Omega Manual
Omega Manual
Omega Manual
OSI-TG-0888-KWA
----=-=..:.-:-=--.::==--.:..:..:.:..:..:..-_--
PART 1:
Training Guide
Table of Contents
PART 1
TRAINING GUIDE
i-2
i-2
;-3
2 - OESIGNING A CYBERTANK
CHASSIS DESIGN AND AI DESIGN
i-4
BEGINNING THE CYBERTANK DESIGN PROCESS
i-4
The Design Control Module
i-5
Creating a New Cybertank
i-5
DESIGNING THE CYBERTRNK'S CHRSSIS
j-6
The Chassis Design Module Display Panel
i-6
Selecting Equipment
i-7
Choosing ALPHA's Equipment
i-8
Viewing ALPHR's Specifications
i-ID
DESIGNING THE CYBERTRNK'S AI
i-l0
Cybertank Command Language (CCL)
i-II
Semi custom uersus Full Custom Design
'i-ll
The AI Module
i-12.
Entering ALPHA's AI
i-12
EHamining ALPHA's AI
i-12
Routines
i-13
Library Capsules
i-13
Sauing the Cybertank Design
i-14
AUTHORIZING A CYBERTANK
i-14
Actiuating the Cybertank Authorization Module
i-14
2.5.2 Successful Ruthorization
i-15
2.5.3 Unsuccessful Ruthorization
i-15
.J
TC-1
PART 1:
OSI-TG-0888-KWA
Training Guide
i-17
i-I B
i-I B
i-19
i-19
i-20
i-20
i-21
i-21
i-21
i-21
i-22
i-23
i-23
i-24
i-24
i-25
i-25
i-25
SECTION
4.1
4.2
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
4.2.6
4.2.7
4.2.B
4.3
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5
i-26
i-26
i-27
i-27
i-2B
i-2B
;-2B
i-29
i-29
i-29
i-30
i-30
i-31
i-31
i-32
i-32
TC-2
PART 1:
OSITG0888KWA
4.3.5
4.4
4.4.1
4.4.2
4.4.3
4.4.4
4.4.5
SECTION
5.1
5.1.1
5.1.2
5.2
5.2.1
5.2.2
5.3
Undo
EDITING ALPHA
Aeloading ALPHA
Aeplacing a Capsule
Authorizing the new ALPHA
Sauing the Design As Beta
Authorizing BETA
Training Guide
i-32
i-33
i-33
i-33
i-34
i-35
i-35
5 - REUISITINGTHE SIMULATION
MORE RBDUT THE CYBERTANK COMBAT SIMULATDRi-36
Deleting the Did Simulation Design
i-36
Designing the New Simulation
i-36
RUNNING THE SIMULATOR
i-37
The Instrument Panel
i-37
Watching the Simulation
;-38
TIME FOR SOME R & R
i-38
TC3
PART 1:
OSI- TG-0888-KWA
Training Guide
i-45
;-47
;-47
i-48
i-49
i-50
i-51
i-52
i-52
i-54
i-55
i-56
i-56
i-57
;-57
i-62
i-68
i-74
SECTION
7.1
7.1.1
7.1.2
7.2
7.2_1
7.2.2
7.3
7.3.1
7.3.2
7 - TESTING A CYBERTANK
THE CYBERTANK TEST MOOULE
Loading the Simulation Oesign
The CTM Control Panel
TRACE MODE
Pausing the Test
Single Stepping
STATUS MOOE
Selecting Status Mode
Changing Status Registers
i-76
i-76
i-76
i-77
i-77
i-77
i-7B
i-78
i-7B
SECTt ON
8.1
8.2
8.3
8.4
8.5
8 - ClEAAANCE EUALUATION
Promotion Criteria
Requesting A Clearance Evaluation
The Evaluation Process
Promotion Approval
Time For A Uacation
i-80
i-80
;-81
;-81
;-82
TC-4
PART 2:
OSI-MR-71988-AG
Module Reference
PART 2
MODULE REFERENCE
SECTION
1.1
1.1.1
1.1.2
1.1.3
1.1.4
1.2
1.3
ii-2
ii-3
ii-4
ii-5
il-6
il-7
ii-8
SECTION
2.1
2.2
2.2.1
2.2.2
2.2.3
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.4
2.4.1
2.4.2
2.4.3
2.4.4
2.4.5
2.4.6
2.4.7
2.4.8
2.4.9
2 - DESIGNING A CYBERTANK
GENERAL INFORMATION
DESIGN CONTROL MODULE
The CYBERTANK Menu
The EO IT Menu
The CAPSULE Menu
CHASSIS DESIGN MODULE
GENERAL
COM CONTROLS
TANK ClRSSES
FUEL CEllS
OR I UE SYSTEMS
WEAPON TYPES
SPECIAL ITEMS
RRTIFICIAL INTElLIGENCE MODULE
GENERAL
THE INSEATION CUASOR
Inserting TeMt
Deleting TeMt
Adding New line
Scrolling
SELECTI NG TEHT
Deleting a Section of TeHt
Replacing a Section of TeHt
ii-9
il-9
i i-II
il-13
ii-15
ii-16
ii-16
ii-18
ii-19
il-19
li-19
ii-20
ii-21
ii-24
li-24
li-24
li-25
il-25
ii-25
ii-25
ii-26
ii-27
li-27
Te-5
PART 2:
OSIMR-71988-AG
Module Reference
jj-27
il-28
jj-28
ii-28
jj-32
li-34
ii-37
il-38
SECTION
4.1
4.2
4.3
4.4
ii-40
ii-4D
ii-41
11-42
SECTI ON
5.1
5.2
5.3
5.4
5.5
jj-45
jj-45
ii-46
il-47
ii-49
SECTt ON
6.1
6.2
6.3
6.4
6 - ClEARANC EUALUATION
CM FUNCTI ON AND LAYOUT
GENERAL COMMANDS
THE INSTRUMENT PANHS
OTHEA OPTIONS
ii-53
ii-54
ii-54
ii-54
ii-56
jj-62
ii-64
TC6
OSI-CCL-71988-AG
il-68
ii-70
ii-71
PART 3
CYBERTANK COMMAND
LANGUAGE
SECTION
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
iii-2
jjj-2
iii-3
iii-3
jjj-4
iii-5
iii-5
iii-5
iii-7
iii-8
iii-9
iii-II
iii-13
iii-15
iii-16
iii-17
iii-18
iii-19
iii-21
iii-22
iii-23
TC-7
.... AH I 4:
OSI-CR-71988-AG
3.9
l.,;apSUle Heterence
ili-23
iii-25
iii-26
iii-27
SECTION
5. I
5.2
5.3
5.4
5.5
5.6
5.7
5.8
5.9
iil-29
iii-3D
iii-31
iii-32
iii-32
iii-34
iii-35
iii-36
ii;-39
5 - MISCELLRNEOUS COMMRNOS
REPA IRING OAMRGE
DEFENSE SHIELD
DETERMINING FUEL LEUEL
WHEN ALL ELSE FAILS
GENERALLY USEFUL COMMANDS
SETTING A "BREAKPOINT"
ATTAINING MANUAL CONTROL
SEQUENCE COMMANDS
INCLUDING CAPSULE ROUTINES
PART 4
CAPSULE REFERENCE
SECTION
1.1
1.2
1.3
1.4
1.4.1
1.4.2
1.4.3
1.4.4
1 - GENERRL INFORMRTlON
WHRT IS R CRPSULE?
HOW TO USE A CAPSULE
OS I CRPSULE STRNORROS
OSI CAPSULE ROUTINES
"SEARCH FOR ENEMY" CRPSULES
"TRRCKING" CAPSULES
"ENEMY TERMINATION" CAPSULES
"FLEE FROM ENEMY" CAPSULE
TC-8
iu-2
iu-2
iu-3
iu-5
iu-5
iu-a
iu-9
iu-IT
OSI-COT-121988-AG
PART 5
1 - MElEE
MElEE OBJECTI UE
MELEE TACTICS
Destroying the Other Cybertanks
Hiding From the Other Cybertanks
u-2
u-2
u-2
u-3
u-4
u-4
u-5
u-6
u-6
PART 6
TROUBLESHOOTING
SECTION
1.1
1.2
1.3
1.4
1 FILE
DISC
DISC
DISC
0 ISC PROBLEMS
NOT FOUND
WRITE PROTECTED
FULL
MALFUNCTION
ui-2
ui-2
ui-3
ui-4
TC-9
ui-5
ui-5
Part 6 - Troubleshooting
OSITS72588SM
ui-7
ui-7
ui-8
ui-9
ui-9
Te10
OSITG0888-KWA
PART 1
TRAINING GUIDE
SYNOPSIS
This section is designed for the new employee. All new
employees must read the Training Guide to deuelop an
understanding of design and implementation. The Training
Guide couers many important topics, including the Employee
Identification Oisc, designing a cybertank, testing a
cybertank, and the Clearance Evaluation procedure.
j1
OSITG0888KWA
SECTION
GENERAL INFORMATION
SECTION BRIEF
This section describes how to use the Training Guide,
eHplains how to get started, and prouides important
background information.
1.1
1.2
GETTING STARTED
OSI-TG-OBB8-KWA
1.3
SPECIAL KEYS
RETURN
DELETE
TAB
MARK
CURSOR-LEFT
CURSOR-RIGHT
CURSOR-UP
CURSOR-DOWN
These names are always typed in UPPER CRSE, as they
appear aboue. Some terminals do not haue all of these keys.
Consult the OSI/CRCO System 2 Reference Card to determine
which keys are auailable for your terminal type .
j3
OSITG0888KWA
SECTION
DESIGNING A CYBERTANK
SECTION BRIEF
Designing a cybertank consists of two steps: designing the
chassis and designing the Artificial Intelligence (AI). The
term Chllssls refers to the cybertank's mechanical
components. HI refers to commands which control the
cybertank's actions uia an on-board computer. This section
details both aspects of cybertllnk design.
2.1
2.2
j4
OSITG0888KWA
Ofol/COI:O !iVlJIEn
ua;n!)lu"
i!'II'l~''1,:1
!i 111110,,"[1
15
OSITGOBBBKWA
2.3
To get a feel for using the COM panel, try selecting each of
the component buttons. Note each button's effect as it
appears on the main display area.
OSI TG0888K WA
IJIPF.H
Main Display
Area
Component
Buttons
I ... ht
;>11 II .. -
ere d it 0 is play
Area
'l~,'
---~~"~"E,,~n~";~)
n
Diagr,l111 2.3.1-- Chassis Design Module (COM)
NOTE:
For users of Commodore 64 and Apple
/ /+,c,e terminals only:
Instead of a small, circular indicator, B diamond
appears indicating that IL @IliU has been selected.
The credits display area is updated accordingly.
j7
as 1- TG-0888-K WA
1-8
OSI-TG-0888-KWA
j9
OSITG0888KWA
HLPIfIl
5hr.rn;U\ 111
300
"n,t~
L.~hl
2Dk..
-~S
1:11
1115
2.4
i-l0
OSI-TG-0888-KWA
Panel
j11
OSITG0888KWA
j-12
OSI TG-0888-KWA
i13
OSI TG0888K WA
commands and are often named after the first routine they
contain. This is the case with both Seek and Destroy.
The line Include Seel< represents the contents of the
Library Capsule named Seel<. You could replace Include
Seel< with the CCl commands from the library Capsule
"Seek" without changing the meaning of the AI.
later in this Training Guide you are shown how to uiew, edit,
and create Library Capsules. Part 4, "Capsule Aeference,"
describes the Capsules auailable in the OSI Library.
2.4.8 Sauing the Cybertank
Your cybertank design is now
10 Disc. 8efore proceeding,
identical to the following (no
upper and lower case letters):
Design
ready to be saued onto your
make sure that your AI is
distinction is made between
Start
Do Seek
Do Destroy
Branch to Start
Include Seek
Include Destroy
To saue your cybertank design, select SAUE from the
CY8ERTANK menu. ALPHA's chassis and Ai designs are now
s lored on your 10 Disc.
2.5
AUTHORlZING A CYBERTANK
i-14
..
OSI-TG-0888-KWA
Unsuccessful Authorization
If the CAM identifies a problem with your design, a messoge
is displayed eHplaining the problem. If the problem is in
your chassis design, press any key. You will be transferred
to the Chassis Oesign Module (COM) where you can fiH the
cybertonk's chassis_
j15
OS 1- TG-OBBB-KWA
OSI-TG-088SKWA
SECTION
BATTLE SIMULATION
SECTION BAIEF
The Combat Simulotion Module (CSM) is a powerful and
f1eHible tool used by engineers to obserue cybertanks under
a uariety of bottle conditions. This section describes how to
design and conduct a bottle simulotion.
3.1
117
OSI-TG-0888-KWA
3.2
1.
