Title: P1246341517adQjE
1Round Two Problem Assignment Session 530 pm,
CS 111 Friday March 22, 2002 Participating
Teams Purdue 7, 12, 16, 19, 27, 29, 34, 37,
39, 42 High School HS1, HS2, HS3
2Objectives of Round 2
Assess the ability of each team to
(a) Select and use Internet technologies.
(b) Rapidly prototype an Internet
application.
(c) Work as a team.
3Evaluation Criteria
Your work will be judged based on the
following characteristics of your project.
Decision of the judges will be FINAL.
(a) Completeness
(b) Correctness
(c) User interface design
(d) Novelty, creativity, and the use of
technologies
(e) Team work
(f) Resourcefulness and ingenuity
4Problem Context
- NATO has decided to invest in an Internet-based
ultra-modern ground defense system that can be
deployed anytime and anywhere. The system is
named ICINGS Internet Controlled Intelligent
NATO Guidance System.
2. Your team is one of several invited to prepare
an initial prototype of ICINGS. The winning teams
will be awarded cash prizes and offered
employment to work on this most exciting system
ever built! Details follow.
5Disclaimer!
ICINGS is a completely imaginary system. No
relationship is intended between ICINGS and any
current or future project undertaken by any
private or governmental agency.
The sole objective of this project is to offer a
challenging problem to students in their quest
for learning principles, techniques, and tools of
software development.
6Watch out!
Requirements given here for ICINGS are ambiguous,
incomplete, and TOO many. Each team is expected
to use creativity and experience of its members
to resolve any ambiguity and prototype a very
limited set of features.
The Internet Olympiad Committee will, most
likely, not offer any clarifications on the
ICINGS requirements once the Problem Assignment
Session is over. The ICINGS project is best
considered as a competition to secure a
multi-billion dollar bid.
7ICINGS Assumptions
The conception of ICINGS is based on the
following assumptions
1. The Internet will be a reliable and widely
used means of communications when ICINGS is
deployed.
2. All weaponry used in ICINGS will be monitored
and controlled via the Internet.
3. Engagements between NATO and the enemy will
not use any NATO (human) soldiers in the war
zone.
8Users of the Prototype
- Exclusive to Authorized NATO personnel.
- Others may be allowed limited access for
monitoring but never for control.
9ICINGS User Classification
G A Military General Highest category
P Planner
S Soldier
C Casual user Lowest category
Read on
10What can ICINGS Do?
Any individual can visit the ICINGS site and do
the following
Identify herself/ himself. Depending on the
level of authorization provided by NATO, perform
one or more of the remaining three tasks.
Place a request for weapon deployment.
Monitor a weapon
Monitor and Control a weapon
11Identify
Standard login procedure is used. New users can
sign in as guests and have limited privileges.
NATO authorized users must have their login ID
and passwords already set up by a special
super-secret NATO computer named OSBL (pronounced
as Oz-bill).
Read on
12Place a Request
Allows only NATO authorized personnel of
Category P to place deployment requests. Each
deployment request must provide the following
information
(a) type and amount of weaponry to be
deployed, (b) zone of deployment specified
precisely through global positioning coordinates,
and (c) exact date and time of deployment.
Read on
13Monitor a Weapon
NATO authorized personnel of Category G, P, and
S can monitor a weapon assigned to them by the
OSBL. Monitoring allows
1. Determination of the current location of a
weapon.
2. Viewing the live video feed from the camera
mounted on the weapon. The camera can be moved
360 degrees around its horizontal and vertical
axes through mouse, keyboard, and/or joystick
controls.
3. Viewing any pending requests from the weapon
for (a) ammunition and (b) maintenance.
Read on
14Monitor and Control a Weapon
NATO authorized personnel of Category S can
monitor and control a weapon assigned to them by
the OSBL. Monitoring was explained on the
previous slide. Control allows one to
1. Set parameters for the weapon to be
controlled and the ammunition to be used.
2. Target and fire a weapon through mouse,
joystick, and/or keyboard.
3. Reposition a weapon.
Read on
15Weapon Types
O Observer. Can be placed in certain types of
locations, e.g. mountain, flat land, space, and
water. Contains an electronic eye (a lens). Is
capable of capturing still and moving images.
