism for a commander to speak to the simulation and receive a response in the same manner. We believe that a combination of commercial voice recognition, voice generation, and AI chat-bot tools can be used to create a more realistic interface for military personnel interacting with a simulation. This paper describes the Voice-Simulation Interaction Module (V-SIM) research project in which we have created a spoken voice interface that uses artificial intelligence to interact with a military simulation. This paper will focus on the modification of the AI to interact using standard military radio messages, techniques for setting up a network of these entities, methods for connecting V-SIM to the SAFs and some of the research and prototypes that are currently being tested.
2 Simulating Military Radio Communications Using Chat-Bot Technology Donald J. Stoner, Louis Ford, And Mark Ricci The Titan Corporation Orlando, Florida INTRODUCTION Most modern warfighter simulations require users to interact with the simulation through a role player who acts as a member of the military training audience but is actually a supplement to the computer simulation. This human s job is to provide the voice of the simulation and to serve as a translator from tactical orders into computer executable commands. In large staff training exercises, these role players are being partially replaced by the use of direct simulation-to-c4i interfaces. However, in lowerlevel operational training scenarios, the training audience must interact via spoken voice using radio equipment. Chat-Bot technologies have the potential to replace role players who must speak to the training audience. Our research has been in identifying the best chat-bots for this application and creating databases that can drive these chat-bots for military training. Applying these technologies also requires the integration of a number of different software applications, which is the secondary focus of our research. Although Chat-Bot technology still has a long way to go in the field of parsing and responding to conversational natural language, the technology has developed enough to handle the structured forms of military radio communications. By modifying the AI of the Chat-Bot to handle these communications the Chat-Bot can interact with the user via formatted radio messages. The Chat-Bot can then be attached to the AI of the SAF and act as its command interface. The command staff can then send radio messages to the SAF, just as they would with real forces, and the SAF would act accordingly. Currently these radio messages must be text based, however given the available technology and advances in voice recognition software these interactions may soon be performed via voice or radio transmissions. A Battalion could set up their Tactical Operations Center and command real and virtual units over the same radio network operating as they would in wartime. This paper will focus on the modification of the AI to interact using standard military radio messages, techniques for setting up a network of these entities, methods for connecting Chat-Bot AIs to the SAFs and some of the research being done with our prototype, the Voice - Simulation Interaction Module (V-SIM). HISTORY OF CHAT-BOT TECHNOLOGY Chat-Bot like technology has been around for nearly 20 years, but has only recently been gaining wide spread use. The first Chat-Bot, so to speak, was the Eliza program [Wieizenbaum, 1966]. This was a psychologist Chat-Bot created by Joseph Wieizenbaum, a professor at MIT. A few years ago, Dr. Richard Wallace wrote A.L.I.C.E., the Artificial Linguistic Internet Computer Entity, a new Chat-Bot program [Wallace, 2000]. It won the Loebner Award, which is the first formal instantiation of a Turing Test. The test is named after Alan Turing the accomplished British mathematician. In 1950, in the article Computing Machinery and Intelligence for the philosophical journal Mind, Alan Turing asked the question "Can a Machine Think?" He answered in the affirmative, but a central question was: "If a computer could think, how could we tell?" Turing's suggestion was, that if the responses from the computer were indistinguishable from that of a human, the computer could be said to be thinking. After winning the Loebner Award, A.L.I.C.E. was later updated by Dr. Wallace, Jon Baer, and others and programmed in Java. They later set up the Alice AI Foundation to promote the programming of Alicebots and help direct the new Artificial Intelligence Mark-up Language (AIML).