2.
3.
4.
5.
64 and Apple
1-18
OSI TGOBBBKWA
Primary Tank
Display Areo
-lIil---
Other Tonks
Display Area
Battlefield
T.... ,, In
DlsPIOY Rreo
{N",,,,)
OSI-TG-0888-KWA
OSI-TG-0888-KWA
3.3
CONDUCTING A SIMULATION
121
OSITG0888KWA
,
,
.-
JL
l-
If
'~
os
~o
n.
II :.g
Diagram 3.3.1 - Combat Simulation Module (CSM)
i-22
OSI-TG-0888-KWA
Table 3.3.2
i-23
OSI TG0888KWA
NOTE:
j24
OSlo TG0888KWA
as I TG0888KWA
SECTION
4.1
4.2
THEAIMODULE
i-26
OSITG0888KWA
OSITG0888KWA
OSITG0888KWA
1-29
OSI' TG0888KWA
Using the Keyboard: You can always scroll teHI using the
SCAOll keys. See Ihe OSIICACO Syslem 2 Reference Card 10
delermine which keys 10 use on your lerminal.
4.3
i-3D
OSITG0888KWA
Using a mouse/joysticle:
To select teHt, moue the'
pointer to the neginning Of the teHt you wish to select,
press and hold the nutton down, and moue the pointer to
the end of the teHt section you wish to selecl. Once
selected, release the button.
Using the keyboard: To select, moue the IC to the
neg inning of the teHt you wish to select, press the MARK
key, then moue the IC to the end of the section of teHt (see
the OSI/CACO System 2 Reference Card to determine the
MARK leey for your particular terminal type).
In either case, the teHt is highlighted as it is selected. Try
selecting "Branch To" now.
Selected teHt is deselected when the I C is moued. If using
the keyboard, the teHt is not deselected until the MARK key
is pressed a second time.
EHperiment with selecting and deselecting words, lines, and
paragraphs. Notice that you can also select teHt
"backwards." In other words, you can negin selecting from
either end of the teHt section.
4.3.2 Deleting a Section of TeHt
When editing AI, you will occasionally want to delete a
section of teHI. You could moue the IC to the end of the
section and press DElETE many times to remoue the section,
nut there is an easier method.
To delete a section of teHt, simply select the teHt in the
manner preuiously described, then press DElETE. To
demonstrate, select "an eHample of" and press DElETE. The
sentence "This is an eHample of a line which is too long"
now reads "This is a line which is too long. "
4.3.3 Replacing a Section of TeHt
It is often desiranle to replace a section of teHt (typically a
word) with something else. You could delete the old teHt
end begin inserting new teHt. but, once again, there is a
netter method.
i-31
as 1- TG-0888-KWA
o(
teHt is stored.
1-32
OSI-TG-OBBB-KWA
4.4
EDITING ALPHA
i-33
OS I TG0666KWA
i-3 4
as 1- TG-0888-KWA
i-35
OSI-TG-0888-KWA
SECTION
5.1
OTHER TANKS
ALPHA
VIPER
BATTLEFIELD
HOUSTON
OSITG0888KWA
5.2
i-37
os I TG0888-KWA
5.3
j38
OSI TG0888KWA
SECTION
6.1
GENERAL INFORMATION
6.2
OSI TGOBBBKWA
l~liijllw.lilli~~]lillll~ll!jlll~i~~'III~11
j~!rn~llill!11!IIjjfl1!!jjrrg~11!1.1jlllllijlll.!!1!jrill
Diagram 6.2.1 -
6~ ~
j40
OS I TG0888KWA
W-+~---:--I-E
s
Oiagr.lm 6.2.2 - The eight possible facing directions
6.2.3 Distance
Each cell is adjacent to eight other cells, one in each of the
standard directions. When calculating distance, any two
adjacent cells are considered to be one hectometer apart.
6.3
051- TG-0888-KWA
j42
OSI-TG-0888KWA
6.4
i-43
OS I TG0888K WA
6.4.~
System Uariables
System Uariables are used by the CCl for internal
operations and represent the state of the cybertank. They
may be used in computations, but cannot be altered. System
variables are very useful, and often necessary, in designing
cybertank AI.
EHamples include: TankH and TankY, which
specify the cybertanks coordinates; Fuellevel, the amount
of fuel remaining; and EnemyDist, the distance to the
enemy. See AppendiH 2 for a list of the System Uariables.
i-44
OSITG0888KWA
6.5
i-45
OSITG0888KWA
MOVE
FORWARD
3
Notice that the command MOUE THNK FOHWHRD 3 has been
entered into the teHt. Now select these plaques:
ROTATE
TO ENEMY TANK
Notice that the command ROTHTE SCHNNER TO FHCE ENEMY
THNK has been entered. Now try one more eHample:
IF
WEAPON
WEAPON RANGE
ENEMY WITHIN
DO
At this point, the CP is prompting you to enter a label name.
Type in BlASTEM and press RETURN. Notice that the command
IF ENEMY THNK IS WITHIN RHNGE THEN 00 BlHSTEM has
been entered. The CP prompts you to enter label names,
variable names, or H-Y coordinates when needed to
complete a particular command.
i-46
OSI TGOBBBKWA
types
of M 0 U-E
as 1-TG-0888-KWA
TANK LEFT 1
TANK LEFT ThisMuch
TANK RIGHT 2
TANK RIGHT ThatMuch
i-48
OSITG0888KWA
can
scan
for
enemy
cybertBnks,
enemy
are
j49
listed
below.
Try
051- TG-0888-KWA
i50
OSI TG0666KWA
are listed
below. Try
to
FIRE WEAPON AT 23 46
FIRE WEAPON AT Xcoordinate Ycoordinate
The lest two commands cause the weapon to fire in 8
specified direction.
i-51
os 1- TG-0888-KWA
i52
OSI TG0888K WA
i-53
as 1- TG-0888-KWA
i54
OSI-TG-OBBB-KWA
6.5.11
Rssignment Commands
Assignment Commands alter the ualues of User Uariables.
These commands are used in the fallowing three forms:
<user var> = <value>
<user var> = <var> + <value>
<user var> = <var> - <value>
j55
OSITG0888KWA
6.6
051 TGOBBBK WA
i-57
as 1- TG-0888-K WA
Moue
Forwerd
I
Diagri\ln 6.6.3.1 - Process flow of simple mo\'ement
As you cen see, the eboue process does not require eny
thinking other then thet used to moue forwerd. From the
eHperiment, you cen elso tell thet the process is not uery
effectiue. To moue more effectiuely, you should leaue your
eyes open and your hands out of your pockets. 1f thet were
the case, then the thought process could be depicted like
thet shown in Diagram 6.6.3.2.
Begin Here
Is Something
in my way?
NO
Can I moue
YES
NO
the
Obstruction?
YES
Moue the
Moue Forward
1-4------1 Obstruction
out
of my way.
Diagram 6.6.3.2 -Process flow of complex movcm'nl
i-58
Turn to one
side and try
again
OSI-TG-0666-KWA
i-59
OSI-TG-0888-KWA
Is Movement
Obstructed?
0.----YES
Fire at
Obstruction
NO
Move Forward
ENO OF
SMAATMOUE
NO_--<
Is Movement
s till
Obstructed?
YES
CD
'--O-b-s-t-ru-ct-i---'oLn-m-u-s-t-b-e-'
indestructable so turn
to a new direction and
try again
C ==>
SMAATMOUE
OETECT OBSTAUCTI ON AT TANK 0 I AECTI ON
IF MOUEMENT IS NOT OBSTAUCTEO TIIEN BAANCH
TO GO
FIAE WEAPON AT OBSTAUCTION
i-60
OSI TG0666-KWA
0==>
E ==>
GO
F ==>
G ==>
3.
i-61
OSITG0888KWA
i-62
OSITG0666KWA
OS I TG0666KWA
look straight
ahead for any
sign of
someone.
someone?
NO
Turn Slightly to
the left.
YES
Haue you already
looked this
direction?
NO
YES
Moue on to a
i-64
OS ,. TG0666- KWA
Look for an
Enemy Tank
Rotate the
Scenner
slightly to the
left
NO
Tank: Found?
Was an Enemy
YES
made 8 complete
circle?
YES
0' ,--''--------,
=:....j
L-
Perform
SMRRTMOUE
i-65
NO
OSITGOBBBKWA
=~>
B
C
~~>
~~>
o =~>
SEAACH
SCAN FOA ENEMY TANK
IF ENEMY TANK WAS FOUNO THEN BAANCH TO
ENDSEAACH
AOTATE SCANNER LEFT t
i-56
OS I TGOBBB K WA
E ==}
==}
G ==}
Go ahead
Since this
"use" or
following
i-67
OS 1- TG-OBBB-KWA
i-68
OSITG0666KWA
OSITG0666KWA
TAG
look to make
sure someone
is around
YES
Is the person
close enough
to tag?
NO
Turn to face
Moue towards
the person
the person
YES
i-70
as 1- TG-0888-KWA
(0
I s Enemy Tank
NO
still found?
-(r-E-~-~-N-~-f ~)
YES
Is Enemy Tank
within Weapon
Ronge?
{;\
0.-----. 0.--__---,
Turn Tank
NO
towards Enemy
I--"~
Tonk:
YES
\V r-_-L-W_--,
Fire Weapon at
the Enemy Tank:
i-71
Perform
SMAATMOUE
OSITGOBBBKWA
A ==>
B ==>
C ==>
0==>
E ==>
F ==>
G ==>
H ==>
HUNT
SCRN FOR ENEMY TANK
IF ENEMY TANK WRS NOT FOUNO THEN BRANCH
TO HUNTOONE
IF ENEMY TRNK IS BEYONO WEAPON RANGE THEN
BRANCH TO CLOSE IN
FIRE WEAPON AT ENEMY TANK
BRANCH TO HUNT
CLOSE I N
TURN TANK TO FACE ENEMY TRNK
00 SMARTMOUE
BRANCH TO HUNT
HUNTOONE
RESUME
Go ahead and enter this HUNT routine into GAMMA's RI. Since
this is another routine, you need another instruction to "use"
or cell it when necessary. This is accomplished by inserting the
line "00 HUNT" before the "BRRNCH TO START" instruction at the
beginning of GAMMA's AI. The beginning of GAMMA's RI should
look like the following:
START
00 SERRCH
00 HUNT
BRANCH TO STRAT
j72
OSI TG0888KWA
j73
OSI-TG-0888-KWA
6.7
GOING AT IT ALONE
Now you are ready to design your own cybertBnks using the
Full Custom Design techniques discussed in the preuious
three sections. Use what you hBue leBrned to design the
best RI you can. Borrow ideas from other designs and add
your own. Remember to use the three step procedure
outlined in the aboue sections.
t>
2>
3>
j74
OSI- TG-0888-KWA
i-75
OSITGOBBBKWA
SECTION
TESTING A CYBERTANK
SECTION BRIEF
This section describes the Cybertank Test Module (CTM), the
primary diagnostic tool for design problems.
7.1
j76
OSI-TG-0888-KWA
7.2
TRACE MODE
i-77
OSITG0888KWA
7.3
STATUS MODE
i-78
osrTG0888KWA
i-79
OS 1- TG-0888-KWA
SECTION
CLEARANCE EVALUATION
SECTION BRIEF
This section describes procedures used in obtaining a
Clearance Eualuation.
8.1
PROMOTION CRITERIA
8.2
i-80
OSITG0888KWA
8.3
8.4
PROMOTION APPROVAL
NOTE:
only:
j8l
OSITG-0888KWA
8.5
i-82
PART 2:
OSI-MR-71988-AG
Module Reference
PART 2
MODULE REFERENCE
SYNOPSIS
This section is designed for new and eHperienced
employees. The Module Reference provides quick access to
all functions of the OSI/CACO System 2 operating
environment. All sections of the OSI/CACO System 2 are
covered in detail.
ii'
PART 2:
OSI-MR-71988-AG
SECTION
Module Reference
1.1
1I""'n Sl ...,u,
11'~ 1111011
I"
lI,u'llth,n" ,
Th.,
.,:m .. hn
"n.
.. .th ....
Ii""
'IOU.
"n,,"I1,,,.
Itllr,'
lli
lIl;ra~1 ,,,all!~ ~1
.. "~"t:lI
H-2
PART 2:
OSIMR71988AG
I.l.t
Module Reference
Il~lln
lla",
J hop" ..""
,11"'-
f:;U~~~',:::,~~,.I""j,
H"rll.ll
ABOUT OMEGA
Displays the copyright notice and the name of the principal
system designer.
KEYBOAAO
Selects the keyboard as your primary input device.
MOUSE
Selects the mouse as your primary input device.
JOYSTICK
Selects the joystick as your primary input device.
