Abstract:This proposed research is to investigate and validate Software Defined Radio (SDR) based, multi-function portable network sensing and intrusion detection algorithms suitable for small dismounted radio platforms used to support Command and Control (C2) standard sensor interfaces carried in the field… more
Abstract:We propose to develop and implement a set of algorithms within a unified target characterization and correlation framework capable of operating in a multiple heterogeneous sensor environment where detection, classification, localization and track priority information is exchanged among multiple… more
Abstract:Simulation tools that exist today for prediction of cosite interference in complex RF environments are able to accurately model complex platforms but they are quickly constrained by computational limits on traditional workstations. The focus of this research will be on updating existing… more
Abstract:DESCRIPTION (provided by applicant): Liver fibrosis is a form of scar formation that is found in almost all patients with chronic injury to the liver. Over time it frequently progresses to cirrhosis, an end-stage lethal disease which is the seventh leadingcause of death in the United States and… more
Abstract:DESCRIPTION (provided by applicant): The renin-angiotensin-aldosterone system (RAAS) plays a critical role in renal physiology. Inhibitors of angiotensin-converting enzyme (ACE) or angiotensin receptor blockers (ARB) are the mainstay in the clinical management of renal disorders such as chronic… more
Abstract:DESCRIPTION (provided by applicant): In Phase 1, measuring and characterizing glucose oscillations in yeast cells immobilized on the surface of a glucose sensor was completed. Using this as a model, it was postulated that within the subcutaneous environment, cells (e.g., fibroblasts, adipocytes)… more
Abstract:An emerging consensus in engineering holds that aleatory uncertainty should be propagated by traditional methods of probability theory but that epistemic uncertainty may require methods that do not confuse incertitude with variability by requiring every possibility be associated with a probability… more
Abstract:Two methods for analyzing software security risks are dynamic application security testing (DAST) - an outside in perspective - and static application
security testing (SAST) - and inside out perspective. Both have shortfalls. DAST findings do not give insight into the root cause, making… more
Abstract:ABSTRACT: As networked computing becomes more and more critical to the US government and US corporations, it is crucial to protect them against new and unknown threats. The field of trusted computing has grown to provide assurances that the software on a computing system has not been tampered. … more
Abstract:ABSTRACT: Enterprise wide data exfiltration will be prevented by designing and implementing a method to protect files based on logical group membership. Anyone outside that group without the group key(s) will be unable to decrypt the data. LEG will provide an automated approach to ensure… more
Abstract:The current testing methods of the NIST Security Content Automation Protocol (SCAP) Validation Program are largely manual and labor-intensive, making comprehensive validation of SCAP-enabled IT security products difficult and time-consuming. ATC-NY will design and develop the Automated SCAP Tool… more
Abstract:ABSTRACT: Development and deployment of airborne multistatic radar systems and the algorithms that control them can be greatly aided by accurate modeling and performance prediction. Capturing physical, electromagnetic and environmental real-world effects of multistatics in a simulation capability… more
Abstract:ABSTRACT: Today"s analysts have an exceptional amount of GMTI intelligence readily available to them for servicing Requests for Information (RFI) because of the growing plethora of GMTI collection systems and multiple forensic data archives; however, only a small fraction of this GMTI is… more
Abstract:ABSTRACT: The challenge set by Fully Adaptive radar tech techniques is how to best optimize all of the possible radar settings all of the possible transmit and receive degrees of freedom to maximize radar performance. The available degrees of freedom, including transmitter parameters such as… more
Abstract:Our objective is to develop an innovative cognitive knowledge-aided information processing framework to take very high rate intelligence data streams over wide areas and autonomously highlight AOIs and targets for the image analyst without a priori knowledge of the area or location of the individual… more
Abstract:ABSTRACT: Clear Science Corp. proposes to develop and demonstrate accurate and computationally efficient analysis software for computing aircraft store trajectories and quantifying the risk of trajectory deviations resulting from unsteady flow in the weapons bay. The software will include… more
Abstract:Clear Science Corp. and the University of Texas at Austin will develop and demonstrate technology that accurately quantifies aero-optical distortion associated with high-energy laser (HEL) weapons on rotorcraft and will utilize the information in designing adaptive optics (AO) systems to maximize… more
Abstract:ABSTRACT: Clear Science Corp. and Princeton University propose to develop and demonstrate software that accurately and efficiently simulates the full set of physics associated with aircraft flight operations. The critical attributes of the proposed framework are accuracy, computational efficiency,… more
Abstract:DESCRIPTION (provided by applicant): The merging of cell culture and microfluidic technology has resulted in improved in vitro models for toxicity studies, drug development, and biomedical research. The reason for which microfluidic approaches provide a more accurate in vitro model of in vivo… more
Abstract:ABSTRACT: Warfighters need to be able to trust the systems on which their lives depend. Cases include an individual human trusting an individual computer, an individual computer trusting a server or network to which it is connecting, a server or network trusting an individual computer connecting to… more
Abstract:ABSTRACT: The overall objective is to enable users on-the-move to reliably and securely send and receive information, targeted for recipients? geographic locations, filtered on their credentials, made persistently available if so designated, and tailored for their devices, facilitating their rapid… more
Abstract:DESCRIPTION (provided by applicant): This Lab to Marketplace SBIR Phase I Phase II Fast Track Application has as its long- term objective to establish ultrasound as a safe, effective, and non-invasive method for assessing fracture risk, an important component in clinical management of osteoporosis.… more
Abstract:This Small Business Innovation Research (SBIR) Phase I project has as its long range objective development of a portable and non-invasive 'ocean-ready' ultrasound device for measuring dolphin bone mineral density (BMD), as a means for assessing and monitoring dolphin and ecosystem health.… more
Abstract:Diamond Visionics proposes a solution to decouple rendering channels from simulators and displays by developing a novel architecture consisting of both hardware and software. Modern video processing and networking techniques will be utilized such that any display in the system can be connected to… more
Abstract:The utility of stereoscopic 3D image representation in many applications is now well established. It is not just a matter of stereo being better than 2D, but of stereo being necessary to interpret representations of complex data sets, physical phenomena, engineering designs and position in space. … more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.