The existing archives of legacy (mostly paper-based) engineering drawings are precious assets of ... more The existing archives of legacy (mostly paper-based) engineering drawings are precious assets of product data in a manufacturing enterprise. However, for these assets to continue to pay dividends they must be converted to a form suitable for computer-aided applications such as CAD/CAE/CAM, simulation-based design, and virtual prototyping. Manually converting legacy engineering drawings into CAD-file format has become common practice to enable reuse of this legacy data and for maintaining it more cost effectively. However, directly reusing legacy drawings for many modem computer-aided applications is not feasible if the complete product data is not properly recovered (e.g., 3D true-CAD solid model). In this paper, a multiple-level drawing conversion methodology, R23D, is introduced to supply a complete solution to this problem. R23D, based upon semantic drawing interpretation modules, incorporates promising results in vectorization and 3D reconstruction to provide an integrated envir...
Abstract—This paper describes an ontology to support course of action (COA) planning that provide... more Abstract—This paper describes an ontology to support course of action (COA) planning that provides an extensible framework for modeling COA plans consistent with Army and Marine Corp doctrine. This ontology is structured into a core ontology that includes definitions of ...
Policies, rules, conventions, procedures, contracts, agreements, regulations, societal and physic... more Policies, rules, conventions, procedures, contracts, agreements, regulations, societal and physical laws are the defining structure for an enterprise. These items forge relationships between people, information, material, and machines to make a system. In this report, we refer collectively to these items as constraints. Constraints initiate, enable, govern, and limit the behavior of objects and agents to accomplish the goals or purposes of a system. If we want to change the behavior of a system for whatever reason (e.g., improve its performance, efficiency, or effectiveness) we need to know what the relevant constraints are. However, the collection of constraints that forge an enterprise system is generally poorly defined. That is to say, the knowledge of what constraints exists and how those constraints interact is at best incomplete, disjoint, distributed, and often completely unknown. The IDEF9 Business Constraint Discovery method described in this report was designed to assist in the discovery and analysis of constraints in a business system. Once these constraints have been cataloged they can be systematically examined and, if necessary, tuned or replaced to improve the performance of the system.
Timely detection of disease outbreak events is of paramount importance for the defense against in... more Timely detection of disease outbreak events is of paramount importance for the defense against infectious diseases and biological threats. Internet-based communications can provide good situational awareness for countries where public data collection is inadequate, unreliable or missing. The key challenge is to sift through this vast amount of unstructured text to identify relevant reports and to extract disease related information into a structured format suitable for analysis. In this work, Natural Language Processing (NLP) techniques are used on data from news feeds, websites, and medical publications to extract key biological event data. We developed the Threat Assessment Dashboard (BioTHAD™) in order to improve detection and monitoring of biological events. We demonstrate that disease outbreak incidence and timing can be effectively extracted from open news sources using NLP. The BioTHAD™ application could serve as a model for tracking not only infectious, but chronic diseases ...
CAU systems design design evolution 15. NUMBER OF PAGES artificial intelligence computer-aided de... more CAU systems design design evolution 15. NUMBER OF PAGES artificial intelligence computer-aided design S3IR program 3 6 automatic code concurrent engineering shape-based reasoning 16. PRICE CODE generation design 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT I OF THIS PAGEI
An overview is presented of the foundations and content of the evolving IDEF3 process flow and ob... more An overview is presented of the foundations and content of the evolving IDEF3 process flow and object state description capture method. This method is currently in beta test. Ongoing efforts in the formulation of formal semantics models for descriptions captured in the outlined form and in the actual application of this method can be expected to cause an evolution in the method language. A language is described for the representation of process and object state centered system description. IDEF3 is a scenario driven process flow modeling methodology created specifically for these types of descriptive activities.
Public reportmi burden for this collection of information B estimated to average I hour par respo... more Public reportmi burden for this collection of information B estimated to average I hour par response, includinfl tho tine for reviewing instructions, searching existing data sources, gathering and maintainng the data needed, and completing and reviewing the collection of information. Send comments regardng ths burden estimate or any other aspect of this collection of information, includrig suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports.
Abstract: This paper presents the design and implementation of a course of action (COA) ontology ... more Abstract: This paper presents the design and implementation of a course of action (COA) ontology for counterinsurgency (COIN) operations. This ontology supports the commander's C2 decision making processes for COA design, analysis and selection and represents the ...
Ship production planning and scheduling at higher levels do not explicitly consider scheduling de... more Ship production planning and scheduling at higher levels do not explicitly consider scheduling details at the level of individual workshops. However, the schedule of major events in ship production is collectively influenced by the actual shop-level, short-interval production schedules, which depend on resource and material availability and also on the due dates and priorities of the workloads. This necessitates development of robust, resource-constrained, shop-level scheduling systems that can support higher-level schedules in ship production. WorkShip (Knowledge Based Systems, Inc., College Station, TX) is a software tool for scheduling workload over short, regular intervals in workshops of a shipyard. It is driven by a powerful scheduling engine that is based on a generic model of resource-constrained job-shop scheduling and an efficient scheduling technique. Similar scheduling systems are being developed in other shops so that all systems can be used in tandem to support higher-...
