Free Essay

The Study on Stealth Design Technology

In:

Submitted By jun2
Words 1551
Pages 7
The Study on Stealth Design Technology
Abstract—In this report we study some basic ideas on stealth technology. Loosely speaking, the stealth technology can be divided into two categories: the study on target shape design and the study on radar absorbing materials. In this report, we explain the basic principles of these two categories, and give some simulations by CST Microwave Studio and Feko to show the effects of stealth technology.

I. I NTRODUCTION The purpose of stealth design is to protect the target from being detected by the enemy’s radar and to increase the target survivability. Ideally, for an object to be ”stealth”, it needs to have a low optical visibility in addition to being low observable in the infrared spectrum and at all radar frequency bands, also the emission of acoustic noise should be low. However, this goal is difficult to achieve, and the recent research is mainly focus on the low observability in a certain radar bandwidth. In some degree, the term ”stealth design” is equivalent to the technology of reducing target’s the Radar Cross Section (RCS). RCS is the parameter to characterize the strength of backward scattering of the target, the formal definition is σ = lim 4πR2
R−>∞

Fig. 1: B-2 stealth bomber

|Es |2 , |Ei |2

(1)

Fig. 2: F117 stealth fighter plane

where, R is the distance from target to radar, |Es | is the scattered electric field intensity and |Ei | is the incident electric field intensity. Radar equation can be used to estimate the power range of radar. It is given as R= Pt Gt Ar σ (4π)2 Pr,min
1/4

,

(2)

where Pt is the transmission power, Gt is the gain of the transmitting antenna, Ar is the effective aperture of the receiving antenna, Pr,min is the minimal receiving power, R is the power range. From the equation we can see, the RCS is the only parameter can be controlled by the target, and the reduction of RCS by an order will reduce the detection range by 44%. Some typical examples of the stealth design include F-22 stealth fighter plane, F-117 stealth fighter planes, B-2 stealth bomber, sea shadow stealth vehicle, etc. Fig. 1 Fig. 3 are pictures of F22, F117 and sea shadow, respectively. Generally speaking, the research on stealth design can be divided into two categories: the target shape design and the research on radar absorbing materials. Each of these two categories includes a board range. The low-reflection shaping requirements have strong negative influence on the aircraft’s aerodynamic properties. There are two distinctly different approaches to establishing the overall shape of a stealth object: 1) by adopting a compact, smooth blended external geometry. This technique is exemplified by the Northrop B-2. 2) By

employing a faceted configuration, using flat surfaces arranged to minimize normal reflections back toward the illuminating radar and eliminate glint. The Lockheed-Martin F-117A adopted this design. The design of radar absorber materials also has two major distinct ways: 1) by admitting the signal and then attenuating its intensity. This type has a wide range of radar frequencies but is usually heavy and expensive. 2) By generating internal reflections which interfere with the waves reflected from the outer surface. It is called resonant radar absorber material because it is only effective at a number of discrete frequencies. The remainder of the paper is organized as follows. The scatter mechanism is briefly discussed in Section II. Section III presents some discussion on the effect of faceted design. Section IV discusses the resonant radar absorber material; and

Fig. 3: Sea Shadow

in Section V, we offer some concluding remarks. II. S CATTER M ECHANISM We focus the microwave bandwidth radar, at which frequency, the wave length is usually much smaller than the target; therefore, the RCS of the target can be discussed under the optical region. When the EM wave that hits on the target are scattered by a variety of mechanisms: 1) Specular: Specular wave scattering is essentially a reflection of the incoming wave. The main contribution arises when the Poynting vector of the incoming wave vector is perpendicular to the local surface. 2) Diffraction: Diffraction occurs when there is a discontinuity in the target geometry or a discontinuity in the electromagnetic material properties of the object. 3) Diffracted surface waves: A surface wave may result when the incoming wave is more or less aligned along the length of a long thin coated body. The scattering arises when the surface wave encounters surface discontinuities, the end of the body or changes in the electromagnetic properties of the surface of the body. 4) Radiation from creeping waves: When the surface which supports a surface wave makes a gentle bend in the longitudinal plane of the surface wave, the surface wave will convert into an attenuated creeping wave that continues to follow the surface and space waves that radiate away from the surface. The first two mechanisms are much larger than the other two. In plane, the empennage, wings and the head easily evolve the specular reflection, as shown in Fig. 4 and 5.

