Transcript
Calhoun: The NPS Institutional Archive Theses and Dissertations
Thesis Collection
1983-06
An analysis plan for the ARCOMS II experiment Di Giorgio, Emilio Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/19638
Kvvit,':.
:•
Dudley Knox Library, NFS Monterey, CA 93943
NAVAL POSTGRADUATE SCHOOL Monterey, California
THESIS AN ANALYSIS PLAN FOR THE ARCOMS II EXPERIMENT
by
Emilio Di Giorgio
June 1983 •
Thesis Advisor:
T
Jayachandran
Approved for public release; dist:ribut:ion unlimited
T210090
Dudley Kaox Library, NPL Uonterey, CA 93943 SCCUXtTV CL ASSiriCATlOM Of TntS PACC
(Wttmn Dmtm gnl»r>d)
READ INSTRUCTIONS BBPORE COMPLETINCi FORM
REPORT POgjMENTAHO N PAGE 1
4
ffl^OMT
NUMSCK
TiTue (tmd
OOVT ACCKMIOM NO.
a.
Suhllllm)
ncci^iCNT's CATALOG NuMaen
s.
Tv^e or RCPowT
Master
An Analysis Plan for the ARCOMS il Experiment 7.
).
pcrioo coveneo
k
'
Th^?7i?l J^n^ 19 8 3 • PcnPonMiNG one. nt^onT numbch •
AuTHonro
CONTHACT OM chant NUMSCnCa)
.
Emilio Di Giorgio •
PCnronMINO ONOANIZATION NAME AND AOOAIII
10.
PnOCHAM CLEMENT. PHOjCCT. TASK AHEA * MOHK UNIT NUMSEMS
12.
nEPOHT DATE
IS.
.June 19 8 3 NUMBEH or PAGES
IS.
SCCuniTY CLASS,
Naval Postgraduate School Monterey, California 93940 n
conthollino office name ano aooress
Naval Postgraduate School Monterey, California 93940 U
MONITOMINC AGENCY NAME
*
74
AOOnESIfll 4l»«r«if Irom Cantrollint Offlecj
\%m.
IS.
DISTNiauTlON STATEMENT
(ol thlm t^tort)
OCCLASSiriCATION/DOMNGNAOiNG
SCHEDULE
(oi ihia Kmpmrt)
Approved for public release; distribution unlimited.
17.
tS.
OlSTHiauTION STATEMENT
(of ihm a^atrmcl
anttmd
In
af«e* 30,
1/
Mllmtmit Irmm Ram^rt)
SUPPUEMENTARY NOTES
Travel expenses and data support were provided by the United States Army TRADOC Systems Analysis Activity. It.
KEY WOMOS
(Contii-M an
f99f
ml*»
H nmc»amfr
••* Idmnlllr »r WoeA nuM*«rJ
Armor field experimentation Experimental effects and interactions Distribution of times to acq^uire and engage Conditional line of sight time and path segment lengths, and aim errors. ,
ao.
ABSTRACT (Conllmf
mt
fvm»»
mt*»
II
n«e*a««wr •»*
Idmrntllr
*r *!••* i>um^
M)
The purpose of this thesis is to examine and recommend methodologies that will support the analysis of the ARCOMS II field experiment. This is done in three parts. The first is to determine the methods with which to analyze the experimental effects and interactions. This is followed by a discussion of data analysis techniques for representing the
DO ,:°r„
1473
EDITION or
I
NOV
AS
IS
OaiOLCTE
SeCURITY CLASSIFICATION OF THIS PAGE (Whtn Dmim Enfrmd)
data. Thirdly, an examination of the techniques for determining the significance of certain questions relating to the Armor Combat Process is discussed.
S
N 0102- LF- 014- 6601
SECURITY CLASSIFICATION OF THIS PAGEfWh«n Dmim Enfrmd)
Apfrcved for public release; disxribution unliait'Sd
an Analysis Plan for
the AfiCOHS II Experiment by
E.S.,
Emilio Di Giorgio Captain, United States Army United States Military Academy, 1974
Submitted ir. uartial fulfillment of the requirements for the degree of MASTER Of SCIEHCE IN OPERATIONS RESEARCH from the
NAVAL POSTGRADUATE SCHOOL June, 1983
ABSTBACT The purpose of
this t.hesis is ro
methccolocies that will II
field experiment.
is tc
examine and reccmmend
support the analysis of
This is done in three parts.
the ARCOMS
The first
determine the methods with which to analyze the exper-
and interactions. This is followed fcy a discussion of data analysis techniques for rapresenting the Thirdly, an examination of the techniques for deterdata. imental •effects
mining the significance of certain questions relating to the Armor Ccmtat Process is discussed.
TABLE CF CONTESTS
I.
INTRCDUCTION A.
9
EACKGRGONL
9
1.
Scenario
10
2.
Data Ccllection
11
3.
Dependent Variables
11
12
B.
Independent Variables OBJECTIVE
C.
SCOPE
13
U.
II.
III.
IV.
13
ANALYSIS OF EXFEHIMSNTAL EFFECTS
15
A.
EACKGRODD DISCUSSION
15
B.
ANALYSIS CF THE EVENT MATRIX
17
1.
A 2*-
2.
2x2
1
Half
Fractional Factorial
17
ANCVA With Replications
19
CAIA ANALYSIS
25
A.
GENERAL
25
3.
DATA STRUCTURE AND CATEGORIZATION
26
C.
FITTING THEORETICAL DISTRIBUTIONS TO DATA
.
.
26
1.
Methodclogy
26
2.
CLOS
30
3.
Acquisition Data
33
4.
Engagement Data
33
Data
METHCDS FOR DEALING WITH QUESTIONS OF SIGNIFICANCE 37 A.
GENERAL
E.
THE EFFECT CF BOUNDING BY THE DEFENDER ON HIS
37
DETECTABILITY C.
QUICK DASHES BY ASSAULTING VEHICLES
D.
E.
ENGAGEMENT AND ITS SIGNIFICANCE ON ATTRITION ROUNDS EXPENDED CN TRUE VERSUS FALSE TARGETS
F.
FALSE TARGET DETECTION RATE
37 39 .
UO
.
41
42
FEEQUENCY CF OVERHATCHSR DETECTIONS
G. V.
CCNCIUSIONS AND RECOMMENDATIONS
U3
U5
A.
CONCLOSIONS
45
B.
RECOMMENDAIIONS
45
APPENDIX
A:
DEPENDENT VARIABLES
48
A.
OFFENSIVE OPERATIONS
48
B.
CEPENSIVE OPERATIONS
49
APPENDIX
E:
2X2 ANOVA WITH REPLICATIONS
50
A.
ANOVA MODEL
50
B.
COMPUTER PROGRAM COTPUT OF ANOVA RESULTS
52
DATA ANALYSIS RESULTS
55
C.
APPENDIX
C:
5u
A.
CLOS DATA
55
B.
55
C.
AQUISITION DATA AIM ERROR CAT A
D.
SCATTER DIAGRAMS FOR TIME AND PATH SEGMENT
55
LENGHTS
APPENDIX
E:
GLOSSARY AND
55 A
aBREVIATIONS
70
A.
ABBREVIATIONS
70
B.
GLOSSARY
70
LIST CF REFERENCES
73
INITIAL DISTRIBUTION LIST
74
LIST OF TABLES
I.
FOPCE COMPOSITION
10
II.
PACTCR LEVELS
12
III.
EXEZRIMENTAL CESIGN MATRIX
16
IV.
CCCED EXPERIMENTAL DESIGN MATRIX
16
V.
THE POSSIBLE 2x2 ANOVA SUB-MODELS
20
VI.
ANALYSIS CF VARIANCE DATA
21
VII.
RESOITS OF ATTACKER TO DEFENDER TACTICS ANOVA
VIII.
RESULTS FOR PCCLED SUM OF SQUARES
IX.
RESULTS OF FIITING ATTACKER TANKS CLOS DATA
...
31
X.
GCCDNESS-OF-FIT RESULTS FOR ACQUISITION DATA
.
3U
XI.
RESULTS OF AIM ERROR FITS
36
XII.
2x2 ANOVA TABLE
51
XIII.
RESULT OF FITTING CLCS DATA
56
XIV.
RESULTS FOR TIMS TO ENGAGE DATA
60
XV.
RESULTS FOR TIME TO DETECT DATA
6
.
.
22 24
.
.
1
LIST OF FIGURES
:.1
Critical Region for the
F
Statistic
23
2.,2
Critical Region for
3,.1
Data Structure
27
3.,2
Fitting Procedure
28
3^,3
Fitted and Empirical CDF Plots
32
C,.1
Tank CLOS Time and Path Segment Histograms
C.,2
Tow CLOS Time and Paxh Segment Histograais
C.,3
APC CLOS Tiie and
c.,4
Attacker Tark to Defender Tank Acquisition Eata
c. 5
Attacker Tank to Defender Tow Acquisition Data
c.,6
Attacker Tark to Defender Dragon Acquisition
F
24
(1,9)
Path Segment Histograms
... ... ...
57 58 59 62
.
63
Data
64
c.,7
Eefender Aim Error Histograms
65
c. 8
Attacker Aim Error Histograms
66
c.,9
Tank CLOS Segment Scatter Plots
67
c.,10
Tew CLOS Segment Scatter Plots
68
c.
APC CLOS Seament Scatter Plots
69
1 1
!•
A.
INTBODUCTION
EACKGECOND
Decision-making within the Armed Forces has evolved into
complex process
an extrenely
dependence upon and computer
Defense
requiring an
ever increasing
quantitative tools such as
combat modeling
siiruiation.
xhis situation
view of
In
Department recognized
the importance
the
data
of the
required as input to these models. Consequently, the Army has undertaken a program of models improvement supported by field
exferimentaticn.
