Design, implementation, and analysis of an Army interactive multimedia threat identification training system
Approved for public release; distribution is unlimited === Correctly identifying a weapon system as "friend" or "foe" is vital to the success of the Army mission. Incorrect identification can leave the enemy to fight another day or cause a fratricide event. A current threat ident...
Main Author: | |
---|---|
Other Authors: | |
Language: | en_US |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/8223 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-8223 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-82232015-07-03T16:06:08Z Design, implementation, and analysis of an Army interactive multimedia threat identification training system Miller, Douglas S. Xie, Geoffrey Falby, John S. Approved for public release; distribution is unlimited Correctly identifying a weapon system as "friend" or "foe" is vital to the success of the Army mission. Incorrect identification can leave the enemy to fight another day or cause a fratricide event. A current threat identification training method is to use Army Field Manual (FM) 1-402, which has not been updated since 1984, and is difficult to tailor towards specific and evolving threat training and mission requirements. This thesis, therefore, has two main purposes: development of a modifiable computer-based program that individual units can easily tailor to meet their current threat training requirements, and a statistical analysis to deteriine if Computer-Based Training (CET) is suitable for individual soldier threat identification training. The CBT application developed for this thesis is dynamically linked to image and text files maintained by the unit-training officer, thus allowing for modification and updates as required. Experimental results indicate that using this CBT application can be a suitable, and in some aspects better, training tool than FM 1A02. After a 20-minute study period, experiment participants using the CBT had an average nomenclature final test score increase of 38.4 percent over a similarly experienced control-group 2012-08-09T19:19:30Z 2012-08-09T19:19:30Z 1999-09 Thesis http://hdl.handle.net/10945/8223 en_US This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, may not be copyrighted. Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
language |
en_US |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited === Correctly identifying a weapon system as "friend" or "foe" is vital to the success of the Army mission. Incorrect identification can leave the enemy to fight another day or cause a fratricide event. A current threat identification training method is to use Army Field Manual (FM) 1-402, which has not been updated since 1984, and is difficult to tailor towards specific and evolving threat training and mission requirements. This thesis, therefore, has two main purposes: development of a modifiable computer-based program that individual units can easily tailor to meet their current threat training requirements, and a statistical analysis to deteriine if Computer-Based Training (CET) is suitable for individual soldier threat identification training. The CBT application developed for this thesis is dynamically linked to image and text files maintained by the unit-training officer, thus allowing for modification and updates as required. Experimental results indicate that using this CBT application can be a suitable, and in some aspects better, training tool than FM 1A02. After a 20-minute study period, experiment participants using the CBT had an average nomenclature final test score increase of 38.4 percent over a similarly experienced control-group |
author2 |
Xie, Geoffrey |
author_facet |
Xie, Geoffrey Miller, Douglas S. |
author |
Miller, Douglas S. |
spellingShingle |
Miller, Douglas S. Design, implementation, and analysis of an Army interactive multimedia threat identification training system |
author_sort |
Miller, Douglas S. |
title |
Design, implementation, and analysis of an Army interactive multimedia threat identification training system |
title_short |
Design, implementation, and analysis of an Army interactive multimedia threat identification training system |
title_full |
Design, implementation, and analysis of an Army interactive multimedia threat identification training system |
title_fullStr |
Design, implementation, and analysis of an Army interactive multimedia threat identification training system |
title_full_unstemmed |
Design, implementation, and analysis of an Army interactive multimedia threat identification training system |
title_sort |
design, implementation, and analysis of an army interactive multimedia threat identification training system |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2012 |
url |
http://hdl.handle.net/10945/8223 |
work_keys_str_mv |
AT millerdouglass designimplementationandanalysisofanarmyinteractivemultimediathreatidentificationtrainingsystem |
_version_ |
1716807733723791360 |