Abstract:While it has become apparent that we can and will collect data at unprecedented rates thanks to a wide range of high-resolution high-throughput sensors, it has also become apparent that we do not have the algorithms and tools to satisfactorily analyze Big Data. Cloud computing as an infrastructure… more
Abstract:The National Airspace System (NAS) in the United States will become a complex array of commercial and general aviation aircraft, unmanned aircraft systems, reusable launch vehicles, rotorcraft, airports, air traffic control, weather services, and maintenance operations, among others. The Federal… more
Abstract:MetroSim is a Metroplex-based arrival, departure, and surface optimization. Linking with both the NASA-developed Traffic Management Advisor (TMA) tool as well as the NASA-developed System Oriented Runway Management (SORM) tool, MetroSim allows airport planners, traffic flow management experts,… more
Abstract:Usually the lifetime of a trailer is much longer than tractors; tractors must work with a variety types and ages of trailers over the course of their use. In many scenarios (e.g., roadside inspection, border crossing, smart parking, connected vehicle initiative, etc.), it is necessary to identify… more
Abstract:Self-adaptive monitoring systems are highly desirable and demanded in military and civilian application scenarios. In this effort, we leverage our in-house machine learning framework, ABMiner and ontological knowledge representation workbench to address the challenging problem, and propose the… more
Abstract:To support reliable and secure communications, a suitable network analysis tool is needed for accurately and efficiently detecting, diagnosing, and predicting faults in the network. In tactical networks, faults can be very common, and are typically hard and time consuming to detect, isolate and fix.… more
Abstract:Modeling of radar signature of sea targets in dynamic sea states is a critically important problem in developing methods of detection and identification of potentially threatening ships. As most maritime radars operate at X-band, this EM problem has an extremely large electric-size and it is further… more
Abstract:ABSTRACT: The damage and loss caused by attacks and security breaches have drawn attentions to develop secure and reliable systems for embedded systems. Compared to their desktop counterparts, embedded devices are facing more security challenges, such as the more possible physical access to a… more
Abstract:ABSTRACT: In this effort, Intelligent Automation Inc. (IAI) in collaboration with the Stanford University proposes to develop a novel tool for advanced propulsion system design, in particular the open rotor system. The novel design architecture is an enhancement of the Collaborative Optimization… more
Abstract:ABSTRACT: Team training and performance assessment have been explored for decades. However, modern distributed mission operations, i.e., LVC operations, are getting increasingly complex, exceeding the traditional capabilities of separate component solutions, such as mission planning, briefing,… more
Abstract:ABSTRACT: We propose to develop a secure cloud computing environment for infrared (IR) surveillance data gathered by space-based IR sensors. The IR data is typically massive and needs to be made available to warfighters via a very narrow (56k) communication channel. The current point-to-point… more
Abstract:Intelligent Automation, Inc. proposes an innovative visualization tool that transforms online GIS mappers into a climate impact assessment and planning tool that allows planners to visualize the impact of storm surges with sea level rise and coastal erosion using a 3D virtual city. The goal is to… more
Abstract:Good hearing is critical to understanding verbal communications, and to auditory situational awareness in military training and on the battlefield. Also, hearing protection is critical to the health and safety of those exposed to hazardous noise. In veteran"s compensation cases, Tinnitus and… more
Abstract:Physical and manufacturing limitations have now slowed single processor performance gains. Increasingly, the additional devices afforded by increasing transistor density have been allocated to additional computing cores. A significant legacy library of software components and applications already… more
Abstract:ABSTRACT: The effectiveness of current and future tactical aircraft increasingly depends on their ability to exchange information. Existing waveforms such Common Data Link (CDL) must be enhanced with mesh networking capabilities to meet desired efficiency, flexibility, and reliability requirements… more
Abstract:ABSTRACT: The United States Space Surveillance Network (SSN) is a critical part of the US Strategic Command's (USSTRATCOM) missions and involves detecting, tracking, cataloging and identifying the numerous artificial objects of various natures orbiting the Earth. The modernization requirement… more
Abstract:IAI and its transition partners, Raytheon BBN Technologies and Raytheon Integrated Defense Systems, propose the Hermes framework and toolkit for cyber security assessment and evaluation tests, which facilitates test exercises in managing, processing, and analyzing large logging datasets from… more
Abstract:Cyber assets usually support missions with different priorities. How to effectively evaluate the health of a network and its ability to achieve the overall mission is critical to ensure mission success. In this effort, Intelligent Automation, Inc. proposes"CREACT", a set of advanced… more
Abstract:Cyber intrusion and anomaly detection techniques suffer from their reliance upon the presence of known malicious signatures or unusual conditions that warrant further investigation. The use of signature-based detection cannot effectively eliminate false negatives when dealing with advanced… more
Abstract:Cyber security analysts are inundated with heterogeneous threat feeds created by different kinds of cyber security monitoring tools such as Snort, Nessus, Symantec etc. There is a need for streamlining threat analysis to help operators focus on prompt identification and comprehension of security… more
Abstract:This effort proposes a comprehensive framework to design and develop an intelligent, dynamic and real time traffic monitoring/filtering system to identify and covertly divert suspicious/malicious traffic (within an enterprise network) to specific locations for further analysis and to ensure… more
Abstract:The Department of Defense (DoD) has initiated a Data-to-Decisions (D2D) program to develop an open-source architecture system that enables rapid integration of existing and future data exploitation tools to achieve a new paradigm in the management and analysis of data. Big Data solutions, e.g.,… more
Abstract:With the fast growth of web data and HUMINT reports, intelligent analysts need the capability to rapidly monitor and analyze event information in those massive amounts of unstructured textual data, in order to achieve and maintain persistent Situational Awareness (SA). Intelligent Automation, Inc.,… more
Abstract:The Department of Defense and owners of large, commercial enterprise networks need excellent tools and well trained personnel to enforce cyber-security and counter cyber-attacks. This proposal focuses on supporting security personnel to have great Situational Awareness and training to help them use… more
Abstract:Intelligent Automation, Inc. proposes a novel state of the art Programmable Disassembler and Reassembler (PDR) system. The PDR enables utilization of unused spectral bandwidth by distributing bandwidth over multiple frequencies/paths and then reassembling at the destination with little bandwidth… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.