The existing archives of legacy (mostly paper-based) engineering drawings are precious assets of ... more The existing archives of legacy (mostly paper-based) engineering drawings are precious assets of product data in a manufacturing enterprise. However, for these assets to continue to pay dividends they must be converted to a form suitable for computer-aided applications such as CAD/CAE/CAM, simulation-based design, and virtual prototyping. Manually converting legacy engineering drawings into CAD-file format has become common practice to enable reuse of this legacy data and for maintaining it more cost effectively. However, directly reusing legacy drawings for many modem computer-aided applications is not feasible if the complete product data is not properly recovered (e.g., 3D true-CAD solid model). In this paper, a multiple-level drawing conversion methodology, R23D, is introduced to supply a complete solution to this problem. R23D, based upon semantic drawing interpretation modules, incorporates promising results in vectorization and 3D reconstruction to provide an integrated envir...
Abstract—This paper describes an ontology to support course of action (COA) planning that provide... more Abstract—This paper describes an ontology to support course of action (COA) planning that provides an extensible framework for modeling COA plans consistent with Army and Marine Corp doctrine. This ontology is structured into a core ontology that includes definitions of ...
Policies, rules, conventions, procedures, contracts, agreements, regulations, societal and physic... more Policies, rules, conventions, procedures, contracts, agreements, regulations, societal and physical laws are the defining structure for an enterprise. These items forge relationships between people, information, material, and machines to make a system. In this report, we refer collectively to these items as constraints. Constraints initiate, enable, govern, and limit the behavior of objects and agents to accomplish the goals or purposes of a system. If we want to change the behavior of a system for whatever reason (e.g., improve its performance, efficiency, or effectiveness) we need to know what the relevant constraints are. However, the collection of constraints that forge an enterprise system is generally poorly defined. That is to say, the knowledge of what constraints exists and how those constraints interact is at best incomplete, disjoint, distributed, and often completely unknown. The IDEF9 Business Constraint Discovery method described in this report was designed to assist in the discovery and analysis of constraints in a business system. Once these constraints have been cataloged they can be systematically examined and, if necessary, tuned or replaced to improve the performance of the system.
Timely detection of disease outbreak events is of paramount importance for the defense against in... more Timely detection of disease outbreak events is of paramount importance for the defense against infectious diseases and biological threats. Internet-based communications can provide good situational awareness for countries where public data collection is inadequate, unreliable or missing. The key challenge is to sift through this vast amount of unstructured text to identify relevant reports and to extract disease related information into a structured format suitable for analysis. In this work, Natural Language Processing (NLP) techniques are used on data from news feeds, websites, and medical publications to extract key biological event data. We developed the Threat Assessment Dashboard (BioTHAD™) in order to improve detection and monitoring of biological events. We demonstrate that disease outbreak incidence and timing can be effectively extracted from open news sources using NLP. The BioTHAD™ application could serve as a model for tracking not only infectious, but chronic diseases ...
CAU systems design design evolution 15. NUMBER OF PAGES artificial intelligence computer-aided de... more CAU systems design design evolution 15. NUMBER OF PAGES artificial intelligence computer-aided design S3IR program 3 6 automatic code concurrent engineering shape-based reasoning 16. PRICE CODE generation design 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT I OF THIS PAGEI
An overview is presented of the foundations and content of the evolving IDEF3 process flow and ob... more An overview is presented of the foundations and content of the evolving IDEF3 process flow and object state description capture method. This method is currently in beta test. Ongoing efforts in the formulation of formal semantics models for descriptions captured in the outlined form and in the actual application of this method can be expected to cause an evolution in the method language. A language is described for the representation of process and object state centered system description. IDEF3 is a scenario driven process flow modeling methodology created specifically for these types of descriptive activities.
Public reportmi burden for this collection of information B estimated to average I hour par respo... more Public reportmi burden for this collection of information B estimated to average I hour par response, includinfl tho tine for reviewing instructions, searching existing data sources, gathering and maintainng the data needed, and completing and reviewing the collection of information. Send comments regardng ths burden estimate or any other aspect of this collection of information, includrig suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports.
Abstract: This paper presents the design and implementation of a course of action (COA) ontology ... more Abstract: This paper presents the design and implementation of a course of action (COA) ontology for counterinsurgency (COIN) operations. This ontology supports the commander's C2 decision making processes for COA design, analysis and selection and represents the ...
Ship production planning and scheduling at higher levels do not explicitly consider scheduling de... more Ship production planning and scheduling at higher levels do not explicitly consider scheduling details at the level of individual workshops. However, the schedule of major events in ship production is collectively influenced by the actual shop-level, short-interval production schedules, which depend on resource and material availability and also on the due dates and priorities of the workloads. This necessitates development of robust, resource-constrained, shop-level scheduling systems that can support higher-level schedules in ship production. WorkShip (Knowledge Based Systems, Inc., College Station, TX) is a software tool for scheduling workload over short, regular intervals in workshops of a shipyard. It is driven by a powerful scheduling engine that is based on a generic model of resource-constrained job-shop scheduling and an efficient scheduling technique. Similar scheduling systems are being developed in other shops so that all systems can be used in tandem to support higher-...
Uploads
Papers by Richard Mayer