In
Training and Doctrine Command
response
to
as
the proponent for
experiments to
provide Improvement Program the required support. series
of
field
directed the Tradoc Ccmbined Arms Fort Hood,
This
Armor
the
Army
Model
Furthermore,
Test Activity
a
(TCATA)
It at
Texas to conduct the first of these experiments.
initial experimentation
Operations
Ccirbat
Experiment Phase II force
the
designated the TRADOC
(TRADOC)
Systems Analysis Activity (TRASANA)
this effort
was quickly
Support
Model
(ARCOMS II)
engagement experiment
followed by
was designed
II force-en-
to provide
modelers to better understand
that would enable
Field
(ARCOMS)
The ARCOMS
.
the
data
the direct
fire comtat processes in both offensive and defensive opera-
tions;
the result
eventual improvement in
cf which is the
Armor comtat modeling, combined arms ming.
time
Ancng
the critical issues
and range
dependent
simulation
to be addressed
distributions
variables" during the force-on-f orce
were the
"dependent
of the
engagements as well as
the experimental effects and interactions [Ref.
thru 1-10].
and wargam-
1:
pp.
1-1
Sce nar io
1 .
this
scer.aric for
The
series cf ccmbined
"
a
meeting engagements betwe-rn ATTACKER
aiirs
shown in Table
and DEFZNDEE forces ccnfigured as p.
consisted cf
experiaient
I
[Ref.
1:
1-5], The force configuration depicted here is typical of
an Armor heavy team attacking
an Armor platoon supported by
The specific quantities of
anti-tank weapons.
each force
element were allocated in order to provide the Attacker with the minimum force ratio of three to one.
TABLE I PORCE COMPOSITION ECUIEMENT
OVERWATCH
BOUNDING
TYPE Tank,
DEFENSE
OF FEN SE
M60
APC
2
platoons
1
platoon
AT
1
platoon
1
platoon
1
section
1
element «
Tte
scenario was
designed
to
play OS
and
CPFOR
tactics in both offensive and defensive op'^rations. The opposing forces were given initial briefings and operations orders. The test officers acted as both the controllers and
headquarters for
the higher
the participating
players were permitted to conduct of their
experience and
consistant selected
with to
the
The
the operation to the
best,
ability so
tactical
represent.
units.
The
10
long as
doctrine attacking
they remained
that
fores
they
were
ccaaenced
one cf
from
deploymsr.-t
avenues of
two salected
approach.
Their objective was to seize pcsizions being defended by the flowing.
free
the tactical
This permitted
Artillery, smoke,
realistic as possible. of
the meeting engagement was
Froc this point
opposing force.
play to
be as
mines and the use
trenches were not played. £§ia Collect icn
2*
Pricr to the
conduct of the experiment
data on xhe
following environmental areas was collected. 1.
Meteorological data.
2.
Player demographics.
3.
Eguipment demographics.
U.
Historical guestiona ires.
This was followed,
phase in
short time later,
a
employment of
which the
by the experimental
automated measuring
and
recording devices enabled data coiisction to be performed in this method of data collection
Additionally,
"real time".
amass an enormous quantity of data pertaining to position locaxion, firer and -arget identifiprovided
a
means
cation, range, and a
tew.
The
data
tc
a
record of hits and misses,
collected
consisted of five types.
on the
dependent
Line-of -sight data (intervisibility)
2.
Target aquisition data.
3.
Target distribution data.
4.
Tarcfst engageiEsnt
5.
Attrition data. .
results.
Cep gnd ent Va riable s
The dependent variables that pp.
are,
variables
They are
1.
3
just to name
were measured [Ref.
1-20 thru 1-33] are too numerous to be listed here.
however, provided in appendix A.
1 1
1:
They
Four independent
variables were chos=n at
measure th* dependent or response
variables.
variables consisted cf two levels as fixing each of the distinct
variable levels,
Each cf these
shown in Table II.
By
combinations of rhe independent
an experimental trial was determined.
entire experiment consisted of a
which to
eight rrials each replicated
total cf three tim?£.
TABLE II FACTOR LEVELS INCEFENDENT VARIABLES
LEVELS
ATTACKER TACTICS
-Fire and .Movement -Rapid Approach
-Deliberate Defense
DEFENDER TACTICS
-Hasty Defense -Hilly
TERRAIN (avenue of approach)
(Avenue
-Flat (Avenue
HATCH POSITICN (visibility)
-Open -Closed
12
The
'
'A') B»
OEJECTIVE
B.
It is the objective of this paper to examine those" ireth-
will hest support
odologics that
the data
analysis effort
reduction. This is to be The first is an examination of
following the coirple^icn of data
accomplished in three parts. the experimental
second is
The
effects.
to discuss
analysis techniques to describe the data. by
discussion of
This is followed
the analysis techniques that
determine the significance of
data
will help to
certain questions relating to
the Armcr Ccmbat Process.
SCOPE
C.
will be limited to specifically
The scope of this paper
addressing the questions
of "What should be
analyzed?"
as
well as "Shat method should be employed to perform the anal-
ysis?".
In
the preceding paragraph
it was stated
that a
primary concern of experimental analysis is to determine the
effect that the
independent variables have upon
dent variables.
effect that
equally important
It is
the interactions
upon the dependent variable.
between these This
the depen-
to examine
the
variables have
is to be accomplished in
the following manner. 1.
of current procedures in
An examination
analysis of
factorial design analysis will
variance and
be mada
to decide upon the best method with which to estimate
the experimental effects. 2.
Cnce
an appropriate
method
has
be used
procedural
example will
analytical
prccess involved
in
been selected,
a
to illustrate
the
the derivation
and
interpretation of the experimental effects. the data Combat Modeling, upon the methods which transfom the
In order to facilitate
analysis should focus data
into descriptive
or
Armor
predictive
13
models.
The
models
include regressicn models as well
as many well known profca-
Procedural methods will be discussed in order tc obtain answers zo specific questions regarding the combat process reflected by this experiment. conducting Included in this discussion are proposals for bilisxic cr stochastic models.
te-weer. these
results and experience as well as ether experimentation.
comparative analyses
14
historical
n. A,
ANALYSIS OF EXPERIHENT&L EFFECTS
BACKGEOOD DISCUSSION The four independent variables each at two levels form of sixteen
total
urique combinations.
variable for
dependent
to conduct
possible
factorial design. forth,
be
factors
through
analysis of
an
referred to as
II and
while their appr cpriare
C
nated as plus( +
this coding will a
variables will,
be used throughout the
particular facror,
or
This was due prima2:
each combination was replicated three times.
employed. proven tc
utilized the 2* factorial
be an efficient
effects,
contributions that ,
were
2-3].
look at
A
actually
Terrain
method error.
combination of two,
estimate the as well
The main effects Tactics,
as an
ar^ the
Defender
Position nave upon the experi-
Hatch
mental yield (the dependent on the ctier hand,
by which to
the factors Attacker ar.d
design would have
interaction effects
and the
estiirats cf ^experimental
Tactics
combinations xhat
p.
If all possible combinazions of the control vari-
ables had been
irain
been desig-
using only eight
rily tc the prohibitive cost of resources [Ref. the
A
factor-level ccmbinaticn.
treatment combinations.
show
The
thesis when refer-
of the sixteen
IV will
hence-
been coded
levels have
experiment was performed by
Table
2*
a
factors.
have
III
The AECCMS II
Yet,
using
is
For clarity and simplicity
or niinus(-).
)
variance
the experimental
Tables
the
combina-icns it
these
The independent
listed in
ring to
each of
measuring
3y
a
variables)
ccnsist of
.
The interactions,
the simultaneous effect of
three or four factors
a
upon the yield.
This is valid sc long as the factorial model assumptions are
valid.
15
TAELE III
2XPEEIHENTAL DESIGN MATRIX
CCNTECI VARIAELE
LEVELS
Attacker Tactics
Defender tactics Terrain of
(avenue
a p pr o a ch
Hatch Position
SIGN
COD
Fire and Movement
A
Rapid Approch
A
Deliberate
B
Hasty
B
Hilly
C
flat
C
Open
D
Closed
D
TABLE IV CODED EXPERIMENTAL DESIGN MATRIX
TRIAL
A
B
c
D
+
1
2 3 4 5 6
+
+
+
-f •f
•f
> •f
7 8
No. of Ho. of
(*) {-)
4 4
f
+
6 2
6
6 2
2
16
NO.
OF REPS
3 3 3 3 3 3 3 3
B.
AUALISIS OF THE EVENT MATRIX Given the event matrix in Table
"How should
it
determine experiHaving already excluded the 2* factorial
tecause of the reduced number of trials,
tility of using ether known te examined.
is -her
order to
analyzed in
be
mental effects?" design
IV the question
This
types of factorial designs will
involve a
viill
the feasi-
at fractional facxo-
loolc
confounding of the interactions tc produce sub-mcdels cf a 2* factorial design. Although the use of
rials,
and
blocking variables was considered, in
this faper.
does not exist be generated.
will not be included
it
This is primarily due to the a
fa.cz
that there
which blocks could
physical variable from
The introduction of a dummy blocking variable
would only serve to compound the analysis of the confounding
that wculd normally cccur due to blocking. 1 •
i il'L
fractional Factor ial
M^l
Cften there exists
redundency with
amount of
main effect^-. the
in a factorial design
negligible effect
especially trje when the design [Sef. 3:
notion one
may
it
possible
of
freedom
factor is it.
that
gained
is
^.o
That cost is in terms of
a
has
prior information
the little
interaction cr a
attached tc
cost
one knows
If from experience
of such
a
negligible
effect, there will be little or no loss of information. the other hand,
if no
a
pr
iori knowledge exists,
17
a
loss of information regarding
interaction.
the effect of the omitted cr seme
are used in
However,
when an
assumed tc be negligible
is
Capitalizing upon this reduce the number of
374-375]-
pp.
find
The latter
large number of factors
trials and still obtain valid results. bit
interaction cr the
particular factor.
a
or
be attributed to either
of a higher ordar
cf a
certain
the interactions
respect to
This reduncency may
negligible effect
a
a
On
less of
liJcely
Rather than regarding
occur.
