Keyword: Information Technology

Information Technology

INSIDER: Sensors/Data Acquisition

A new solution compresses and offloads critical data from battlefield machines more efficiently, enabling faster AI processing and decision-making on the battlefield.

INSIDER: Information Technology

U.S. Special Operations Forces have a new aid in the fight against cyber-attacks. The Tactical Key Loader (TKL) cryptographic key device, which answers the Army’s call for the...

INSIDER: Software

Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent Air Force demonstration of the...

Briefs: Sensors/Data Acquisition
Characterizing uncertainty in estimating the state of a resident space object is one of the fundamentals of many space surveillance tasks.
Briefs: Aerospace
Co-Prime Frequency and Aperture Design for HF Surveillance, Wideband Radar Imaging, and Nonstationary Array Processing

A co-prime array uses two uniform linear subarrays to construct an effective difference coarray with certain desirable characteristics, such as a high number of degrees-of-freedom for DOA estimation. In this case, the co-prime...

Briefs: Information Technology

Recently, modeling and simulation (M&S) engineers have made impressive strides in improving ground vehicle reliability and soldier safety. This work involved...

Briefs: Information Technology

The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending...

Briefs: Defense

Defending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the...

Briefs: Aerospace
This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.

System administrators and cyber defenders continue to face challenges in...

Briefs: Information Technology
This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.

As the military adopts more networked...

Briefs: Defense

Improvised Explosive Devices (IEDs) pose a significant threat to military ground vehicles and soldiers in the field. Full-system...

Briefs: Information Technology
Materials Design Principles for the Dynamic Fracture of Laminar Composite Structures

Crack bridging (e.g., from stitches or pins) and friction have profound and potentially very useful effects on delamination crack growth, controlling growth rates (damage levels) and the energy absorbed. However, the implications for structural design principles...

Briefs: Aerospace

Enterprise business processes are more connected than ever before, driven by the ability to share the right information with the right partners at the right time. While this...

Briefs: Information Technology

The military seeks to enable agile and adaptive mission management and control for a team comprised of unmanned aerial vehicles (UAVs), unattended ground sensors (UGS),...

Briefs: Aerospace

The phenomenon of flapping wing flight in nature has been studied for centuries. Recently, flapping flight for unmanned aerial vehicle (UAV) applications has become of interest....

Briefs: Unmanned Systems

One critical aspect in developing a quantitative model of unmanned autonomous vehicle (UAV) operator and system performance has been to adopt a task-centric approach to...

Briefs: Information Technology

Integrated simulation capabilities that are high-fidelity, fast, and have scalable architecture are essential to support autonomous vehicle design and performance...

Briefs: Information Technology

Synthetic and natural micro-architectures occur frequently, and multiphase functionally graded composites are becoming increasingly popular for applications requiring...

Briefs: Defense

Currently, the two main computational tools used by the aerothermodynamics community to model hypersonic flows are Computational Fluid Dynamics (CFD), and the direct...

Briefs: Aerospace

In order to enable off-road vehicle dynamics analysis simulations when traveling on soft soil, a deformable Vehicle Terrain Interface (VTI) model that interfaces with...

Briefs: Information Technology

For nighttime surveillance, acquisition of visible light imagery is impractical due to the lack of illumination. Thermal imaging, which acquires mid-wave infrared or long-wave infrared radiation naturally...

Briefs: Information Technology

Improvised explosive devices (IEDs) and other traditional under-body blast weapons are a significant threat to military ground vehicle systems. Engineers and scientists...

Briefs: Information Technology
Two-Way, Freeform, Speech-to-Speech Translation Systems for Tactical Use

The Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) is developing and fielding freeform, two-way translation systems that enable speakers of different languages to communicate with one another in real-world tactical situations without an...

Briefs: Information Technology
Universal Sparse Modeling

Sparse data models, where data is assumed to be well represented as a linear combination of a few elements from a dictionary, have gained considerable attention in recent years, and their use has led to state-of-the-art results in many signal and image processing tasks. Sparse modeling calls for constructing a succinct...

Briefs: Information Technology

A lightweight Web Service (WS) and a Web site interface have been developed that enable remote measurements of electronic devices as a “virtual laboratory.” Using...

Briefs: Information Technology

When working sequences of images, registration of the frames to a common point of reference is an essential prerequisite for many types of image analysis. The phase...

Briefs: Information Technology

When required to reverse-engineer a product, engineers often do not have design specifications for the system, and the machine may not be disassembled or invasively examined. The...

Briefs: Information Technology
Data Fusion of Geographically Dispersed Information for Test and Evaluation

Test and evaluation relies on computer collection and manipulation of data from a myriad of sensors and sources. More computing power allows for increases in the breadth and depth of the information collected. The same computing power must assist in identifying,...

Briefs: Information Technology

Operation of autonomous surface vehicles (ASVs) poses a number of challenges, including vehicle survivability for long-duration missions in hazardous and...