SpecilJl Note:
No t IJII input devices IJre supported
on IJII terminlJl types.
ii3
PART 2;
OSI-MR-719BB-AG
1.1.2
Module Reference
"~Ela.1I!
1!5.,n'
lI .. llu Oan.
1 hilI''' 'IIIU ~
f~o~~::':';"b~"
1111111,,,,, lllrl'dl'cl la ;t
IIer" ... ~1I"l!th.n~
NEW EMPLOYEE
Returns you to the Security Entrance Procedure at OSI's
main compleH entrance.
CLERRRNCE EURLURTION
Initiates an Employee Eualuation request for possible
promotion to a higher clearance leuel.
CONTINUE RN EURLURTION
Continues a preuiously saued Clearance Eualuation.
DELETE SRUEO EURLURTION
Deletes a preuiously saued Clearance Eualuation_ See
Section 9.3 for more information on using the File
Termination Panel (HPJ.
CRLL IT R DRY
Performs a security shutdown of your computer terminal
and unlOCKS your office door so you can leave. EHcessiue
early departures will be duly noted.
ii-4
PART 2:
OSI-MR-71988-AG
I. 1.3
Module Reference
Hillin (Jan,
I it" IDIIlllnll (" ........ d In ~~ .. Hln'" 1l1th
~:~~Gg~\I.
is gnt<e ,nil
II",""
In
NislI.
START A SIMULATION
Inuokes the Combat Simulation Module.
CONTINUE A SIMULATION
Inuokes the Combat Simulation Module and continues a
preuiously saued simulation.
DESIGN A SIMULATION
Inuokes the Simulation Design Module.
PRINT SIMULATION STATS
Prints the uarious statistics of a simulation to your printer.
See Section 1.2 for detailed information.
DElETE A SIMULATION DESIGN
Deletes a simulation design that was created with the
Simulation Design Module.
DElETE SAUEO SIMULATION
Deletes a simulation that was saued from the Combat
Simulation Module.
jj-5
PART 2:
OSI-MR-71988-AG
1.1.4
Module Reference
.~
I .
11 .. 110 D;ln,
'{I'll lullP'!.
rll"....bl!r
lI"re ...
so..ell"nll
h:I
DESIGN CYBERTRNKS
Inuokes the modules used to create and modify cybertanks.
TEST CYBERTRNK
Inuokes the Cybertank Test Module used to test cybertanks
in 6 simulation.
DESIGN BRTTLEFIElD
Inuokes the Battlefield Design Module.
DUPLI CRlI ON MDDULE
Inuokes the Data Duplication Module.
DELETE CYBERTRNK
Deletes a cybertank from a your 1D Disc.
ii-6
OSI-MR-71988-AG
PART 2:
1.2
Module Reference
SIMULATION STATISTICS
NUMBER OF BRTILES:
12
ALPHA
BETA
GAMMA
DINKY
2
3
1
1
1
1
J
6
ii-7
OSI.MR.71988.AG
1.3
PART 2:
Module Reference
iiB
PART 2:
OSI-MR-71988-AG
SECTION
Module Reference
DESIGNING A CYBERTANK
SCTI ON BR I F
This section describes the OSIICRCO System 2 modules used
to create and modify cybertank designs.
2.1
GENERAL INFORMATION
2.2
ii-9
PART 2:
OSIMR71988AG
Module),
Module Reference
and
Cybertank
.X;.
r.
11...1 .."11
-[d.l"
.[",~..
,..
nSIJ'CIiCU SYSlln 2
[IHllfllll nnUlIll
UlflS1UII 2'l!'ti' l'l.:t
or~i1r."
("b,,''.mH llv-...."",.
SI,......
SlllttOIlHD
ij10
PART 2:
OSI-MR-71988-AG
Module Reference
The neHt lime you enter the DCM, you are immediately
transferred to the AI module, with the last modified
cybertank design loaded. This default option is prouided for
your conuenience, since you will probably edit your
cybertank's AI instead of its chassis. If you wish to edit the
chassis, simply select the CHASSIS option in the
CYBERTRNK menu.
NOTE:
There are seueral instances in which the last
cybertank design will not be loaded. It usually occurs When
the design was not located in any or the auailable access
slots, If this happens, the design must be loaded manually.
The DCM, COM, and AI Module all share the same menus.
Different menu items are enabled or disabled depending
upon the module you are using. The menus are described in
this section. Features unique to each modUle are discussed
in the fOllowing sections.
(
2.2.t
..,.
." ....
,n
-;"
"
,.,.,
,
C'lh'"
II
In ,.
: 51E" i!.
l t1l1DUL(
, 'li!1'1.:J
.", t
iill
PART 2:
OSIMR71988AG
Module Reference
NEW
Allows you to create a new cybertank design. If selected,
the File Storage Panel (FSP - see Section 9.1) appears. Enter
the name of your new cybertank design and select the SnUE
button. You will be transferred to the CDM to design the
new cybertank's chassis (see Section 2.3).
LDAD
Lets you retrieue a preuiously saued cybertank design. If
selected, the File Retrieual Panel (FRP - see Section 9.2)
appears, Select the cybertank design you wish to load and
you are transferred to the AI Module (see Section 2.4).
SAUE
Stores the current cybertank design to your ID Disc.
SAUE AS
Allows you to saue the current cybertank design using a
new name. If selected, the FSP apppears. Enter a new name
for your cybertank design, It should be noted that the new
uersion of the design is totally separate from the original.
The original remains unchanged. After sauing, the new
cybertank design file becomes the working design.
CHASSIS
Transfers you to the Chassis Design Module (CDM) (see
Section 2.3),
AI
Transfers you to the AI Module (see Section 2.4).
AUTHDRI2E
Transfers you to the Cybertank Authorization Module (CAM)
for approual of your cybertank design in conforming to DSI's
specifications (see Section 2,6).
PR I NT
Prints the current cybertank design. The printout contains
the cybertank's chassis components and a complete listing
of its artificial intelligence. Aefer to the DS I /CACD System 2
ii-12
PART 2:
OSI-MR-71988-AG
Modul.e Reference
WAANING:
Once a cybertank design is terminated, it cannot be
recol1ered!
QU IT
EHits the DCM and returns you to the EHternal Control
Module (ECM).
2.2_2
" 1",,,1'11'11('
(I~>1
"1:111:1'
t:tf51r.1I til,.
VHIStlJl1.
_.~,
=- _---'.
-:---"1
r,-.""",,,,
I:"U""I,,,,'; 1'1.,,..,'
.,If!,,.HIIIII
Ii",."
CUT
Removes selected
temporary storage.
teHt
from
the
AI
and
places
it in
OSI-MR-719BB-AG
PART 2:
Module Reference
COPY
Places selected teHt into temporary storage without
remouing it from the AI.
PART 2:
OSIMR71988AG
2.2.3
Module Reference
'Edil'~
'1;'11""1."'11'
, .
I'll.!...
.
,
,,,, 'Je12
Ul,!/l:llr:1l SI'!ilEtl,
lll~illill
r.UNTlllll. lUI.
:'-'V'I;>''!
,-1"1'
VUr~lIlH
[lela....
j,.
Sllltll'lllllD
LOAD
Used to retrieve a previously saved AI Capsule. If selected,
the FAP appears. Highlight the desired capsule and select
the LOAD button. You are transferred to the A I Module (see
Section 2.4), with the selected capsule loaded.
(NCLUDE
Used to place an AI Capsule into your cybertanl<'s AI. When
selected, the FRP is displayed. Select the desired RI Capsule
and it will be inserted Elt the current cursor position.
SAUE
Used to save the current RI Capsule.
ii15
PART 2;
OSIMR71988AG
Module Reference
UERIFY
Used to check an RI Capsule for syntaH errors. This process
is analogous to the Authorization procedure used when
designing cybertanks, but no chassis design is required.
DELETE
Used to remoue AI Capsules from your 10 Disc. When
selected, the FTP displays the names of all A I Capsules on
your 10 Disc. Highlight the AI Capsule you want to delete
and select the DELETE button.
WARNING
Once an AI Capsule has been deleted, it cannot be
recouered!
PRINT
Prints a complete listing of the current AI Capsule to your
printer. Refer to the OSI/CACD System 2 Reference Card for
more specific instructions for printing.
2.3
2.3.1
GENERAL
The Chassis Design Module (COM) is used to create and
modify a cybertank's chassis, including its tank class, fuel
cells, driue system, weapon type, scanner, and assorted
special items.
A uaried selection of components prouides endless
possibilites for chassis design - limited only by bUdget
restrictions. Due to variations in price and attributes, it is
important to be selectiue with the components used in your
design. Some tank classes weigh more than olhers, some
weapons fire faster than others, etc. To assist in the design
phase, the attributes of each component are included in
tables in this section.
ii-16
PART 2:
OSI-MR-71988-AG
Module Reference
jj17
PART 2:
OSI-MR-71988-AG
Module Reference
ER
... r,
Main Display
Area
_ _-h-,,;shRrrwn f11
Component
Buttons
Credit Display
Area
Diagram 2.3.2 _. Chassis Design Module (COM)
ii-18
PART 2:
OSI-MR-71988-AG
Module Reference
WEIGHT
ARMOR
AMPHIBIOUS
Cougar X
Medium
Weak
No
200
Heavy
Weak
Ves
350
Sherman M7
Olympia
Bradley
M4
Mercury
Light
Weak
No
500
Medium
Average
No
Medium
Weak
Yes
650
750
825
Light
Average
No
Challenger
Heavy
Strong
No
M5 Turtle
Medium
Average
Britannia
Medium
Strong
Light
Strong
Ves
Ves
Ves
Centaur
Bentley
COST
975
1100
1500
2000
ii-19
PART 2:
OSI-MR-71988-AG
Speed
Weight
Module Reference
Light
Medium
275
Heavy
Heavy
400
Turbo
Medium
525
Light
700
Gyro
Heavy
900
Flux
1200
Drive
System
Light
Standard
Dual-Turbo
Cost
150
Medium
Fission
light
1500
Fusion
Medium
2000
Light
2500
Ion
ii-20
damage
to
all
PART 2:
OSI-MR-71988-AG
Damage
Module Reference
Damage
Cost
Speed
Amount
Piercing
Slow
Light
Ext. Armor/Instruments
175
Explosive
Slow
Lt-Med
Ext. Armor/Instruments
250
$Iow
Medium
Ext. Armor/Instruments
Laser
Fast
Medium
Weapon
Turbo Laser
Area
Internal
Internal
475
675
750
Fast
Med-Heavy
Gauss Gun
Average
Heavy
Plasma Gun
Average
Heavy
Ex!. Armor
1300
Slow
Heavy
EXL/lnt.
'800
Nuke
Ex!. Instruments/Weapon
900
OSI-MR-71988-AG
PART 2:
Module Reference
Scanner lock
A normal scanner only identifies the current location of an
enemy cybertank and mouement cannot be detected unless
you perform multiple scans. You can lock onto an enemy
cybertank and track its mouement by using the Scanner
lock. By using this item, your scanner will rotate
automatically to face the enemy and is unaffected by your
cybertank's mouement.
You can unlock your scanner at any time. It unlocks
automatically if the target cybertank is destroyed or the
scanner's view is obstructed. In addition, an enemy
cybertank can unlock your scanner by disrupting your signal
with a Jammer (described below).
This deuice reQuires special AI instructions. See Part 3,
Section 3.6 for more information.
listener
Determines whether or not an enemy cybertank has locked
onto you with its scanner. Identifies the need to jam an
enemy signal.
This deuice reQuires special AI instructions. See Part 3,
Section 3.7 for more information.
Jammer
Used to jam an opponent's scanner signal once lock-on has
been discovered. The Jammer disrupts an enemy's scanner
signal and forces it to unlock. A listner deuice need not be
installed for the Jammer to function.
This deuice reQuires special AI instructions. See Part 3,
Section 3.8 for more information.
OSI-MR-71988-AG
PART 2:
Module Reference
launcher
This deuice launches 0 remote sumner into the air. A remote
scanner links your Cybertank Scanner System (CSS) with the
OSICOM I satellite. Once linked, you are relayed the
locotion of the enemy cybertank nearest you.
PART 2:
OSI-MR-71988-AG
2.4
Module Reference
2.4.1
GNRRl
A special Cybertank Command language (CCL) was
deueloped to aid in the design of a cybertank's artificial
intelligence. The creation of a cybertank's AI is performed
using the Artificial Intelligence Module (AI Module).