"cc
infer maticr.
it would
,
attributed to
is ncrmaliy
inf or maticn *hat
be
confounded wirh effect normally attributed to
Thus an
combination nation.
now confounded with
is
is
less of
a
say that
some other
r,he
affect.
the omitted
factor
some other factor combi-
now indistinguishable
effec-cs are
two
The
xhi? as
more appropriare -c
has been
information
the effac-.
from
one-another Reduction in the requisite number of trials may also
half-repiicate of a 2* factorial. A half-replicate of the 2* factorial is merely a 2*- I or 23 factorial. This requires only eight or half of the original sixteen trials. Thus, it only remains to determine those eight combinations that produce the best results. acccmplished by
be
considering
confounding
comes from
proper choice
The
a
a
interaction with other factor combinations. generates called
complimentary
two
fcld-ovar.
a
sets
of
higher
This procedure
combinations
eight
is equally useful
Either set
order
for the
analysis provided that measurements are taken using the selected half- replicate. Clearly, it is important to obtain as much informa-
purposes of
tion as possible with regard to the main effects. it
necessary to generate
is
higher order interactions. respect
the
to
interacticns an attempt
was
fold-over sets
AB, AC, AD, BC,
Unfortunately,
.
match. ABC,
An attempt
ABD, ACD, It
BD
using
and CD were generated and
,
match the resulting treatment ccmbiused in
the experiment (Table
none of the fold-over sets produced
a
with each of the third order interactions
BCD,
and ABC
D
was also fruitless.
tecame readily apparent that the imbalance in the
occurrence of have
fold-over sets
The
naticns to the eight actually IV)
by confounding
This precludes any ambiguity with
main effects. made to
To do this
factors at the upper
an over-riding
effect in
18
and lower level
using
any subset
was to of
a
2*
(S6€ Tabl€ IV)
factorial design
sub-mcd=l -hat
The only
.
could produce the proper treatment combinations for analysis 22 factorial
is the
This design
.
severely reduce the amount of useful informa-
will, however, tion about
the 2x2 ANOVA
design or
interaction effects
factors and
the
-hat would
have otherwise been available. 2x2 ANOVA With Replications
2..
The imbalance in the treatment combinations selected for the experiment dcss not allow for the examination of all
the 2x2
sub-models that are
possible.
combinations are indicated in Table the four independent variables as
the ether two be held at a
will
possible to
be
Choosing any two of
V.
factors will require that
fixed level.
examine
only possible
The
Once this is done it
effects of
the
the
chosen
factors.
of an example, if Attacker Tactics is consid-
Ey way te the
second,
the 2x2 design for
V
may be derived.
at least
four
Since factors
level,
it
and Defender
first factor
ered to
B,
C,
of
that this configuration requires
the proper
and D
th?
factors "A AND B" shown in Table
Notice
trials
tactics as
plus-minus combination.
never occur together at the lower
will not be possible
variance table using factors
3
D.
19
to
construct an analysis of
and C,
or
B
and D,
or C and
TABLE
V
THE POSSIBLE 2x2 ANOVl SaB-MODELS "A AND B"
A+B+OD+
A+B-C+D+
•
A-»
Trial
1
Trial
a
A-
Trial
2
Trial
6
"A AND D" A+
E+C+D>
"
A-I-E4C-D4-
A
AND B"
A^B^C^•D +
A+B+C+D-
A+
Trial
1
Trial
3
A+
Trial
1
Trial
5
A-
Trial
2
Trial
7
A-
Trial
2
Trial
8
The model for a 2x2 analysis of variance with repli-
cations is relatively (Ref.
pp. 568-570] simple.
4:
Assuming
that an cbsevaticn of the response variable is a functicn of the
fcllcving affects -the grand mean, -the row effect where i=1,2
6.
1
-th€ cclumn effect where j=1r2 -the interaction effect
-experimental error for the observation at the kth replication where
the
)c
= 1,2,3
observation in -he ijth call
mcdel representing the kth
may then te written
'ay. The error
+
6
+ 1
terms in
Y
.
'J
+
'i^ '
.
.
ij
the model
+
(2.2)
£ i
jk
are assumed
distributed with mean zero and variance
20
a"^-
to
be
noraially
The fictitious data in Table
trate the analysis of variance
determine
interest
tc
Tactics,
and
Suppose it
procedure.
effects
the
will serve tc illus-
VI
factors
of
Attacker
the mean time
Defender Tactics upon
is of
for the
Defender to detect an attacker. The data in each cell repretime for the defender to
sents the mean for
replications
the three
each of
treatment ccmbinations in Table
analysis of variance
is provided
BMDP2V,
subroutine,
the
as a solution using the Bicmed
table for this model as well
computer
corresponding to An
V.
detect an attacker
in
Appendix
C
summary of the results is listed in The results of the analysis may serve to answer Table VII. questions concerning the existence of effects or interac-
[Ref. 5:
p-
tions.
359-386].
A
relevent
three
The
questions
relate
column (Defender Tactics), rcw (Attacker Tactics),
to
and inter-
action effects.
TABLE VI ANALYSIS OF VARIANCE DATA DEFENDER TACTICS 2
1
1
ATTACKEE TACTICS
(j)
60
82
80
74
70
3a
86
90
90
76
SH
92
(i)
2
The null and alternative .on
hypotheses on the intsrac-
effects are stated as KG:
There is no interaction eff ect
(
-b
.
HA:
There is an interaction eff ect
(
\b
.
21
.=
0)
y^
0)
Where "i"
and
gc between
" j"
hyposthesis
null
is
(KG)
levals one and rwo. indeed
true
then
If the
tss^
ths
statistic, IS = MSI/f?SE, is distributed as an "F" with" 1 , degrees cf freedcai. The probability that an "F" variable 8 will exceed the computed value of the test statistic is used (
)
detemine
to
rejected.
It
the
if
null hypothesis
is customary
will be
to reject
Ho if
accepted or
this computed
probability is less than a preselected value, a , called the level of sigr.if icance. a represents the probability that the null hypothesis is rejected given that it is in fact true. This relationship is depicted in Figure 2.2. For example, if
the value
of the
test statistic
greater, it would lead to at
an alpha cf
.
1U07.
is equal
to 2.67
or
rejection of the null hypothesis At an alpha of 0.1, we would fail to a
reject the null hypothesis; it would then be concluded that there is no evidence to suggest the existence of a significant interaction effect.
TAELE 711 BISOITS OF ATTACKER TO DEFENDER TACTICS ANOVA (HYEOTHETICAI EXAMPLE)
SOURCE
SOM OF
SQUARES
D. F
.
«EAN SQUARE
MEAN
ss:i =
Err rCT
79707
MSM = 79707
ATTACKER TACTIC
SSA = 507
MSA = 507
DEFENDER TACTIC
SSD=
MSD =
27
27
INTERACIICN EFFECT
SSI =
MSI =
147
147
ERRCR EFFECT
SSE = U4
MSE = 3
55
22
TEST STATISTIC 1449. 22
TAII PROE 0.00 00
9.22
0.0162
0.49
0.5034
2.67
0.
1407
When the null hypothesis is not rejected, cf squares
sum VIII)
analysis of
often modified by
is
squares tc to test
in the
the
adding
the modified error
it;
hypothesis on the main
the =rror
variance table -che
Table
(
interaction
sum of
mean square is then used effects.
The resulting
mean square values ard the values of the test statisxic
shown in Tatle VIII. in
If a
=
0.1 one can conclude as depicted
rhat "Attacker
Figure 2.3
effect on the mean time to
Tactics" has a significant detect a target by the defender
"Defender Tactics" does
while the
are
not.
Of
course,
this
example was contrived for illustrative purposes and does not
necessarily reflect reality. will te
possible to perform
response variables
Once the data is a
collated it
similar analysis on
using the ANOVA configurations
all the in
V.
Figure
2.
1
Critical Region for the
23
F
Statistic.
Tatle
"
'
"
" "
TABLE 7III JESOLTS FOR POOLED SUM OF SQUARES
I
MSP
FA
(S£E > £SI)/(DFe + DFi) 4ao + ia7)/(8 1)
—
65.22
=
MSA/MSP 507/65.22
F
(1,9) = 3.36 .^
7.77 FC
=
MSD/MSE 27/65.22
F
c(1»9) =
3.3 6
-^
.4 14
(1,S),
F
.9
Figure 2.2
7.77
3.36
0. 414
Critical Region for
24
F
(1,9).
III. DATA ANALYSIS
GEMEEAL
A.
The manner and method by which
often dsterniined by for the express an event to
tion.
its intended ise.
If it is
purpose of assessing the
will occur,
tabulate the
data is analyzed is mcst to be used
probability that
it would be desirable
,
at
a
minimum,
empirical distribu-
results based upon -he
On the other hand, if the data is intended to be used
for further analysis,
it
would be more desirable
to fit a
The latter method has theoretical distribution to the data. some distinct advantages over the former. Tabulation of
empirical results are not as versatile as the fitting of a distribution. The fitted distribution allows for the study of the
and
ters
of changes in the values of
effect
indapendent
the
especially
important
in
variables.
combat
both the parameThis
modeling
aspect
is
must
be
which
situations.