Fig. 6: the simulation model of dihedral

Fig. 7: the mono-static RCS of the dihedral Diffraction is another major source for target’s RCS. Fig. 8 shows the surface current of NASA almond model illuminated by a plane wave. We can see the current density is especially high at the tip of the model, which will induce a large diffraction. This explains why many stealth planes adopt a compact, smooth blended external geometry to avoid sharp edges and tips.

Fig. 4: the specular reflection on the head of airplane

Fig. 5: the effective dihedral reflector on the empennage The following is a simulation of Dihedral reflector by FEKO. Fig.6 is the dihedral model and Fig. 7 is the monostatic RCS simulation result. In the simulation, the elevation is 0 degree, and the azimuth angle is from −15 to 105 degree. The two PEC plates are perpendicular to each other. For this dihedral, it is easy to see the reflection wave is always parallel to the incident wave; therefore, in the whole area from 0 to 90, the monostatic RCS main a large value.

Fig. 8: the surface current of NASA almond model

III. TARGET S HAPE D ESIGN In this section, we consider the small faceted stealth design. F117 is a typical example. Fig. 2 is a picture of F117, from which we can see it compose of many small facet, these small face located in certain angle to avoid the backward reflection. Fig. 9 is an illustration of this principle.

Fig. 9: the reflection on the head of F117 A group of simulation has been conducted to illustrate the effect of this design. The author builds a simple model for F117 (shown in Fig. 10) and a model for conventional airplane (shown in Fig. 11). Fig. 12 and 13 shows the simulation results by CST MWS. Notice the F117 model has much smaller backward reflection than the conventional one.

Fig. 12: The reflection property of F117

Fig. 13: The reflection property of the conventional airplane Fig. 10: a simple CST model of F117 If Rs = 377Ω, there will be no reflection from the Salisbury screen.

Fig. 11: a simple CST model of conventional airplane

IV. R ADAR A BSORBER M ATERIALS We discuss the resonant radar absorber materials. The most simple one is called Salisbury screen (shown in Fig. 14), which invented in 1952, named after the American engineer Winfield Salisbury. It is formed by placing a resistive sheet above the objects surface in order to create a resonant absorber. If the resistive film is λ/4 from the PEC, then a quarter-wavelength transmission line section transforms the short circuit at the conductor plate into an open circuit, i.e., 1 1 1 1 = + = . Zin Rs ∞ Rs (3)

Fig. 14: salisbury screen The following is the simulation of Salisbury screen by FEKO. Fig. 16 shows the comparison of Salisbury screen and PEC. The size of salisbury screen and PEC are both 4λ × 4λ square. The plane wave is normal incident, and the far field monitor is set to recode the reflection from −90 to 90 degree. From the simulation result, we can see the bi-static RCS of the Salisbury screen is much smaller than the PEC. The single layer Salisbury screen can only beat one single frequency. The bandwidth and the incident angle are relative

Fig. 15: FEKO model of salisbury screen

Fig. 16: The reflection property of salisbury screen and PEC narrow. If multi-layer is adopted, such as Jaumann absorbers, the radar absorbing material can enlarge the incident angle and bandwidth. Some optimal design on the location of layers in Jaumann absorbers are conducted by some other references. V. S UMMARY In this report, we discussed some basic ideas on stealth design technology. There are two major techniques to reduce target RCS: to focus on the target’s shape design and to focus on the radar absorber materials. Each of them contains a broad research range. In this report, we further make an explaination on the faceted stealth shape design technique and the resonant radar absorbing materials. The simulation by CST MWS and FEKO shows the effectiveness of these stealth design method.

Similar Documents

Free Essay

Stealth Technology

...IMPACT OF STEALTH TECHNOLOGY ON AIR DEFENCE “Stealth refers to a wide range of steps that can be taken to make aircraft harder to detect. There is a payoff and a price.” - Jay H Goldberg [i] CHAPTER I INTRODUCTION 1. The latest trends in military aircraft manufacturing are towards development and incorporation of technology which can provide with means to avoid detection. This enhances its survivability by reducing its radar signature and hence reducing the possibility of being detected by enemy radars. The degree to which this is achieved differs from aircraft to aircraft. Certain aircraft like the B-2 and F-117 have been manufactured with this technology as the basis and are thus referred to as Stealth Aircraft. In other aircraft, stealth is achieved to a lesser degree but it nevertheless helps them in enhancing their survivability against enemy air defence. The day is not far when this technology is likely to find wide spread use in the field of aviation. 2. The dictionary defines stealth as "evasion of notice". Applied to Aerial Warfare, it implies the ability of an aircraft, or platform, to carry out its mission without being detected. Other terms such as "LO" - low observables, or "RO"- reduced observables, have also been used which imply the same thing. The very concept of 'Stealth' conjures up an image of something moving in secretly without being detected. 'Stealth' technology actually is all about the art of making aircraft, missiles and...

