Abstract:This Small Business Innovative Research (SBIR) Phase II project will further develop HunchLab -- software tools that leverage spatial statistics to enable police personnel to test their theories of criminality against data collected in the day-to-day activities of policing. The preceding Phase I… more
Abstract:Multi-UAV supervisory control and UAVs operating along side of manned operations in the terminal approach area will not occur until improvements are made in UAV mission management. Indeed, the Air Force Scientific Advisory Board indicated that significant advancements needed to be made in the realm… more
Abstract:The United States has a mechanized military that relies heavily on fuel availability. Delivering large quantities of fuel is a logistical burden. Besides the cost of the fuel itself, we must transport it, store it, and protect it. Fuel convoys are large targets moving along predicable paths. They… more
Abstract:In an Urban Search and Rescue (USAR) situation, the ability for the rescuers to maintain an accurate and comprehensive situational awareness is critical to allow them to maximize their effectiveness in a chaotic and dangerous environment. Timeliness is paramount to saving lives, and… more
Abstract:Understanding shallow underwater environment is increasingly important, but shallow water acoustic models depend on a large number of factors that interact in a non-linear fashion. There are many different acoustic back scatter models, but many of the models haven't changed in years and some of the… more
Abstract:The potential of cell phone use in asymmetric operations against coalition forces has grown exponentially and has expanded well beyond the now-familiar IED detonators. The ubiquitous cell phone is the easiest way for insurgents to communicate in order to coordinate attacks and reconnoiter facilities… more
Abstract:The Navy's conversion to a 'Rapid Response - Force Protection' tactical mindset due to asymmetric threats requires a change in hardware to support the new tactics. Exposing a potential adversary's intent is key to determining the actions a commander should take. Unfortunately, with regards to aerial… more
Abstract:Dependable electrical power is critical for complex weapon systems. An advanced diagnostic and prognostic capability would improve the Navy's fight-through capability. 21st Century Systems, Incorporated is teaming with the University of Missouri - Rolla and Qualtech Systems, Incorporated to continue… more
Abstract:The essence of information assessment is the process of distinguishing signals from noise. In the military, intelligence analysts are constantly searching for signals that might suggest an adversary's intentions. In each case, the analyst must search through a quantity of data, searching for… more
Abstract:Alameda Applied Sciences Corp proposes to develop a fast pulse, portable, fast neutron source to detect
SNM in the field. Our source offers a less than 100ns neutron pulse with a repetition rate up to 100Hz. The goal is to develop a source with 1000hrs of continuous operation at greater than 1E8 n/s… more
Abstract:Increasingly, superconducting radio-frequency (SRF) technology is replacing conventional copper radio frequency (RF) technology in new and upgraded particle accelerators. SRF cavities consume less power than conventional cavities to produce a given accelerating gradient, leading to smaller… more
Abstract:Relative to conventional RF-based accelerators, Laser Wakefield Acceleration (LWFA) has demonstrated a quantum leap in electron beam acceleration over a given length. This technology is poised to bring high energy electron beams within reach of a host of new applications in research, industry, and… more
Abstract:The proposed Spotter effort develops the algorithms necessary to exploit large format (LF) imagery in an operational environment with layered sensor platforms by cueing high-resolution sensors in order to reduce downstream data volume. In order to support analysts conducting intelligence,… more
Abstract:Cyber networks are a critical part of the nation's security. Not only do cyber networks protect critical and sensitive information, they also enable vital functions both in the U.S. and abroad, in the military as well as in the commercial realm and are therefore a valuable target for international… more
Abstract:The Department of Defense (DoD) requires an automated process to aid the timely dissemination of information to those with need to know without exposing secure information. Though security requirements often take a higher priority than users' need for information, it is also imperative that… more
Abstract:The transition of Department of Defense (DoD) infrastructure to a Net-centric Enterprise Services (NCES) architecture on a Global Information Grid (GID) is dramatically increasing the connectedness between military, civilian, and intelligence personnel and the networks they employ. With the… more
Abstract:21st Century Technologies (21CT) proposes PRESAGE, a fast, mobile, and robust computational tool for automated analysis of extremely large sets of unstructured information to assist commanders in proactively responding to asymmetric threats. Understanding and influencing the sympathies of the… more
Abstract:21st Century Technologies, Inc. (21CT) presents the Human and Unmanned Teaming for Tracking Elusive Dismounts (HUNTED) effort. HUNTED gives small units direct control over a coordinated team of two or more unmanned systems (UMS) to perform superior search, detection, and tracking of elusive… more
Abstract:Foveated imagery is ubiquitous in nature, and foveating sensors offer the potential for superior performance in artificial vision systems. However, technical and user acceptance barriers caused in part by a lack of mature theory currently hinder the exploitation of foveated imagery on the… more
Abstract:According to the Iraq Study Group, US Forces must continue to support Iraq to prevent the government from falling and being influenced by neighboring countries (Syria and Iran) and to prevent a propaganda coupe for Al Qaeda and the spread of radical Islam. Our soldiers, marines, and sailors are… more
Abstract:The ability to efficiently process intelligence data is critical to fighting the global war on terror. A major source of this data is recorded speech. Therefore, the performance of speech processing applications (speech recognition and speaker identification applications, for example) depends on… more
Abstract:DESCRIPTION (provided by applicant): Since the earliest examination of cellular structures, biologists have been fascinated by observing cells using light microscopy. The advent of fluorescent labeling technologies plus the plethora of sophisticated light
microscope techniques now available make… more
Abstract:DESCRIPTION (provided by applicant): In this proposal we respond to the call by the National Institute of Environmental Health Sciences (NIEHS) in the PHS 2007-2 Omnibus Solicitation for new products/devices, tools, assays to improve our ability to precis
ely measure environmental exposures to… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.