3 Components of the Chat-Bot The Chat-Bot software is composed of three main components, a Responder, Classifier, and Graphmaster, as shown in figure 1. The Responder, which is the interface between the user and the core routines. It handles the input and output, transfers user data to the Classifier, and delivers the bot s response to the user. The Classifier normalizes and filters the input. It applies substitutions and splits the user input into logical components. The normalized strings are then transferred to the Graphmaster. The Classifier also processes the output from the Graphmaster, handles various AIML instructions, and delivers the bot s response to the Responder. The Graphmaster organizes the storage of the brain contents. The content is stored as a graph. The Graphmaster handles the pattern matching process, which involve an advanced search-tree algorithm (see figure 1). Artificial Intelligence Mark-up Language AIML enables people to represent knowledge into Chat-Bots based on the A.L.I.C.E software technology. The Alicebot software community developed AIML during It was originally adapted from a non-xml grammar also called AIML, and formed the basis for the first Alicebot, A.L.I.C.E. AIML describes a class of data objects called AIML objects and partially describes the behavior of computer programs that process them. AIML objects are made up of units called topics and categories, which contain either parsed or unparsed data. Parsed data is made up of characters, some of which form character data, and some of which form AIML elements. AIML elements encapsulate the stimulusresponse knowledge contained in the document. Character data within these elements is sometimes parsed by an AIML interpreter, and sometimes left unparsed for later processing by a Responder. The AIML also has the ability to use JavaScript within the categories and it can be used to call executables. Figure 1 Chat-Bot Components
4 Figure 2 Graphic Representation of the AIML Parsing Tree used by the Graphmaster Figure 2 is a graphical depiction of the AIML parsing tree. The large nodes with numerous branches represent patterns associated with common interrogatives like WHAT, WHO, WHEN, and WHERE. Chat-Bot Interfaces Most Chat-Bots currently in use are text based. The user and the Chat-Bot communicate via textmessaging or some other form of keyboard interface. Technology for speech recognition and text to speech generation is improving rapidly and some Chat-Bot interfaces are beginning to use these. It will soon be common to deal with computers and even Chat-Bots through speech recognition. There are quite a few programs available today, such as Naturally Speaking or ViaVoice, that use this type of technology for hands free use of operating systems and computer applications. This technology can also be experienced in many automated phone response systems. By using this speech recognition and text to speech technology the Chat-Bots can be adapted to interface over phone lines, via computer terminals, and hopefully someday over standard radio communications devices. V-SIM the Chat-Bot prototype The Voice-Simulation Interaction Module (V-SIM) is a prototype Chat-Bot interface designed to use Speech Recognition and Text to Speech COTS software. Currently V-SIM is using the Microsoft Speech SDK for speech recognition and AT&T Natural Voice for Text to Speech generation. V-SIM is designed to be modular allowing the addition or removal of the base components. The modular design also allows for modification and adaptation to a variety of simulations including DIS and HLA networks. One of the main goals of V-SIM is to utilize low cost COTS and GOTS products to create a usable interface at minimum expense. USER INTERACTION WITH SEMI AUTOMATED FORCES In the majority of modern warfighter simulations interaction with the Semi Automated Forces (SAF) is typically controlled by point and click techniques. Drop down menus and other graphic interfaces controls are used to set SAF dispositions and its actions. These types of controls are effective for the purpose they were designed for but they do not provide a realistic interface. In today s military training environment integrating simulations with real world exercises is becoming increasingly
5 important. More and more simulations focus on interacting with real units out in the field, but how can a commander experience the realism of the training if they are directing half of their units by pointing and clicking on a computer screen and the other half by standard radio communications? To create a truly realistic Train as you Fight environment the simulation should be able to interact with the battlefield commanders in the same manner as the real players. It is this problem of interaction that this paper focuses on and will attempt to address using the Chat-Bot technology, and the V-SIM prototype. SAF Communications There are a variety of methods in which SAFs communicate. The automated forces may be directed by the user using point and clicks, by drop down menus on a graphic user interface, or the SAF may be directed by the simulation, directly based on orders or choices given by the users. These directions to the SAFs can take any number of forms from interactions to directly changing parameters within these automated forces. These techniques are designed for efficiency in the computer system, and to accomplish the simulations overall mission. Often realism of interaction is not taken in to account or even considered by these simulations. This is not a shortcoming in the simulation it is simply how it was built given its design parameters. Real World Communications When a battlefield commander directs his troops it is typically done through radio message traffic. His communications staff operates the radios that keep him in touch with his troops as well as superior and subordinate commands. Everything from command and control through supply and support are handled via these radio messages. The format for these messages is very structured and static. Specific messages have specific formats with each line having a specific meaning. Deviation from these patterns is rare and there is little change in standard radio procedures. These radio messages are also made up of generic radio communications such as radio checks, call-ups, sign-offs and authentication. It can be viewed as a small subset of natural language with some changes made to the grammatical rules and message structure. Descriptions and specification for these messages and procedures can easily be found in military radio communications manuals such as FM Combat Net Radio Operations, Signal Operation Instructions (SOI) and even the United States Message Text Format (USMTF) message format manuals. This is how the battlefield commander communicates with his units, not through pointing and clicking on icons on a computer screen, or drop down menus, and while the day may come when that is how military units are directed, that is not the case today. In an ideal training environment the commander would operate just as he would in wartime and the crux of the problem is how to integrate this realism into modern simulations. V-SIM AND THE SEMI AUTOMATED FORCES ARTIFICIAL INTELLIGENCE How do you solve the problem of realistic SAF interaction? One possible solution is the use of Chat- Bot technology, as incorporated into V-SIM. It uses the Chat-Bot s native artificial intelligence (AI) to interact with the user. By tailoring the Chat-Bot s AI to handle standard military radio message formats and procedures it can be adapted as an interface for the SAFs.