Words: 15633 - Pages: 63

Premium Essay

Internship Report

...AN ANALYSIS OF THE PRACTICE AND APPLICATION OF "STEALTH MARKETING” THROUGH CUSTOMER RELATIONSHIP MANAGEMENT & THE FRONTIER OF COMPETITIVE DIFFERENTIATION (GRAMEENPHONE PERSPECTIVE) By Tarannum Binte Shaheed ID: 081 044 030 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Business Administration Fall 2012 NORTH SOUTH UNIVERSITY February 2013 1 AN ANALYSIS OF THE PRACTICE AND APPLICATION OF "STEALTH MARKETING” THROUGH CUSTOMER RELATIONSHIP MANAGEMENT & THE FRONTIER OF COMPETITIVE DIFFERENTIATION (GRAMEENPHONE PERSPECTIVE) Submitted to: Dr. Jashim Uddin Ahmed Internship Supervisor Director & Lecturer, School Of Business BUS 498: Internship Submitted By: Tarannum Binte Shaheed ID # 081 044 030 Bachelor of Business Administration (Fall 2012) NORTH SOUTH UNIVERSITY 2 LETTER OF TRANSMISSION February 15, 2013 To Dr. Jashim Uddin Ahmed Director & Lecturer School of Business North South University Bangladesh Subject: Submission of Internship Report Dear Sir, It is my great honor to submit the report of my 3 months long Internship Program in Grameenphone Ltd. The report titled ―An analysis of the practice and application of Stealth Marketing through Customer Relationship Management & The frontier of Competitive Differentiation (Grameephone‘s Perspective)‖ is the final outcome of successful completion of my internship program at the company. It has been a joyful and enlightening experience for me to work in an organization...

Words: 8251 - Pages: 34

Free Essay

Invisible Cloak

...optical lens, that able to bend the incoming light ray from in order to around an object, giving the appearance that it is not there at all.   Introduction Definitions and Background The desire to make objects or people invisible has a long history: to this end, many different devices have been imagined. However, it is only in relatively modern times that these plans have begun to move from fiction to reality. The recent development of metamaterials and the new design of optical lens have made accessible and opened up new possibilities for invisibility, the most promising of which are described in this article. To be invisible in the conventional sense is to be undetectable to electromagnetic radiation within a given frequency range; light must not be scattered or absorbed. An immediate and unfortunate consequence of this requirement is that an invisible person must also necessarily be blind. In many applications, partial invisibility is sufficient. Hence, with all these kind of technology, metamaterials and optic lenses will provide the human being a wide range of new applications device and new systems whether in military sector or in automotive system such as, in Keio University, Tokyo for instance, enable the back seat driver to become invisible whenever the driver is moving backward (Gbur,2013) or when...

Words: 1399 - Pages: 6

Premium Essay

Thesis

...changing because of success of Internet and the revolution in Information technology. The advancement in technologies have made it possible to commoditize the components such as network, computing, storage and software. In the new paradigm, there are multiple entities (hardware, software agents, protocols etc.) that work on behalf of different autonomous bodies (such as a user, a business etc.) and provide services to other similar entities. Internet has made is possible for many such geographically distributed antonymous entities to interact with each other and provide various services. These entities will work for their respective owners to achieve their individual goals (maximize their individual payoffs), as opposed to obtaining a system optima (that is socially desirable). This results in an entirely different paradigm of computing where the "work" is performed in a completely distributed/decentralized fashion by different entities where the primary objective of each entity is to maximize the objective of its owner. Therefore, it is important to study traditional computer science concepts such as algorithm design, protocols, and performance optimization under a game-theoretic model.  This course aims to provide a basic understanding of various game-theoretic concepts and its application in different domains. After this course the students should be able to model many real situation using game-theory and design solutions (mechanisms, algorithms, protocols etc.) that are robust even...

