Abstract:This Small Business Technology Transfer Phase I research project tests the feasibility of software tools that leverage spatial statistics to enable police personnel to test their theories of criminality against data collected in the day-today activities of policing. Specifically, the research will… more
Abstract:Our adversaries understand the need to limit their exposure time to preying USAF eyes. The enemy hides, exposes only during the briefest of time and then hides again. As the enemy adapts to our technology and finds methods to minimize their exposure, the F2T2EA process had to be compressed from… more
Abstract:The recent outbreak of E. coli only served to remind us of the vulnerability of our food production. It stirred memories of an amateur bio-terror attack using salmonella in local salad bars in an attempt to influence a local election in Oregon. In handling any bio-terrorism event, there are two… more
Abstract:Information overload and cluttered user interfaces cause decreased situational awareness and lowered performance of the human operators. Irrelevant data increases searching times for tasks requiring the identification of threats, causing delayed decisions. Cognitive burden on the user increases as… more
Abstract:Software Agents and Agent Systems are making their way from the university research labs to the mainstream industrial and government markets. We are witnessing a revolutionary change in the computing environments as legacy stove-piped systems are giving way to flexible customizable multi-agent… more
Abstract:There are many challenges in addressing the problem of Political Will. The first is developing a clear, complete, consensual definition of Political Will driven by both theory and field practice. But a larger challenge is deconstructing and unpacking the Political Science and Social Science concept… more
Abstract:In today's complex, multi-dimensional, coalition, effects-based campaigns; commanders must be able to "see" the situation in their decision making tasks. The modern fighting force is privy to an enormous array of intelligence gathering, database, and sensor sources of information to the point of… more
Abstract:We currently have thousands of security cameras in the war zone. Automated Target Recognition (ATR) is essential for reducing the manpower required for monitoring the security cameras. Having human operators staring at video screens for hours at a time is not an effective use of our forces. ATR is a… more
Abstract:Vehicle rollovers continue to be one of the most hazardous and costliest types of crashes among both military and civilian vehicles in the U.S. While rollover crashes only constitute 2.2% of civilian crashes, they make up 33% of the total cost of civilian crashes. An analysis of military mishap… more
Abstract:Alameda Applied Sciences Corporation (AASC) proposes dry, non-toxic, plasma-based hybrid energetic ion deposition and implantation process to prepare highly-dense, corrosion-resistant aluminum on complex geometry aircraft components. By replacing electroplated Low Hydrogen Embrittlement cadmium… more
Abstract:Transparent conductive indium tin oxide (ITO) coatings are used on the canopies of certain USAF aircraft for a variety of electromagnetic functions. However, the aircraft canopies suffer from short service lifetimes and must be replaced often because today's ITO coatings exhibit poor mechanical… more
Abstract:Alameda Applied Sciences Corp proposes to develop a fast pulse, portable, fast neutron source to detect SNM in the field. Our source offers a 20ns neutron pulse with a repetition rate up to 1kHz. The goal is to develop a source with 1000hrs of continuous operation at 1E8 n/s. The Ph I program will… more
Abstract:Alameda Applied Sciences Corporation (AASC) proposes to demonstrate extended service lifetime of space tethers in the Low Earth Orbit (LEO) environment by using Filtered Cathodic Arc Plasma Deposition (FCAPD) to deposit a high quality protective coating onto space tether material. Protective… more
Abstract:Most radio-frequency (RF) particle accelerators worldwide rely on normal conducting RF cavities to accelerate the particle beam. A few large research accelerators such as the Continuous Electron Beam Accelerator Facility (CEBAF) at Thomas Jefferson National Laboratory (JLAB) use superconducting… more
Abstract:Protecting Organic Light Emitting Diodes (OLEDs) from moisture and oxygen remains the key technical challenge for fabricating flexible, solid-state lighting displays with acceptable service lifetimes. Although OLED-based displays on flexible PET polymer substrates have been demonstrated, they… more
Abstract:Radio frequency (RF) cavities, key components in particle accelerators for fundamental high energy physics research, increasingly utilize superconducting technology to achieve higher accelerating field gradients. Traditionally, superconducting RF cavities are made of niobium, which, although… more
Abstract:Presently, commercial and government radiation test facilities do not have convenient, reliable calibration systems for routine, day-in, day-out checks on x-ray and neutron detectors or their filter arrays. Lack of such calibration systems compromises the quality of the testing, and leads to wasted… more
Abstract:AASC's objective is to mitigate the risk of implementing an active interrogation system based upon time of flight measurements. A fast pulse neutron source is a critical component of a time of flight system even at large stand off. This program directly addresses means to control the probe… more
Abstract:Alameda Applied Sciences Corp proposes to further develop its non-line of sight, energetic coating system to deposit protective thin film coatings for polymers in the low earth orbit. Numerous satellites costing $25M to $1B reside in LEO and the lifetime time of the polymers used in these assets is… more
Abstract:Data fusion techniques applied to intrusion detection and network defense have recently shown promise in multi-stage attack detection and network situation assessment. However, to provide full situation awareness, cyber attack impact assessment and future attack prediction must be addressed. 21st… more
Abstract:The ability to efficiently process intelligence data is critical to fighting the global war on terror. A major source of this data is recorded speech. Therefore, the performance of speech processing applications (speech recognition and speaker identification applications, for example) depends on… more
Abstract:The autonomy of Unmanned Systems (UMS) must increase if they are to be fully leveraged by small military units. Current unmanned systems require at least one human operator per platform to function in a combat environment, preventing small military units from deploying UMS teams for collaborative… more
Abstract:21st Century Technologies (21CT), is proposing the development of DOCS (Document Classification and Summarization System), a document management system which applies natural language processing (NLP) techniques to provide a cross-domain solution (CDS) for document dissemination. DOCS will utilize… more
Abstract:The proposed Theory and Application of Foveated Acquisition and Tracking (TAFAT) effort will develop both the theory and the application of target acquisition, tracking, and recognition for high-speed digitally foveating cameras. Digitally foveating cameras offer fundamentally new capabilities that… more
Abstract:According to the Iraq Study Group, US Forces must continue to support Iraq to prevent the government from falling and being influenced by neighboring countries (Syria and Iran) and to prevent a propaganda coupe for Al Qaeda and the spread of radical Islam. Our soldiers, marines, and sailors are… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.