This software is copyrighted and licensed for use on one computer per copy.
Triton Elics International grants permission to the purchaser to make a limited
number of copies of the program for backup purposes. Additional reproduction of
the programs or this manual is a violation of the copyright law.
The licensee is bound by the terms and conditions set forth in the Software
License Agreement and Limited Warranty that accompanies this document.
Sonar is a registered trademark of Triton Elics International, Inc.
p
Safety Precautions
When working with the overall system
1. Before handling components inside your computer system, exit all
applications and shut down the operating system in accordance with
procedures applicable to them.
2. Turn off the power to the computer and disconnect all cables that may be
feeding electrical power to the system you will be working on.
3. Wear a grounded, anti-static wrist-strap. This is especially important if
you are removing, replacing, or installing a printed circuit board of any
kind.
Failure to adhere to these and other safety precautions mentioned in the manual
could result in harm to property or personnel!
When working with magneto-optical cartridge disks
• Please refer to the Appendix entitled “Mass Storage Options” for
important details covering the handling of M-O disks!
• Never boot your system with a writable M-O cartridge inserted into the
drive!
• Use magneto-optical media that has 512 bytes per sector, not 1024
bytes per sector, and use the AFDisk software utility to format
magneto-optical media. Never use Windows 95 to format M-O media!
recautions mentioned below. In addition,
observe all safety precautions mentioned in this
manual.
Triton Elics Internatonal
125 Westridge Drive
Watsonville, CA 95076
USA
U.S.A.
SOFTWARE LICENSE AGREEMENT
By opening this package, you agree to be
bound by the terms of this Agreement,
which include the software license and the
limited warranty. This Agreement applies to
you and any subsequent licensee of this
software program. If you do not accept or
agree to the terms of this Agreement, do
not open this sealed package. Promptly
return the unopened package to TRITON
ELICS for a refund. However, no refund or
replacement will be given if the sealed
envelope containing the SOFTWARE
Sentinel and Manual has been opened or if
any of the components of the product
(including the software sentinel) are
missing. Grant of license for the software
product and full title and ownership of the
hardware product shall not transfer to the
Buyer until the purchase price, plus any
interest or fees resulting from late payments or pre-arranged terms, has been
received in full by the Seller.
1. GRANT OF LICENSE: TRITON ELICS
grants you the right to use the enclosed
TRITON ELICS software product in the
manner provided below.
YOU MAY:
• Use one copy of the TRITON
ELICS software products identified
above on a single computer.
• Make one (1) copy of the program
in machine-readable form solely
for backup purposes, provided that
you reproduce all proprietary
notices.
• Transfer the SOFTWARE and
user documentation on a permanent basis provided you retain
no copies and the recipient agrees
to the terms of this Agreement.
YOU MAY NOT:
1. Reverse engineer, decompile, modify or
disassemble the SOFTWARE except to the
extent such foregoing restriction is
expressly prohibited by applicable law.
Remove any proprietary notices, labels, or
marks on the program, documentation, or
program disk.
2. UPGRADES. SOFTWARE and
documentation upgrades are provided free
of charge for one year from the date of
shipment. If the SOFTWARE is an
upgrade, you may use or transfer the
SOFTWARE only in conjunction with
upgraded product. You may use that
upgraded product only in accordance with
this License.
3. COPYRIGHT. The SOFTWARE
(including any images, “applets,”
animations, video, audio, music, and text
incorporated into the SOFTWARE) is
owned by TRITON ELICS and is protected
by United States copyright laws and
international treaty provisions.
4. TECHNICAL SUPPORT. Technical
Support is available by phone, fax, modem,
Triton Elics bulletin board service or Internet free of charge during warranty period.
MARISAT charges are invoiced at cost
plus twenty percent.
5. EXPORT RESTRICTIONS. You agree
that neither you nor your customers
intends to or will, directly or indirectly,
export or transmit the SOFTWARE or
related documentation and technical data
to any country to which such export or
transmission is restricted by any applicable
U.S. regulation or statute, without the prior
written consent, if required, of the Bureau
of Export Administration of the U.S.
Department of Commerce, or such other
governmental entity as may have
jurisdiction over such export or
transmission.
LIMITED WARRANTY
TRITON ELICS warrants that (a) the
SOFTWARE will perform substantially in
accordance with the accompanying written
materials for a period of one (1) year from
the date of shipment and (b) any hardware
accompanying the SOFTWARE will be free
from defects in materials and workmanship
under normal use and service for a period
of one (1) year from date of shipment.
