Information Science

Stories

Peer-to-peer (P2P) networking has changed the way users search for, send, and receive digital information over the Internet. Instead of relying on...

A wireless transmission system provides high-quality video transmission over severely impaired wireless links between nodes that are connected within airborne networks. The target bit rate...

Briefs: Information Technology
Optimized Robust Adaptive Networks in Supervisory Control and Data Acquisition Systems

The Electric Power and Communica - tion Synchronizing Simulator (EPOCHS) system could provide great benefits to private industry and Department of Defense (DoD) power systems infrastructure by allowing simultaneous, synchronous simulation of communication and...

Briefs: Information Technology
Evolvable Approaches to Software Verification and Validation

Research was conducted to integrate and advance current techniques in compilers, hardware architectures, and security to develop novel techniques to protect against physical attacks on encrypted embedded systems. The innovation in the approach was in exploiting the power of integrated...

The ability to detect and recognize buildings is important to a variety of vision applications operating in outdoor urban environments. These include landmark recognition,...

Tech Transfer Reports: Information Technology
Information Technology Helps Users Monitor Power Consumption

Buildings and factories are a lot like living creatures. Their mechanical systems, from elevators to manufacturing equipment, are like muscles. Specialized fluids and life-giving utilities such as water, natural gas, steam, and electricity course through their structure. And they...

A study was performed to evaluate the accuracy achievable in the use of submodeling in finite-element modeling of the mechanical response of a structural system that includes...

Briefs: Information Technology
Next-Generation Information Systems Architectures

A document describes a paradigm in which low-altitude unmanned aerial vehicles (UAVs) with wireless communication capability are used to assist networking among a set of ground stations. This new paradigm is attractive because UAVs can be dynamically deployed in a wide variety of geographical...

Briefs: Information Technology
Infrastructure for Development of Secure, Reliable Software

The Verification and Automated Reasoning research group at Cornell University has been building an infrastructure, comprising human expertise and computational resources, for the development of secure, reliable software for critical military applications. Such software includes...

A formal model has been devised to impart some mathematical rigor to the concept of the attack surface of a software system. Complementing the model is a definition of a quantitative...

Briefs: Information Technology
Explicitly Timed Authorization Logic

A document describes explicitly timed authorization logic (nicknamed "η-logic"). In prior authorization logics, it is, variously, impossible or difficult to handle time explicitly; express security policies that involve complex, time-dependent relationships; or reason accurately about time. By enabling...

Military planners are aggressively developing network-centric warfare platforms that use wireless communications as a force multiplier. The...

Briefs: Information Technology
Cooperative Control of Robotic Aircraft

A document reviews a multidisciplinary research program oriented toward development of a rigorous theoretical foundation, and scalable analytical tools and paradigms, for construction of cooperative, networked control for numerous autonomous and semi-autonomous aircraft. This research has addressed issues...

Amethod of real-time fusion of readout data from electronic inertial and image sensors for passive navigation has been developed. By "passive navigation" is meant navigation without...

Briefs: Information Technology
C++ Architecture for Simulating UAVs

A conference paper describes the use of the CADAC++ software system for simulating operations of uninhabited aerial vehicles (UAVs) in conjunction with moving ground targets while interacting with other UAVs and with satellites that assist in targeting. CADAC++ was developed by rewriting the prior...

The term "Software Wind Tunnel" (SWiT) denotes an institution proposed to be established as a means of overcoming obstacles that, heretofore, have impeded technology transition in...

Briefs: Information Technology
Magneto-Fluid Dynamics Calculations for Aerodynamics

Governing differential equations, and algorithms to solve the equations numerically, have been developed to enable computational simulation of weakly ionized aerodynamic flows in the presence of electromagnetic fields. The equations and algorithms are intended mainly for application to...

Three algorithms, and software that implements the algorithms, have been conceived and analyzed as means of effecting automated planning of scientific observations by a fleet of unmanned...

Briefs: Information Technology
Simulation of a Flywheel Energy-Storage System

A computational model has been developed to simulate the operation of a laboratory flywheel energy-storage system that is a subsystem of the Flywheel Attitude Control, Energy Transmission, and Storage (FACETS) system located at Kirtland Air Force Base in New Mexico. The FACETS, which includes three...

Aconcept of sensor validation using nonlinear minor-component analysis (NLMCA) has been proposed as a theoretical basis of a sensor fault-detection-and isolation (FDI) module in a...

Briefs: Information Technology
Enlightened Multiscale Simulation of Biochemical Networks

A continuing research project is dedicated to development of mathematical and software infrastructure in support of post genomics research in systems biology. One near-term objective of the project is to contribute to deeper understanding of the organizational principles of biological...

Acquiring data from sensors, transporting the data, and then archiving it for future reference has changed dramatically over the last few years. The...

Briefs: Information Technology
The Dataflow Interchange Format for Designing DSPs

The dataflow interchange format (DIF) is a conceptual framework for helping designers of digital signal-processing (DSP) systems to integrate diverse dataflow models, dataflow techniques, DSP-design software tools, DSP software libraries, and embedded processing platforms. Somewhat more...

An improved method has been devised for defending a server or other computer against a code-injection attack, in which an attacker exploits a hardware or software vulnerability to inject...

Briefs: Information Technology
Some Advances in Digital-Image Forensics

A program of research in the forensic analysis of digital images has yielded several proposed techniques for automated image-data processing to answer questions concerning the source, authenticity, and integrity of a given image or set of images. The need for such techniques arises because the ease with...

A method of parametric design of bodies having arbitrary three- dimensional shapes has been invented. The method is intended mainly for use in the design, analysis, and manufacture...

Briefs: Information Technology
Development of Adaptive and Reflective Middleware

A report describes Phase II of the Adaptive and Reflective Middleware Systems (ARMS) program, which was focused on developing an adaptive and reflective network Quality-of-Service (QoS) infrastructure for the Total Ship Computing Environment (TSCE). Conceived for the next generation of Navy...

Progress has been made in research on several fronts in an effort to develop computational simulation capabilities for use in virtual design and testing of advanced structural materials. It...

A program initiated by the Defense Advanced Research Projects Agency (DARPA) and now also pursued by other agencies called “Learning Applied to Ground Robots” (LAGR), is...

Videos