Abstract:For many communication applications, the demand for more bandwidth is a never ending problem. Military system applications often can exceed commercial demands by an order of magnitude or more as SIGINT and IMINT data collection and transmission are keys to our National Security. Optical delivery… more
Abstract:For many communication applications the demand for more bandwidth is a never ending problem. Military system applications often can exceed commercial demands by an order of magnitude or more as SIGINT and IMINT data collection and transmission are keys to our National Security. Lasercom systems… more
Abstract:Building upon the Edelman's Neural Darwinism and Damasio's brain model, we propose a framework for creating evolutionary and neurobiologically inspired computational platforms for autonomous vehicle control as well as for applications in the arena of ambient intelligence. Additionally, we propose… more
Abstract:An increasingly common military medical need is the need for in-the-field acquisition of symptomatology, differential diagnosis of diseases potentially previously unseen by the medical professional, and identification of symptoms to the population at large. This need suggests a combination of… more
Abstract:Problems with current radio based incident communications systems include: only VHF or UHF radio technology is used, limited number and range of frequencies, interagency cooperation hampered by incompatible frequencies and devices, terrain causes line-of-site and visibility problems for… more
Abstract:As warfare becomes more technology bound there is a growing threat of misappropriation of software that could disable or hinder US military activities. Constrained Automatic Anti-Tamper System (CAATS) is a complete system of software and infrastructure to deploy the strongest and most advanced… more
Abstract:The Army's CERDEC has identified the need for enhancements to network intrusion tolerance/survivability capabilities of systems currently being developed under the Tactical Wireless Network Assurance (TWNA) program. To address the needs of CERDEC, Architecture Technology Corporation (ATC) brings… more
Abstract:The FCS (Future Combat Systems), WIN-T (Warfighter Information Network-Tactical), and JTRS (Joint Tactical Radio System) programs have all identified the need for secure and survivable ad hoc wireless tactical networks to support the network centric battlefield environment of the future. To address… more
Abstract:The use of Net-Centric Enterprise Services (NCES) to provide ubiquitous access to information within the Department of Defense presents challenges in both the design and implementation of these systems. The need to provide information to the war-fighter in a timely manner while maintaining the… more
Abstract:The US Army has identified the need for intrusion-resistant and survivable ad hoc networks for tactical mobile environments. Architecture Technology Corporation (ATC) brings over 6 years of directly related technology development experience in the areas of ad hoc networks, intrusion tolerance, and… more
Abstract:A lot of work has been done to develop security and QoS techniques for IP networks. However, existing work doesn't provide a complete solution for addressing security and end-to-end QoS provisioning for multimedia flows traversing heterogeneous networks. Thus, there is a need for a system that can… more
Abstract:Architecture Technology Corp. (ATC) proposes a reverse-engineering toolset named AfterShock. This toolset will use dynamic analysis and will build one work done for ATC's static reverse-engineering tool, Earthquake. AfterShock will use Valgrind, an open-source dynamic code modifying tool, to… more
Abstract:We describe an approach to protect programs from differential analysis that is free of some of the drawbacks of traditional techniques. The approach does not rely on program analysis to determine applicability, so it can be uniformly applied to any program. Polymorphic variation in binary software… more
Abstract:Architecture Technology Corporation (ATC) proposes an attack model based on attack paths. An attack path is any sequence of steps in an attack tree that will lead to a successful attack. The model then computes the safety of the program as the minimum cost attack path, "the path of least… more
Abstract:NRC's Committee on Government Data Centers made a set of technology recommendations for data centers meet user needs and develop the long-term record of environmental change. ArC is a low cost scalable Archive Storage Management System that will help NASA respond to the NRC recommendations. The ArC… more
Abstract:"Critical gears and engine bearings in our newest vertical thrust aircraft must operate with absolute reliability under high loads, high heat, corrosive salt air and intervals without lubricant. Current gear and bearing materials meet the design requirements, however, it is desirable to improve the… more
Abstract:Current engine bearing lubrication technology begins to break down at the high rotation speeds, loads and temperatures required for advanced fighter engines. Furthermore, in combat operation bearings may have to operate for short periods with no lubrication, and also resist pervasive corrosive… more
Abstract:The focus of this proposal is to develop BioPhalanx a rapid, hand portable, robust detection system for multiplexed detection of bio-threats, in harsh environments. We have developed a new method of detection called Combinatorial Probe Analysis (CPA), which provides an exponential increase in… more
Abstract:Spray drift is one of the most significant issues presently facing agricultural applicators. Agricultural applicators are committed to the management of chemical drift and take responsibility on a daily basis for making good decisions in the field. Material that drifts off-site is material that is… more
Abstract:STIL-NAVS will use STIL (streak-tube imaging lidar) technology to produce accurate ocean wave field maps. In Phase II, Aret¿ Associates will adapt an existing Aret¿ breadboard sensor. STIL-NAVS is planned to image waves sampled at 36Hz and at a lateral distance of 50m to 150m from a mast height of… more
Abstract:The goal of this SBIR Program is to enhance the AQS-20A computer-aided classification and identification performance by constructively exploiting acoustic and EO sensor measurements. Benefits from this program will accrue to underwater mine countermeasures due to improved probability of mine… more
Abstract:The XSVA is a 24-element vertical array of temperature and conductivity sensors, integrated into a standard sonobuoy, providing continuous estimates of sound velocity over a 72-hour measurement period. In Phase I, Aret¿ Associates demonstrated the key elements of the XSVA array concept. We built… more
Abstract:Aret¿ has developed a CAD / CAC / CAI algorithm for 3D range data collected by the AQS-20A EOID sensor. The algorithm, called Automatic Real-time Computer-Aided IDentification (ARCAID) performs detection, MLO/NMLO classification, shape classification, Mine/Non-Mine/Unknown identification (ID) and… more
Abstract:Aret¿ Associates proposes to develop a novel sensor using thick-film technology to measure variations in the concentration of dissolved hydrogen in the ocean environment. We will employ a unique layout of the classic Wheatstone bridge design that uses screened-palladium metal resistors as the… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.