CUSTOMER REMEDIES. TRITON
ELICS’s entire liability and your exclusive
remedy shall be, at TRITON ELICS’s
option, repair or replacement of the
SOFTWARE or hardware that does not
meet TRITON ELICS’s Limited Warranty.
Warranty service is F.O.B. TRITON
ELICS’s Watsonville facility. All shipping
and insurance costs are paid by buyer. Onsite Customer Service and Warranty
Repair (including travel hours,
transportation, lodging and meals) may be
provided by TRITON ELICS, at its own
discretion, to Buyer at cost plus twenty
percent. However, actual labor hours to
provide this service or repair will be free of
charge to Buyer. This Limited Warranty is
void if failure of the SOFTWARE or
hardware has resulted from accident,
abuse, or misapplication. Any replacement
SOFTWARE or hardware will be warranted
for the remainder of the original warranty
period or thirty (30) days, whichever is
longer.
NO OTHER WARRANTIES. Except for the
above express limited warranties, TRITON
ELICS makes no warranties, expressed,
implied, statutory, or in any communication
with you, and TRITON ELICS specifically
disclaims any implied warranty of
merchantability or fitness for a particular
purpose. TRITON ELICS does not warrant
that the operation of the program will be
uninterrupted or error free. Some
states/jurisdictions do not allow the
exclusion of implied warranties, so the
above exclusions may not apply to you.
This limited warranty gives you specific
legal rights. You may have others, which
vary from state/jurisdiction to
state/jurisdiction.
NO LIABILITY FOR CONSEQUENTIAL
DAMAGES. To the maximum extent
permitted by applicable law, in no event
shall TRITON ELICS be liable for any
damages whatsoever (including, without
limitation, damages for loss of business
profits, business interruption, loss of
business information, or any other
pecuniary loss) arising out of the use of or
inability to use this TRITON ELICS
product, even if TRITON ELICS has been
advised of the possibility of such damages.
Because some states/ jurisdictions do not
allow the exclusion or limitation of liability
for consequential or incidental damages,
the above limitation may not apply to you.
U.S. GOVERNMENT RESTRICTED
RIGHTS. The SOFTWARE and
documentation are provided with
RESTRICTED RIGHTS. Use, duplication,
or disclosure by the Government is subject
to restrictions as set forth in subparagraph
(c) (1) and (ii) of the Rights in Technical
Data and Computer Software clause at
DFARS 252.227-7013 or subparagraphs
(c) (1) and (2) of the Commercial Computer
Software—Restricted Rights at 48 CFR
52.227-19, as applicable. Manufacturer is
Triton Elics International, Inc., 125
Westridge Drive, Watsonville, CA 95076. If
you acquired this product in the United
States, this Agreement is governed by the
laws of California. If this product was
acquired outside the United States, then
local law may apply.
TRITON ELICS INTERNATIONAL
SOFTWARE LICENSE AGREEMENT
AND LIMITED WARRANTY
Preface:
Using This Manual
This book is the first part of a two-part set from Triton Elics International, Inc.:
Isis User’s Manual, Volume 1. It contains most of the most frequently accessed
functions and information relevant to the software. The second book,
Manual, Volume 2
structure, navigation templates, and other less frequently accessed information.
Throughout this manual, warnings, hints and important statements are separated
from the text,
, contains everything else about Isis, such as file format
italicized and denoted by the following symbols.
Denotes a warning or caution.
Isis User’s
Denotes an import ant statement, tip, or hint.
Chapters 1 through 3 of this manual cover the basics: Isis overview, setting up
the hardware, and getting started with the software. The remaining chapters
describe, on a menu by menu basis, the everyday tasks all Isis users may need
to know. Chapter 12 guides you through the occasional maintenance tasks you
should perform and provides important troubleshooting tips for overcoming
hardware and software problems. Volume 2 of the Isis User’s Manual addresses
special needs that some Isis users may infrequently encounter.
Skills You’ll Need to Know Before Using Isis
To use Isis, you should know basic Windows concepts, such a s working with
icons on the Windows desktop. You can find this information in the Microsoft online Help system built into the Windows systems.