Mere
importantly,
have
been
theoretical probabality distributions, extensively studied, and their properties are
well
responsive to
known.
a
vari=ty of scenarios and
This makes them extremely useful in analysis as well
as modeling.
Ir many
situations,
a
problem may
be more
easily modeled mathematically than by laboring over an elaborate ccmcuter simulation. in light of the preceding
discussion,
the remainder of
this chapter will cover the methodology for fitting theoretical distributions to data and testing for goodness-cf-fit.
25
DA1A STBXTORE ANE CATEGORIZATION
B.
B€fore any attempt is mads at analysis,
appropriate
detsririre the
to
data
data structure
provides the
Figure 3.1
level of
it
is necassary
to be
for the
used.
ARCOMS II
experiment. Since the appropriate level of data is dependent upon the issues and analyses to be performed, its determina-
conjunction with
made in
will te
tion
the discussion
of
analysis techniques. FITTIUG THEORETICAL DISTRIBUTIONS TO DATA
C-
''
-lethcdolcqy
•
methodology for
The
fitting probability
tions fellows the sequence shown in Figure 3.2.
begins with tion
data.
mated from the data.
then compared
parameters
The
distribution are either is
hypothesized
the
of
known in advance or
they are esti-
The empirical distribution
(histogram)
with the hypothsized distribution
"goodness of fit" test.
This
provides an
distribution
The process
educated que ss as to the underlying distribu-
an
the
of
distribu-
will
using
a
determine if the fitted
approximation to
acceptable
the
distribution of the data. a.
Estiirating Parameter Values
Once a decision has been
bution tc b€ It
fitted, e.g.
made as to the distri-
exponential, gamma, normal stc.
will te necessary tc estimate tne parameters.
eters
determine the
estimates of experience.
specific shape
the parameters If this
then serve tc
of
is not the case,
derive an estimate for
The param-
the curve.
are available
the
,
Cften
from historical
data itself may
the parameters.
The
appropriate estimates for many of the standard distributions may be fcund in
Reference 6.
26
AflcoNt :i 0*1 A
._....J
DATA
TTl^! TtlAL
u
^'i'i
rr-^
3
i
I
«-l
-I I
'
I
I
<
.
I
I
^
V
%
^f
tr
DCPf«C¥T v*AIA«l£S
ATTAClfB TTPC
Figure 3.1
Data Structure.
27
STAflT
CONSTHUCT A MlSTOCaAM
SELECT
,^_
TC$
CSTIMTP PMUMCTERS
oENCfurE TMttajfTICAL
pnoM«iLiTiES
COMKtCT
COOOMCSS Of FIT* TEST
arxc
Figure 3.2
Fitting Procedure,
28
"Goodness of Fit" Tests
fc.
the most
Two of
goodness-of-f it
for
Kolomcgcrcv-Smirnov
are
the
tests.
(K-S)
statistical tests
widely used
Chi Under
.
Square
and
the
certain conditions,
each of these tests has attributes which makas it preferable to the
ether.
The
test may
K-S
continuous distributions when the
only be used
parameters of the distri-
bution tc be fitted are assumed to be known. have
beer,
distributions,
and exponential
the normal
ccnstructed
However,
special
which permit the K-S test
when the parameter have been
extension of the
for fitting
tables
to be used
estimated from the data.
K-S test is known as
for
This
the Lilliefors test.
The K-S and Lilliefors test are often preferred over the Chi
Square test when the sample size test,
en
the
other
distributions,
and it
The Chi Square
small.
is applicable
hand, is
is
to all
especially good when
types of
moderate to
large samples are available.
useful but
A
distributions is
less rigorous
the technique of
plots.
This graphical method
tiles
of
indicates
requires plotting the percen-
theoretical distribution the empirical distribution. a
against A
the
straight line
good fit.
Variables Selected for Analysis
c.
While data
analysis should
every dependent variable measured, Sight (CLCS)
fitting
constructing probability
the
percentiles of plot
method of
,
Acquisition,
be accomplished
on
the Conditional Line of
and Engagement data were selected
to provide procedural examples.
29
CIC3 Data
2.
Sight data consisted prima-
The Conditional Line of
rily cf the time duration and path segmenz length over which
between an attacker vehicle and
line of sight
was determined to exist.
element cf the opposing force
time segment duration was measured
defender
ar.d
defender
to attacker
categories.
fact that
to the
path
The
were measured only for
the distance over which the attacker is due
The
for both the attacker to
on the other hand,
segment lengths,
least one
at:
vehicle traveled.
the attacker
forces were
This moving
throughout the entire period of the engagement, whereas, the forces would
defender
only
expected to
be
defensive positions.
alternate decided tc
For
this
theoretical distributions
fit
between attacker vehicle types
move
between
reason it
to the
was
CLOS data
(Tanks, Tows, and APCs)
,
and
the aggregate of all the defender forces.
Histograms of the
data sets indicate that
the CLOS
Time and Path segment lengths might be represented by cne of
distr ibutics.
five
Weibull,
They
the
are
Beta and Lcgnormal
distributions.
curve
grams. were fit
that is "sinilar" The Exponential,
to the
in shape
By varying the
to that of
the histo-
and Weibull distributions
Gamma,
time and path
segment lengths.
shows the results of this fit for two of these sets. the number of
data pcints in each
the Chi Sguare test was used X2.
By ccmparing
distribution the
X2 >
of the two sets
1
-a
Since is 829,
the Chi Square
following rejection criteria may
x^,
Table IX
to compute the test statistic,
X^ to the l-aquantile of
Reject the null hypothesis of
Gamma,
it is possible to obtain
parameters cf these distributions, a
Exponential,
a
(D.F.)
30
"good fit" if
be used.
1
TABLE IX EESDLTS OF FITTING ATTACKER TANKS CLOS DATA
TYPE
CELLS
n
DIST
PARAMETERS
(N)
TIME £29
(K)
CHI STAT
D.F. (K-N)
X 1-a (DF) '
5
EXf
^=.01935
194.
1
4
9.488
5
GAK.
9=. 00686
7.539
3
7.814
WEIB.
r=.3478 v=0.0
5.52
2
5.99
688.4
6
12.59
2.407
5
11.07
8.67
4
9.488
SEG.
5
1
a=31.5l4 B=.5714 PATH S29
7
BXF.
7
GAM.
SEG.
X=.0118 9=.0027 r
»EIB.
7
=0.231
v=0.0
1
a=44.505 6=.5128
1
_
A
tila cf
J
ccmparison of rhe test statistic ro the .95 guanthe Chi Square distribution, showed that for all
time segment lengths the hypothesis tha* the data represents an exponential
both the fits.
provided
distribution is
Gamma and the For
an
path
soundly rejected.
Weibull distributions
provide good
Gamma
distribution
segment lengths
obviously
However,
tha
better fit
than
did
th€
Weibull
exception to this is the Tow path segment lengths. Figure 3.3 shows the plots of the Weibull cummulative distributions function and the empirical CDF for distribution.
The only
tank tiie and path segment data.
31
For rime Segment lengths
(A
< Q
m O — o <
Figure 3.3
Fitted and Empirical CDF Plots.
32
distributions are virtually identical. This indicates that the Hsibull provides a good fit for Time segment lengths. Ir the second case the Weibull fit was not as good Gamna fit. as the The results for the remaining sets of the two
CLOS data are enclosed as Appendix C. 3
Acq uis ition
.
Cata
Acquisition data Attack€r weapons
The
Defender force,
was devided into two
acquiring or
of sight,
the
From this data, twc depen-
analysis viz. "Time to target given that there exists conditional line and "Time to Engage" a target given that it has
dent variables a
those of
and the Defender force wsapons acquiring and
engaging Attacker weapon types. Acquire"
engaging
data grcups.
were selected for
,
been acquired. The histograms for both "Time to engage"
cne mcst
the
pointed to the
likely to provide
data sets
had
Lilliefors test was used.
a
good fit. number
in Table
In those cases
where
data points,
the
of
tabulated
been
of Reference
A16
as the
The Lilliefors quantiles for the
distribution have
exponential found
exponential distribution
small
a
to acquire" and "Time
and may
The results
7.
be
Tanks
acquiring or engaging Defender Tow weapons is shown in Table X. They indicate that the exponential distribution provides a
good fit
to
Attacker the those for the
both the data on "Time to Engage".
'Time to
These
remaining data sets are
Acquire" and for results as well as
provided in Appendix
C. ^
•
Enqaqsm ent Data
Engagement range to engagsment,
data
consists of
aim errors
in
measurements
on
the
both vertical and hori-
zontal angular shifts originating from the target's center
33
__
_ ,
TABLE
X
GCOENESS-OF-FIT RESULTS FOR ACQOISITION DATA
ATTACKEB TANKS TO DEFENDER TOWS TYPE
n
DIST
EARAMETEES
TilDQ
15
EXP.
X
=.0092
.1642
a < 0.5
15
EXP.
X
=.08 15
.3202
a <
TEST STAT
CRITICAL VALUE
tc Acq. TiiD^
.999
tc Eng.
—
-
of mass,
well as
as
a
1
indicator variables deli-
series of
neating target exposure, aspect angle, whether it is moving, whether it is firing, and whether it was hit, missed or killed.
