Interchanging Agents and Humans in Military Simulation

Total Page:16

File Type:pdf, Size:1020Kb

Interchanging Agents and Humans in Military Simulation From: IAAI-01 Proceedings. Copyright © 2001, AAAI (www.aaai.org). All rights reserved. Interchanging Agents and Humans in Military Simulation Clinton Heinze1, Simon Goss1, Torgny Josefsson1, Kerry Bennett1, Sam Waugh1, Ian Lloyd1, Graeme Murray1 & John Oldfield2 1 Defence, Science, and Technology Organisation 2 Royal Australian Air Force 506 Lorimer Street, Fishermen’s Bend, Evaluation Analysis & Standards Flight, 92 Wing, Victoria, Australia RAAF Base Edinburgh, South Australia, Australia [email protected] [email protected] Abstract and human until implementation [14]. With this as a driver The innovative reapplication of a multi-agent system for in the design process the construction of systems in which human-in-the-loop (HIL) simulation was a consequence of humans and agents can be interchanged is simplified. Two appropriate agent oriented design. The use of intelligent systems using the same base architecture are used to support agents for simulating human decision making offers the operations research: potential for analysis and design methodologies that do not • The original system that utilises intelligent agents for distinguish between agent and human until modelling all of the military personnel within a implementation. With this as a driver in the design process scenario. This is conceptually identical with the the construction of systems in which humans and agents systems reported by Tidhar et. al. [1] although applied can be interchanged is simplified. Two systems have been to different aircraft and missions. constructed and deployed to provide defence analysts with • the tools required to advise and assist the Australian The new system that removes the intelligent agent for a Defence Force in the conduct of maritime surveillance and particular aircraft of interest and provides user patrol. The systems both simulate maritime air operations. interfaces that allow the actual crew of that aircraft to One utilises intelligent agents to provide models of tactical fly simulated missions for the purpose of validating and 2 decision making, the other provides the same environment developing tactics. but provides a set of user interfaces to allow air force flight The use of intelligent agents to military simulation is crews to participate in human in the loop simulation by maturing. For several years intelligent agents have been replacing the intelligent agents. The experiences gained applied to constructive military simulation. Architectures, from this process indicate that it is simpler, both in design methodologies and programming patterns in support of this and implementation, to add humans to a system designed development are improving. for intelligent agents than it is to add intelligent agents to a system designed for humans. The incorporation of intelligent agents into HIL simulation is generally post-hoc engineering of large legacy systems or the injection of entities into a large distributed simulation Introduction via an interface [10]. Agents have requirements on systems The modification and development of existing that are not apparent in mainstream HIL simulations. constructive1, multi-agent military systems by the Difficulties associated with the successful incorporation of Australian Defence Science and Technology Organisation intelligent agents into extant systems are often associated (DSTO) to provide the Royal Australian Air Force (RAAF) with a failure to recognise the specific requirements that with human-in-the-loop (HIL) capability is reported in this agents will place on the system [9,16]. These problems can paper. It extends applications developed and described be alleviated by careful design of new systems or by costly earlier [1,2], and commences the process of integrating remediation of existing systems. intelligent agent developments [8] with HIL systems This paper provides a case study of a deployed HIL research [3]. The applications described here differ in simulation used for development of tactical procedures for a purpose from most other deployed HIL simulations in that maritime surveillance aircraft. An existing constructive they are used for exploration, evaluation and development simulation that used intelligent agents to model all human of tactics and procedures rather than for training [15]. components was modified. The modifications provide user The innovative use of an existing multi-agent system for interfaces that allow air force personnel to replace the HIL simulation was a consequence of appropriate agent agents that previously modelled them. The experiences oriented design. The use of intelligent agents for simulating gained from this process indicate that it is simpler, both in human decision making offers the potential for analysis and design methodologies that do not distinguish between agent 2 There is a phase of significant duration in an acquisition or mid-life refit programme where military units are in a work-up mode in anticipation of 1 delivery of platforms with enhanced capability that makes them effectively The simulation community uses the term constructive to designate those ‘first of kind’ and requires development of new or significantly altered systems that contain no human interaction. tactics, operating procedures, and doctrine. design and implementation, to add humans to a system • The tactical decision making processes on board the designed for intelligent agents than it is to add intelligent aircraft representing the human operators, and crew agents to a system designed for humans. workload (including the type and amount of information available at any given time), the