If You Choose Not to Read the Whole Book
For basic instructions on setting up Isis hardware and software, refer to 'Setting
up Isis Hardware Default'
Volume 1, for information on those topics.
and to 'Getting Started with Isis,’ both in Chapter 2,
June 2004 Isis® Sonar User's Manual, Volume 1
Chapter 1 Isis Overview 1
1.1 Introduction to Isis 1
1.2 Theory of Isis Operation
3
1.2.1 Background 3
1.2.2 Data Acquisition 4
1.2.3 Real-Time Data Processing 5
1.2.4 Combining Navigational and Acoustical Data 5
Isis is a compact, low-cost, modular, shipboard data acquisition and image
processing system. The system is designed to acquire, process and store
multiple channels of side-scan sonar, and multibeam echo-sounder data. Isis will
also acquire and store any sensor having an RS232 serial output, including
navigation, towfish attitude information, depth, gravity, and magnetic data.
The Isis software runs under Microsoft Windows 9x/NT/2000 and allows
independent control of the processing and display of each channel of data
acquired. The operating system of choice is Windows 2000, and multiple monitor
options can be supplied. A wide variety of signal and image processing modules
is available. These tools include target and feature analysis, signal processing,
spatial and transform domain filters, manual and automatic TVG, and beam
pattern and grazing angle compensation. Most of these tools are available in real
time and can be used to enhance the output to a “map” or “Mosaic” file (see
1.2.4, ‘Combining Navigational and Acoustical Data’).
Chapter 1: Isis Overview
June 2004 Isis® Sonar User's Manual, Volume 1 2
Figure 1-1. Isis system by Triton Elics
The Isis hardware and software system is modular. Isis modularity gives the user
the means to customize the data acquisition system for a specific task. The
modular nature of Isis system architecture also eases modification and
expansion of the system as needs change.
Users can develop server programs that operate outside of Isis. Again, Isis
modularity makes this possible. The server programs can communicate with Isis
through dynamic data exchange (DDE). Triton Elics provides the user with
variable names and DDE hooks to facilitate such conversations and even
provides an example server as a guide.
Chapter 1: Isis Overview
June 2004 Isis® Sonar User's Manual, Volume 1 3
1.2 Theory of Isis Operation
The early data acquisition and image processing efforts at Triton focused on
side-scan sonar imagery. Significant advances were made in the acquisition and
processing of side-scan sonar data. These advances have drastically improved
the resolution of data acquired with Triton Elics’s systems and eased
interpretation of these data.
1.2.1 Background
Triton set out in 1984 to provide a color video display to image sonar data in
up to 256 colors, matching the 48 dB dynamic range of most side-scan
sonars. Triton’s first color display system was called SMIPS. Even though
SMIPS only produced 16 colors, the colors were much more easily
distinguished than shades of gray. When Triton introduced Q-MIPS in 1988,
Q-MIPS provided a full 256-color display and many user-selectable color
look-up tables (LUTs).
The power and flexibility of the color displays encouraged Triton to add
many image processing features to Q-MIPS similar to those used in other
image processing systems that focus on optical and radar imagery from
satellites. Q-MIPS was a full-functioned, data collection system employing
advanced tools for image analysis. Some of the features that have made
Q-MIPS unique as a data acquisition system are:
• oversampling with user control over downsampling methods
• preservation of dynamic range
• data fusion
• beam pattern and grazing angle compensation
• geocoding
• flexible mass storage
• hardcopy output
Q-MIPS also served as the basis for other advanced sonar imaging
products that have attacked the traditional distortions present in side-scan
images.
Chapter 1: Isis Overview
June 2004 Isis® Sonar User's Manual, Volume 1 4
Figure 1-2. Imaginary seafloor as arbitrary reference point for sonar
altitude
Isis grew out of the Q-MIPS system and incorporates many new features;
for example it now has the ability to incorporate topographical information
from multibeam echo sounder data.
Isis now has the ability to use topographical data from multibeam echo
sounder data to correct the side-scan imagery. Isis provides a modular,
compact, low-cost alternative to Q-MIPS. As described in the following
paragraphs, Isis, following in the footsteps of Q-MIPS, offers many
improvements over previous data acquisition and imaging systems. Like
Q-MIPS, Isis actually improves the performance of the side-scan sonar and
provides a powerful interface that allows the user to manipulate and
interpret sonar imagery and subbottom data. Isis also takes full advantage
of the latest graphics cards and all of the on-board memory found there. As
a result, Isis richly displays its imagery in millions of colors.
