Abstract:Todayfs naval networking environment is primarily composed of several enterprise computing and communications environments, which can be characterized as large scale heterogeneous network environments. Due to the inherited complex and heterogamous nature of network, it is quite challenging to… more
Abstract:To provide better healthcare to PTSD patients, there is a strong need to develop a powerful PTSD CDSS based on evidence-based treatment strategies, acting as an anytime virtual assistant for PTSD professionals, Primary Care Physicians (PCP) and residents. To address this critical need, Intelligent… more
Abstract:Mental workload is considered one of the most important contributors to human performance. In previous decades, considerable research has been conducted on workload assessment using different methods, such as subjective measurement and performance measurement. Recently, there is a trend to utilize… more
Abstract:IAI with University of Michigan proposes an innovative HIC software modeling and integration framework built around objectively quantified cognitive models of human operators i) Executive-Process/Interactive Control (EPIC) and ii) GOMS (Goal Operator Method and Selection rules) Language Evaluation… more
Abstract:In a low-texture indoor environment, landmark-based navigation is difficult due to lack of distinctive micro-features such as SIFT and SURF. Intelligent Automation, Inc. (IAI) and GRASP Laboratory at the University of Pennsylvania propose a Bio-Inspired Visual Navigation System with the following… more
Abstract:ABSTRACT: Detection of clandestine tunnels and underground facilities is a continuing interest of the US DoD and Customs and Border Protection. Research continues in an attempt to find functional and reliable sensing methods, including seismic methods. Dynamic activity in tunnels emits mechanical… more
Abstract:ABSTRACT: Intelligent Automation, Inc. (IAI) proposes to apply a game theoretic approach to design a robust decision making tool for self defense space systems that integrates realistic system models, distributed sensor management, advanced estimation, and tracking techniques. Our approach uses… more
Abstract:The Navy's role in the Global War on Terrorism (GWOT) has necessitated a variety of activities that require long-term, reliable intelligence, reconnaissance, and surveillance. For tactically relevant applications, the endurance and performance tradeoff remain the limiting factors in determining… more
Abstract:The problem of low ground clearance vehicles being stuck at tracks of highway-rail grade crossings (HRGC) poses a severe safety risk. Vehicles with long wheelbases and low ground clearance are more likely to be stuck on high-profile
HRGCs. Currently there is no commercially available automated… more
Abstract:We propose to develop a next generation radio frequency network channel emulator simulator tool called RFnest-48 that can evaluate a fully-connected wireless mesh network consisting of up to 48 nodes represented using physical devices ("real"nodes) and 200 nodes simulated in software… more
Abstract:ABSTRACT: Current cyber threats analysis and detection techniques based on intrusion prevention/detection, anti-virus and spam filters often offer unsatisfactory security properties. They cannot detect new attacks, have high false negative rate and often identify attacks after they have happened.… more
Abstract:ABSTRACT: Trust and reputation management system has been proven to be an effective method to solve many security issues in Wireless Sensor Networks (WSN). A typical reputation management system evaluates the trustworthy of a sensor node based on historical interactions. However, trust… more
Abstract:This is a supplemental Phase II proposal submitted to DOT for additional funding and performance period extension of the on-going DOT Phase II project (contract # DTRT57-10-C-10027). The overall objective of the Supplemental Phase II effort is to complete the development of the sensor system… more
Abstract:The key innovation of this effort is the development of future traffic demand for Uninhabited Aerial Systems (UAS) given the various missions they intend to fly, and thereafter populating a data warehouse with these projected flights that can be marketed to the aviation community. We propose… more
Abstract:While it has become apparent that we can and will collect data at unprecedented rates thanks to a wide range of high-resolution high-throughput sensors, it has also become apparent that we do not have the algorithms and tools to satisfactorily analyze Big Data. Cloud computing as an infrastructure… more
Abstract:The National Airspace System (NAS) in the United States will become a complex array of commercial and general aviation aircraft, unmanned aircraft systems, reusable launch vehicles, rotorcraft, airports, air traffic control, weather services, and maintenance operations, among others. The Federal… more
Abstract:MetroSim is a Metroplex-based arrival, departure, and surface optimization. Linking with both the NASA-developed Traffic Management Advisor (TMA) tool as well as the NASA-developed System Oriented Runway Management (SORM) tool, MetroSim allows airport planners, traffic flow management experts,… more
Abstract:Usually the lifetime of a trailer is much longer than tractors; tractors must work with a variety types and ages of trailers over the course of their use. In many scenarios (e.g., roadside inspection, border crossing, smart parking, connected vehicle initiative, etc.), it is necessary to identify… more
Abstract:Self-adaptive monitoring systems are highly desirable and demanded in military and civilian application scenarios. In this effort, we leverage our in-house machine learning framework, ABMiner and ontological knowledge representation workbench to address the challenging problem, and propose the… more
Abstract:To support reliable and secure communications, a suitable network analysis tool is needed for accurately and efficiently detecting, diagnosing, and predicting faults in the network. In tactical networks, faults can be very common, and are typically hard and time consuming to detect, isolate and fix.… more
Abstract:Modeling of radar signature of sea targets in dynamic sea states is a critically important problem in developing methods of detection and identification of potentially threatening ships. As most maritime radars operate at X-band, this EM problem has an extremely large electric-size and it is further… more
Abstract:ABSTRACT: The damage and loss caused by attacks and security breaches have drawn attentions to develop secure and reliable systems for embedded systems. Compared to their desktop counterparts, embedded devices are facing more security challenges, such as the more possible physical access to a… more
Abstract:ABSTRACT: In this effort, Intelligent Automation Inc. (IAI) in collaboration with the Stanford University proposes to develop a novel tool for advanced propulsion system design, in particular the open rotor system. The novel design architecture is an enhancement of the Collaborative Optimization… more
Abstract:ABSTRACT: Team training and performance assessment have been explored for decades. However, modern distributed mission operations, i.e., LVC operations, are getting increasingly complex, exceeding the traditional capabilities of separate component solutions, such as mission planning, briefing,… more
Abstract:ABSTRACT: We propose to develop a secure cloud computing environment for infrared (IR) surveillance data gathered by space-based IR sensors. The IR data is typically massive and needs to be made available to warfighters via a very narrow (56k) communication channel. The current point-to-point… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.