sensor data-fusion The following section details the domain of application of process and chain of command. this technology, that of maritime patrol and surveillance by the RAAF. Operational analysis that incorporates both • The environment, including weather and sea state. constructive and HIL simulation can offer significant • Several types of ships. savings to the Air Force. Savings are realised both in mission performance and in support costs with respect to An example mission with some of the factors that need to be fuel used and time to complete a mission. By far the biggest considered in tactical decision making is outlined below: savings are realised in extending the life of type of an aircraft through smarter operation. Typical AP-3C Scenario Maritime Patrol and Surveillance Tactics An AP-3C Maritime Patrol Aircraft is tasked to find and monitor the movements of a target whose location is not precisely known. In this Air Operations Division (AOD) of the DSTO supports the situation the aircraft will fly a predefined search pattern over the region of RAAF’s Maritime Patrol Group (MPG) in developing new ocean that the target is suspected of being located within. The aircraft will tactics and ‘concepts of operation’ for the upgraded AP-3C use its various sensors such as the radar, the ESM (Electronic Support Orion Maritime Patrol Aircraft (see Fig. 1). The Orions are Measures: for detecting the radar transmissions of other ships and used by the RAAF in peacetime for maritime search, aircraft) and infra-red optical sensors to try and locate and classify all surveillance and operations in and around Australian possible ships in the region in order to find the target. The radar operator territorial waters. and the ESM operator perform their duties trying to detect and classify various ‘contacts’ on their sensors. Typically these two operators have TACCO, NAVCOM, Radio Operator, Radar and ESM hundreds of ‘contacts’ on their sensors at any given time. The protocol for Operators (Intelligent Agents) using the radar and ESM sensors (they have many different modes) depends on a number of factors such as weather conditions, altitude, target type, the presence or otherwise of other ships and aircraft and whether the aircraft wants to advertise its position to the target it is looking for. Contacts that cannot be eliminated at this stage are passed up to the Sensor Employment Manager (SEM) who performs data-fusion duties, such as P-3C Platform & associating data from the two sensors if they are deemed to be from the Aerodynamics same source, and who directs the use of different sensor classification EL/M2022 Radar techniques. The SEM passes on information about contacts that may ALR 2001 ESM possibly be the target to the Tactical Coordinator (TACCO). The TACCO Electro-Optical & decides which contacts need further investigation and in which order, Infra Red Sensors either by flying closer or changing aspect for different sensor classification techniques. The TACCO must balance many competing factors, including minimising the amount of unnecessary flying distance in order to complete Figure 1. The various sensors and human operators that are modelled in this work superimposed on a photograph of an AP-3C the mission as soon as possible (in effect solving ‘travelling-salesman’ type Orion maritime patrol aircraft. problems) and not concentrating on identifying one suspicious contact at the expense of others. The Orions are in an extensive upgrade program that includes new sensors and avionics that significantly The TACCO and SEM are always on the alert for ‘suspicious’ behaviour improve the capability of the aircraft. Because MPG have that may single out one unknown contact as the target. In effect no previous operational experience with some of these new ‘suspicious’ behaviour means a reaction or response from the contact that sensors, AOD’s operational analysts work
Recommended publications
  • Simulation, History and Experience in Avalon and Military-Entertainment Technoculture
    Simulation, History and Experience in Avalon and Military-Entertainment Technoculture PATRICK CROGAN University of the West of England, UK Abstract: This essay takes Mamoru Oshii’s Avalon (2001) as a starting point for considera- tion of the impact of simulational interactive media on contemporary technoculture. The con- nections made in the film between virtual reality games and military research and develop- ment, and its quasi-simulational modelling of various historical ‘Polands’ in re-sequencing a dystopian end of history are the most valuable resources it brings to this study of how simula- tion’s predominant development represents a major challenge to the forms of critical cultural reflection associated with narrative-based forms of recording and interrogating experience. Analysis of the methods and rhetorics of simulation design in the military-industrial (and now military-entertainment) complex will elaborate the nature and stakes of this challenge for to- day’s globalising technoculture of ‘militainment’. Keywords: simulation, videogames, anime, war, history, technoculture, militainment his article is not so much about Mamoru Oshii’s 2001 Japanese-Polish, anime-live ac- Ttion hybrid feature, Avalon, as it is about the challenge that the film’s subject— videogame virtuality—represents for the critical analysis of contemporary global, digital technoculture. I propose that videogames are exemplary forms of digital technoculture, not least because they illustrate the powerful influence of military technoscience on the latter. Avalon
    [Show full text]
  • The Global Military Simulation and Virtual Training Market 2015–2025 Single Copy Price: $4,800