Since all the variables, except for aim errors, are
indicator in nature, figure
number
of the
Consequently,
they will
aim
of
times
marely yield
they
occur
errors are the only
a
proportional in the
data.
dependent variables
selected for fitting a distribution. An examinaticn of this data revealed that aim errors were only recorded
for Attacker and Defender
Tank weapons.
The data was, therefore, formed into four sets corresponding to
the "X" and
" Y"
Histograms for
Defender larks. suggestid that to
coordinates of aim error for Attacker and
a
xhese coordinates
each of
Normal distribution is
a
likely candidate
Since the aim error distribution is bi-variats,
fit.
a
bi-variate normal distribution must be fit, unless it can be
coordinates is Ths correlation between "X" and "Y" for Attacker and
shown that zaro.
the correlation
between
34
the two
were computed to
Defender Tanks assume that
the correlation
to
be
between the
small enough
to
two variables
is
handled separately. The results cf
XI
-O.OU respec-
0.15 and
With this assumption the "X" and "Y" coordinates can
zero. be
are appear
These valuas
tively.
be
the Chi Square test
listed in Table
show that the Normal distribution does not provide the data.
fit tc
shaped), when
the
Khile they are
similar in
empirical distribution is
cciEfared
to
the
Further investigatioi: cf
theoretical
shape
of zero
Normal
(bell
distribution.
the data showed this was aim errors may
good
extremely "peaked" due tc a
large number of zero error points within the data set.
excessive number
a
be the
This
result of
rounding to the nearest integer mil when the data was recorded. Since the significance of a one mil error depends upon the range to the target,
might prcvide far toe coarse
a
measuring to the nearest iril measurament scale. The end
clustering of data points on the integer values, especially at zero. was not possible to fla a consequence it obtain a good fit tc the aim error data.
result is
a
35
TABLE XI RESDITS OF Aia ERHOH FITS DATA SET
Attacker (X-cccid)
NDMBEE OF CELLS
PARAMETER ESTIMATES y
=-0.331
a^
=
Attacker
CHI SQ VALUE
61.75
1.01
0.053
80.67
(Y-coord)
0.982
Defender
.0167
111. 385
(X-cccrd) .572
Defender
=
(Y-cocrd) 2
.428
=1.09
36
294.564
DEGREES OF FREEDOM
IV. MEIHCPS FOR DEALING WITH QUESTIONS OF SIGNIFICANCE
A.
GFNEfiAL
improve combat modeling within
Ic order to
increased understanding of the Without the knowledge
cf
one-another,
engange
combat process is essential.
how ccmbar units operate, manuever,
terminate engagments, combat expected to represent reality.
or
scarcely be
modeling could Thus,
the primary focus of this
those
analysis methods
combat processes. Each
question will
UTili2ed to
be
the significance
The questions to
issues that
upon the
chapter will be to discuss
which may
questions regaring
answers to
the Army an
provide
of certain
be examined
are based
TRASANA determined to be important. addressed separately, be by briefly the most appropriate method
discussing the pertinent issue,
of analysis, and the experimental dara that will support the
analytical method. B.
THE
OF
EFFECT
BOUNDING
THE
BY
DEFENDER
ON
HIS
DETECTABILITT It has,
for the
most
part,
defender were to stealthily sive positions, him.
he
counter
A
that if
a
move between alternative defen-
might prolong the time it takes to detect
that any
argument is
stationary tackgroud
is
more
movement against
likely to
queue the
a
visual,
electronic detection ability of the searcher, thereby, increase the probability that the attacker
thermal, and
been assumed
detects
or
a
defender target.
Defender movement
into and
The question is then,
between alternate
tions significantly increase the rate force is able to detect him?"
37
at
"Does the
firing posi-
which the Attacker
may be viewed
The question
the notion
supports
alternate
An
asking whether
the number
that as
positions increases
detections.
hypotheses that
exists versus the alternative that
the data
of moves
between
the number
the
so does
approach to answering
the statistical
test
as
of
this question
is to
no increasing
trend
an increasing trend dees
exist. The data required
each defender
must relate the number
of times that
vehicle moves between defensive
positions to
the corresponding the number of times that he is detected by any member
of
the atxacker force.
A
set of data
trial will consist of the paired observation Xj
for each
(Xj,Yj),
where
is the number of moves for the jth defender vehilce,
Yj is the total A
and
number of detections scored against him.
method
nonparametric
for
detecting
increasing
or
trends is the Cox-Stewart test [Ref. 7: PP.133-13S]. Although this test is adequate for determining whether or not a trend exists, it provides no specific information as to how this result is to be used for modeling decreasing
or analysis.
therefore,
It is,
more useful to
in addition to answering
method which will,
employ
a
the question,
estimate of the magnitude of the relationbetween the t *o variables of interest by means of
also provide an ship
nonparametr ic regression [Ref. 7:
pp.
272-277],
Assuming
the linear regression model
Yj
first the
=
A
(U.l). a
BXj
(U.l)
ncnparametric estimates of
ranks are determined; tions may
+
he obtained
The slope "B" in
an
"A" and "B"
estimate of the
based on
number of detec-
substituting these estimates in C^.l) will determine whether or not
by
relationship exists between Xj
38
and Yj.
The magnitude and
sign of the slope will determine the degree and direction of The Spearman's
the relationship.
[Bef. 7:
252-256] may be
pp.
Rho test for correlation
used no test
the following
hypothesis He:
t
=
bo
Ha:
t
>
bo
This is
the null hypotheses
equivalent to testing
correlation
exits
correlation does
the
versus exist.
A
regression
positive that
a
must be pointed out that
It
using least squares
that
will indicate
rejection
correlation does indeed exist. a
alternative
that no
could be
used,
provided
distributional assumptions are satisfied. least squares regression is extremely sensitive to However, the existence of outliers. If it is suspected that outliers that
all
the
are present,
it is best to
regression.
such as
use a mora "robust"
the one just described
method of
or the Median
regression.
confidence interval for the slope in equation U.I may be derived by using the "two point" slope method [Ref. 7: p A
266-267]. QOICK DASHES BY ASSAULTING VEHICLES
C.
make quick It
vulnerability,
to reduce
In order
dashes from one
is suspected
is asked,
significantly
defilade position to
that these quick dashes
to detect defender targets.
tion
assaulting
"
their
ability
the next.
reduce its ability the following ques-
by assaulting
quick dashes
Do
reduce
Therefore,
vehicle
to
detect
weapons
defender
targets?" As in
the previous section
we
may test
for increasing
Cox-Stewart test; or perform a hypothesis test on the slope of the regression to determine if a posi-
trend using the
tive correlation exists.
Because of the advantages prvicusly
39
enumerated, the nonparametric regression method is preferred in this analysis as
either
In
case
precisely the it
is
of
constructed in must be taken tc insure
sets
data
the
Care
same manner.
that the length that
well.
are
precisely defined and
"quick dash" is
a
consistent
tactical
current
with
doctrine.
Assuming that the quick dash lengtn is 200 meters, it is now the number of times that 7«5hicl€ "j"
possitle to define Xj,
corresponding tc
moved less than or equal to 200 meters;
Xj
determine the number of detections scored by vehicle "j". The result is the bi-variats data set (Xj,Yj). This type of data may be collected, specific to a particular we
may new
battle run, trial or aggregatted for the entire experiment. D.
EHGAGEMENT AND IIS SIGNIFICANCE ON ATTfilTION question here
The
engagements
occur
attacker?",
or "Does
engages the
"Does
is
defender
the
hurt
frequency
the
opposing force increase
and decreases the kills it
kills it recei ve3(Zi)
derived.
A
total of
.
24
with which
a
the
force
it achieves
attacker force,
two sets of
engagements initiated by that force (Yi)
engagements initiated by
than
the kills
bi-variate data must be analyzed. kills attributed to it
more
which
receives?"
Fcr either the defender or
point.
frequency with
the
One
set is the number of and the number of
(Xi)
The other set is the number of
.
that
f orce (Xi)
and the
number of
Each battle run represents one sample
sample
points may,
therefore,
be
The analysis procedure is the test for trend using
the Ccx-Stewart
test, or the method of nonparametric regres-
sion discussed in section B.
40
B.
BCONDS EXPENDED CN TROE 7EBS0S FALSE TARGETS issue tc
The
b€ addressed
the number of rounds
relationship between true
false targets.
or a
Attacker
force,
weapons fire fewer
there exists
is whether
the
expended against
the stand
From
question can
point of
posed "Do
be
a
rounds per target against
the
Attacker
false targets
true ones?" The same
question may in turn be asked with respect tc the Defender force. It may, in addition, te more detailed in scope so as tc concern a particular weapon type, battle run, or trial number. than against
The issue involves
a
comparison of the
distribution of
are specifically interested in deter-
two sets cf data.
We
iiining whether
net we can expect one set
or
to have higher
expected value than the other. The data required for this analysis consists of of observations.
One set representing
expended against
true targets
(Sj)
.
the number cf rounds The other set
number cf rounds expended against false targets
The expected value
expected value of An appropriate
cf
consists cf
assigning the sun
where
>E
(S j)
}
Sk is lass than the {E (sk)
Pn
The hypotheses
normal test statisxic [Ref. (gf-Pn)
Z=
/
pp. 378-384]
8:
Q.O
-
Pf (1-Pf)
Pn (1-Pn)
Nf
Nn
Y a
by constructing a standardized
may be tested
rejection occurs
statistic
the test
if
interval nay now be established for 0< Pf-Pn <
Z
/
I
For each Overwatching
bivariat€
,
(Pf-Pn)
Pf (1-Pf)
Xi
,
target is firing, and Yi,
and
Pn=
confidence
as
(1-Pn) ?n(1 ?n
(U.S)
Nn
the
number
The elements
a
of the
detections when
the
the number of detections when the
target is not firing. The proportions ?f and Xi/(Xi-«-Yi)
A
Z
or stationary attacker target
point is constructed.
point are
^ -^
Nf
r
bivariate data
exceeds the
normal distribution.
quantile of the standard
0.