6 Figure 1 Chat-Bot Message Parsing Example Modifying the Chat-Bot AI to Parse Military Communications Creating an artificial intelligence program to deal with natural language is no small undertaking. The complexities of natural language are vast and trying to determine and deal with all possible permutations is a daunting task. Many decades of research have been spent on this problem. Fortunately, the strict patterns and rules of military communications removes much of the vexing complexities inherent in more general natural language understanding problems. Military communications are very structured in their nature and have certain protocols, which must be followed. There are certainly variations allowed but nothing as substantial as natural spoken language. Modifying the Chat-Bot AIML to deal with these types of communications, though a non-trivial exercise, is feasible and manageable. The first step is in setting up the AIML to deal with callsigns and programming in the rules of military communications. Message structure must be set up and ways of determining content or topic must be written in. Formal radio messages should always begin with the sender and receiver s callsigns, and lines of message should always end with either over, break, or out. The AIML is set up to check these and determine if the proper sender and receiver were used in the message, and that messages are terminated properly. This is used for error checking, as a means for determining when the message is complete and parsing should begin, and will be seen as a device later used for determining which SAFs are being directed by the User. All communications start out as generic radio messages. This means that the usual call-ups, radio checks and authentication are all covered under one section of the AI. When a message is initiated it starts with a call-up. This is the sender calling the receiver. The receiver in turn acknowledges this. Then the authentication takes place. Once this is completed the sender moves into the message they wished to send. When a specific message is sent the AI topic is set to that message and all messages are parsed under that message specific topic. This allows for putting the proper information in the correct context. V-SIM can then store the information in a database for later use and/or use by the SAF. Once this message is complete the AI resets to the generic radio message topic and is ready to deal with any new type of message. Once all messages have been sent and received the AI then resets to the generic communications and sign-off can
7 take place between the sender and receiver. The Chat- Bot is then ready to begin again. Given the correct type of prompts or stimulus from a driver program, such as a SAF, the AI can be used to send information as well. V-SIM can read the data from a database and feed it into the AI, which inserts it into a message. The message is then sent out to the user in military radio message formats using standard procedures. An example of this would be a SAF tank that is hit by enemy fire. The Chat-Bot would monitor the status of the tank and when its health was lowered due to the hit it would initiate a call to its higher headquarters stating that it had come under attack. Figure 2 V-SIM to SAF Interface Flow Through Connecting V-SIM to the SAF AI V-SIM is fairly flexible in how it deals with SAFs. It can be configured to pass data directly to a given SAF or it can store data in a database to be accessed by multiple SAFs. These configurations allow V-SIM to be adapted to most modern simulations. In some cases a driver program or interface may need to be written for it to deal with specific types of SAFs, but the data in general and the interfaces with the user should remain constant. The V-SIM AI can be configured to directly call functions on a SAF sending the commands directly to the unit. This works best on a one to one scale with V- SIM representing only one SAF. As it can act as multiple actors the database storage technique can be the most effective for handling multiple SAFs. In this technique the data for each SAF is stored in a specific area of the database. When the SAF needs to pass data back and forth to the User it reads and writes data from its specific area. This allows V-SIM to handle traffic for multiple entities without using up large amounts of system memory. In cases where the SAF entities cannot deal with the database, then a driver or interface program would need to be adapted. Other techniques for connecting to the SAF could certainly be developed and are only limited by imagination and need. The interface could be tailored to the different simulation networks. Network Simulation Techniques Within the context of this type of training, there are multiple communication networks that need to be represented. These networks represent different areas of interest within the military communication
8 infrastructure. Examples of this include a Command Network and a Supply and Support Network. These networks often have sub-networks based upon echelon. In addition to being logical, these networks are often physical as they quite often use separate, reserved radio frequencies for their communication traffic. The use of these networks, like the format of the radio messages themselves, is well defined and quite independent of the other communication networks. This well-defined and independent nature lends itself to the use of separate instances of V-SIM per predefined radio frequency each representing the entities likely to be encountered on that corresponding communication network. While these networks are quite independent, knowledge of dynamic ground truth within the simulated world would need to be represented to the appropriate extent. V-SIM would access this type of situational information through a common database or through their interface to knowledge gained and stored by the SAF entities they represent. In the case of either a part-task radio operator trainer or an interface to SAF, the switching of V-SIM instances representing the different communication networks would be achieved through the user interface. This user interface would require the dialing up of the proper frequencies through standard menus or graphical representations of actual equipment, such as the SINCGARS interface developed using GL Studio. V- SIM would then respond in a doctrinally correct way to messages on the networks it represents. Messages sent to inappropriate networks would easily be caught by that network s instance due to the invalid call signs that would be used. OTHER APPLICATIONS The adaptation of V-SIM to other current and future applications has a great deal of potential. Specifically the use of standardized radio message formats has many applications in the modeling and simulation fields. V-SIM as a Radio Operator Trainer One application of the V-SIM technology that could easily be constructed using the current technology is a computer based radio operator part-task trainer. A prototype