    The Global Military Simulation and Virtual Training Market 2015–2025 Single Copy Price: $4,800 Reference Code: DF0065SR The Global Military Simulation and Virtual Published: April 2015 Training Market 2015–2025 Report Price: US$ 4,800 (Single Copy) The Global Military Simulation and Virtual Training Market 2015–2025 Single Copy Price: $4,800 Summary “The Global Military Simulation and Virtual Training Market 2015–2025” report offers the reader detailed analysis of the global military simulation market over the next ten years, alongside potential market opportunities to enter the industry, using detailed market size forecasts. The global military simulation and virtual training programs market is expected to value US$XX billion in 2015 and increase at a CAGR of XX% to reach US$XX billion by 2025. The market consists of three simulation categories: flight, combat, and maritime. Flight simulators are expected to account for XX% of the global military simulation market, followed by maritime simulators and combat simulators with shares of XX% each. Over the forecast period, the cumulative global expenditure on military simulators and virtual training programs is expected to reach US$XX billion. “The Global Simulation and Virtual Training Market 2015–2025” provides detailed analysis of the current industry size and growth expectations from 2015 to 2025, including highlights of key growth stimulators. It also benchmarks the industry against key global markets and provides a detailed understanding of emerging opportunities in specific areas. Key Findings The global military simulators and virtual training programs market is expected to value US$XX billion in 2015 and is expected to increase to US$XX billion by 2025, representing a CAGR of XX% during the forecast period.
    [Show full text]
  • 4. Wargaming the Middle East: the Evolution of Simulated Battlefields from Chequerboards to Virtual Worlds and Instrumented Artificial Cities
    4. Wargaming the Middle East: The Evolution of Simulated Battlefields from Chequerboards to Virtual Worlds and Instrumented Artificial Cities Janina Schupp Abstract Shortly after the end of a tank combat during the Gulf War, a team of US Army historians, scientists, and engineers flew to Iraq to gather detailed data of the battle. The collected information was used to create an exact virtual simulation of the combat for training. The mapping capability – offered by the resulting simulation game 73 Easting – to visualize the battlefield from any position and point in time revolutionized military exercises. With ongoing conflicts in the Middle East, these digital training cartographies are now linked to real bodies and vehicles through digital and mobile technologies during live training in artificially constructed villages. This chapter analyses this evolution and critically investigates the growing ‘gamification’ ensuing in these representations of Middle Eastern battlefields. Keywords: Wargames, Middle East, interactive battlespace, live simulations In war the experienced soldier reacts in the same way as the human eye does in the dark: the pupil expands to admit what little light there is, discerning objects by degrees, and finally seeing them indistinctly. By contrast, the novice is plunged into the deepest night. […] It is immensely important that no soldier, whatever his rank, should wait for war to expose him to those aspects of active service that amaze and confuse him when he first comes across them. (Clausewitz 1989, p. 122) Strohmaier, A. and A. Krewani (eds.), Media and Mapping Practices in the Middle East and North Africa: Producing Space. Amsterdam: Amsterdam University Press, 2021 doi 10.5117/9789462989092_ch04 96 JANINA SCHUPP The act of playing at war is deeply engrained in human history and has per- sisted to the present day in both professional and hobby culture.
    [Show full text]
  • Counter Terrorism Simulation: a New Breed of Federation
    Simulation Interoperability Workshop – Spring 2002 Counter Terrorism Simulation: A New Breed of Federation Roger Smith Titan Systems Corporation Orlando, Florida 32765 [email protected] Keywords: Terrorism, Federation, System Dynamics, FOM ABSTRACT: In this paper we will explore the need for a suite of simulation tools that can be used to analyze, predict, and prevent terrorist activities. Simulation technology and tools can be applied directly to the war against terrorism, but custom solutions for this mission do not yet exist. A simulation of terrorism must address each of the components of a terrorist network – the command nucleus, field cell, group communications, national host, sympathizers, and support assets. Together these components create a network that enables a small group to conduct guerilla warfare against any target in the world. Simulating our response to these components will require more than traditional interactive or analytical simulations. An appropriate simulation must represent the assets and missions of 1) the surgical application of military special forces - to include helicopter insertion and support, infantry operations in an urban environment, and search and rescue teams; 2) intelligence collection against urban and guerilla forces - particularly focused on communications and human intelligence and moving target surveillance; 3) political actions to decrease the ability of an organization to operate in specific countries; 4) legal actions against non-governmental sympathizers that support terrorists; 5) financial and economic sanctions targeted at assets belonging to terrorists and at national that host them; and 6) the cultural influences on potential recruits and supports of terrorists. These activities cover a very broad spectrum and it is probably not feasible to include all of them in a single simulation system.