(4.2)
Yi/(Xi+Yi).
constructed for each battle run, of the entire experiment.
44
The
Pn
are then Pf=
sample
may
be
trial or as an aggregation
CONCIOSIONS AND RECOMMENPATIONS
?•
CCNCIOSICNS
I.
Whil€ the ARCOMS
collection of
the
processes,
it
field experiment forged
II
experimental data
did net provide
experimental effects
the Armor
on
The choice
eight factor-level combinations at which ured failed to provide the balance used is the
22
of the
the data was meas-
needed to perform
a
2*-i
The only model which could be
factorial analysis with
this is not an applicable
Combat
for an efficient analysis of
and interactions.
fractional factorial analyis.
the way in
replications.
Even
sub-modal for all factor combina-
tions. In fact, there are only three combinations of factors that provide suitable models.
They are Attacker Tactics to
Defender Tactics, Attacker Tactics to Terrain,
and Attacker
Tactics to Hatch Position. The fitting of theoretical distributions is possible for a
great
d«=al
of the data. Preliminary data analysis suggests
that CLCS time
either
Gamma or
aquire
and
are distributed as
and path segment lengths
Weibull distributions
time
to
engage
appear
while to
be
the tima
to
exponentially
distributsd. B.
EICCMMENCATICNS Based upon
these conclusions
the following
recomenda-
tions are made. 1.
Variance for the dependent variables A should be accomplished using a listed in Appendix 22 factorial design ANOVA) with three replica2x2 This model is provided in Appendix tions per cell. An Analysis
of
(
B.
The
Model
assumptions should
45
be
verified
by
cf -he error terms.
checking for rcrmality
If this
consideration shculd be given to the Friedman nonparametric analysis of variance cind its extension for the case with replications assumption is not reasonable,
[Ref . 7:
pp.
299-308
].
it is recommended that a
Fcr future experimentation,
2.
detailed experimental
design be determined
collecting any
The design shculd
data.
prior to
specify the
issues tc be addressed, the analysis techniques to be employed,
and
structured to An early identification of the
how the data
support the analysis.
analysis
techniques will
is to be
help define
the type
and
quantity of data to be collected. CLOS Time
The
3-
segment lengths
when ploted
against
both Time to Clos and Range to the initiation of CLOS
reveal the presence of plotted against the
a
bi-modal relationship.
range to initiation of
representing longer duration
modes,
frequent occurrences, meters.
as
were located
This phenomenon occurred
'^hen
CLOS the
well as more
at 1500 and 3000
for both Time and
Path segment lengths. Figures showing this phenomenon are in Appendix D. It is recommended that an investi-
gation of this phenomenon be pursued with small scale experiment.
the ARCCMS
Prior to
little data
experiment,
there
has been
generated from field experimentation
very
which can
realistic combat scenario. Combat models have relied heavily historical data. upcn engineering and generated well ccntrclled Engineering data is from "labcratcry-like" experimentation. The interactions involved represent
in
a
a
ccmtat evironment with
a
engagement are not reflected in be
obtained
tion is
frciD
as
free
flowing
such data.
f orce-cn-forcs
Some idea must
to how different data from field experimenta-
engineering or
historical data.
46
The objective
the field experimenration data provides
is to datermine
if
more realistic
representation of the
combat data
a
than the
ether two. It is recommended that 1.
A
comparative
ABCOKS
data
analysis and
that
be
performed
of
the
between
Balistic
the
Research
Laboratory and the Night Vision Laboratory. 2.
Regression Analysis should be performed using the engagement data discussed in Chapter III to predict A
the parameter "t". Nigh"!:
for probability of detection
in time
This should be compared with the resul-s of the Vision Laboratory experiment. This comparative provide an
analysis
may
between
engineering
insight into the differences
data and
field experimentation.
HI
that
collected
from
APPENDIX
A
DEPENDENT VABIABLES The
dependent
are
variables
listed
according
their
contribution to combat processes in A.
OFFENSIVE OPESATICHS Attacker vehicle LOS ti
ice
and pat.h Segments.
Number of Defensive position scanning lasers with LOS to single attacker vehicle.
Number of atracker vehicles with LOS to single
defensive position scanning laser.
Defender vehicle CLOS time and path segments during exposure. Number of defender vehicles
wi-ch
CLOS to
single attacker vehicles. Number of targets acguired by the attacker force. Time tc acguire true targets by the attacker.
Number of false targets acquired by the attacker. Number cf true targets with CLOS and rounds expended by the attacer force.
Number of true targets engaged by the attacker force. Time tc engage true targets by the attacker. Target engagement results for true target engagement by the attacker force.
Number cf false targets engaged by the attacker force.
Time to engage false targets by the attacker force.
Reported target engagement results for false target
engagements by the attacker force. Time, distance,
and movement rate between bound
positions for the attacker force.
48
Time of occupaticn of the bound position and rounds fired by the attacker force.
Number cf hits received by attacker vehicles.
Number cf kills cf attacker vehicles. B.
DEFEHSIVE OPERATICNS Defender vehicle LOS time segments. Kean number of defender vehicles with LOS tc offensive scanning lasers.
Attacker vehicles with CLOS time and path segments during exposure. Number of attacker vehicles with CLOS to
single defender vehicles. Number cf true targets acquired by the defender forces.
Time tc acquire true targets by defender vehicles.
Number cf false targets acquired by the defender forces.
Number cf true targets with CLOS and rounds
expended by the defender forces
Number cf true targets engaged by the defender fcrce. Time to engage true targets by defender vehicles.
Target engagement results for true target engagements by the defender forces.
Number of false targets engaged by the defender force Time to engage false targets by the defender vehicles
Pepcrted target engagement results for false target
engagements by the defender force. Time, distance, positioits
and movement rate between bound
for the defender force.
Time cf occupaticn of the bound position and rounds fired by the defender fcrce.
Number cf hits received by defender vehicles.
Number cf kills cf defender vehicles. 49
APPEHDIX B 2X2 ANOVA WITH REPLICATIONS ABOVA HCDEL
I.
The 2x2 analysis
variance modal with
of
three replica-
tions per cell is
where
i
=
1,...,n
;
n=2
j
=
1,-..,in
;
m=2
k
=
1 , . . . ,
p
;
p=
3
The model parameters are
the grand mean
n
=
3.
= the
y.
=
the second factor affect
^^.
-
the interaction effect
£.
=
The error term
.,
first factor effect
error terms are independent and
This model assumes that the
Normally distributed with It
a
mean of zero and variance of
a\
may be used to test the following hypotheses 1.
All
3.
no affect
= 0. (There
is
=0.
is no
due
to the
first
factor) 2.
All
y.
(There
affect due
to the
second
J
factor) 3.
interaction effect) The clarify the fcllcwing terms are defined in order to ANCVA table on the following page. All
\b
.
= 0- (There
is
no
ID
50
^:
w
,
CO
c ^ <
*;
^^
p^
rz!
< CO
s.j 00
CO
•
(—
< CI C/7
CO
C'J
CO CO 00
i
<
CQ 00
GO
CO 00
II
II
00
23
< M
>-• I
<
.
I
o
M
1
1
•H i
e C
CM
•-I
^.^
l-i
'-:
"
1-^
•^
N.-^
•^1
•H ;^
t 1
>-
;:ti
•n
• 'r-\
<-^
1
1
>
i
cuw S C
w t-i
^~^
^ "^
n
i-0
j»:
(=
t-j
-I—
•H
r"
^
1
I '
11
< 7^
i
00 CO
II
II
00
1— :o
1
1
CO
1
II
II
L-3
an CO
00 CO
C-i
O f—
< C_) c.:
CJ ex r)
o
00
CQ
< <
-v r~i
o
<
j-H
O < c^
<
tx
51
b
-H
CCMFDTEB PEOGRAM
E.
NAV41 POSTGRADUATE SCHOCL
FILE: TESTAE
fROGRAM
//CIGIORGI
(1928,1159), •CIGKAGI OR 360«,CLASS=A
JCe
Al
//MAIN CRG=^PGVMl.i928F //* //*
SA^FLE CF AMOVA HYPCThtlJCAL TEST CATA
// // //
ATTACKER TACTICS TC DcfE^CEf TACTICS.
//*
EXEC BI^EC,fR0G=8MDF2V //GC.SYSiN CC /PRC3LEM TITLE IS 'AREITRAFY h>PCT hET I CAL TEST DATA* V-fiRl;iBLES ARE 5. /INFLT fCRN^T 15 3F3.C)* . bAf*E^ ARE OEFT/C T AT^C T IC ,CET TIME . /VARIABLE CEP£NDE:\T IS DETTIMt, /DESIGN CPCLiFING ARE CEF T^CT , / T AC 1 IC • /GRCLP 2. CCDEMli ARE 1, h/MES(i) ARE DELidfHAiTY. CCCES(2) ARE i, :. fAME£i2> ARE FIRcMVT , F ;? I C . /END //
*
,
ec ec 70 2 66 2 9C 2 9^ 1 82 74 1 5A 1 2 9C 2 76 2 92 1
1 1
2 2 2 2 2 2
/* //
52
PAGE
1
EM0F2V - AN/LYSIS OF VARIANCE AhC COVARIANCE WITH REPEATED MEASLi^tS. BMOP STATISTICAL SOFTWARE, INC. 196^ WESTWCCC BLVD. SUITE 202
(213) 475-57CC FkCGRAM REVISED APRIL 1982 ^'A^UAL REVISEC 1981 CQPYRIGhT (C) 1^82 REGENTS CF UNIVERSITY CF CALIFORNIA TO SEE REMARKS /NO A SUMMARY OF NEk. FEATURES FCR THIS PRCGRA^, STATE N'^US. IN THE fRI^T PARAGRAPH.