of this has already been created for the SINCGARS radio. V-SIM can walk the radio operator through an interactive tutorial teaching the soldier how to operate the radio as well as allowing them to practice sending and receiving message traffic just as they would on real radio systems. Call-ups, authentication, messages and sign-offs could all be practiced without the need for setting up actual operational radio systems or performing complicated radio exercises. This trainer could be part of a distance learning curriculum, or distributable to units and schoolhouses allowing soldiers to stay proficient in radio communications procedures with a minimum of support required. COMINT Enhancements in Simulations An underdeveloped area in modern simulations is communications intelligence (COMINT). Unless the simulation is specifically designed to provide this type of data to the users it is typically non-existent. As explained in the earlier section SAF entities typically communicate and interact without any type of generated signal or message. They are simply not designed for this purpose. Why is this information important? Intelligence systems are becoming increasingly important on today s battlefields and in planning for future military operations yet it is one of the most difficult areas to train. By using the developed V-SIM technology and attaching it to the AI of the SAF these missing messages can be generated and inserted into the simulation for the intelligence system operator to collect on. The SAF operates as normal with the addition of the V- SIM connection. V-SIM monitors the SAF and when triggered by the SAF s actions a doctrinally correct message is generated and put out on the network. This can also be used between SAFs when they are interacting. These generated messages can then be collected by the intelligence system operator and reported as they would any collected intelligence. V-SIM would be more dynamic and varied than the majority of the canned recordings currently in use. This message traffic generation would significantly increase the quality of the training for the operator and give them more information to report on. The added Intelligence value would also enhance the command staff s view of the battlespace, thus increasing the quality of the training. Inter-Simulation SAF Communications Another possible future application of this technology is in inter-simulation communications. One of the problems faced today is connecting various types of existing simulations together to create a more comprehensive trainer. By using these standardized radio messages SAFs could communicate from one
9 simulation to another without the necessity of adapting their network structure to multiple simulations and systems. It is even feasible that these simulations could interact over radio networks just as the real forces operating in the simulation. A radio operator could feasibly talk to SAF entities in multiple simulations over their radio network just as they would the real players. Similar research is being conducted on this type of inter-simulation communications. One major effort in this field is the Battle Management Language [Hieb, Tolk, Pullen, and Sudnikovich 2004]. CHALLENGES While the current capabilities of Chat-Bots and the AIML are extensive and very adaptable to modern simulations there are still several challenges to be faced. V-SIM tries to deal with these problems by implementing software work-arounds and adapting the technology to deal with this limited problem space of military communications. Limitations of the AIML One of the biggest problems is in the limitation of the Artificial Intelligence Mark-up Language capabilities. The language is designed for a simple query and response kind of interaction with the user. To be more effective in simulations the language needs to be given more interactive capabilities. It needs to be able to initiate communications and be more pro-active in communicating with users. This can be accomplished by extensive work in generating AIML files, but will need some help by adapting the driver, or chat programs to be smarter and more simulation driven. Speech Recognition and Text to Speech Generation Another major problem for future use is in the areas of speech recognition and text to speech generation. While this can be done in a quite environment at a computer terminal the technology is not currently at a level that would allow use over a radio communications network. Any static in a received message would be difficult for the speech recognition software to interpret and would result in numerous incorrect responses. V- SIM tries to accommodate for some of this by using keywords and pre-filtering of speech to determine the gist of the message and discarding ancillary words or sounds. There is current research going on in this field, but it has been unable to accomplish this with the SINCGARS radio due to sound quality issues [Daniels and Bell, 2001]. The difficulty in the text to speech generation is in the realism of communications. For the ultimate level of realism the user wouldn t be able to tell if they were talking to a real person or to a computer. Unfortunately the current technology is machine sounding. The speech doesn t flow smoothly and voice is obviously machine generated. Hopefully future developments in the fields of speech recognition and text to speech generation will solve these problems. SUMMARY The field of Chat-Bot technology is rapidly burgeoning. By adapting this technology to military radio communications and developing interfaces to modern computer simulations the realism of the training environment for battlefield commanders and their staff can be greatly increased, and the line between real units and SAF units in a simulation can be made a little fuzzier. The potential for a wide variety of uses exists in these Chat-Bots. The technology currently exists for application development now, and the rapid expansion of this field ensures the increase in capability and greater realism in the future. With the development of prototypes, such as V-SIM, hopefully interest will grow within the modeling and simulation communities. REFERENCES Weizenbaum, J. (1966). ELIZA A computer program for the study of natural language communication between man and machine. Communications of the ACM, HLT- 2001, Volume 8, Issue 1, ACM Press, New York, NY, Jan, Daniels, J., and Bell, B. (2001). Listen-Communicate- Show (LCS): Spoken language command of agentbased remote information access. In Proc. of Human Language Technology Conference, HLT- 2001, San Diego, CA, Mar, Ringate, T., Wallace, R., Taylor, A., Baer, J., & Daniels, D. (2001). AIML Primer. Retrieved April 20, 2003, from: aimlprimer.html Stoner, D., Ford, L., & Williams, M. (2003). Electronic and Communications Environment Enhancement in Virtual Worlds European Simulation Interoperability Workshop. Stoner, D., Smith, R. (2002). Virtual Sensors in a Constructive and Live World Fall Simulation Interoperability Workshop.