    [Show full text]
  • All but War Is Simulation: the Military Entertainment Complex
    1 THEATERS OF WAR: THE MILITARY-ENTERTAINMENT COMPLEX Tim Lenoir and Henry Lowood Stanford University To appear in Jan Lazardzig, Helmar Schramm, Ludger Schwarte, eds., Kunstkammer, Laboratorium, Bühne--Schauplätze des Wissens im 17. Jahrhundert/ Collection, Laboratory, Theater, Berlin; Walter de Gruyter Publishers, 2003 in both German and in English War games are simulations combining game, experiment and performance. The U.S. Department of Defense (DoD) has been the primary proponent of war game design since the 1950s. Yet, commercial game designers produced many of the ideas shaping the design of military simulations, both before and after the advent of computer-based games. By the 1980s, the seeds of a deeper collaboration among military, commercial designers, the entertainment industry, and academic researchers in the development of high-end computer simulations for military training had been planted. They built “distributed interactive simulations” (DIS) such as SIMNET that created virtual theaters of war by linking participants interacting with distributed software or hardware simulators in real time. The simulators themselves presented synthetic environments—virtual worlds—by utilizing advances in computer graphics and virtual reality research. With the rapid development of DIS technology during the 1990s, content and compelling story development became increasingly important. The necessity of realistic scenarios and backstory in military simulations led designers to build databases of historical, geographic and physical data, reconsider the role of synthetic agents in their simulations and consult with game design and entertainment talents for the latest word on narrative and performance. Even when this has not been the intention of their designers and sponsors, military simulations have been deeply embedded in commercial forms of entertainment, for example, by providing content and technology deployed in computer and video games.
    [Show full text]
  • Constructive Vs Serious Games
    Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) 2008 Games – Just How Serious Are They? Dr. Paul A. Roman Mr. Doug Brown Royal Military College of Canada Land Synthetic Environments Kingston, Ontario Kingston, Ontario [email protected] [email protected] ABSTRACT As military forces around the world begin to adopt gaming technology as an apparently cost effective and robust means for military tactical training it seems appropriate to consider how well suited they are for this task. This paper uses an evidence based approach to illustrate how American, British, Canadian and Australian forces are applying serious game (SG) technology to meet a variety of training needs. In particular, the paper uses these specific examples to address three questions: What tactical training requirements are serious games best suited to meeting? How effective and efficient are they at meeting those requirements? What are the technological limits associated with their use? In answering these questions, the paper concludes that SGs are providing a cost-effective means to provide experience-based learning with emphasis on cognitive and increasingly affective training domains. War fighters will not develop the expert psycho-motor skills they need to effectively employ their weapon systems using game-based training. However, once the team of experts in various weapon systems is created, SG technology affords trainers the opportunity to turn them into an expert team capable of communicating well with the cognitive skills they need to effectively operate as teams. The examples demonstrate that this is true for infantry, armoured or combined arms training in open or urban terrain and holds for the very technologically demanding case of aviation training.