Some may have night vision capability. Sizes vary
from that of an observing ant to an eagle to a
space satellite.
D Destroyer. Is capable of firing ammunition.
Can be positioned by moving in any of four
directions (Left, right, front, backwards)
through remote control. Has a telescopic viewer
mounted. Also has a auto target tracking system
that can be made to lock itself on a target that
is within a specified range.
16Ammunition
A Ammunition. Can be loaded in only type D
weapons. For each type of D weapon there is a
specific type of ammunition. For example, certain
types of bullets can go into a specific gun. All
ammunition has a remotely controllable lethal
index that varies from 0 meaning absolutely no
physical damage to 10 meaning maximum possible
damage.
All ammunition is intelligent. It ensures that NO
human life is lost. Even a lethal index of 10
does not cause a person to die but will stun a
person.
17Database Access 1
ICINGS will need access to several databases.
Some of these databases are static and not likely
to change during the conflict. Others are dynamic
and likely to change frequently. Here is a list
of databases for use by ICINGS. None of these
databases is provided to you.
Geographical database of all NATO countries and
all countries likely to be involved in a conflict
with NATO. Using data in this database it should
be possible to answer questions like Where is
the largest power plant in country C, what area
does it serve, and what is the makeup of its
neighborhood? Which food manufacturing plant
is within 50 miles of city X and serves the
largest number of people in X.
18Database Access 2
Weather database contains up to the minute
information on weather in any 1 mile region
surrounding any point in the geographical
database.
Inventory database contains the current stock of
each weapon likely to be deployed in the
conflict, weapon attributes, production
requirements, and weapon manufacturers.
Conflict database contains information on the
ongoing engagement. This information includes
damages to property and humans, progress towards
objectives, weapon deployment and performance
details. It should be possible tom replay a
conflict, after the engagement, using information
in this and other databases.
19About your Prototype 1
- Keep in mind that you are developing a prototype
and not the - entire application needed to carry out advanced
warfare.
2. You are free to select any subset of the
features of the application that you want to
include in your prototype.
3. As no real ICINGS is available, you may
develop a simple simulator for use with your
prototype.
4. Do not forget the time constraint placed upon
you. No extra time will be provided
beyond 530pm Friday March 29, 2002.
20About your Prototype 2
5. Your prototype must be accessible via a
browser. The URL of your prototype must end in
teamxx.html, where xx is the 2 digit number of
your team. For example, the URL for accessing the
prototype developed by team 30 must end in
team30.html
6. Your prototype must be accessible to the panel
of judges starting 530 pm on Friday, March 29
and remain accessible, without any change in its
code, until 530pm Friday April 5. The top three
college teams may change their sites until 8am
Monday April 15, 2002.
21Evaluation Procedure 1
1. A panel of judges will evaluate your prototype
using the criteria specified earlier.
2. The evaluation will begin at 530pm on Friday
March 29, 2002 in Room CS 175. The evaluation
will be done in the order listed on the title
slide. You are responsible for setting up your
demonstration.
3. Each team will be given a maximum of 20
minutes to set up and demonstrate their
prototype. Following the demonstration
the judges may ask questions for a maximum of 5
minutes.
22Evaluation Procedure 2
4. The scores from all judges will be combined,
averaged, and tabulated. The teams will be
ranked based on the average scores. The three
teams with the highest score will be declared
the winners of the 2nd Internet Olympiad. The
decision of judges will be final
5. Teams from High Schools will be ranked by the
judges. The top team will have an opportunity to
make a 15 minute presentation to members of the
CS Corporate Partners council on April 15.
23Evaluation Procedure 3
6. Winners will receive cash awards during the
annual CS banquet on April 15, 2002.
- Rankings amongst the top three teams from Purdue
will be decided by members of the CS Corporate
Partners Council (CPC) during the afternoon of
April 15, 2002 in Room CS 111. This will be based
on a 20 minute presentation by each team. The top
three college teams WILL be able to modify their
prototype prior to presentation to the CPC.
8. All resources you use, such as servers etc.,
must be available during the evaluation.
24Questions!