2.4.2
TH I NSRTI ON CURSOR
All teHt, whether entered by keyboard or with the CP, is
inserted at the thin uertical bar referred to as Ihe
Insertion Cursor (IC). You can moue the IC anyWhere in
the edit window by mouing the mouse/joystick pointer and
clicking the button. In addition, you can moue the IC with
the following CURSOR keys (please refer to the OS I /CRCO
System 2 Reference Card to determine the appropriate keys
for your terminal Iype):
ii-24
PART 2:
OSI-MR-71988-AG
Module Reference
ii25
PART 2:
OSI-MR-71988-AG
Module Reference
ii-26
OSI-MR-71988-AG
PART 2:
Module Reference
OSI-MR-71988-AG
PART 2:
Module Reference
2..4.11
Copying and Pas ling TeHI
You can duplicate (copy) a section of teHt and place it in a
new location. This function does not remoue selected teHt
from its current location in the edit window.
To CoPY, select a section of teHt and choose COPY from the
EO IT menu. A duplicate or copy of the selected teHt is
stored internally by the AI Module.
To Paste, moue the IC to a position that marks the
beginning of the insertion. Select PASTE from the EO IT
menu. A copy of the stored teHt is inserted at the current
location of the Ie. You can continue to paste that section
into new locations by mouing the IC and selecting PASTE
from the EDIT menu.
UNDO
2.5
PART 2:
osrMR71988AG
Module Reference
.... "nli_
I1fJUI;
lOr.nll
'11101 f"1:1
fnll
....
'!iI'E1:rJlL'
'1l11IltU:1l
ii-29
PART 2:
OSI-MR-71988-AG
Module Reference
ii-3D
PART 2:
OSIMR719BBAG
ttR~2:J.~fO~5 OBs1RUCTED
CH1l1Uill111l
1
Ii
L
lRI1HrOUflU
Module Reference
THE"
~llUr- r DRll'lIlO
I
OHRIlI:Il In IRIlHSEnROI
CHRIlGEOIR
If
'OO
IURIIDIR
TURII
'1
1111111 Lf1
IHIII I:O!
1
THfll
'IIr;on"t1 I".
Diilgr.1m 2.5.2
B-31
OSI-MR-71988-AG
2.6
PART 2:
Module Reference
PART 2:
OSI-MR-71988-AG
Module Reference
.battle, the cylJertank will use its old chassis and HI and not
the modified design.
ii33
PART 2:
OSI-MR-71988-AG
SECTION
Module Reference
3.1
.<
PART 2:
OSIMR71988-AG
NOTE:
Module Reference
.~.
employee
UisPlilY nrc.,
Prima!"!) Tilnk
lJisnlay lIreil
U"r..'HI
t- !ilfl~3HHJl
'!lRW
GUilI,wMm!Jll
,--,ita,;,
-OJTT
\1
Ottler Tanks
Oispltly nrc.,
Ik.v"
l
I
Bailiefieid
OisplilY nrCi)
I:
ltllUSllJl1
i i -3 5
PART 2:
OSI-MR-71988-AG
Module Reference
jj36
PART 2:
osrMR-71988AG
Module Reference
3.2
between
selecting
ii-37
PART 2:
OSI-MR-71988-AG
3.3
Module Reference
ii-38
PART 2:
OSI-MR-71988-AG
Module Reference
NOTE:
R headquarters
indestructible Objects.
cannot
be
moved
through
PART 2:
OSI-MR-71988-AG
SECTION
Module Reference
4.1
4.2
GENERAL COMMANDS
ii-40
OSI-MR-71988-AG
PART 2;
Module Reference
4.3
1
A
T
S
W
SL
DS
LD
Fuel level
Internal damage (AI Computer, Engine)
Armor damage
Tread damage
Scanner damage
Weapon damage
Scanner Lock (off = unlocked; on = locked)
Defense Shield (off = down; on ~ up)
Listener Device (on ~ being scanned)
PART 2:
OSI-MR-71988-AG
Module Reference
T
8
S
A
4.4
OTHER OPTIONS
AESTAAT
SIMULATION is used to start the
simulation ouer again. All battles simulated
cybertonk uictories are cleared.
ii42
current
and all
PART 2:
OSI-MR-71988-AG
Module Reference
ii-43
OSIMR71988AG
PART 2:
Module Reference
PART 2:
OSI-MR-71988-AG
SECTION
Module Reference
5.1
5.2
GENERAL COMMANDS
PART 2:
OSI-MR-71988-AG
Module Reference
5.3
OTHER OPTIONS
PART 2:
OSIMR-71988AG
Module Reference
5.4
TRACE MODE
l~ltt:
gnC Efl
---~--------_.
otn~hHu~RliII
--
Ir apS1RIJi.1F.a
~1I11" IIflRlle
III
JURH Lcrr 1
II[A\fite~I"~RHH
IF
1I11!;IRIl~TED
~~~tt fiR II II 10
(CT~I)
ii-47
PART 2:
OSI-MR-71988-AG
Module Reference
instructions closely.
ii-48
PART 2:
OSIMR71988AG
5.5
Module Reference
STATUS MODE
"t-
I
I
(J.p'';'
,~~~f
tor
.. It
nl:,'
,',f
.. l~"
i
~.
,II'
'.f'
..,
'H
n'
f"
It
~"
:flt>
11,1
reI.,'
.fl"."
I,
II
11
f~hm
t', .....
I.: :;;~:~;"
U!'''/'ll'
Ii
j;-49
PART 2:
OSI-MR-71988-AG
Module Reference
The table below lists all of the entries which can be changed
along with their respectiue System uariable name:
Page 1
Page 2
Page 3
ENTRY NAME
Fuel Left
Direction
X Location
Y Location
SYSTEM VARIABLE
FuelLevel
TankDir
TankX
TanyY
Type
X Location
Y Location
Distance
Obstacle Type
ObstacleX
ObstacleY
ObstacleDist
Internal
Armor
Treads
Scanner
Weapon
IntDamage
ArmorDamage
TreadDamage
Scan Damage
WeapDamage
Direction
ScanDir
X Location
Y Location
Distance
EnemyX
EnemyY
EnemyDist
Type
X Location
Y Location
Distance
ObjType
ObjX
ObjY
ObjDist
X Location
Y Location
Distance
EnemyHQX
EnemyHQY
EnemyHQDist
Ally Number
Code Received
AllyNum
AllyCode
ii50
PART 2:
OSI-MR-71966-AG
Page 4
Page 5
Module Reference
X Location
Y Location
Distance
AllyX
AllyY
AllyDist
X Location
Y Location
Distance
Direction
AllyEnemyX
AllyEnemyY
AllyEnemyDist
AllyEnemyDir
Ally Number
Code Received
CopyNum
CopyCode
X Location
Y Location
Distance
CopyX
CopyY
CopyDist
X Location
Y Location
Distance
Direction
CopyEnemyX
CopyEnemyY
CopyEnemyDist
CopyEnemyDir
Repair Kits
Launchers
XY Distance
Random #
KitsLett
RemotesLeft
XYDist
RandomNum
X Location
Y Location
AllyHQX
AllyXQY
Pages siH and higher list all the User Uariables in the
cybertank's AI. All User Uariables can be edited.
To change the value of a System or User Uariable, halt
eHecution (see Section 5.2) using the PRUSE key. If you are
using a mouse or joystick, simply click on the register you
wish to change and it becomes highlighted. I f you are using
the keyboard, please refer to the OSI/CRCO System 2
Reference Card to determine the appropriate keys to use to
highlight the various status registers. Once you have
highlighted the variable you want to edit, simply use the
ii-51
OSI-MR-71988-AG
PART 2:
Module Reference
PART 2:
OSI-MR-71988-AG
SECTION
Module Reference
CLEARANCE EVALUATION
SEClI ON DR I EF
This section describes the importance of clearance
euoluotions and the method of accessing on euoluotion.
6.1
EMPLOYEE ElJALliRTrON
FORM:1I263'i-A
I1P I "<lljl) 11".. "
Dan
tl""
II P
MOnO
~ ij s,:":',';;;::;.
ii-53
PART 2:
OSI-MR-719BB-AG
Module Reference
6.2
GENERAL COMMANDS
6.3
6.4
OTHER OPTIONS
ii-54
OSI-MR-71988-AG
NOTE:
PART 2:
Module Reference
PART 2:
OSIMR71988-AG
SECTION
Module Reference
7.1
ii56
PART 2:
OSIMR71988AG
Module Reference
ii57
PART 2:
OSI-MR-71988-AG
Module Reference
ii-58
PART 2:
OSI-MR-71988-AG
Module Reference
!I+,c,e
j -
59
PART 2:
OSI-MR-71988-AG
are
available
Module Reference
from
the
8 l 0 CK
iiGO
PART 2:
OSI-MR-71988-AG
Module Reference
Di.1gr,lm 7.1.3
EDIT Menu
ii51
PART 2:
OSIMR71988AG
Module Reference
7.2
USING BLOCKS
ii-62
PART 2:
OSI-MR-71988-AG
Module Reference
Once you haue the blocks, select PlOP MODE ON from the
ED IT selection menu. You can moue around on Ihe
baltlefield and "plop" the currently selecled block onlo Ihe
battlefield by clicking anywhere in Ihe main display area. If
you are using Ihe keyboard, please refer 10 Ihe OSI/CACO
Syslem 2 Reference Card for more information.
To relurn 10 using liles 10 create Ihe battlefield, select Ihe
DISPLAY TILES oplion from wilhin the EDIT selection menu.
ii-63
PART 2:
OSIMR719BBAG
SECTION
Module Reference
8.1
ii-54
PART 2:
OSIMR71988-AG
.~.
Module Reference
n".I'ld,l.lllI
1I11t!
.t.,..t"I'W."'I.ut' ..
:;" I ... " I
III 10"
Ih,- 1
,..
,hu,I'Ii"I,,,,
ii65
OSI-MR-71988-AG
PART 2:
Module Reference
data
files
leftfrom
Once you have selected the data file(s) you want to copy,
you must identify a destination for those files. Select the
DESTlNRTlON button. Three new buttons, DRIUE, COpy and
CRNCEl, are displayed.
The DRIUE button is used to select the destination or target
access slot for the copy procedure. Select the DRIUE button
until the desired disc name is displayed in the DESTINATION
field at the upper left of the screen.
To begin the duplication procedure, select the COPY button.
Uarious status messages will appear in the lower-left area
of the screen labeled INFORMATION. These messages give
you specific instructions (if needed) for completing the
duplication process.
PART 2:
OSI-MR-719BB-AG
Module Reference
ii-67
PART 2:
OSI-MR-71988-AG
SECTION
Module Reference
SYSTEM OPERATIONS
SEcn ON BR I H
This section describes the operation of data file operation
panels.
9.1
ii-GS
PART 2:
OSIMR71988AG
Module Reference
Select the SRUE button to saue the data file to the current
disc using the name you entered. You CRNNOT saue a file
without first giuing it a name.
The CRNCEL button lets you abort the saue process. You are
returned to the current module.
ii-59
PART 2:
OSI-MR-71988-AG
9.2
Module Reference
ore more than SiH names. use the up and down scroll arrows
to scroll through the list.
ll", .. I."II\_
l'a.l
'.11 Sn ,.,
PART 2:
OSI-MR-71988-AG
Module Reference
9.3
ii-71
PART 2:
OSI-MR-71988-AG
Module Reference
'. ,ro-'m
III II
.. RIO] 15
ii72
PART 2:
OSI-MR-71988-AG
Module Reference
ii-73
OSI-CCL-71988-AG
PART 3
CYBERTANK COMMAND
LANGUAGE
SYNOPSIS
This section presents the commands auailable for designing
a cybertanlc's Artificial Intelligence (AI). The CCL Aeference
is a must for all ineHperienced employees and contains B
great deal of useful information for the eHperienced
employee, Each section of the CCl Reference contains
eHamples to clearly demonstrate the use and function of
the commands.
iii-1
OSI-CCL-71988-AG
SECTION
1.1
GENERAL DEFlNITIONS
1.2
CYCLE COUNT
iii2
OSI-CCL-71988-AG
1.3
CCl
commands,
"reserued"
for
RESERVED WORDS
operators.
specific
and
System
purposes
Uariables
and
cannot
are
be
1.4
STRUCTURE CONVENTIONS
iii-3
OSI-CCL-719BB-AG
1.5
LABELS
iii-4
OSI-CCL-71988-AG
1.6
SYSTEM VARIABLES
1.7
USER VARIABLES
1.8
OPERATORS
"Llbcl"
1 eye
jjj5
TankOir + 1
iii-6
OSI-CCL-71988-AG
SECTION 2
COMMAND STRUCTURE
1 eye
1 eye
60 eye
TrcadDamagc
EXAMPLE USAGE
ChcckTrcad
H ~Slj):n:.l-:
~J":r(~j)'d,::; ~!11e
CCT~:E~~}1
]~EP:ilh' T!I\~.J! ~l~
CT.Exil
Resullle
lFu:m.:'l1'U1HI1
~.rll1~:rl
lli:t<'i1:nttlll T<D
OSI-CCL-719BB-AG
2.2
MOVING
COMMAND STRUCTURE
40 eye
40 eye
TankX
TankY
EXAMPLE USAGE
MoveClear
Detect Obstruction at Tank Direction
,If Movement is Not Obstructed Then Branch To Me_Move
Fire Weapon at Obstruction
Branch To MoveClear
Me Move
iii-a
OSI-CCL-71988-AG
2.3
TURNING
COMMAND STRUCTURE
16 eye
16 eye
16 eye
'16 eye
'16 eye
16 eye
16 eye
T;lI1kDir
EXAMPLE USAGE
FindOpen
iii-9
Turn Tank To 7
There are many instances where you need to haue your
cybertanlc moue to a Icnown location, but are not sure of
the needed direction. Four different commands in the CCl
will automatically turn your cybertanlc in the nearest
direction to face B known location.
iii-l0
OSI-CCL-71988-AG
2_4
COMMAND STRUCTURE
4 eye
4 eye
4 eye
1 eye
1 eye
1 eye
1 cyc
"Label"
If Obstruction [isl Ally HQ Then [Branch To: Do] "Label"
"Label"
iii-ll
OS 1- C C L- 71 988-A G
ObslacleX
ObslacleY
ObslacieDist
ObslacleType
EXAMPLE USAGE
l\1oVCCIC<lf
D-el~d (Crb.:;1T~I..::'lj'DJl
1.