—
JUNE li, 1«83
AT 22:23:08
FRCGRAM CONTRCL INFORMATICN
/PRCELEM /INPUT
TITLE IS 'ARBITRARY H YPCTl-ET ICAL TEST DATA'. \,;!RIA3LES ARE 3. FCRN/T IS (3F3.C)' . NAMES ARE DEFTAC .ATACTIC ,C£TTIME . CEFENCENT IS DETTIME. CRCUFING ARE DEFTACT ATAC TIC . CCDESd) ARE 1, 2. NAI^ESdJ ARE OELie, HASTY. CCCcS(2) AKc 1, 2. NAMESi2) ARE FIREWVT , f API C. •
/VARIABLE /DESIGN
,
/GRCLP
/END
FRCBLEM TITLE IS ;!R8ITRARY
t-Y
FCTI-ET ICAL
TEST CATA
••.••.••
NUMBER CF VARIABLES TO READ IN. NUMBER OF V/PIAELES ADOEC 5Y TRANSFORMATIONS. '. . TOTAL NL^'3£F ZF VARIABLES . NUMBER CF CASES TO READ IN CASE LABELING V/RIABLES M5SING VALLES CHECKED BEFORE CR AFTER TRANS. BLANKS ARE INPUT UNIT NLMBER RSrtlNO INPUT UNIT PRIOR TO READING. . DATA. • NUMBER CF WCfCS CF DYNAMIC STORAGE NUMBER CF C^icS CESCRIBED BY INPUT FCRMAT
TO END •
NEITHER MISSING
•
NO 9c254
5
...
3
DETTIME
9
ChARACTERS.
3
.
.....
VARIABLES TC BE USED DEFTACT 1 2 ATACTIC INPUT FCRMAT IS
3
.
1
(3F3.0)
MAXIMUM LENGTH CATA RECCRD IS
INPUT VARIABLES VARIABLE RECORD COLUMNS INDEX 1
2
NA^E
DEFTACT ATACTIC
NO.
BEGIN
1
1
1
4
flELC
HDTH
ENC
3 3
3 6
TYPE
VARIABLE INCEX NAi'E
*F
*
3
CETTlME
F
DESIGN SPECIFICATIONS
=12
GPCUF DEFEND = 3 EASED ON INPUT FORMAT SUPPLIED
VARIABLE NO. NAME 1
2
MINIMUM LIMIT
MAXIMUf<
LIMIT
fECOPDS READ PER CASE.
1
MI SSI NG
CCDE
CATEGORY CATEGORY NAME CODE
DEFTACT l.GOOCO DELI8 2.00GOO HASTY
ATACTIC
1.00000 FIREMVT a.OvOOO RAFIO
53
INTERVAL GREATER L£ THAN C
C.
OOTPOT OF ANOVA BiSOLTS
Ul •
IM •H
StJ LO
•
• •
•
•
r»f».(>.r^m
r LU
y»
-J OS
<9
as
VJ —1
1^ a.
u.
u
CO
m
>»a
LOO. LU
Q
<
00
-J
(joC
X(X
(-)
Q ^'1
< :>
U.'U u»
LU
Z3
(>J
h-LU
•
LU UJ
Ol V4J
xu.
^ o
•
'/lac
in
rn
1—
Z
«% cC H-
1
t
•
•
•
rH
«
<-»
coa l-«>-H
1
-^
•
a
•
ot-
-0
uu IX
t— ->
«l(XU.OtQ. r-"^ •«+'-«<*
r-
(X
a
ex
a.
a
UJUJUJ<
2.
0)2. -lUJ
~i
-J IX
LU
uu.
>
2
f-
II
U._J-J<-0<-0
too
UJ
OLU U.Q
LOO» cX •
•-4
(*> ii^
•
y-
•J r"
-« h-*J U_«l LU>-
lU 1—
K\LU U3
— < -i ^ < ::3
L3
LO
II
->cc.
u.
a. -^
m
*/)Z
LO
UJ
a >—
LU
U)
03
u
**»—
IX
> Q. -J
az 1
u.t/>
CJOC
U.
UJ
t-
X
a
to
<
CXQ
UJ<
aj<« CJCX
u.
CO
<
>«•
>-«
UJ •
130 *-••--•
Q LU UJ c*
u
X
(\j
OrslOvT^r
lU
a
(X >•
a.
• • • • • f>.r^r*>i>»o
3
UJ a. LU
1-1
Z
ooooo lU 0000 (X a. 00000 00000 Z l_>tJLJO>-J
XU.
UJ u. UJ
a.
h-UJ
a UJ
LULL.
< m
.-4»4i-l>^GO
C£.UA
00
LU
xac
:>
LULU
•
•
<
00a LUQ
i-CJ
UJ
<
>z —ILU
lU^en
G>
< —
z -
00
:oo
300
••00
"
O
r——
o rO ui
.
f
OB-mLP
QB>j
(O
*
>j»— ^j«— r--i lO »j
^
-<
1/1
1/)
s s m O
o n
O >
5
o
> o
z
>
8
NC OF SAMPLES *00
200
300
400
bOO
xxx2^'-''x CrTiO; •OTJ'rar- r-r-
35ZgOu<.-n02ir"-. -> — ^ z z z— -. -. > -n 2 — — — r-.J mm n Q Z
o O u» r—
-I
?;
I
>
mo
m o m
to
g
O s X
O
> o > 2
Figure C.
1
Tank CIOS Tine and Path Segment Histograns,
57
c (/I
o to
X
<
!? »-
!^
Ui
UJ
-i
—
o
t-
Z
^— eo
^
^» if»
>c\
3
U^ UI
^ .^
1
J^ -^ % C- ^ u<
in
«
'^
CD
$S- — "^ ex
rvi
>o
Q.
—
t^
K1
>^
"^
-
-
<,
a
u
<
m 2
O 5
L^
-<
WJ
>
_)
UJ UI —1
^ ^• UJ
•—
• h~ ,^J
i/i 1/1
- ? tn Z u/ — uJ LJ
UJ Ui Pi^ —i*
^- ^-
r 2
UJ UJ
UU
_ ^ UI Lo Z ^fe5^251^S ^m < Ui q: or
(_>
L^
x2
X
2: 0
SjIdi^VS JO
ON
o
o
1
2
tr
Ui
\
tn
X
<
o UI
a:
o 2 o UJ
c
2
O Ut
Z ? UI
9t
in
(/>
O
1/1
rx
i£> (5> fX >^ ao "^ cw "• (N
to
Ui
— —
r
3
tn
5"
UI
uJ UJ
to
O U
m^ Z uj ui UJ — UI U OU 2o£-j
UJ cu
l/l
_
J
l:
2: 09
09
•
.
v/ix2XtnCii:iric>*3f^o»x
:x
0»
SjIdr^VS JO ON
Figure C.2
Tow CLCS Tiae and Path Segment Histograms.
58
in
o
a <
I§
cc
UI CO
X
CI
<
!£ ^ S
»—
o Uj
DC
o
8 ^
z
3
O
Ui
o
lyi
^. -^
UI
O
Irt
yi
— X £_r^'r' "^OXJ — tNO m — f^'~-or^'^<3>-»0'^
>
X
to
Ui
u< -i
^^
-z: ;/i
i/i
Z ^ ^ 0,^2i
-*
-^
u. QJ Q.
X
02
0»
09
O ^
01
a^
'3
C
»^
0' - ^ u z 2
-1
09
c'l
Z
uj
^
.^
1^ ->
•'_'
X r
0.
X
'/I
SoO— 5r^2r.rx-^ a" 2 4 x^'^'^i*'''"'''^ 1-"
0.
Ot
SJIdrNVS jO
Figure C.3
-.
Q xi/ix zx>/ii/i:tuicN5'^o>xx
3=
:i:
08
—
UI
on
APC CLCS Time and Path Segment Histograms.
59
TABLE XIV RESULTS FOR TIME TO ENGAGE DATA
DATA PCR ATTACKER TO DEFENDER VEHICLES:
TYPE Tack tc
CIST. FORM l_e^(t-2)
X
.076
CRITICAL VALUE
TEST TYPE
TEST STAT
D. F.
Chi
5.41
5
a< .75
NA
a< .30
Sq.
Tank (87)
1-e-^t
.328
Lilfor. .1497
l_e^(t-3)
.2414
Lilfor. .2857
Tack to
Tew (15)
Tank tc Drag.
l-eA(t-3) Tew to Tan k
i23) l_eA(t-3) Tow to Tow
.
146
Chi
3.34
3
SA
.7< ^<,
8
4
.7
* O
lO CO
o• O 43 — ^O -
5
UJ
—
s«J
^^
•-• •—
»—
>- •— 2. z.
«
3^ Ui
<
r.