1.2.2 Data Acquisition
A goal at Triton Elics has been to simplify the task of acquiring and storing
different data types. Along these lines, the Isis system has been designed to
acquire many of the types of data used in search and survey, both on land
and at sea.
Towfish telemetry data can be acquired by Isis via several different
interfaces. These data can be merged with the navigation and acquired via
Chapter 1: Isis Overview
June 2004 Isis® Sonar User's Manual, Volume 1 5
the same serial port. Alternatively, another serial port can be used. Custom
interfaces can also be created by Triton Elics for sonars whose telemetry
data is transmitted in a specific manner.
1.2.3 Real-Time Data Processing
With real-time processing, it is possible for the user to interpret features
visible in the processed data (but perhaps not in the raw data) as they are
collected. This allows decisions to be made in real time based on these
interpretations.
In side-scan sonar data, Isis removes the water column, corrects the slantrange, and corrects the along-track speed — all in real time. These features
ensure accurate visualization of the seabed. With the advent of real-time
mosaicking, a true, georeferenced picture of the area can be generated as
the survey occurs.
Processing data in real time does not preclude saving the raw data. During
acquisition Isis always saves the raw, uncorrected data.
1.2.4 Combining Navigational and Acoustical Data
While Side Scan Sonar imagery and Multibeam Sonar data is acquired,
other forms of data can be entering Isis via the serial ports. For example, a
navigation device or an integrated navigation computer may be connected
to a serial port in the Isis system. Also, towfish telemetry (including pitch,
roll, heading and depth) are often interfaced and sometimes combined with
the navigation data. All of these data are merged into a standard XTF data
format in the host computer before being passed on to a mass storage
device.
Data fusion is an important aspect of the Isis design. The simultaneous
acquisition of navigation data and acoustic data allows for real-time
positioning of any pixel of imagery (geocoding). If the towfish is crabbing or
yawing while towfish telemetry is interfaced to Isis, these corrections will
also be included in geocoded positions. Navigation data entering Isis ca n be
used to determine the speed over ground. This information is employed to
correct the imagery in real time or in playback mode, allowing rectilinear
rendering (that is, equal scale in both the along-track and across-track
directions).
All of the data acquired can be used to generate a side scan sonar “map” or
“mosaic,” which can be imported into TEI’s GIS Delph Map package and
combined there with almost any other georeferenced data.
Chapter 1: Isis Overview
June 2004 Isis® Sonar User's Manual, Volume 1 6
1.2.5 Choice of Data Storage Formats and Media
Isis is capable of storing data in one of three standard data formats: XTF,
Q-MIPS and SEG-Y. The XTF (Extended Triton Format) format, originally
developed by Triton for storage of data collected with Isis systems, has
gained such popularity that some organizations which do not even own an
Isis have adopted it because of the format’s flexibility and ease of use, and
also because so much data have been collected by others using Isis
systems.
At minimum, each Isis system provides a large hard disk drive and CD readwrite drive. Any additional storage media, such as Magneto Optical (MO)
drives, removable hard disk drives, Jaz drives, etc., can be supplied.
1.2.6 Hardcopy Records
Isis currently supports many hardcopy output devices — see ‘Hardcopy
Devices Supported by Isis’
Centronics standard are provided at no additional cost when a printer is
purchased from Triton Elics.
( 5.1). Other printer interfaces using the
Chapter 1: Isis Overview
June 2004 Isis® Sonar User's Manual, Volume1 7
Chapter 2 Getting Started with Isis Software
Your system comes to you with your Isis software already installed on your hard
disk. This chapter explains:
• what software is provided with your system and where it is
located
• how to run Isis
• what the icons on the Isis main menu mean
• what the basic modes of operation are
• what basic keyboard shortcuts are available
• how the trackball is used with Isis software
• what special utilities are available to you to control your screen
display
2.1 Software Installation Notes
Typical software installation CD will contain folders like the ones depicted in the
Windows Explorer layout. (See the figure,
installation folders’
.)
‘Typical listing of TEI software
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 8
Figure 2-1. Typical listing of TEI software installation folders
TEI software is compatible with Windows 95, Windows 98, Windows NT 4.0, and
Windows 2000. The following notes will help you achieve a smooth installation of
the software.
• Please exit from all other applications before running any of the
installation programs.
• You will not be able to complete the installation on an NT4.0 or
Windows 2000 system if you do not have administrator’s rights.