    [Show full text]
  • The Military Entertainment Complex
    1 THEATERS OF WAR: THE MILITARY-ENTERTAINMENT COMPLEX Tim Lenoir and Henry Lowood Stanford University War games are simulations combining game, experiment and performance. The U.S. Department of Defense (DoD) has been the primary proponent of war game design since the 1950s. Yet, commercial game designers produced many of the ideas shaping the design of military simulations, both before and after the advent of computer-based games. By the 1980s, the seeds of a deeper collaboration among military, commercial designers, the entertainment industry, and academic researchers in the development of high-end computer simulations for military training had been planted. They built “distributed interactive simulations” (DIS) such as SIMNET that created virtual theaters of war by linking participants interacting with distributed software or hardware simulators in real time. The simulators themselves presented synthetic environments—virtual worlds—by utilizing advances in computer graphics and virtual reality research. With the rapid development of DIS technology during the 1990s, content and compelling story development became increasingly important. The necessity of realistic scenarios and backstory in military simulations led designers to build databases of historical, geographic and physical data, reconsider the role of synthetic agents in their simulations and consult with game design and entertainment talents for the latest word on narrative and performance. Even when this has not been the intention of their designers and sponsors, military simulations have been deeply embedded in commercial forms of entertainment, for example, by providing content and technology deployed in computer and video games. Building on a brief overview of the history of war games, we will sketch the history of military simulations leading to SIMNET in the late 1980s and projects building on this work through the mid-1990s.
    [Show full text]
  • The Convergent Use of Programmable Media for Terrorism Modeling and Social Simulations in Civilian Vs
    Repositorium für die Medienwissenschaft Stefan Werning The Convergent Use of Programmable Media for Terrorism Modeling and Social Simulations in Civilian vs. Military Contexts 2008 https://doi.org/10.25969/mediarep/1562 Veröffentlichungsversion / published version Sammelbandbeitrag / collection article Empfohlene Zitierung / Suggested Citation: Werning, Stefan: The Convergent Use of Programmable Media for Terrorism Modeling and Social Simulations in Civilian vs. Military Contexts. In: Rolf F. Nohr, Serjoscha Wiemer (Hg.): Strategie Spielen. Medialität, Geschichte und Politik des Strategiespiels. Münster: LIT 2008 (Medien'welten. Braunschweiger Schriften zur Medienkultur), S. 114– 135. DOI: https://doi.org/10.25969/mediarep/1562. Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Weitergabe unter Attribution - Non Commercial - Share Alike 3.0 License. For more gleichen Bedingungen 3.0 Lizenz zur Verfügung gestellt. Nähere information see: Auskünfte zu dieser Lizenz finden Sie hier: https://creativecommons.org/licenses/by-nc-sa/3.0 https://creativecommons.org/licenses/by-nc-sa/3.0 Stefan Werning The Convergent Use of Programmable Media for Terrorism Modeling and Social Simulati- ons in Civilian vs. Military Contexts Modeling Terrorism as a Household Strategy The rhetoric of the ›Global War on Terrorism‹ is a recurring theme in interac- tive, i.e. programmable media like digital games (cf. e.g. commercial games like Fugitive Hunter: War on Terror (Black Ops Entertainment, 2003) and War on Terror (Digital Reality, 2006)) and on-line portals establishing the ›War on Ter- rorism‹ as a quasi-›brand‹ in public discourse. ¯1 Technological developments enabling the algorithmic modeling of terrorism are a central strategic compo- nent both of modern military self-description, e.g.
    [Show full text]
  • The Simulation of Chaos
    Developments in Business Simulation & Experiential Exercises, Volume 8, 1981 THE SIMULATION OF CHAOS Paul B. Malone III, George Washington University ABSTRACT learning developing their techniques to recognize the fact that decision and decisionmakers are influenced by human emotions? There is evidence that some are working on it. At This paper expresses a concern that, in our efforts to use the April, 1980 ABSEL meeting, Robert Pitts and Kenneth simulation as a technique to develop logical, objective and Thompson observed that “the direction [in simulation and analytical decisionmakers, we may be disregarding a vital experiential learning] has been centered too much around component of every significant decision--the human building mental skills and not enough emphasis placed on element. Important decisions are not made in an emotional building diagnostic human skills ..." [6, p. 44]. At the same vacuum; many simulation decisions are. This is unrealistic. meeting, Louis White and Kevin Wooten reiterated the need The armed forces--past masters of the use of simulation to develop concurrently three basic skills--cognitive, during tines of peace--have been successful in integrating behavioral and interpersonal--into management education emotional considerations into the decisionmaking process programs [11, p. 93]. Richard Barton observed that particularly in the training and development of combat “compared to the subtleties and nuances of human behavior, leaders. While business simulation does not ordinarily computer simulation models are extremely gross” [1, p. 14]. involve “life-and-death” decisions, some techniques used in military simulation may have universal utility. Some of these Decisions of any significance can have profound short- and are described in this paper.
