Information Science

Stories

Modeling and simulation were used to analyze the effects of underbody blasts on moving vehicles.

Recently, modeling and simulation (M&S) engineers have made...

The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending...

Data mining models describe dynamic behavior of attacks and failures, enabling defenders to detect and differentiate simultaneous attacks on a target network.

Defending cyberspace is a complex and largely...

Briefs: Information Technology
Framework for Resilient Remote Monitoring
This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.

System administrators and cyber defenders continue to face challenges in...

This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.

As the military adopts more networked...

Improvised Explosive Devices (IEDs) pose a significant threat to military ground vehicles and soldiers in the field. Full-system...

Application Briefs: Aerospace
Integrated Underwater Security System
ATLAS ELEKTRONIK UK
Winfrith Newburgh, Dorchester, UK
+44-1305-212400
www.uk.atlas-elektronik.com SIGNALIS SAS
Bezons, France
+33-1-39-96-44-44
www.signalis.com...
Briefs: Information Technology
Materials Design Principles for the Dynamic Fracture of Laminar Composite Structures

Crack bridging (e.g., from stitches or pins) and friction have profound and potentially very useful effects on delamination crack growth, controlling growth rates (damage levels) and the energy absorbed. However, the implications for structural design principles...

Enterprise business processes are more connected than ever before, driven by the ability to share the right information with the right partners at the right time. While this...

The military seeks to enable agile and adaptive mission management and control for a team comprised of unmanned aerial vehicles (UAVs), unattended ground sensors (UGS),...

The phenomenon of flapping wing flight in nature has been studied for centuries. Recently, flapping flight for unmanned aerial vehicle (UAV) applications has become of interest....

One critical aspect in developing a quantitative model of unmanned autonomous vehicle (UAV) operator and system performance has been to adopt a task-centric approach to...

Integrated simulation capabilities that are high-fidelity, fast, and have scalable architecture are essential to support autonomous vehicle design and performance...

Synthetic and natural micro-architectures occur frequently, and multiphase functionally graded composites are becoming increasingly popular for applications requiring...

Currently, the two main computational tools used by the aerothermodynamics community to model hypersonic flows are Computational Fluid Dynamics (CFD), and the direct...

In order to enable off-road vehicle dynamics analysis simulations when traveling on soft soil, a deformable Vehicle Terrain Interface (VTI) model that interfaces with...

Briefs: Information Technology
Thermal-to-Visible Face Recognition

For nighttime surveillance, acquisition of visible light imagery is impractical due to the lack of illumination. Thermal imaging, which acquires mid-wave infrared or long-wave infrared radiation naturally...

Improvised explosive devices (IEDs) and other traditional under-body blast weapons are a significant threat to military ground vehicle systems. Engineers and scientists...

Briefs: Information Technology
Two-Way, Freeform, Speech-to-Speech Translation Systems for Tactical Use

The Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) is developing and fielding freeform, two-way translation systems that enable speakers of different languages to communicate with one another in real-world tactical situations without an...

Briefs: Information Technology
Universal Sparse Modeling

Sparse data models, where data is assumed to be well represented as a linear combination of a few elements from a dictionary, have gained considerable attention in recent years, and their use has led to state-of-the-art results in many signal and image processing tasks. Sparse modeling calls for constructing a succinct...

A lightweight Web Service (WS) and a Web site interface have been developed that enable remote measurements of electronic devices as a “virtual laboratory.” Using...

When working sequences of images, registration of the frames to a common point of reference is an essential prerequisite for many types of image analysis. The phase...

When required to reverse-engineer a product, engineers often do not have design specifications for the system, and the machine may not be disassembled or invasively examined. The...

Briefs: Information Technology
Data Fusion of Geographically Dispersed Information for Test and Evaluation

Test and evaluation relies on computer collection and manipulation of data from a myriad of sensors and sources. More computing power allows for increases in the breadth and depth of the information collected. The same computing power must assist in identifying,...

Operation of autonomous surface vehicles (ASVs) poses a number of challenges, including vehicle survivability for long-duration missions in hazardous and...

Briefs: Information Technology
Flexible Computing Architecture for Real-Time Skin Detection

In both the Air Force and search and rescue (SAR) communities, there is a need to detect and characterize persons. Existing methods use red-green-blue (RGB) imagery, but produce high false alarm rates. New technology in multispectral skin detection is better than the existing RGB...

Briefs: Information Technology
Ballistic Filter for GPS and Accelerometer Measurements

Ballistic filtering describes the dynamic equations that can be used to form Extended Kalman Filters (EKF) for the estimation of a projectile’s trajectory. The steps associated with initialization and implementing an EKF are demonstrated through a specific task. The performance of an EKF...

Briefs: Information Technology
Considering Software Protection for Embedded Systems

Given the current trend of reprogrammable embedded devices within the Department of Defense and industry, attention needs to be refocused on the benefits or measurability of software protection applied to this domain. Modern reconfigurable embedded systems consider circuits as software and the...

Peer-to-peer (P2P) networking has changed the way users search for, send, and receive digital information over the Internet. Instead of relying on...

Trending Stories

Articles: Sensors/Data Acquisition

Drone Swarms: A Transformational Technology

INSIDER: Aerospace

Second Vendor F-35 Canopy Testing Completed

Videos