10 Wallace, R. S. (2000). AIML Overview. Retrieved April 20, 2003, from: wallaceaimltutorial.htm Hieb, M., Tolk, A., Pullen, J.M., Sudnikovich, W., Extensible Battle Management Language (BML): A Methodology for Web Enabling Command and Control for Network Centric Warfare, 2004 Command and Control Research and Technology Symposium, San Diego, CA June 2004 V-SIM DEVELOPERS AND AUTHORS Donald J. Stoner is a Software Engineer for the Titan Corporation. He has developed tools for visualizing simulation events, for networking multiple simulations, and modeling intelligence sensors in simulations. He is a former member of Army Military Intelligence and Special Forces with experience in signals interception, reconnaissance and surveillance. Louis Ford is a Senior Software Engineer for the Titan Corporation working on modeling and simulation technologies that bridge the virtual, constructive, and live domains. He has worked on numerous simulation, space, and missile programs. Mark Ricci is a Principal Software Engineer with the Titan Corporation in Orlando, Florida. He is a certified Modeling and Simulation Professional through the NDIA. He has over eight years experience in M&S for military training with specialization in Intelligence, Surveillance, and Reconnaissance systems.
Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology
Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 [email protected],
Construct User Guide
Construct User Guide Contents Contents 1 1 Introduction 2 1.1 Construct Features..................................... 2 1.2 Speech Licenses....................................... 3 2 Scenario Management
Simulating Information Warfare Using the HLA Management Object Model
Simulating Information Warfare Using the HLA Management Object Model Roger Smith BTG Inc. Orlando, Florida 32765 [email protected] Keywords: Information Operations, High Level Architecture, Management
MORE CAPABLE DOD CONSTRUCTIVE SIMULATIONS ARE SUPPORTING AN EXPANDED TRAINING AUDIENCE.
MORE CAPABLE DOD CONSTRUCTIVE SIMULATIONS ARE SUPPORTING AN EXPANDED TRAINING AUDIENCE. The government/industry team has a number of efforts in progress to increase the usability, affordability, fidelity
Managing Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA [email protected] Len Bass Software Engineering Institute Carnegie
Intelligent Log Analyzer. André Restivo <[email protected]>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
IFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
Ms. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
ENABLING WIRELESS DATA COMMUNICATION IN CONSTRUCTION MANAGEMENT SYSTEM
ENABLING WIRELESS DATA COMMUNICATION IN CONSTRUCTION MANAGEMENT SYSTEM Liu Yanxiang & Yow Kin Choong School of Computer Engineering Nanyang Technological University Nanyang Avenue, Singapore 639798 Keywords:
Creating and Implementing Conversational Agents
Creating and Implementing Conversational Agents Kenneth J. Luterbach East Carolina University Abstract First, this paper discusses the use of the Artificial Intelligence Markup Language (AIML) for the
Microsoft TMG Replacement with NetScaler
Microsoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for Optimization This deployment guide focuses on replacing Microsoft Forefront Threat Management Gateway (TMG)
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
Emulated Digital Control System Validation in Nuclear Power Plant Training Simulators
Digital Control System Validation in Nuclear Power Training s Gregory W. Silvaggio Westinghouse Electric Company LLC [email protected] Keywords: Validation, nuclear, digital control systems Abstract
Module 9. User Interface Design. Version 2 CSE IIT, Kharagpur
Module 9 User Interface Design Lesson 21 Types of User Interfaces Specific Instructional Objectives Classify user interfaces into three main types. What are the different ways in which menu items can be
Voice Driven Animation System
Voice Driven Animation System Zhijin Wang Department of Computer Science University of British Columbia Abstract The goal of this term project is to develop a voice driven animation system that could take
CB Linked Server for Enterprise Applications
CB Linked Server for Enterprise Applications Document History Version Date Author Changes 1.0 24 Mar 2016 Sherif Kenawy Creation 2.0 29 Mar 2016 Sherif Kenawy Modified Introduction & conclusion 2.1 29
HP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
Bridging the Digital Divide with Net-Centric Tactical Services
Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: [email protected] 1. Abstract The DoD
COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
Mission Critical Voice Communications Requirements for Public Safety National Public Safety Telecommunications Council Broadband Working Group
Mission Critical Voice Communications Requirements for Public Safety National Public Safety Telecommunications Council Broadband Working Group Executive Summary The term mission critical voice has been
Supervision software for Intrusion detection, Fire detection and CCTV systems
Supervision software for Intrusion detection, Fire detection and CCTV systems elmospa.com Global security solutions Globalpro GLOBALPRO is the new supervision software that allows to obtain a powerful
Military Reliability Modeling William P. Fox, Steven B. Horton
Military Reliability Modeling William P. Fox, Steven B. Horton Introduction You are an infantry rifle platoon leader. Your platoon is occupying a battle position and has been ordered to establish an observation
Visionet IT Modernization Empowering Change
Visionet IT Modernization A Visionet Systems White Paper September 2009 Visionet Systems Inc. 3 Cedar Brook Dr. Cranbury, NJ 08512 Tel: 609 360-0501 Table of Contents 1 Executive Summary... 4 2 Introduction...