    [Show full text]
  • Military Simulations in an Interagency Context
    The Applications of Military Simulations in an Interagency Context by James Gilmore he use of simulation has been a long-standing tradition throughout military history. Planning every minute detail of an important operation is something that comes naturally and has subsequently been honed over the course of repeated use. Only recently has the Army’s use Tof computer modeling and simulation started making its way out of the military complex and into the world of private industry. Technological capabilities, once only thought useful for defense purposes are now being used to streamline business best practices and improve a corporation’s predictive capabilities.1 While the use of simulation has slowly started invading the corporate world, other federal agencies are still reluctant to add gaming and modeling to their everyday practices. This reluctance is the focus of this article. By examining research on cognitive and training implications for simulation use and the results from a series of interviews conducted with experts familiar with the Army’s use of simulations, this article will discern whether this particular type of training tool can be used successfully outside the military realm. Background and Information Much of the literature on the use of simulations pertains to its utility in training or for technological development. The most agreed upon definition of a modern-day military simulation is a model or simulation whose operation does not involve the use of actual military forces and whose actions undertaken will affect players on the opposing side.2 In the past, simulations have been used to make crucial decisions with minimal information.3 Putting together various computer models and war games always seemed to make sense in the military context, as the ability to understand the enemy can make strategic planning much easier.
    [Show full text]
  • A Virtual Cyber Range for Cyber Warfare Analysis and Training
    Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC) 2012 A Virtual Cyber Range for Cyber Warfare Analysis and Training Lloyd Wihl Maneesh Varshney SCALABLE Network Technologies SCALABLE Network Technologies Los Angeles, CA Los Angeles, CA [email protected] [email protected] ABSTRACT There is a need to accurately model the effects of cyber weapons for analysis, system testing and hardening, and training. Current simulations of the Net-Centric Battlespace do not adequately recreate the impact of cyber warfare due to a lack of realistic cyber threat and defense representations. Hardware-based cyber ranges are limited in scale, costly, and time-consuming to configure. Moreover, they have no capability to simulate the inherent vulnerabilities endemic to wireless tactical networks. They also do not effectively model the overall effect of a cyber attack on a mission and are therefore unsuitable for mission analysis or training. In this paper, we present a new approach, the Virtual Cyber Range, a portable modeling and simulation framework that provides a real-time, hardware-in-the-loop capability for simulation of cyber threats to the entire net-centric infrastructure. It also provides the ability to evaluate the effectiveness of the threats in disrupting communications via key performance indicators. The range provides models for accurate cyber threat simulation at all layers of the networking stack to include passive, active, coordinated and adaptive attacks on networks with hundreds to thousands of wired and wireless components. The range enables interoperability with Live-Virtual- Constructive (LVC) simulations providing assessment of human-in-the-loop performance, and can stimulate physical networked systems with simulated cyber threats for real-time testing.
    [Show full text]
  • Designing a Virtual Embedded Scenario-Based Military Simulation Training Program Using Educational and Design Instructional Strategies
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2018 Designing a Virtual Embedded Scenario-Based Military Simulation Training Program using Educational and Design Instructional Strategies Christina Cook University of Central Florida Part of the Curriculum and Instruction Commons, and the Instructional Media Design Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Cook, Christina, "Designing a Virtual Embedded Scenario-Based Military Simulation Training Program using Educational and Design Instructional Strategies" (2018). Electronic Theses and Dissertations, 2004-2019. 5854. https://stars.library.ucf.edu/etd/5854 DESIGNING A VIRTUAL EMBEDDED SCENARIO-BASED MILITARY SIMULATION TRAINING PROGRAM USING EDUCATIONAL AND DESIGN INSTRUCTIONAL STRATEGIES by CHRISTINA COOK M.A. University of Central Florida, 2012 A dissertation in practice submitted in partial fulfillment of the requirements for the degree of Doctor of Education in the School of Teaching, Learning, and Leadership in the College of Education and Human Performance at the University of Central Florida Orlando, Florida Spring Term 2018 Major Professor: Carolyn Hopp ©2018 Christina E. Cook ii ABSTRACT The purpose of this dissertation in practice was to develop and implement a new training program for designers of military intelligence simulation scenarios used to train soldiers. The use of education and design instructional strategies assisted in the ability for designers to gain mastery skills in creating realistic, high-fidelity scenarios that are applied in the training process.
    [Show full text]