0111 TofJ:n:J-:.
iD:i:r~J.:aj({):.n
commands to
iii12
OSI-CCL-71988-AG
2.5
COMMAND STRUCTURE
1 cyc
1 eye
1 eye
If Tank [isl Not Facing (Enemy] Tank Then (Branch To: Dol
liLa bell!
If Tank [isl Aligned [with Scanner] Then [Branch To: Dol
"Label"
If Tank lisl Not Aligned [with Scannerl Then [Branch To:
Do] "Label"
If Tank [isJ Facing Enemy HQ Then [Branch To: Dol
"Label"
If Tank [isl Not Facing Enemy HQ Then [Branch To: Dol
1 eye
1 eye
lILabel"
If Tank [is] Facing "X" llyn Then [Branch To : Dol liLa bel"
If Tank [is] Not Facing "X" "y" Then [Branch To: Do] II Labcl lt
1 eye
1 eye
1 eye
None
EXAMPLE USAGE
MoveClear
Detect Obstruction at Scanner Direction
If Movement is Not Obstructed Then Branch To MC_ChkDir
Fire Weapon at Obstruction
Branch To MoveClear
MC_ChkDir
U:1 'If&l:nlk b A1ug:rl\B!1 mall 't<ilml~lI' 'lI!h~:rl JBlI'<il!nclh .!f1O
!VH::_iVl"'''''''
Align Tank with Scanner
MC_Move
Move Tank Forward 1
Resume
iii-13
OS I-C C L- 71 988-A G
iii-14
OSICCL-719BBAG
SECTION 3
3.1
COMMAND STRUCTURE
1 eye
1 eye
60 eye
SCilnDamagc
OSI-CCL-71988-AG
EXAMPLE USAGE
ChcckScan
:Ii
~':j):rnl~:r
:E~]JJlh ;.r,n:IJ:II'=2'
CS_Exil
Resume
3.2
COMMAND STRUCTURE
8 eye
'I cye
1 cyc
EncmyX
EnelllYY
EncmyDist
EXAMPLE USAGE
FindTank
Rotate Scan ncr Right 1
~':.tn :'F.o:r :.E:rlE:1.rlY Tn:rl):
]J :.E:!r~:m:y TIl:r!.}: t'f.j1,:; 1'10'1 J='O!1:!1 ~I 'rJI ~Jl
"B:r1lncll
Teo
:Fhl ~ITll:rl~'.
FT_Follndlt
Rcsullle
iii-16
OSI-CCL-719BB-AG
3.3
COMMAND STRUCTURE
8 eye
1 eye
"Label"
If [Closest] Object [was] Not Found Then [Branch To: Dol
"Label"
1 eye
ObjX
ObjType
ObjY
ObjDist
EXAMPLE USAGE
ClearArea
Tree = 4
House = 5
Align Tank with Scanner
CA_Loop
t<DJl IF<f):r cn(,m~~1 @hfie:ctl
<CJUR~d.l~
CA_Rotate
Rotate Scanner Righf 1
If Scanner Not Aligned with Tank Then Branch To CA_Loop
CA Exit
Resume
CA_Destroy
If Closest Object is Beyond Weapon Range then Ca_Rotate
Fire Weapon al Closest Object
Branch To CA_Loop
OSI-CCL-71988-AG
3.4
COMMAND STRUCTURE
8 eyc
1 cye
1 ("c
1 cye
1 eyc
EnemyHQX
Ellcmyf-lQY
EnclllyHQDist
EXAMPLE USAGE
ChrcknilSC
G-l.:i11l1
:f-o:r
lli!Jl~m)' JJ{~
Rotate Scanner 1
Brilnch to ChcckB.1Sl~
Shoolll
Firc ""eilpon ilt Encmy HQ
Resume
iii-18
OSICCL71988AG
3.5
COMMAND STRUCTURE
Rotate (Scanner] Left "it"
16 eye
16 eye
16 eye
16 eye
16 eye
16 eye
1 eye
1 eye
ScanDir
EXAMPLE USAGE
FinctTilllk
lll(OU~j~e Gtll:n:!I.e:r U~fig]rt 11
SC;ln For Enemy Tank
iii-19
OS I-CCL-71988-AG
-1-~4'-~-1-
s
Diagram 3.5 - The eight possible directions
iii-20
OSICCL71988AG
your scanner to
the
3.6
COMMAND STRUCTURE
5 eye
5 eye
I eye
I eye
Lock (Scanner)
Unlock ISc.lnner)
If (Scanner isl Locked then [Branch To: 001 "Label"
If (Scanner is! Unlocked then [Branch To: Dol "Label"
None
EXAMPLE USAGE
FindTilllk
Scan for Enemy Tank
If Enemy T.ll\k WilS Found then IT_Follnd
Rotate Scanner Right 1
Brill1ch to FindT;lI1k
FT Found
Lod": ':;';iIJIJI!::r
~!:.!l.:rl::1:~:r
:ic V:a1u,!;r.e.tl
U]L~::rl :e:rJ.l:!l-cll
".rro
:Firl~ITil:n}.
Resume
The SCBnner lock, B speciBI item built into the CSS, CBn be
purchBsed in the Chessis Design Module (COM) if you hBue
enough credits in your bUdget. Wheneuer a "lock Scenner"
instruction is eHecuted, your cybertenk's scanner locks onto
iii-21
OSICCL71988AG
3.7
COMMAND STRUCTURE
1 eye
1 eye
None
EXAMPLE USAGE
Detect
UfJ ual1.r&:
i1~ i\l(O~
l.8\!:U1llg
:!::~11url~~1 'U"~)~ln
OT No
Resume
iii-22
OSI-CCL-71988-AG
3.8
COMMAND STRUCTURE
8 eye
None
EXAMPLE USAGE
Detect
y,mn
(.f;i!1I11fl~:r ii~:.rli1J
DT_No
Resume
The Jam Stenner signal commend is useful only if your
cybertonk is equipped with 0 Jommer, 0 speciol device
ovoiloble in the Chossis Design Module (COM). The Jommer
will outomoticolly unlock 011 enemy cybertonk sconners
which hove locked onto your cybertonk. This provides on
opportunity for escope (hopefully) while enemy cybertonks
try to re-scan end detect your new location.
3.9
COMMAND STRUCTURE
15 eye
1 eye
1 eye
EncmyX
EnclllyDist
EllcmyY
RClllolcsLcfl
iii23
OSI-CCL-71988-AG
EXAMPLE USAGE
TryLaunch
ilif
U~l!:lIH01~
S-t:i1:n:n.e:r
j~ UJJH1\7.))]TIn1Jlll.e Tall~Jl
iB:ral:ndl "Ir<o
TlL_i\I(l)
LL1Htll1ltli !RelffilO1.e S:!:<$l!I}!l'le:r
TL No
Resume
A Aemote Scanner is a special device available in the
Chassis Design Module (COM). When you purchase a Aemote
Scanner Launcher it is built into the CSS.
Aemote Launchers hold four Remote Scanners. When
"Launch Aemote Scanner" command is eHecuted,
Remote Launcher hurls a Remote Scanner into the
Remote Scanners are links between your cybertank and
oSICoM I satellite.
the
the
air.
the
OSICCL71988AG
SECTION 4
fire
4.1
COMMAND STRUCTURE
"I eye
1 eye
60 eye
Rcp"ir '''''capon
\'Ve<l p D.ll1lage
EXAMPLE USAGE
ChcckWeap
J1 \W:::;':lj.Jo:n :i.:; :F':!:W:th;Jli"l] TJI.!;:Il ]nl:.n-!:]) T<o CiY'1....:E:.::.ll
:,E::]J ilh ~1Y t i(\.' 011
CW Exit
Resullle
OSI-CCL-71988-AG
4.2
COMMAND STRUCTURE
1 eye
1 cye
1 eye
1 eyc
1 eyc
1 eye
None
EXAMPLE uSAGE
FindTank
Scan for Enemy Tank
If Enemy Tank Was Found Then Branch To CheckRange
iii-26
OSI-CCL-71988-AG
4.3
COMMAND STRUCTURE
40 eye
40 eye
40 eye
40 eye
. 10 eye
10 eye
None
EXAMPLE USAGE
C1carl'ath
Detect Obstruction ... t Tank Direction
I f Movement is Not Obstructed then LctsMove
:F11=
"1'I!;i1}itJl1
irt
O!;~tr:g.c!jWl
lctsf\ love
Move Tank Forw:lrd 1
Resume
iii-27
OSICCL71988-AG
Special Note: The CWS WILL NOT fire the weapon if your
Defensive Shield is up (see Section 5.2 for more
information on the Defense Shield).
OS IC C L 71 988A G
SECTION 5
MISCELLANEOUS COMMANDS
SECTI ON DR I EF
This section presents a collection of diuerse commands
which are generally useful, but not commonly used.
5.1
REPAIRING DAMAGE
COMMAND STRUCTURE
60 eye
60 eye
60 eye
60 eye
60 eye
1 cyc
1 eye
Repair Internal
Repair Armor
Repair Treads
Repair Scanner
Repair Weapon
If [Repair] Kit [is] Available then [Branch To: Do] "Label"
If [Repair] Kit [is] Unavailable then [Branch To: Do] "Label"
IntOamage
ArmorDamage
ScanDamage
TreadOamage
WeapDamage
KilsLeft
EXAMPLE USAGE
TreadFixer
If Tank Treads are Not Functional Then FixTreads
Resume
FixTreads
A\1~:lJ~b)e
Ji.h:al1
!F~~'!]t1
Resume
FixJt
Ultepi1J:r T:reil..;l.;
Resume
iii-29
OS I-CC L-71988-AG
5.2
DEFENSE SHIELD
COMMAND STRUCTURE
10 eye
5 eye
1 eye
I eye
RaiselShieldl
Lower [Shield]
If Shield (is1 Up Then [Branch To: Do} "Label"
If Shield [is] Down Then [Branch To: Dol "Label"
None
EXAMPLE USAGE
ChkShieid
:If f}]d~hl
ll.'o~'1e:r Sld~Jil
Shoolll
Fire ''''capon at Enemy Tank
Resume
OSI-CCL-71988-AG
5.3
COMMANO STRUCTURE
1 cyc
If Fuel ( isl Emply Then (Branch To: Dol "Label"
"eye
None
EXAMPLE USAGE
ChkFul'1
NoNJD\'1~
Move Forw<lrd 1
Noi\'1ove
Resume
All cybertanks require fuel to power onboard mechanical
deuices. Without fuel, a cybertank is a sit ting duck. A lack
of fuel affects the fOllowing:
I. The MOS, CSS, and CWS are inoperable.
2. All mouement is terminated.
3. All CommLink communications are halted.
4. The Oefense Shield cannot be raised.
As you can see, running out of fuel is no triuial matter. It is
an important consideration in the design of your
cybertank's AI. Always try to keep mouement to a minimum,
since it is a big fuel consumer. The Energy Miser, auailable
in the Chassis Oesign Module (COM), is an important option
since it reduces fuel consumption by approHimately 50'7.