Words: 2068 - Pages: 9

Premium Essay

United States Air Force Research Paper

...United States Air Force Research Report February 7, 2011 Executive Summary The United States Air Force has been able to carry on a great tradition of air supremacy and advanced technology. They were born in September 1947, when they separated from the Army Air Core, and became their own unit (www.peterson.af.mil). Providing for the troops that serve always has been a top priority of the Air Force. The Air Force is run in management form, just like any large organization, or small business. It has a rank structure, where tasks are delegated down from the ranking Officers through the Enlisted Core. After significant evaluation, I have researched and identified the following six categories necessary for the Air Force to preserve satisfaction and success from their troops: 1. Declare existing organizational goals through a firm mission statement. 2. Maintain the highest ethical standards. 3. Uphold communication through the rank structure through surveys. 4. Reinforce the importance of training for top performance. 5. Maintain the Air Force’s principal focus on the Airmen’s well-being. 6. Constantly improve from research methods to stay a premier organization. The first and second groups support a proven successful vision that has worked for more than 64 years. The Air Force’s Core Values are what helps to keep their Mission Statement so pertinent and gives them a strong backbone to sustain the high ethical...

Words: 2109 - Pages: 9

Free Essay

Zara

...Report On Invisible Cloak Submitted To: Prepared By: Mrs. Parul Pathak Ankita Aggarwal Mr. Ganesh Mishra Laxmi Pooja Contents * Inroduction * What is Invisible Cloak * What makes it so different? * Meta Materials * How does it works? * About the cloak * How close are scientists to creating a real-life invisibility cloak? * References Invisible Cloak Introduction Invisibility has long been employed in works of science fiction and fantasy, from 'cloaking devices' on spaceships in the various Star Trek series to Harry Potter’s magic cloak. But physicists are beginning to think they can actually make devices with just these properties. To achieve the feat of 'cloaking' an object, they have developed what are known as metamaterials, some of which can bend electromagnetic radiation, such as light, around an object, giving the appearance that it isn’t there at all. The first examples only worked with long-wavelength radiation such as microwaves. One small device that made small objects invisible to near-infrared radiation and worked in three dimensions was unveiled by physicists from the UK and Germany earlier 2015. Admit it. You'd love to own an invisibility cloak. Utter an embarrassing faux pas at a party? Just throw on your magical garment and vanish from the snooty gaze of your fellow partygoers. Want to hear what your boss is really...

Words: 2297 - Pages: 10

Premium Essay

Nanoparticles in Drug Targeting

... Page.no 1. Introduction To Nanoparticles (2) 2. Nanoparticulate systems For Targeting (13) 3. Drug Targeting (25) 4. Approaches To Drug Targeting (29) 5. Nanoparticle Drug Delivery Market (47) 6. Future Barriers And Challenges (48) 7. Various Nanopharmaceuticals And Their Case Studies (49) 8. NanoDrug Patenting (54) 9. Conclusion (57) 10. Bibliography (58) NANOPARTICLES IN DRUG TARGETING 1. INTRODUCTION NANOPARTICLES * Nanoparticles are in solid state and are either in amorphous or crystalline They include Nanocapsules and Nanospheres.They are able to adsorb or encapsulate a drug thus protecting it against chemical and enzymatic degradation.Their size ranges from 1-100mn. * Nanocapsules:They...

Words: 10751 - Pages: 44

Premium Essay

How to Do Imc

... | Integrated Marketing Communications Textbooks & Materials Byers & Barr, “Integrated Marketing Communications Custom Edition for Santa Clara University 3E”: Pearson Learning Solutions, 2014. CoursePack Reader – “Marketing 596 – Winter 2014” Course Description This course is designed as an introduction to the concept and practice of integrated marketing communications (IMC). It takes the participant through communication, marketing, branding, and integrated marketing theory, planning and IMC program coordination. The course also addresses the marketing communications tactics of advertising, public relations, direct response, sales support, the Internet and social media. Emphasis is placed on business-to-business and technology marketing demonstrating how theories and practices from consumer marketing are applicable to those discipline areas. Premise IMC is based on the premise that a proper mix and balance of communications strategy and tactics (advertising, public relations, direct response,...

Words: 1067 - Pages: 5

Premium Essay

Nye, Susan, Barbara Priovolos, Jean-Pierre Jeannet. “the Swatch Project.” Imede Case Study, Lausanne; 1985, 6.