All Isis “black boxes” ship with a user name Isis. In this case the
Isis user name has administrator’s rights and does not require a
password.
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 9
• Each application is installed by browsing to the appropriate folder
(for example, Isis5.50 Install) on the CD and double-clicking on
the SETUP.EXE file found in that folder.
• TEI recommends that if you have more than one hard drive, you
install the software on the second (usually the D:) drive, using
the default folder names on the CD. You will be given the option
to select any drive during the setup process, select the Custom
option and change the drive letter.
• The first installation on an NT4.0 system requires a re-boot
during the installation; however, this only occurs for the first
installation. Under Windows 2000, no rebooting is necessary
during the installation process. However, you must reboot the
system after installing under Windows NT 4.0.
• For each application, a number of sample data files can be
optionally installed. These files will reside in a subfolder called
Demo Files within each application’s main folder. These special
files can be played back or processed by the relevant TEI
applications without a TEI sentinel being installed. If no sentinel
(dongle) is attached, a message displays, indicating either that a
sentinel was not found or that the sentinel is damaged. However,
you can still play back the sample files that come from the CD.
• In order to run the software in acquisition mode, or to play back
or process other files, you will need a TEI sentinel attached to
the LPT1 printer port. Contact TEI if you need a sentinel.
• If the operating system is Windows NT 4.0 or Windows 2000,
you will need to install a sentinel driver. The driver is included on
the CD in the Sentinel folder; a text file, with installation
instructions, is in that folder.
• In the case of Windows NT 4.0, Service Pack 5 (or higher) needs
to be installed. Service Pack 5 is on the CD.
• The TEI manuals that are installed with the software are in
Adobe Acrobat PDF format. Acrobat Reader software (required
to read the PDF files) is also on the CD.
• The CD has a number of other folders containing drivers and
applications that could be required; each folder has a text file
with more information.
• To remove the software, use the Add/Remove Programs utility in
the Windows Control Panel collection of utilities.
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 10
• The installations make two changes which are not restored when
the programs are removed using Add/Remove Programs. They
are: the addition of a folder called [TEIdlls] in the Windows or
WINNT folder; and a modification to the PATH environment
variable, which adds the [TEIdlls] folder to the PATH. The
[TEIdlls] folder can be safely deleted after all TEI software has
been removed.
2.2 Upgrading to a Newer Software Version
If you already have a version of the software that you wish to upgrade on your
system, you will see a dialog box inviting you modify, repair, or remove the
software you intend to install. See the figure, ‘Modify, Repair, Remove choices
during installation’
for an example of this kind of dialog box.
Figure 2-2. Modify, Repair, Remove choices during installation
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 11
You will need to remove the old version of the software before you will be
permitted to install the new version. To do so, enable the
dialog box and click
setup.exe. As noted above, some items are deliberately not removed during the
uninstall process; doing so can cause problems. If necessary, manually delete
\TEIdlls folder, but only do this if you are going to re-install all TEI
the
applications.
Important Note: The Windows Installer will fail to uninstall the software if the
operating system has been upgraded from (for example) Windows 98 to
Windows 2000 after the TEI applications were installed. If you want to upgrade
your operating system, uninstall the TEI programs first, and then re-install the TEI
programs after the upgrade.
Next. You can then install the new version by rerunning
Remove button in the
2.3 Solutions to Some Common Problems
Problem: After about five minutes the installation does not complete and the
Windows desktop does not return.
Solution: Try again after using <CTRL>+<ALT>+<DEL> to shut the system
down and restart. The problem can be caused by applications
running in the background or not being shut down before running the
installation.
Problem: Under NT/98 the installation may fail after the first re-boot, with a
message that it cannot locate the file setup.exe.
Solution: This can occur if the CD ROM drive is slow getting started after the
first reboot. Just use Explorer to double-click on setup.exe again,
and the installation will proceed normally.
Problem: There is insufficient space on the C: drive, even though D: (or
another) drive has been chosen to install the programs.
Solution: Under Windows 95, 98 and NT, the Windows Installer needs to build
the complete Installer Engine and files on the C: drive. The file can
be as large as 250 MB for a full installation. Windows 2000 will
require much less space, since the operating system includes the
Installer Engine.
Problem: After the Installation completes, you see the message, “The dynamic
link library map.dll could not be found in the specified path” when the
program is started.