Analytic Modeling in Python
Analytic Modeling in Python Why Choose Python for Analytic Modeling A White Paper by Visual Numerics August 2009 www.vni.com Analytic Modeling in Python Why Choose Python for Analytic Modeling by Visual
ARTIFICIALLY INTELLIGENT COLLEGE ORIENTED VIRTUAL ASSISTANT
ARTIFICIALLY INTELLIGENT COLLEGE ORIENTED VIRTUAL ASSISTANT Vishmita Yashwant Shetty, Nikhil Uday Polekar, Sandipan Utpal Das, Prof. Suvarna Pansambal Department of Computer Engineering, Atharva College
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: [email protected] Jun-Jang Jeng IBM T.J. Watson
BASIC WINLINK 2000 TRAINING GUIDE
BASIC WINLINK 2000 TRAINING GUIDE Lewis Thompson W5IFQ, AAR6UK June 26, 2009 CONTENTS Introduction... 3 About Winlink 2000... 3 Required Equipment... 3 Setting Up Airmail Step by Step...5 Connecting to
USB GSM 3G modem RMS-U-GSM-3G. Manual (PDF) Version 1.0, 2014.8.1
USB GSM 3G modem RMS-U-GSM-3G Manual (PDF) Version 1.0, 2014.8.1 2014 CONTEG, spol. s r.o. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted or stored in
School of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
A primer in Entrepreneurship. Chapter 4: Writing a Business Plan
Chapter 4 Writing a Business Plan Prof. Dr. Institute for Strategy and Business Economics Chapter 4: Writing a Business Plan Table of Contents I. The Business Plan I Presenting the Business Plan to Investors
CHANGING DIMENSIONS AND PERSPECTIVES OF KNOWLEDGE MANAGEMENT
CHANGING DIMENSIONS AND PERSPECTIVES OF KNOWLEDGE MANAGEMENT Kamal Kumar Chaurasia * Abstract Knowledge is the result of learning which provides the only sustainable competitive advantage to the organization.
138 Configuration Wizards
9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP
customer care solutions
customer care solutions from Nuance white paper :: A Guide to Successful Intelligent Virtual Assistants Why Best-in-Class Technology Alone Is Not Enough NUANCE :: customer care solutions More than ever
Utilizing Domain-Specific Modelling for Software Testing
Utilizing Domain-Specific Modelling for Software Testing Olli-Pekka Puolitaival, Teemu Kanstrén VTT Technical Research Centre of Finland Oulu, Finland {olli-pekka.puolitaival, teemu.kanstren}@vtt.fi Abstract
Meeting Scheduling with Multi Agent Systems: Design and Implementation
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and
Network-Wide Change Management Visibility with Route Analytics
Network-Wide Change Management Visibility with Route Analytics Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application
An Esri White Paper June 2010 Tracking Server 10
An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Copyright 2010 Esri All rights
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Features. Emerson Solutions for Abnormal Situations
Features Comprehensive solutions for prevention, awareness, response, and analysis of abnormal situations Early detection of potential process and equipment problems Predictive intelligence network to
CHAPTER 14 Understanding an App s Architecture
CHAPTER 14 Understanding an App s Architecture Figure 14-1. This chapter examines the structure of an app from a programmer s perspective. It begins with the traditional analogy that an app is like a recipe
Live Training. Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS)
CDT/SV in action Stryker Vehicle Live Training Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS) Live Training Products and Systems Observer-Controllers in the Training
Service Quality Management The next logical step by James Lochran
www.pipelinepub.com Volume 4, Issue 2 Service Quality Management The next logical step by James Lochran Service Quality Management (SQM) is the latest in the long list of buzz words floating around the
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
Masters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
Remote Maintenance with Security Appliances FL MGuard RS2000 and RS4000. Economic and Reliable Service
Remote Maintenance with Security Appliances FL MGuard RS2000 and RS4000 Economic and Reliable Service Today, plants generally comprise of complex machines and systems with a high degree of automation.