OfE: [uen though your cybertank moy run out of fuel, its
internal computer systems still continues processing logic
functions. The AI still eHecutes ond TAYS to carry out all
commands. If you design your cybertank to check its fuel
leuel regularly, you can have it branch to a special routine
(possibly self-destruct at that point) when it detects a lack
of fuel.
iii31
OSICCl?' 988AG
5.4
COMMAND STRUCTURE
1 eye
Self Destruct
EXAMPLE USAGE
Cheek A II
I f Tank Treads arc Functional Then Branch to OK
If Scanner is Functional Then Branch to OK
If ""capon is Functional Then Branch to OK
If Fuel is Remaining Then Branch to OK
If Repair Kit is Available Then Branch to OK
tsE]f lD~~~::r.m:j
OK
Resume
5.5
COMMAND STRUCTURE
XYDisl
RandomNulll
jjj32
OSICCL71988AG
EXAMPLE USAGE
CheckDist
(G~1 W1Z"tilll'!:"!?
lllQ :J. 11
>l-
IElE(!-1!p
Resume
You can put anything you want here
MaybeGo
CGte~ If,{.ulUil([:HIl \liO lliDU
If RandomNum > 50 then NoGo
Branch to Movelt
>l- All of this is ignored by the computer systems
No Go
>I-
Resume
iii33
OSI-CC L-719BB-AG
5.6
SETTING A "BREAKPOINT'
COMMAND STRUCTURE
oeye
Break
None
EXAMPLE USAGE
ChcckEncmy
Scan for Enemy Tank
If Enemy Tank W"s Not Found Then Branch To Done
If Enemy T,1Ilk Is Not WiLhin ""capon Rilllge Then Br<lnch To
Done
DOlle
Resume
iji34
OSICCL71988AG
5.7
COMMAND STRUCTURE
1 eye
1 eye
None
EXAMPLE USAGE
ReadKey
l'J1l nl!;:Il
111;;]:
J'1:~:y
P:r.:.z::!;d ::::
11111~1
J{ey
]:I
Resume
1'vlovcForwd
Move Tank Forwilrd 1
Branch to Done
Fire
Fire 'Veapon at Closest Object
Done
Resume
The Cybertank Remote System (CRS) provides a great deal of
control over your cybertank's actions. The CRS is basically a
link between your terminal's keyboard and your cybertank.
By issuing one letter commands [R-Z) from your terminal's
keyboard during simulations, you can alter the behavior of
your cybertank.
The above eHample checks to see if the "I" or "F" keys have
been pressed. If either were pressed, the CRS passes the
information to the cybertank's AI so it can respond
accordingly by branching to the correct label. If neither the
", .. nor "F" key were pressed, then the cybertank continues
to function as usual.
Cybertanks that rely on Ihe CRS 10 respond to keyboard
control are often called Manual cybertanks. Manual
cyberlBnks haue a tremendous eduentege ouer standard AI
iii35
OSI-CCL-71988-AG
5.8
SEQUENCE COMMANDS
COMMAND STRUCTURE
1 eye Do "Label"
1 eye Gosub "Label"
1 eye Resume
SYSTEM VARIABLES AFFECTED
None
EXAMPLE USAGE
TankProg
lD>n ~~<11UIlB!11lB:Ul:7
1!J>t> iYJt>w<!!lFiJ'\>nl
lBJl'<11!!H:ill 11(0 1l'c1lln!k1P!l'<eg
SeanEnemy
Scan For Enemy Tank
If Enemy Tank Found Then 1Ilf)
\S~)'o'o1Ua
!g~~"ll!l1)e
MovcFrwd
Move Tank Forward 1
!R.(!!~~l:mte
Shootll
If Enemy Tank is 'oVilhin Range Then ij),Q
~G]]}l
ll{~z;!un(!!
Kilill
Fire at Enemy Tank
lf~ce~:tll1)~
iii36
OSI-CCL-71988-AG
iD:o
>t ..
iYj&l~~~:p.nnl
llJ:o lJ(l)\Y~:F~'1:ril
iD\O ,tcllll:E:nelllY
IB1'Ul:ndl U:O :.a~~'J):Ul:pl.e
MakePath
Detect Obstruction at Tank Direction
If Movement is Not Obstructed Then "B:ru:m;}l U<D NJnJt'e!D}:
Fire Weapon at Obstruction
MakcOk
:gtes~nn&
MoveFwrd
Move Tank Forward 1
!R (!? 131.n:t11 ~
iii-37
OSICCL-71988AG
ScanEncmy
Scan for Enelll}' Tank
If Enemy Tank Not Found Then le:ril:udi T([) i"JIJ:E:n~:lll}'
If Enemy Tank is Beyond \Veapon RanGe Then ill:r111l!::h TID
i'\l OiE:r1ElJ1Y
Fire ''''capon at Enemy Tank
NoEncmy
lflemtllJllt'
1.
The routine "MakePalh"
MakePath" command.
is
called
with
the
"Do
2.
The routine "MakePath" checks to see if there is an
obstruction. If there is no mouement obstruction, then
eHecution branches to "MakeOK". If there is an obstruction,
then Ihe cybertank fires at it (and hopefully destroys it).
3.
Whether there was an obstruction or not, the AI winds
up at "MakeDk". At "MakeOK" there is a "RESUME"
command. This command returns the AI back to the
command directly after the "Do MakePath". In other words,
eHecution continues at the line "00 MoueFwrd'.
4.
The commend "Do MoueFwrd" sends eHecution to the
routine "MoueFwrd".
5.
The "MoueFwrd" routine simply moues the cybertank
forward 1 hectometer.
6.
The "RESUME" command sends eHecution back to Ihe
line directly after the "Do MoueFwrd" command, which is
the "Do ScanEnemy" command.
7.
The "00 ScanEnemy" command sends the AI to the
routine called "ScanEnemy".
8.
The routine "ScanEnemy" checks to see if an enemy
can be found and if so, is it within weapon range. If an
enemy cybertenk is not found, or one is found but is out of
weapon range, then the RI will branch to the label
OSI-CCL-71988-AG
eHecution
there is 0
AI to the
In other
EHample."
1O.
The commond "Bronch to EHomple" loops the AI bock
up to the label "EHomple" ond the whole process is
repeated ouer Bnd ouer.
5_9
COMMAND STRUCTURE
None
EXAMPLE USAGE
TankProg
Do SCilnEllclllY
Do MovcFnvd
Br.lllch to TankProg
lllld~\.t1fB J..:.Jl:n:.E:n~:rn;y
Part 4.
iii-39
OSI-CCL-71988-AG
SECTION 6
6.1
COMMAND STRUCTURE
1 cyc
1 cyc
Switch [CommLink] On
Switch [CommLinkl Off
None
EXAMPLE USAGE
CheckBase
Scan for Enemy HQ
If Enemy HQ was Found Then TellTeam
Resume
TellTeam
~\ffl~l!:'~1
<Cro:t1l111lLhlz. (Q):n
iii-40
OSI-CCL-71988-AG
6.2
COMMAND STRUCTURE
1 eye
1 eye
1 eye
AllyNum
AlIyCodc
AllyX
AllyY
AlIyDisl
AlIyDir
CopyEnemyDist
AllyEncm)'X
AlIyEnel1lYY
AlIyEnel1lyDisl
AlIyEnel1lyDir
CopyNul1l
CopyCode
CopyX
CopyY
CopyDisl
CopyDir
CopyEncm)'X
CopyEncmyY
CopyEnemyOir
CheckComm
If AHyeode <> then CodcHcrc
:le11:r C:ru:mILhl}.
Branch to CheckComm
CodeHere
Switch COJnm Link Off
CCO}'}' (C<D:m:U11lnl-:
i[}3)111
Switch CommLink On
If CopyCode;:: 1 Then EnemyFound
If CopyCocte;:: 2 Then BaseFound
Resume
iii-41
OSICCl71988AG
iii-42
OSICCL71988AG
5. Use the "Copy ... " System Uariables (CopyH, CoPyY, etc ... )
to home in on the team member in distress.
The aboue, written in CeL, would resemble the following:
CheckComm
An AllyCode of 7 means team-member being attacked
An A1lyCode of 1 means enemy HQ found
If AllyCode = 7 then Branch To Rescue
If AllyCode = 1 Ihen Branch To FoundHQ
Resume
Rescue
The cybertank now knows that a team-member is being
attacked.
Switch CommLink Off
Copy CommLink Data
Switch CommLink On
The CommLink is turned off to ensure that new incoming
transmissions do not over-write the current values in the
CommLink. The CommLink data is copied into another set
of System Variables that are NOT overwritten by incoming
CommLink transmissions. It is this second set of System'
Variables that is used in subsequent AI commands. The
CommLink is turned back on so that the cybertank can
continue monitoring in case a more important transmission
GoToTank
This small routine moves the cybertank toward the teammember that sent the distress signal. Since fhe Copy
CommLink Data command was issued. the System Variables
CopyX and CopyY are used as the cybertank's destination.
Along the way, the cybertank continues checking the
AllyCode System Variable in the CommLink to see if any
team-member has found the enemy HQ.
Turn Tank to CopyX CopyY
Detect Obstruction at TankDir
iii-43
OSICCL71988-AG
FoundHQ
If the enemy HQ was found, the cybertank should perform the
same procedure as when moving to a team-member in
distress.
Switch Commlink Off
Copy Commlink Data
Switch Commlink On
Branch To GoToHQ
Now, the cybertank is free to use the ..Copy..... System
Variables to proceed to the team-member which found
the enemy HQ. Since this routine is a great deal like the
GoToTank routine used above, we will just assume the
routine is written and is called GoT 0 H Q.
iii-44
PART 4:
OSI-CR-71988-AG
Capsule Reference
PART 4
CAPSULE REFERENCE
SYNOPS I S
This section is a must for new employees. The Capsule
Routine Reference details the "hows" and "whys" of using
pre-defined AI routines. Capsule routines can simplify the
creation of a cybertank's AI. Employees can "plug-in"
uarious routines to perform diuerse operations .
iv-1
PART 4:
OSICR71988AG
SECTION
Capsule Reference
GENERAL INFORMATION
SECTION BRIEF
This section defines CBpsules Bnd how they Bre used.
1.1
WHAT IS A CAPSULE?
1.2
NOTE:
routines
iv-2
Bre
found
on
the
PART 4:
OSI-CR-71988-AG
Capsule Reference
1.3
Capsule Uariables
For all User Uariables listed below, a ualue of zero implies
"NOT SET", while a ualue of one implies "SET".
iV-3
PART 4:
OSI-CR-71988-AG
Capsule Reference
iv-4
PART 4:
OSI-CR-71988-AG
1.4
Capsule Reference
1.4.1
CenterSeorch
) Lobel to use when colling: CENTER
This Copsule routine moues the cybertonk to the center
of the bottle field. While mouing, it seorches for enemy
cybertonks. Once the cybertonk is in the center of the
bottle field, the Copsule routine continues 0 ropid but
thorough seorch pottern. Any cybertonk thot uses this
routine is looking for trouble.
Primory Usoge: This Copsule is uery offense-oriented.
I t is useful ogoinst enemy cybertonks thot come stroight ot
on enemy. The quick sconner seorch detects them long
before they ore within weopon ronge.
Weokness:
This Copsule is impeded somewhot by
certoin bottlefield designs. If, for eHomple, 0 design hinders
occess to the uery center of the bottlefield, the cybertonk
is uulnerable to a sneak attack: while searching for B route
to the center.
iv-5
PART 4:
OSICA71988-AG
Capsule Reference
CornerSearch
> Label to use when calling: CORNER
This Capsule routine finds the corner nearest the
cybertank and moues toward it. During the moue, it
searches for enemy cybertanks. The theory behind moving
to the corner for protection (which was devised by a clever
young engineer at 051) is that yaur cybertank's "back is
covered" and enemy cybertanks can attack your cybertank
from only three angles.
Primary Usage: This Capsule is a defense-oriented routine.
Using the corners of the battlefield, a cybertank gains an
advantage due to the protection of the walls. In addition,
nestling up in a nice safe corner reduces the need for
movement and conserves fuel.
Weakness:
While this routine is defense oriented,
a
cybertank using it is usually discavered by enemy
cybertanks. This is due, in part, to the nature of some
lower-level cybertanks "hugging" the battlefield walls.
Another drawback is that retreat ar a "break and run" is
iv-6
PART 4:
OSICR71988AG
Capsule Reference
RendomSeerch
> Lebel to use when ceiling: RNDSERRCH
This Capsule routine rendomly roems the bettie field
seerching for enemy cybertenks.
Primery Usege: Since this Cepsule is rendom in design, it
fosters uarious, unpredictable results. Random mouement
mekes the cybertenk difficult to treck -- sometimes it
moues left, sometimes it moues right.
Week ness: The primery downfall of this Capsule is its
"randomness" or illogical actions. For eHemple, e cybertenk
using this Cepsule can be in uery close proHimity to an
enemy cybertenk end neuer detect it, while the enemy
cybertenk, by using e uery systematic seerch pettern, is
able to detect the "random" cybertenk.
SitSeerch
> Label to use when ceiling: SITSERRCfI
This Cepsule routine instructs the cybertenk to sit in
one spot and scen for on enemy cybertenk. That's all it does
-- uery sweet, uery simple.
