Information Science

Stories

INSIDER: Information Technology

A new solution compresses and offloads critical data from battlefield machines more efficiently, enabling faster AI processing and decision-making on the battlefield.

INSIDER: Data Acquisition

U.S. Special Operations Forces have a new aid in the fight against cyber-attacks. The Tactical Key Loader (TKL) cryptographic key device, which answers the Army’s call for the...

INSIDER: Software

Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent Air Force demonstration of the...

INSIDER: Aerospace

Northrop Grumman Corporation’s Forward Area Air Defense Command and Control (FAAD C2) system has been selected by the U.S. Department of Defense (DOD) as...

Briefs: Information Technology
Characterizing uncertainty in estimating the state of a resident space object is one of the fundamentals of many space surveillance tasks.
Briefs: Aerospace
Co-Prime Frequency and Aperture Design for HF Surveillance, Wideband Radar Imaging, and Nonstationary Array Processing

A co-prime array uses two uniform linear subarrays to construct an effective difference coarray with certain desirable characteristics, such as a high number of degrees-of-freedom for DOA estimation. In this case, the co-prime...

Briefs: Information Technology

Recently, modeling and simulation (M&S) engineers have made impressive strides in improving ground vehicle reliability and soldier safety. This work involved...

Briefs: Defense

The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending...

Briefs: Information Technology

Defending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the...

Briefs: Aerospace
This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.

System administrators and cyber defenders continue to face challenges in...

Briefs: Aerospace
This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.

As the military adopts more networked...

Briefs: Information Technology

Improvised Explosive Devices (IEDs) pose a significant threat to military ground vehicles and soldiers in the field. Full-system...

Application Briefs: Defense
ATLAS ELEKTRONIK UK
Winfrith Newburgh, Dorchester, UK
+44-1305-212400
www.uk.atlas-elektronik.com SIGNALIS SAS
Bezons, France
+33-1-39-96-44-44
www.signalis.com...
Briefs: Information Technology
Materials Design Principles for the Dynamic Fracture of Laminar Composite Structures

Crack bridging (e.g., from stitches or pins) and friction have profound and potentially very useful effects on delamination crack growth, controlling growth rates (damage levels) and the energy absorbed. However, the implications for structural design principles...

Briefs: Information Technology

Enterprise business processes are more connected than ever before, driven by the ability to share the right information with the right partners at the right time. While this...

Briefs: Defense

The military seeks to enable agile and adaptive mission management and control for a team comprised of unmanned aerial vehicles (UAVs), unattended ground sensors (UGS),...

Briefs: Aerospace

The phenomenon of flapping wing flight in nature has been studied for centuries. Recently, flapping flight for unmanned aerial vehicle (UAV) applications has become of interest....

Briefs: Unmanned Systems

One critical aspect in developing a quantitative model of unmanned autonomous vehicle (UAV) operator and system performance has been to adopt a task-centric approach to...

Briefs: Information Technology

Integrated simulation capabilities that are high-fidelity, fast, and have scalable architecture are essential to support autonomous vehicle design and performance...

Briefs: Information Technology

Synthetic and natural micro-architectures occur frequently, and multiphase functionally graded composites are becoming increasingly popular for applications requiring...

Briefs: Defense

Currently, the two main computational tools used by the aerothermodynamics community to model hypersonic flows are Computational Fluid Dynamics (CFD), and the direct...

Briefs: Aerospace

In order to enable off-road vehicle dynamics analysis simulations when traveling on soft soil, a deformable Vehicle Terrain Interface (VTI) model that interfaces with...

Briefs: Imaging

For nighttime surveillance, acquisition of visible light imagery is impractical due to the lack of illumination. Thermal imaging, which acquires mid-wave infrared or long-wave infrared radiation naturally...

Briefs: Sensors/Data Acquisition

Improvised explosive devices (IEDs) and other traditional under-body blast weapons are a significant threat to military ground vehicle systems. Engineers and scientists...

Briefs: Information Technology
Two-Way, Freeform, Speech-to-Speech Translation Systems for Tactical Use

The Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) is developing and fielding freeform, two-way translation systems that enable speakers of different languages to communicate with one another in real-world tactical situations without an...

Briefs: Information Technology
Universal Sparse Modeling

Sparse data models, where data is assumed to be well represented as a linear combination of a few elements from a dictionary, have gained considerable attention in recent years, and their use has led to state-of-the-art results in many signal and image processing tasks. Sparse modeling calls for constructing a succinct...

Briefs: Information Technology

A lightweight Web Service (WS) and a Web site interface have been developed that enable remote measurements of electronic devices as a “virtual laboratory.” Using...

Briefs: Information Technology

When working sequences of images, registration of the frames to a common point of reference is an essential prerequisite for many types of image analysis. The phase...

Briefs: Information Technology

When required to reverse-engineer a product, engineers often do not have design specifications for the system, and the machine may not be disassembled or invasively examined. The...

Videos