EFFECTIVE STRATEGIC PLANNING IN MODERN INFORMATION AGE ORGANIZATIONS
EFFECTIVE STRATEGIC PLANNING IN MODERN INFORMATION AGE ORGANIZATIONS Cezar Vasilescu and Aura Codreanu Abstract: The field of strategic management has offered a variety of frameworks and concepts during
(Refer Slide Time: 2:03)
Control Engineering Prof. Madan Gopal Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 11 Models of Industrial Control Devices and Systems (Contd.) Last time we were
GSM ATT Modules Simply effective remote control
GSM ATT Modules Simply effective remote control To control electrical loads via mobile phone The benefits Remote management of electrical devices is an increasingly widespread requirement in residential
VHDL Test Bench Tutorial
University of Pennsylvania Department of Electrical and Systems Engineering ESE171 - Digital Design Laboratory VHDL Test Bench Tutorial Purpose The goal of this tutorial is to demonstrate how to automate
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
DEALMAKER: An Agent for Selecting Sources of Supply To Fill Orders
DEALMAKER: An Agent for Selecting Sources of Supply To Fill Orders Pedro Szekely, Bob Neches, David Benjamin, Jinbo Chen and Craig Milo Rogers USC/Information Sciences Institute Marina del Rey, CA 90292
Reduce Mobile Phone Expense with Avaya Unified Communications
Reduce Mobile Phone Expense with Avaya Unified Communications Table of Contents Section 1: Reduce Inbound Minutes... 2 Section 2: Reduce Outbound Minutes... 3 Section 3: Take Greater Advantage of Free
( Increased usage of IP addresses )
IPv6 Applications IPv6: Make Possible Internet of Things More Devices than people Smart phones Smart Tablets Traditional Internet desktops Data-enabled mobile phones Consumer appliances Embedded systems
Subversion Integration for Visual Studio
Subversion Integration for Visual Studio VisualSVN Team VisualSVN: Subversion Integration for Visual Studio VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
Masters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
Manual English KOI Desktop App 2.0.x
Manual English KOI Desktop App 2.0.x KOI Kommunikation, Organisation, Information Comm-Unity EDV GmbH 2010 Contents Introduction... 3 Information on how to use the documentation... 3 System requirements:...
VACA: A Tool for Qualitative Video Analysis
VACA: A Tool for Qualitative Video Analysis Brandon Burr Stanford University 353 Serra Mall, Room 160 Stanford, CA 94305 USA [email protected] Abstract In experimental research the job of analyzing data
Omni-Channel Marketing for Customer Driven Interaction
Omni-Channel Marketing for Customer Driven Interaction 2 Omni-Channel Marketing for Customer-Driven Interaction The Customer Driven Experience With the growing impact of mobile apps and digital touchpoints
The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
The document may be freely distributed in its entirety, either digitally or in printed format, to all EPiServer Mail users.
Copyright This document is protected by the Copyright Act. Changes to the contents, or partial copying of the contents, may not be done without permission from the copyright holder. The document may be
Auditing UML Models. This booklet explains the Auditing feature of Enterprise Architect. Copyright 1998-2010 Sparx Systems Pty Ltd
Auditing UML Models Enterprise Architect is an intuitive, flexible and powerful UML analysis and design tool for building robust and maintainable software. This booklet explains the Auditing feature of
COMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
File by OCR Manual. Updated December 9, 2008
File by OCR Manual Updated December 9, 2008 edocfile, Inc. 2709 Willow Oaks Drive Valrico, FL 33594 Phone 813-413-5599 Email [email protected] www.edocfile.com File by OCR Please note: This program is
Users Manual. Super Silent Client. Super Silent Client Users Manual. 2008 Piravi Software Solutions. http://www.piravi.com. Document Revision 1.
Super Silent Client Users Manual Document Revision 1.0 2008 Piravi Software Solutions Copyright Piravi Tech Page 1 of 15 Table of Contents Chapter 1: Introduction 1.1 Copyright Information. 1.2 Legal Issues
The Impact of Using Technology in Teaching English as a Second Language
English Language and Literature Studies; Vol. 3, No. 1; 2013 ISSN 1925-4768 E-ISSN 1925-4776 Published by Canadian Center of Science and Education The Impact of Using Technology in Teaching English as
Getting started with API testing
Technical white paper Getting started with API testing Test all layers of your composite applications, not just the GUI Table of contents Executive summary... 3 Introduction... 3 Who should read this document?...
Masters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
ABB solar inverters. User s manual ABB Remote monitoring portal
ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904
Designing a Graphical User Interface
Designing a Graphical User Interface 1 Designing a Graphical User Interface James Hunter Michigan State University ECE 480 Design Team 6 5 April 2013 Summary The purpose of this application note is to
Purpose... 2. What is EDI X12... 2. EDI X12 standards and releases... 2. Trading Partner Requirements... 2. EDI X12 Dissected... 3
Beginners Guide to EDI X12 (including HIPAA) Copyright 2006-2011 Etasoft Inc. Main website http://www.etasoft.com Products website http://www.xtranslator.com Purpose... 2 What is EDI X12... 2 EDI X12 standards
Automated Inventory System
Automated Inventory System User Manual Developed by USDA Food and Nutrition Service June 2009 (Incomplete) Table of Contents Welcome Menu Client Services Report System Inventory System Operations Tailgate
Marine Corps Tank Employment MCWP 3-12 (CD) Appendix F. Scout and TOW Platoons
Appendix F Scout and TOW Platoons Section 1. Scout Platoon Section 2. TOW Platoon F - 1 Section 1. Scout Platoon. Mission. The battalion scout platoon performs reconnaissance, provides limited security,
How to create even more authority and presence using the web. Your ultimate weapon to getting and sustaining change.