... Books: * Berger, S. (2006). How we compete. What Companies Around the world are doing to make it in today’s global economy. Doubleday, New York. * Christensen, C. (1997). The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business School Press, Boston. * Church, J; Ware, R. (2000) Industrial Organization: a Strategic Approach. McGraw-Hill, Boston. * De Bono, E. (1992). Sur/petition: Creating Value Monopolies when Everyone Else is Merely Competing. HarperBusiness, New York. * Glasmeier, A. (2000). Manufacturing Time: Global Competition in the Watch Industry, 1795-2000, * Morrison, A. (1999). Swatch and the Global Watch Industry. Ivey Case #9A99M023. University of Western Ontario. * Pictet. (2003). The Watch Industry: What makes it tick? Geneva. Pictet & Cie. * Porter, M. (1980). Competitive Strategy: Techniques for Analyzing Industries and Competitors. Free Press, 1998.        * Porter, M. E. (1998). On Competition. Harvard Business School. Boston * Porter, M. (1976). Interbrand Choice, Strategy and Bilateral Market Power. Vol. 146, Harvard Economic Studies. Cambridge, MA. Harvard University Pres. * Roberts, J. (2004) The modern firm, organizational design for performance and growth. Oxford University Press. Oxford. * Thomson, N; Baden-Fuller, C. (2010). Basic strategy in context: European text and cases. Chichester, Wiley. | | * Zaugg, K. (1991). Swatch after...

Words: 882 - Pages: 4

Premium Essay

Robert Hanssen Cheating

...American National Security was giving up the most important technologies which was “PROMIS prosecutor management Information systems which hid secrets of the United States of America” the software was given provided to Al-Qaeda and Soviet informants. The “PROMIS software” was am artificial intelligence software that can track any individuals behaviors and financial markets in real time. The spy Hessen was allegedly accused of giving information “PROMIS software" to Russian government the KGB and FSB. The Russian sold the information to Al-Qaeda this provided software to Osama bin Laden in money laundering and attacking the twin towers in New York City. The “PROMIS software” was used by Osama Bin Laden to evade the United States officials from capturing him. The “PROMIS program” created huge amount of conflict within other government claiming the “PROMIS software was a Trojan Horse Trap Door” many governments around the world stopped using this programs do too its potential dangers. Although despite Hanssen gave this information to the Russian government he was captured and was sentenced to 15 life sentences in a maxim security prison. The bomber engineers Noshir Sheriaji Gowadia who was considered among the world as “Father of Chinese stealth technology” it was believed that his advanced technology designed B-2 bomber propulsion system. Gowdia worked for Northrop for about eighteen years developing sophisticated technology. Although it was unclear how much technological advances...

Words: 855 - Pages: 4

Free Essay

Integration of Video Games in Classrooms

...Integration of Video Games in Classrooms Abstract This literature review will explore the effective ways educational video games enhance student motivation in classrooms and the personalized approach of education through video games. It will also explore the adaptation of educational games in classrooms as well as educator’s concerns. The review is limited to the use of video games designed for educational purposes and does not discuss the educational value of the entertainment video games. The review does not discuss the different effects of video games on diverse groups; it focuses primarily elementary to college level students. Video games have been around for over thirty years; they are one of the most lucrative and prominent forms of entertainment across cultures. A total of $20.77 billion was spent in 2012 in the game industry (ESA, Essential Facts about the Computor and Video Game Industry, 2013). The Gaming Industry is changing and adapting every year to the new technological changes. Video games have become an important form of entertainment to society. “U.S. consumers play video games on… Sony PlayStation 3 and the Microsoft Xbox 360 and on personal computers (“PCs”)….on mobile video players such as the PlayStation Portable “PSP”, the Game Boy Advance and the Nintendo DS….“on-line” among multiple players who interconnect over the Internet and other proprietary online networks” (Siwek, 2010). The expanding market of video games and its influence on American...

Words: 2385 - Pages: 10

Free Essay

The B-1 Bomber

...THE B-1 Bomber: Victim of a “Buy before you Fly: Philosophy December 17, 2015 THE B-1 Bomber: Victim of a “Buy before you Fly: Philosophy     Introduction The B-1 Bomber is a four-engine supersonic variable-sweep wing, jet-powered heavy strategic Bomber that is used by the U.S. Air Force. It was first envisioned in the 1950’s as a supersonic Bomber with Mach 2 speed, and sufficient range and payload to replace the Boeing B-52 Stratofortress. However, when it was brought into full operation, it was developed into the B-1B, primarily a low level penetrator with long range and Mach 1.25 speed capability at high altitude. The initial B-1 Bomber program was cancelled, partly because it was becoming obsolete, and also for political reasons. It was designed by the Rockwell international developers and it started service in the year of 1986 with the help of Strategic Air Command SAC. Customer and Expectations The United States Air Force USAF was the primary customer for the B-1B program, and the Strategic Air Command was the direct customer responsible for operating the B-1 Bomber. During development of the B-1 Bomber the Air Force had varying expectations which lead to it initial cancellation and regeneration of the B-1B that we know today. (Brook, 2012). The United Sates Air Force USAF expected the B-1B program to provide the advanced capability that was needed to improve their defense system. The major expectation associated with this program for the United Sates...