Primery Usege: This Capsule routine is uery effectiue in
detecting eny enemies in close proHimity. It sefeguerds
egeinst eccidently stumbling upon en enemy with defenses
down, end is eHtremely fuel efficient.
Weekness:
using this
bettlefield
plecement
(CSM) may
iv-7
OSI-CR-71988-AG
1.4.2
PART 4:
Capsule Reference
"TRRCKING" CRPSULES
BeeLineHunt
> Label to use when calling: BEELINE
Rs the name implies, this Capsule routine mal<es a beeline towards an enemy cybertanl<. The routine attempts to
moue towards the enemy cybertanl< until the enemy is
within weapon range. This routine assumes that an enemy
cybertanl< has already been detected.
Primary Usage: This Capsule routine is used to QUicl<ly
approach an enemy cybertanl<. Slower tracl<ing routines
orten lose the trail of uery mobile enemy cybertanl<s. This
routine was designed to prouide maHimum speed during
"the hunt".
Weal<ness: Since this Capsule is preoccupied with getting to
the enemy cybertanl< Quicl<ly, it orten moues the cybertanl<
into weapon range without being prepared to attacl<. R
cybertanl< using this Capsule routine rarely gets off the
first shots during a battle confrontation.
Tracl<Enemy
> label to use when calling: TRRCK
This Capsule routine tracl<s a located enemy cybertanl<.
It does NOT actiuely seel< out an enemy, since it assumes an
enemy has already been found. Rs long as the enemy
cybertanl< continues to moue closer, this routine instructs
the cybertanl< to remain stationary. If the wait is eHtended,
your cybertanl< will moue toward the enemy.
Primary Usage: This Capsule routine is most effectiue when
speed is not of the essence. Since the enemy cybertanl< is
usually mouing toward you, your cybertanl< typically fires
the first few shots.
PART 4:
OSI-CR-719BB-AG
Capsule Reference
WaitForEnemy
> Label to use when calling: WAIT
This Capsule routine instructs your cybertank to sit in
one spot and woit for an enemy cybertank. This routine
assumes that an enemy has already been found.
Primary Usage: This Capsule routine is most eHectiue
against slow, hulking, uery powerful enemy cybertanks.
Since a cybertank using this Capsule routine remains
stationary while tracking an enemy, it is almost always
assured the first shots. Against powerful enemies, the first
few shots are eHtremely important.
Weakness: The primary weakness of this routine is that a
cybertank is uulnerable to attack when stationary. While
waiting for an identified enemy to approach, other
cybertanks can approach without detection.
1.4_3
BerserkAttack
) Label to use when calling: BERSERK
As the nome implies, this Capsule routine is a full-force
attack on an opponent. This Capsule simply fires the
cybertanl<'s weapon ten times in a row -- no thinking, no
wasted time, just plain old fashioned brute force.
Primary Usage: This Capsule is best suited for attacking
slow, hulking cybertanks that come straight in for the kill.
The combination of this Capsule with a uery fast weapon
(lasers) results in a uery deadly cybertank.
iv-9
PART 4:
OSICR71988AG
Capsule Reference
KiliTank
> Label to use when calling: KILLTANK
This Capsule routine fires the cybertank's weapon at an
enemy cybertank until the enemy is destroyed or is no
longer detected by the scanner. If the enemy cybertank
moues out of weapon range, then this Capsule will moue
toward it until obstructed.
Primary Usage: This Capsule routine is primarily used
against enemy cybertanks that are known to flee from
combat. Your cybertank will chase a fleeing enemy.
Weakness:
This Capsule routine is inefficient against
cybertanks that employ a techniQue known as "back-Up and
wait. A cybertank which uses this techniQue will moue
backward one hectometer, wait for the opposing cybertank
to moue forward into range, then fire and moue backward
again. For a cybertonk to successfully use this techniQue it
must haue a fast weapon and a light chassis for maHimum
firing and maneuuering speed.
NormalAttack
> Label to use when calling: ATTACK
This Capsule is a standard attack routine. Your
cybertank fires at on enemy cybertank until it either moues
beyond weapon range or is not detected by the scanner.
Primary Usage: This Capsule routine is, as the name implies,
the normal attacking procedure. Since this Capsule routine
does NOT attempt to follow an enemy cybertank, it is uery
i v -1
OSICR7,988AG
PART 4:
Capsule Reference
1.4.4
P a nit
OSI-COT-121988-AG
PART 5
v-'
OSI-COT-121988-AG
SECTION
MELEE
SECTION BRIEF
The most common type of simulation is known as Melee.
Melee is an all out free-for-all. Each cybertank in a melee
simulation is an enemy of euery other cybertank.
1.1
MELEE OBJECTIVE
1.2
MELEE TACTICS
1.2.1
Destroying the Other Cybertanlcs
The most common method of being uictorious in a melee
simulation is to destroy all the other cybertanks in the
simulation. If there are many other cybertanks in the
melee, then a cybertank must be uery powerful if it is to
haue a chance at being uictorious. The chances of
encountering two or more enemy cybertanks at the same
time is relatiuely high; thUS, a cybertank in a large melee
must be able to sustain damage "from behind" while
attacking another enemy.
During a small, or one-on-one melee, the uictory does not
necessarily go to the most powerful cybertank, but to the
cybertank With the "cleuerest" AI design_ For eHample, a
small, quick cybertank can moue in on a larger, more
powerful tank and get off a couple of shots before the
larger tank is able to react. If this process is successfully
v-2
OS I-G OT -1 21988-A G
conserues fuel.
v-3
OSI-COT-121988-AG
Part 5
SECTION
Combat Objectives
TEAM COMBAT
SECTION BRIEF
Cybertanl<s can also engage in team combat simulation.
Team combat pits groups of cybertanl<s, composed of up to
seven cybertanl<s, against one another. Team combat offers
many strategic possibilities.
2.1
ABSOLUTE TERMINATION
2.2
HEADQUARTERS TERMINATION
v-4
OS ICOTl 21988A G
2.3
TEAM COMMUNICATIONS
v5
OSI-COT -1 21988-AG
SECTION
MANUAL CONTROL
SECTION BRIEF
One of the most interesting simulation possibilities is that
of manually controlled cybertanks. By pressing uarious keys
on the computer terminal, a cybertank designer can
eHercise a great deal of control ouer the cybertank.
3.1
3.2
v-6
OSI-COT-121988-AG
the last key pressed is an "I", "J", "K", "M", or"" (space)_
If the last key pressed is one of these keys, the on-board
computer system will branch to the appropriate label. After
the cybertank turns or moues forward, the on-board
computer system branches back to the ReadKey label and
the process is repeated.
ReadKey
If Last Key Pressed =
If Last Key Pressed =
If Last Key Pressed =
If Last Key Pressed =
If Last Key Pressed =
Branch to ReadKey
TurnNorth
Turn Tank to 0
Branch to ReadKey
TurnWest
Turn Tank to 6
Branch to ReadKey
TurnSouth
Turn Tank to 4
Branch to ReadKey
Turn East
Turn Tank to 2
Branch to ReadKey
MoveForwd
Move Tank Forward
Branch to ReadKey
v-7
OSI-TS-72588-SM
Part 6 - Troubleshooting
PART 6
TROUBLESHOOTING
SYNOPSIS
This section discusses problems which may occur during
operation of the OSI/CACO System 2. It also defines possible
solutions to these problems.
OSI-TS-72588-SM
Part 6
SECTION
Troubleshooting
DISC PROBLEMS
SECTION BRIEF
During operation of the DSI/CACD System 2, problems can
occur during disc access. Some of these are easily rectified.
1.1
access slot.
To avoid this error, simply keep the disc containing the data
file in the access slot. The disc may be removed after the
DSI/CACD system has retrieved the specified data file.
The File Termination Panel (HP) may produce this same error
if, under the similiar circumstances, it is unable to delete a
specified data file.
1.2
This error occurs when the OSI/CACD trys to save a data file
to a write protected disc via the File Storage Panel (FSP).
Most discs have write protect features to prevent
information being written to them. If a disc is indeed write
protected, the OSI/CACD is unable to save any data to the
disc and this error message is displayed.
vi-2
OSI-TS-725BB-SM
Part 6 - Troubleshooting
All 5 1/4 inch discs haue a small notch in the right side. If
the notch is couered, the disc is write protected. I f the
notch is uncouered, the disc is not write protected and
information can be written to it. To auoid the Disc Write
Protected error, simply remoue the material that is
couering the notch.
All 3 1/2 inch discs haue a write protect tab built in the
upper right-hand corner of the reuerse side. If the tab is
moued and unblocks the hole, the disc is write protected. If
the tab is moued to block the hole, the disc is not write
protected and information can be written to it. To auoid the
Disc Write Protected error, simply moue the tab so that it
blocks the hole.
1.3
DISC FULL
All discs are limited in the amount of data they can store. If
your disc is at its maHimum capacity and you instruct the
OSI/CACO to saue another data file uia the File Storage Panel
(FSP), this error message will appear. Once your disc is fUll,
you can delete some information to prouide space. Use the
File Termination Panel (FTP) to delete specific data files
from the disc.
The Disc Full error can become a reccurring problem since
most discs haue a rather small capacity. The solution below
may help.
The FSP can saue a file to any disc (not only to your
Employee 10 Oisc). Sauing data files onto seueral discs can
alleuiate later problems. For instance, you may want to
saue cybertank designs on one disc, battlefield designs on
another, etc. Aemember, the Combat Simulation Module
reQuires that the battlefield and all cybertanks in a
simulation design reside on the same disc, resulting in the
deuelopment of the the Data Ouplication Module (DDM).
vi-3
OSI-TS-725SS-SM
Part 6 - Troubleshooting
The DDM leIs you copy dolo files from one disc 10 anolher.
using Ihe DDM, you can copy Ihose dolo files you are
currenlly using onlo your 10 Disc, leouing unused dolo files
on olher discs, commonly referred 10 as backup discs.
1.4
DISC MALFUNCTION
OSI-TS-72588-SM
Part 6 - Troubleshooting
SECTION
SECURITY ERRORS
SHTION BRIEF
OSI is a high-security compleH. Procedures haue been
implemented to preuent unauthorized entrance into the OSI
CompleH and unauthorized access to cybertank designs.
2.1
2.2
vi- 5
Part 6 . Troubleshooting
OSITS725BBSM
vi-6
OSI-TS-72588-SM
Part 6
SECTION
Troubleshooting
SIMULATION ERRORS
SECTION BRIEF
The Combat SimUlation Module (CSM) and the Cybertanl< Test
Module (CTM) haue a limited amount of memory auailable
for processing simulations. Rlso, each cybertanl< in the
simulation must be authorized for use.
3.1
3.2
vi-7
OSI-TS-72588-SM
Part 6 - Troubleshooting
3.3
Part 6 . Troubleshooting
OSITS72588SM
SECTION
OTHER ERRORS
SECTI ON BR I EF
There are other system error messages which can appear at
certain points.
4.1
AUTHORIZATION ERRORS
4.2
ILLEGAL BATTLEFIELD
vi- 9
Glossary
OSI-GL-1219BB-AG
Glossary
ACCESS SLOT: The mechanism used by the OSI/CACO System
2 to access discs. Also known as a disc driue.
AI: Artificial Intelligence. The underlying logic by which
cybertanks function.
AUTHORIZE: The act of creating a cybertank from a
cybertank design. All cybertank designs must be authorized
by OS I before a cybertank can be created.
BOM: Battlefield Design Module. The component of the
OSI/CACD System 2 used to create simulation battlefields.
CACD: Computer Aided Cybertank Design. The process of
using powerful computers in the design and implementation
of cybernetic machinery.
CAM: Cybertank Authorization Module. The component of
the OSI/CACD System 2 used to identify cybertank design
flaws. I f any flaws are found, they are reported to the
employee.
CAPSULE ROUTINE:
Pre-written sections of Artificial
Intelligence (AI) Which perform. specific functions. These
routines can be incorporated into an-y employee'S AI.
"-.
CCl: The Cybertank Command language. The computer
language used to construct cybertank AI.
COl: Cybertank Directional Indicator. Shows the direction
of the cybertank and scanner during a simUlation.
COM: Chassis Design Module. The component of the
DSI/CACD System 2 used to build a cybertank's
chassis/body.
G -1
Glossary
OS 1- G L1 21988-A G
G -2
Glossa ry
OSI-GL-1219BB-AG
G -3
Glossary
OSI-GL-121988-AG
AI.
PSP: Printer Setup Panel. The control mechanism used to
configure a printer for the OSI/CACD system.
S I M U L AT ION:
A closely approHimated model of a
cybernetic battle used for testing or eHperimentation.
UEAIFY: Checlcs the cybertanlc AI for errors and notifies
the employee of any problems. Although similar to
authorize, uerify will not create a cybertanlc.