Change Management Consultant Guide Bonus ebook How to create even more authority and presence using the web Your ultimate weapon to getting and sustaining change 1 Stuart Corrigan Vanguard Scotland Ltd
THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4
THIRD REGIONAL TRAINING WORKSHOP ON TAXATION Brasilia, Brazil, December 3 5, 2002 Topic 4 INFORMATION TECHNOLOGY IN SUPPORT OF THE TAX ADMINISTRATION FUNCTIONS AND TAXPAYER ASSISTANCE Nelson Gutierrez
Adaptive Automated GUI Testing Producing Test Frameworks to Withstand Change
Adaptive Automated GUI Testing Producing Test Frameworks to Withstand Change Abstract Although QA and Development managers may see many challenges in creating an automated GUI testing framework, it is
Client Marketing: Sets
Client Marketing Client Marketing: Sets Purpose Client Marketing Sets are used for selecting clients from the client records based on certain criteria you designate. Once the clients are selected, you
Interfacing with Manufacturing Systems in Education and Small Industry Using Microcontrollers through the World Wide Web
Interfacing with Manufacturing Systems in Education and Small Industry Using Microcontrollers through the World Wide Web Samuel Cotton Ph.D. [email protected] Department of Industry and Technology Ball State
UNLOCK YOUR IEC 61850 TESTING EXCELLENCE
IMPROVE EFFICIENCY TEST WITH CONFIDENCE OF KNOW-HOW LEARN AND EXPAND YOUR IEC 61850 SKILLS MASTER YOUR NETWORK KNOWLEDGE GENERATE TEST RESULTS UNLOCK YOUR IEC 61850 TESTING EXCELLENCE Connect To & Read
Revealing the Big Picture Using Business Process Management
Revealing the Big Picture Using Business Process Management Page 1 of 20 Page 2 of 20 Introduction In today s business environment, change is inevitable. Changes in technology, organizational structure,
CA VM:Operator r3. Product Overview. Business Value. Delivery Approach
PRODUCT SHEET: CA VM:OPERATOR CA VM:Operator r3 CA VM:Operator is an automated console message management system for z/vm and mainframe Linux environments. It allows you to minimize human intervention
"Nowa Technika Wojskowa" Nr 12/2011 AS A READY, PROVEN AND COMPREHENSIVE C3I SYSTEM TO SUPPORT LAND FORCES ACTIVITIES The Network Centric Data Communication Platform is a modular, completely prepared according
Note: A WebFOCUS Developer Studio license is required for each developer.
WebFOCUS FAQ s Q. What is WebFOCUS? A. WebFOCUS was developed by Information Builders Incorporated and is a comprehensive and fully integrated enterprise business intelligence system. The WebFOCUShttp://www.informationbuilders.com/products/webfocus/architecture.html
IVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International
IVR CRM Integration Migrating the Call Center from Cost Center to Profit Rod Arends Cheryl Yaeger BenchMark Consulting International Today, more institutions are seeking ways to change their call center
1Building Communications Solutions with Microsoft Lync Server 2010
1Building Communications Solutions with Microsoft Lync Server 2010 WHAT S IN THIS CHAPTER? What Is Lync? Using the Lync Controls to Integrate Lync Functionality into Your Applications Building Custom Communications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
EasyC. Programming Tips
EasyC Programming Tips PART 1: EASYC PROGRAMMING ENVIRONMENT The EasyC package is an integrated development environment for creating C Programs and loading them to run on the Vex Control System. Its Opening
Programming in Access VBA
PART I Programming in Access VBA In this part, you will learn all about how Visual Basic for Applications (VBA) works for Access 2010. A number of new VBA features have been incorporated into the 2010
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
CAE GESI Command & Staff Training
CAE GESI Command & Staff Training one step ahead Meeting new demands in command and staff training Today s armies are facing new challenges that place increasing importance on training. In addition to
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Lottery Looper. User Manual
Lottery Looper User Manual Lottery Looper 1.7 copyright Timersoft. All rights reserved. http://www.timersoft.com The information contained in this document is subject to change without notice. This document
Developing an Artificial Intelligence Engine
Introduction Developing an Artificial Intelligence Engine Michael van Lent and John Laird Artificial Intelligence Lab University of Michigan 1101 Beal Ave. Ann Arbor, MI 48109-2110 {vanlent,laird}@umich.edu