Words: 1754 - Pages: 8

Premium Essay

Case Study 1 Week 2

...Strategies for security in High-Rise Residential Buildings | November 10 2013 | | Kristen Mosuch Case Study 1 | Strategies for security in High-Rise Residential Buildings When living in a high-rise, residents have a reasonable expectation of safety and security. As a contractor charged with the construction of such a building, there are many facets of security that must be taken into consideration before design and construction can begin. As a contractor, there is a certain responsibility to account for any risks that already exist, as well as risks that may exist in the future. Security is often used as a selling point for potential buyers, so the overall success of the project can depend on how well the security portion is implemented. According to Chris Grniet, regional managing director for Guidepost’s Technology/Design Consulting team, “What’s secure and what isn’t for residential properties tends to wax and wane with the perception of general security and safety in the overall environment.” (Garris, 2013) Residents will feel more comfortable, and will be willing to spend more if they feel secure in their living environment. “When establishing the right mix of comfort and security, the trick is to incorporate security measures without making them completely obvious. It’s not about being stealth, but about providing a safe environment that feels like home. “ (Garris, 2013) Security should not interfere with the daily lives or residents, but should be non-invasive...

Words: 1973 - Pages: 8

Free Essay

Analysis of the Australian Bicycle Industry

...ANALYSIS OF THE AUSTRALIAN BICYCLE INDUSTRY According to current data, bicycle retailing and repairing in Australia generates revenue of $812 million. 1,564 businesses employ 4,454 people. No one company enjoy a significant market share in this industry (Source: http://www.ibisworld.com.au/industry/bicycle-retailing-and-repair.html). Bicycle Industries Australia Ltd has reported that: • 2012/2013 imports totalled over 1.4 million bicycles – an increase of 16.6% on 2011/2012; • Imports for adult bikes increased 21% • Children’s bike imports decreased 7% (Source: http://www.bikeoz.com.au/index.php/news/67-bicycle-sales-hits-new-high-as-children-get-left-behind) A report released by the Prevention Research Collaboration of the University of Sydney has found: • Cycling in Australia is increasing gradually resulting in: o Cleaner cities o Less congested cities o Less stress on public transport systems o More active healthier population o Reduction in greenhouse gas emmisssions o Reduction in rate of obesity • Cycling offers commuters o Opportunity to say time and money o Chance to avoid stress of traffic jams, late trains, and crowded buses o Ability to incorporate physical activity into their daily routine • Cycling provides multiple health outcomes Recognising these benefits, Australia’s National Cycling Strategy aims to double the number of Australian cyclists by 2016, and The City of Sydney Cycle Strategy and Action Plan 2007-2017 aims to increase...

Words: 3908 - Pages: 16

Free Essay

Alone

...A Literature Review of Gaming in Education Research Report Katie Larsen McClarty Aline Orr Peter M. Frey Robert P. Dolan Victoria Vassileva Aaron McVay June 2012 GAMING IN EDUCATION 1 About Pearson Pearson, the global leader in education and education technology, provides innovative print and digital education materials for preK through college, student information systems and learning management systems, teacher licensure testing, teacher professional development, career certification programs, and testing and assessment products that set the standard for the industry. Pearson’s other primary businesses include the Financial Times Group and the Penguin Group. For more information about the Assessment & Information group of Pearson, visit http://www.pearsonassessments.com/. About Pearson’s Research Reports Pearson’s research report series provides preliminary dissemination of reports and articles prepared by TMRS staff, usually prior to formal publication. Pearson’s publications in .pdf format may be obtained at: http://www.pearsonassessments.com/research. GAMING IN EDUCATION Abstract 2 The use of simulations and digital games in learning and assessment is expected to increase over the next several years. Although there is much theoretical support for the benefits of digital games in learning and education, there is mixed empirical support. This research report provides an overview of the theoretical and empirical evidence behind five key claims about...

Words: 8946 - Pages: 36