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 12
Solution: You MUST reboot the system after finishing the installation. This is
necessary so that changes to PATH environment variable can be
applied.
Problem: You may not be able to install all the options (demo files, manuals,
help files) unless you can free enough space on the C: drive.
Solution: Consider using the Minimum Installations option located on the CD
to install only the programs you need.
Problem: When first running Isis after installing a new version, you receive an
error message that says your Isis CFG configuration file is out of
date.
Solution: This message alerts you that CFG files created with versions of Isis
earlier than this version of Isis are incompatible. Click OK during
your current Isis session. In future Isis sessions, the incompatibility
message will no longer appear.
Problem: Your receive error messages such as ‘the procedure entry point
xxxxxxxxx could not be located in the dynamic link library yyyyyy.dll
when trying to start one of the TEI applications.
Solution: This error may occur on a system that has had earlier versions (prior
to Fall 2000) of TEI software installed. Use Windows Explorer to
search for the following files:
The files must be unique on the system (that is, there must be only
one instance throughout your entire computer). The installer copies
the latest version to a folder {Windows Folder}\TEIdlls during the
installation process. If any files with the above names are found that
are not in {Windows Folder}\TEIdlls, then you should delete (or
rename) them.
Problem: You receive an error message during installation of TEI software.
For example, you may see this message:
Error – Unable to write to temporary location
Solution: You may see that message if you are running certain anti-virus
software, such as Norton (or other brands too). Check to see that
you have disabled your anti-virus software. The solution is to
temporarily turn off Norton Auto-Protect:
1. Right-click the Norton icon (or other anti-virus icon) on the Windows
taskbar.
2. Select Disable Auto-Protect when prompted.
3. Resume installing your TEI software.
4. When the installation completes, re-boot your PC.
5. When the system restarts, Norton Auto-Protect will be re-enabled by
default.
2.4 Checking for Dongles and Licenses
If a dongle is not detected, the software looks for a software license. The system
first checks locally, then remotely, to find a license.
If a local, fixed license file is not found, the software checks the computer registry
to see if a license path exists for a floating license. If not, the software asks the
user to navigate to a license file stored on the network. The floating license can
be configured for one to many concurrent users. If a floating license file is used,
the system uses one license each time Isis runs; if a fixed license file is used,
many instances of Isis can run simultaneously, and there is no limit on the
number of allowed instances (same as with a dongle). Figure 2-3 shows the
initial dialog you get if you don’t have a working dongle installed on your
computer. If you don’t have a dongle, you must have a fixed or floating license. If
you have neither a dongle nor a license, Isis will run in demo mode only.
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 14
Figure 2-3. Find License File dialog box
2.5 Keeping a Log
In Record Mode, Isis appends text entries to a file called SURVEY.LOG located
in whatever drive Isis is running from. When logging in Record mode begins, Isis
adds to the file:
• date and time
• version of Isis currently running
• system serial number
• file name
• name of the sonar
• number of sonar channels, number of samples per channel and
their configuration
• number of bathymetry channels and all related setup information
including installation offsets
• the template for each serial port
In summary, all settings that affect the way data is stored are noted in the
SURVEY.LOG file. Ordinarily, Isis appends to the file only when logging has
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 15
begun or the file name changes. However, when the Klein 5000 server is
running, all sonar settings that controls the Klein 5000 sonar are also noted in the
file. A sample of part of the contents of a
Figure 2-4.
Instead of modifying
It is potentially dangerous for you to open the survey.log file, modify it,
and save it back to disk while Isis is running — Isis may be modifying
the file at the same time you are trying to edit it or save it!
survey.log while Isis is running, consider these alternatives:
• If storing to an XTF file, click the NOTE: button in the Parameter
Display window. If you click the NOTE: the contents of the Notes
text are saved into the XTF file, are posted to the
file, and printed (if hardcopy is turned on).
• Use Notepad to open a different ASCII file. The file should be
named something other than
SURVEY.LOG file is shown in
SURVEY.LOG
D:\SURVEY.LOG.
Chapter 2: Getting Started with Isis Software
June 2004 Isis® Sonar User's Manual, Volume1 16
Figure 2-4. Sample SURVEY.LOG created by Isis
If the first line of the log file contains only the characters LOG, Notepad will
automatically insert the current time and date each time the file is opened. You
also can press F5 to insert the current time and date at the insertion point. Refer
Chapter 2: Getting Started with Isis Software
Loading...
+ 280 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.