S —
—^
UI
p—
— y-
^
•<
— :z >(/i(/)Zui — Uj(_)
—
UI —I
Ui
-> -J
^ui UIO
Lt,0O t-uiu20uj(/>ucrZa:a: Z _ 0: Ui « < l^ ui UI _ — a Q. — ^ — ui a .jj
i-i
rfS
wS
.
c£
X 02
OC
X (/I t/^ (7i
5 ^ ^
'
'iS
rn ./> fN />
vw
3
"^ I
»X
3<
01
S31cl>NVS
JO ON
z <
I-
q:
Ui
a UJ
o z
OC
a c
to
<
o
o 4
lO
<
2 <
o—
»- (B
^
—
Ui
> (/1 (/I Z Ui Ui i/> — Ui O u t-uiu.z;ou-jj(_!5za:-r u. z; O u- JJ CJ S r-i£^3_juiZ> ^-u.a — u.< u. 3 . w r^ i^^ _ r 2£ X ~ o» X X •
uaO<
ix"i
.
o<;
ot
oi:
oc
i")
>i^
Oi
SjldhVS JO ON
Figure C.a
Attacker Tank to Defender Tank Acquisition Data.
62
o Ui a z.
o z o 5
rfl
UI t3
<
UI
2
'i
O O
UI lij
5 ^K
it
UJ
i
.
u>
UI
2 2
<
Ui
2
O —
_,
wi _1
S
Ui
UI ut
__ — < ^ Z >«/l(/lZui
_—
UJ'/*
'Jv*
t-
.
— UJ(_>
h- r-
2 Z ujui
^_i5ouiaa^Q,
33
W1X ZX(/>Crt:^irtxx
O
»—
oc u>
a
UJ u. UJ
O Z
UI
S3 a <
OC
o < IN
i
z <
o:
V*
«N
<.
*
>-
f-
i^
o (N
<<»— — —
——
— 0(N«^—
O^
to
u <
u 6
i
!
Figure C.5
I
r
T
T
i
•<
> U^
i/i t/> t/l
nr u*
UJ im
LJigO< ^iSui<:
Z.
<
— « T ~ "^ O
o - » 1
>~
N.
«)
«3
(>»
1/1
2
^
o <
a —
UJ Ui .^
UI UI
^*
..J
»-•
.^t
-•
.^
«•
« CO '— Ui U-
*1
A, ;^ IX
<
UJ UJ
2 X
Q xaix2xi/ii/ii:«ocM3p^o»xx — c!3;u?^«^
Ui
Oi
SI
O'l
SjIdl^VS JO
5
ON
z
o o < a a:
Ui
a
UI
o o
o
O O
UJ
<
2
8 o Q O
o -i
O-
—
5
^^
- Z Z Ui — Ui Ui
Z Z
i/l l/> I/)
>-uiuZOuiuiu»iiZJ:iZ_ (^ iroa:v*j«uiuiZ ua3C< ^ -» I— ^^ UJ 5 — aa — a ^ ^i-uiO. '^_/
hAJ
-«
l^rf
k*J
.£.
-^
**.
X
wi
X 2 X
^/i
?t
i
u^ y< 41 lO 41 (N (J>
5
X X
Sjidi^vs jO on
Figure C-6
Attacker
TanJc
to Defender Dragon Acquisiticn Data,
64
:.
a: o a: cr
C,
Ui
<
en
o o
cc
C
<
<
«/>
2 Z
2
00
lA -J
Z Q ac o o
o
5 ^ Ui
a:
a
§ o
« a>
-J — a o —— ><<^0
o
O*
O O O O to
trt
2
r<4 I
I
> >
(/)
X
tn
Ui
Z 2
Ui Ui
-Lju.z25Lj'yioCt2ccJc a cr ui < — Ui _ uj< *>— uia."— 0. —a — —3 M ^
umo<
q:
O q:
J-
021
08
•
-
J.
0»
S3"ldWVS JO ON
q:
2 <
-
)> u<
z ^
zz
Ui LJ
l/l
omO-* Z05ui-uiQ.—'a-a.'22 -.-i-SQUiaaiOi ui Q — xJl'^i*^*'!'!
xi/>xzxi/»OT^iocMar^ O
z
r- Z >cn)^^ —
6 — -J UI
(y)
X
UIU1
L.JO
2 2 „«^
y(_)
2oa:^-u.a.— So. — <
Lj-<
"-^^^ujUIwi Q 9^5 rv XI/>X2XW1(^^iOCn3 Ui
q:
J.
O q:
J.
09
08
001
(j»
0^
>t
X
02
S31dWVS JO ON
UJ
UJ
u <
E
o
[
q:
Ui
—J
2
2 2
<
3 Z
ai
< 2
o
O IK O O U
O a: UJ
2 <
s !; Jr Q O X
%. _j _. •<
_ — oOo 3 — O —O < — •
rfl
f^ f^ '-
•
I
I
'T
I
OOO—
I
I
x
(/I
[
2
S
UI
!i
::
bid .— >-
< >
2 —2o2 ^^ X u S Oy 2 ui ^ 5 ^ —a —< U u — -.^SoCJuq. o 2 3 ^
6
Ij
UJ UJ i/i UJ 1/1 :2 UJ (^ o: -J "I UJ Ui .Z a. .^ I- u- a. g^ q. tA tn r^ a> I
[
09
09
Figure C.3
Ot
xuix2xi/iCnSintN 3
Oi
attacker Aim Error Histograms.
66
'
>
X X
1
<
»—
q:
_
o o
u 4
o
a:
o s
O
«/•
I
3
O UJ
O Ul
1
< (/I
<
5
Z
a
^
3 ^ -^
(/I
o _t u
z
D
UJ
^-
_J — -
<
— >
LJ
(_)Cbo<
w >-
(x>;
x: oo»
002
oot
Ul
>~
to
t/l
Z
— — >-
z
L-
z r
zoa-j'*»^^CMtf1— —
3 O Ul «/i
Ul
3
Z 3 UJ uj
L^
»n
O -J u
UJ
UJ
r-
_i — I-
<
— —
uj ui
— — — — - • .
— z n: - z wjuj >U^(/)ZuJ — UJ u, sJ y zoujtnuaZSa U -^ "'OiXuj^ujujZ CD O oujin'/> Q, — S O
/
5
—•
i/i
'_)
<_)
X 00*
OOv
yi
X? X £xi/iCnit>r)tN3'^(T>x
00
COC
SJldm-S jC ON
Figure C.9
Tank CLCS Segment Scatter Plots,
67
o
-I *o
c V)
o
»—
on it
o <
X
3
O O CD
2
Z (jj
a
2
O UJ
U1
_j
X ^
kO
«
OO
•
oO "^ - o-
OO
o
— ^
< — >
»- Ui
02
2
»-
z
— u u* o O (/>
O
<_>
i^
*X X
Or
08
1
UJ
U
(/I I/I 1/1
SSIdAVS JO CN
^8
O
t/1
5^
2 or
o
IS
UJ
01
o
3
O
00
UI 1/1
^
"*
ij
<
^SS
O
"*
iT
— —
t-
»o
—
1^ »r so <0
tM
(SI CJ>
•» (N
— —
to
rd
lJ
1/1
O
O —
>
^
-<
2 UJ U1 — UJ Loo 20uJUlO(Z 2 a. (t < Uj ;0£-J 1^ 7 X (_jCbO< U. UJ D ^ U^ u, C XV/>X2Xt/'0''i£infN 3 '^ X X Ui
i/i
UJ
1/1
_J
f-uiu.
L
•
I
u")
C7>
09
09
Ot
cc
S31driVS jO ON
Figure C.
10
low CLOS Segment Scatter Plots.
68
•
1/1
o
0.
<
.
H
o o U3
UJ »
<
o
V
2
Uj
J
or
o
>—
I
r
K—
c
r<.
3
3 O
(<^
.fci
o
C/l
(/I
X
*•
;^ a> 5 _^ < o 'O in -o u
^— (/I
(/>
Ui tn S* :?
•-••
O
n !Sf
Ci
X
ui
*
CN
Ui
Ul UJ
•—
•-•
•—• p^
•< •—
UJ
Z
2
>—
^
a.
a.
'^
-J — --
Urf
UJ
^ ^
-J -J NVS JO
ON
o a. •4.
!-
C/1
(/I
o
^3
o5 O C3
2
O UJ s
1/1
l/>
>— a,
l^
9
— 3 o
f^
- u. u-
^
ucDO«<
3. —
UJ
-J
--
-•
<
—;
t^
•;;
UJ
—
uJ UJ
O >J 5 I" V' - ^ ^ 2: zci-*j<-ju.;:x .*)
«<
Uj
•_)
>->
Q -X— Xi/ix2xi/Ii/i^^cn5'^?ackerly, C. Mathematical Statistics W ith Applications, 2ed Ed. " ~ .
No n op ar a m etric
,
TJulFuiy Press7~"!^Tr"'
73
Statis tics ,
INITIAL DISTRIBOTIOH LIST No. Copies 1.
Defense Technical Information Center Cameron Station Alexandria, Virginia 2231U
2
2.
Library, Code 0142 Naval Postgraduate School Mcnzersy, California 93940
2
3.
Professor T. Jayachandran, Coda 53Jy Naval Postgraduate School Monterey, Califorria 93940
4.
LTC. £. Paek, Code 55Ph Naval Postgraduate School Monterey, California 93940
5.
CFT Emilio Di Giorgio, FA, USA 22-21 Crescent Street Astoria, New York 11105
6.
USA Tradoc Systems Analysis Accivity ATTN: ATOR- TGM White Sands Missile Range, New Mexico,
74
1
1
1
4
88002
202098
Thesis D5T3T c.l
Di Giorgio An analysis plan for the ARCOMS II experiment.
15
MT
84
13090
/
202038 Thesis D5737 c.l
Di Giorgio An analysis plan for the ARCOMS II experiment.
thesD5737
An
analysis plan for the
ARCOMS
II
3 2768 000 98519 6 DUDLEY KNOX LIBRARY
exper