G -4
Appendices
OSI-AP-121988-AG
APPENDIX
All GN
RT
BEYOND
CODE
DETECT
EMPTY
FOR
FUNCTIONAL
HQ
IF
IS
JAM
LAUNCH
LEFT
MOUE
MOUEMENT
OBSTAUCTI DN OFF
AANDDM
RANGE
RESUME
RETURN
SCANNED
SCANNER
SWITCH
TANK
TAERDS
TRRNSMIT
UNLDCKED
UP
WITHIN
ACTI DE
AAMDA
BEING
ClDSEST
DESTAUCT
DDWN
FIAE
FUEL
All GNED
RUAILABLE
BRANCH
COMMLINK
DIRECTION
ENEMY
FORWARD
GET
INACTIVE
KEY
LOCK
NOT
ON
REMAINING
RIGHT
SElF
TERM
TURN
WRS
A -1
ALLY
BRCKWARD
BRERK
COPY
DISTRNCE
FRCE
FOUND
GOSUB
INCLUDE
KIT
LOCKED
OBJECT
PRESSED
AEMOTE
AOTATE
SHiElD
THEN
UNAUAILABLE
WERPON
ARE
BEEP
CLEAR
DATA
DD
FACING
FROM
GOTO
INTERNAL
LAST
LOWER
OBSTRUCTED
RR ISE
REPAIR
SCAN
SIGNRL
TO
UNLOCK
WITH
Appendices
OSI-AP-1219BB-AG
APPENDIX
AllyCode
AllyEnemyDist
AllyHQY
Armoroemege
CopyEnemyoir
CopyNum
EnemyHQoist
EnemyY
objoist
Obstecleoist
RandomNum
TenkDir
Treedoemege
Allyoir
AllyEnemyH
AllyNum
CopyCode
CopyEnemyoist
CopyH
EnemyHQH
Fuellevel
ObjType
obstecleType
Remotesleft
TenkNum
Hyoist
AllyDist
AllyEnemyY
AllyH
Copyoir
CopyEnemyH
CopyY
EnemyHQY
Intoemege
objH
obstecleH
scanoamage
TenkH
Weapoemege
AllyEnemyoir
AllyHQH
AllyY
Copyoist
CopyEnemY
Enemyoist
EnemyH
Kitsleft
ObjY
obstecleY
SCenoir
TankY
AllyCode
Allyoir
The
last
direction
heeding
tmnsmitting teem member.
Allyoist
AllyEnemyoir
A-2
of
Appendices
OSt-AP-121988-AG
RllyEnemyDist
RllyEnemyH
RllyEnemyY
RllyHQH
RllyHQY
RllyNum
RllyH
RllyY
RrmorDomoge
Copy Code
CopyDir
A -3
Appendices
OSI-AP-121988-AG
CopyDlst
CopyEnemyDir
CopyEnemyDist
CopyEnemyH
CopyEnemyY
CopyNum
CopyH
CopyY
EnemyDlst
EnemyHQDist
EnemyHQH
The
H coordinate
of
the
enemy
headquarters
unknown to your
cybertank until either found by scanning
or transmitted by a team member.
A4
Appendices
OSI-AP-121988-AG
EnemyHQY
The
Y coordinate
of
the
enemy
headquarters
unknown to your
cybertank until either found by scanning
or transmitted by a team member.
EnemyH
EnemyY
Fuelleuel
IntOamage
Kitsleft
ObjOist
ObjType
ObjH
ObjY
ObstacleOist
ObstacleType
A -5
ualue
Appendices
OSI-AP-121988-AG
ObstocleH
ObstocleY
RondomNum
RemotesLeft
SconOomoge
SconOir
TonkOlr
TonkNum
TonkH
TonkY
TreodOomoge
HYOist
A -6
,
Appendices
OSIAp-1219BBAG
WeopDomoge
A7
Appendices
OSIAP-121988AG
APPENDIX
OBJECT TYPES
The following list should be used os on oid in incorporoting 0
System uorioble thot reports on "object's type."
TYPE NUMBER
00
01
02
03
04
05
06
Greater than 6
DESCRIPTION
No object
Roads. grass. etc...
Water
Damaged cybertanks, squashed trees
Trees
Houses, HQ
Buildings, barriers
Cybertanks
A -8
Appendices
OSI_AP-121988-AG
APPENDIX
Tanlc Mouement
MOVE [TANK] FORWARD "#"
MOVE [TANK) BACKWARD "#"
TURN [TANK) LEFT "#"
TURN [TANK] RIGHT "#"
TURN [TANK] TO "ANGLE"
TURN [TANKJ TO "X" "Y"
TURN [TANKJ TO FACE [ENEMY] [TANK]
TURN [TANK] TO FACE ENEMY HQ
ALIGN TANK [WITH SCANNERJ
IF TANK [IS] ALIGNED [WITH SCANNERJ THEN [BRANCH TO : DO]
"LABEL"
IF TANK [ISJ NOT ALIGNED [WITH SCANNER] THEN [BRANCH TO :
DOl "LABEL"
IF [MOVEMENT ISJ OBSTRUCTED THEN [BRANCH TO : DOJ "LABEL"
IF [MOVEMENT ISJ NOT OBSTRUCTED THEN [BRANCH TO : DOJ
"LABEL"
IF OBSTRUCTION [lSI ENEMY HQ THEN [BRANCH TO : DOJ "LABEL"
IF OBSTRUCTION [ISJ ALLY HQ THEN [BRANCH TO : DOl "LABEL"
IF TANK [ISJ FACING [ENEMY] TANK THEN [BRANCH TO : DOJ
"LABEL"
IF TANK [ISJ NOT FACING [ENEMY] TANK THEN [BRANCH TO : DOJ
"LABEL"
IF TANK [ISJ FACING ENEMY HQ THEN [BRANCH TO : DO] "LABEL"
IF TANK [ISJ NOT FACING ENEMY HQ THEN [BRANCH TO : DOJ
"LABEL"
IF TANK [ISJ FACING "X" "Y" THEN LABEL
IF TANK [ISJ NOT FACING "X" "Y" THEN LABEL
DETECT [OBSTRUCTIONJ AT "#"
DETECT [OBSTRUCTIONJ AT TANK DIRECTION
DETECT [OBSTRUCTION] AT SCANNER DIRECTION
IF [TANK] TREADS [AREJ FUNCTIONAL THEN [BRANCH TO : DO]
"LABEL"
IF [TANK] TREADS [ARE) NOT FUNCTIONAL THEN [BRANCH TO : DOl
"LABEL"
A -9
a 5 I /\ P -121988A G
Appendices
A - 10
Appendices
OSI-AP-121988-AG
TANK STATUS
IF FUEL [ISJ REMAINING THEN [BRANCH TO : DO) "LABEL"
IF FUEL [IS] EMPTY THEN [BRANCH TO : DO] "LABEL"
SELF DESTRUCT
DEFENSE SHIELD
RAISE [SHIELD]
LOWER [SHIELD)
IF SHIELD [IS] UP THEN [BRANCH TO : DO] "LABEL"
IF SHIELD [IS] DOWN THEN [BRANCH TO : DO] "LABEL"
A - 11
Appendices
OSI-AP-121988-AG
A - 12
...
..
Appendices
OSI-AP-121988-AG
APPENDIX
AUTHORIZATION ERRORS
The following lists all the possible errors that may occur
during the Authorization process in the Cybertank
Authorization Module (CAM).
DUPLI CATE LRBEL FOUND
This error occurs When the same label has been used twice in
the AI. For a complete discussion of labels, see Part 1, Section
6.4 of this handbook.
FRTRL ERROR: MRHIMUM NUMBER OF LRBELS EHCEEDED
This error occurs when you eHceed the memory allocated for
label names. To remedy, try using fewer labels or shorter
label names. For eHample, instead of using the label
"SHOOTIRNK", try using something like "SHOOT".
UNKNOWN CDMMRND
This error occurs when an unrecognizable command is included
in the AI. This normally occurs because of a misspelled or
missing word.
USER UARIRBLES EHCEEDED
This error occurs if you attempt to use more than 32 User
Uariables. The only way to correct this error is to cut down on
the number of User Uariables. For a complete discussion of
User Uariables, see Part I, Section 6 of this manual.
DOES NOT COMPUTE IN THE LINE
This error occurs when an instruction in the AI is incomplete .
For eHample, the instruction "SCRN FOR FRIENDLY TRNK" is
almost a ualid instruction, but not Quite since it is not
complete.
URLUE USED IS OUT OF RRNGE IN FOLLOWING LINE:
This error occurs when a ualue in an instruction is not within
the allowable range. For eHample, in the instruction "TU RN
TRNK TO g", the 9 is an illegal ualue because you can only turn
your tank to ualues 0-7.
A - 13
Appendices
OSIAp121988AG
A 14
Accelerator, 11-23
Access Slot, (See Orientation Guide)
Drlue Systems,lI-19
Design
Battlefield, II-56
COM Controls,
il~
10
Capsules, iu-l
Copsule Variobles, lu-3
Copsule User-Variables, iu-4
Replacing 0 [opsule, 1-32
Cop\Ule neference,lu-1
flee enemy,
lu~
11
Panic, iu-ll
Terminate [nemy, jlJ-9
8erserkAltack, iu-9
ICIllTank. lu-I 0
NormolRtlock, IU-l 8
Search for [nemy. iu-5
On/Off. 1ii-40
Tronsmlt/Recelue, ill-'ll
CenterSearch,lu-5
(ybertonlc
[dgeSelllrch,lu-6
RondomSearch, ht-7
SitSeorch,lu-7
Trocklng
Copsule~.
lu-O
Deelinellunt, iu-O
WOitfor[nemy, iu-9
D
Doto Duplicotion Module. 1i-64
Debugger Menu, ii-46
Defense Shield, il-22
Design Conlrol Module, jj-9
Designing a Cybertonk. ii-9, 1-4
Creating a New Tonk,ii-ID. i-S
thassls Design. 1i-16, 1-6.ISee CDMI
Selecting [Quipment. 11-17. i-7
RI Design. ii-24. i-1D
Designing 0 DIIHle Simulation, j-16
Cybertonk and Doltlefleld flies, 1-10
Cybertllnk Teoms. i-20
Selecting 0 Ooltlefield. i- I 9
E
editing (See TeHt)
edit Menu, 11-13
edit Window, 1-28
[lectronlc Moll, li-8
[mployee 10 Disc, 1-2 (See Orientation Guide)
[mployee Menu, 1i-4
energy Miser. 11-21
[Qulpment Categories, 1-0
[Hternol Control Module, ii-2
Design Menu, 11-6
[mployee Menu, 11-4
function/layout, 11-2
Simulate Menu, 1i-4
Simulation StalistiCS,lI-7
Print,li-7
System Menu, 11-3
F
File Retrieval Panel, ii-70
rile Termination Panel, if-71
rile Storage Panel, ii-68
Fill Mop, ii-59
fill Screen, ii-59
fuel Cells, 11-19
full Custom Oeslgn,l-30
Ii
GauSS" Guns, ii-20
Getting Storted, 1-2
H
Headquarters
Positioning.li-38
J
Jammer, 11-22
L
ltlbels, iiI-4, 1'12
Losers, 11-20
launcher, ti-22
library Copsules, i-no Part IU
Listener. 11-22
M
Mouement ((yberlankl, 111-7, iii-a
Mouement Obstruction Sensor. 111-12
T
lunlc (IasHs, ii-19
Teams
Selecting, ii-36
N
Nuclear Weopon\, ii-20
o
Object Types, nppendiH :3
Operators, iii-S
p
Po use. 1-23
Pen Down, jj-(j2
R
Repoir KIl, 11-21
TeHt
Rdding lines. ii-25, 1-27
(opy and Poste, ii-14, i-31
(ul and rosie. ii-n. i-3\
Dele ling, i1-2S, 1-21. i-3D
Double lines, i-28
hepanded TeHI, ii-14
Inserllng TeHI, 11-25. ;-21
Replacing TeHt. ii-27. i-3D
Scrolling, li-25, i-20
Selecting, 11-26, 1-29
Tiles. ii-S6
fill Mop, Ii-59
rill Screen, ii-59
ren Down. ii-62
Plop Tiles, ii-62
Trace Mode, ii-47
Tread Damage and Repair, iil-7
u
User Uarlobles, iIi-S, 1-'13
s
Satellite Ulew, 1-23,
ii~43
Soue
u
Uontage roinl, i-22
Simulation, 1i-4<1
w
Weapons
Fire WeaponS", iii-27
Weapon Damage and Repair. jij-2S
Weapon TypeS", 11-20
Weopons Chart, ii-20
Weapon System. i-41
Notes
Notes
...
otes
..
Notes
Notes
Notes
Notes
...
Notes
Notes
About the Author...
'.