Abstract:The Joint IED Defeat Organization (JIEDDO) has identified three lines of operations to combat the IED threat: defeat the device, defeat the network, and train the force. While defeating the device is necessary, attacking the network is the only line of operation that supports intervention to the… more
Abstract:Comprehensive COOP strategies have taken on increased emphasis due to evolving threats, including the increasing threat from cyber warfare and terrorism and the ever-present threat from natural disasters and other forms of disruption. As DoD architectures become more net-centric and globally… more
Abstract:Enemy forces are accelerating their use of small, inexpensive, hard-to-detect UAVs, threatening the US intelligence advantage and putting our forces at risk. The need is clear to implement a counter-measure to the proliferation of small enemy UAVs. Use of a High Energy Laser (HEL) to deny the… more
Abstract:The Multiplex Data Bus Controllers, Translator, and Transmitter (MDBCTT) provides open access to aircraft 1553 multiplex bus data via open-architecture standards such as High Level Architecture (HLA) and the Test and Training Enabling Architecture (TENA), among others. The technology to inject 1553… more
Abstract:The is an effort to increase radiation hardness/survivability of microelectronics through innovation of production processes and capabilities by establishing an economically viable low-volume sub-65nm rad-hard foundry CMOS capability based on Digital Beam Processing (DBP) technology. American… more
Abstract:A flexible active matrix image array is of great interest for both military and commercial applications. Such bendable image arrays allow a variable focal plane which eliminates bulky optics. Such image sensor on a non-fragile polymer substrate also enables a large-size, portable X-ray imager for… more
Abstract:Cyber warfare tactics can covertly turn our forces' technological strength into an operational weakness. While much of the attention in both the military and commercial cyber security communities is on abrupt and blunt attacks on the network, the most insidious cyber threat to our forces are subtle… more
Abstract:From 1987-1997, DoD required Ada for every software project where new code generation was more than 30% of the effort. With the decline in Ada's popularity, it has become increasingly difficult to find skilled Ada developers to maintain this legacy code. Code maintainers who don't know Ada typically… more
Abstract:The "see first, understand first, act first, finish decisively" principle requires that military commanders and analysts be provided a complete, up-to-the-second view of the battlefield. Currently deployed full motion video (FMV) sensors provide crucial real-time situational awareness, but suffer… more
Abstract:Considerable investment has been made in defensive cyberwarfare to prevent enemies and potential enemies from penetrating DoD networks. Little investment has been made, however, in training DoD personnel to detect and thwart insider threats to these networks. There are a variety of technologies for… more
Abstract:Effective U.S. counterinsurgency operations, including counter-recruiting efforts, will need to understand and undermine the narratives that insurgents use for recruiting, support, and fundraising, and replace them with new narratives that encourage peaceful engagement. Current insurgent messages… more
Abstract:The duties of modern military personnel often require the completion of challenging tasks, in stressful environments, and with multiple demands competing for the warfighter's focus. Measuring the stress, anxiety, uncertainty, and fatigue (SAUF) of the warfighter during a particular task would have… more
Abstract:The modern military environment is shifting towards the paradigm of network-centric warfare (NCW). NCW harnesses the power of multiple information systems operating concurrently and makes a wealth of information available to the Warfighter, but can result in information overload. As a result, there… more
Abstract:Hemorrhagic shock remains a leading cause of death for soldiers on the battlefield. The first 60 minutes following a traumatic injury is vital to saving lives; therefore, it is critical to provide medical personnel with real time monitoring of soldiers with traumatic injuries. Recent research… more
Abstract:To maximize situational awareness and survivability in littoral environments, Navy submarines must be able to quickly distinguish between hostile targets and similarly-sized non-hostile vessels. Currently, skilled personnel determine if each contact is hostile. This approach is limited by the number… more
Abstract:With the central role that computers and networks play in the DoDs network-centric environment, all warfighters must have the knowledge and awareness of how information assurance (IA) threats and exploits can significantly degrade operational readiness. While IA threats have been recognized for… more
Abstract:The Network-Centric Warfare paradigm will provide Ground Soldiers in the U.S. Army with large amounts of information needed to maintain Situational Awareness and perform successfully in the field. Current information interfaces lack a targeted operational focus and provide a broad superset of data,… more
Abstract:Current trends suggest that in future concepts of operations, ubiquitous sensors will transparently provide ISR and decision support on demand to the warfighter without the need for tasking or querying individual sensors. Before this can happen, however, it is essential to significantly improve the… more
Abstract:The prominent role that space-based assets play in ISR, navigation, communications, and targeting exposes a critical vulnerability for US military operations. To maintain our military dominance, the US Air Force is actively pursuing Space Situation Awareness (SSA) and Defensive Counterspace (DCS)… more
Abstract:Advanced automation capabilities and human-computer interfaces are needed to enhance operator situation awareness and reduce the cognitive work of supervising unmanned vehicle teams in complex airspaces and waterspaces. To address this need, we will design and demonstrate Advanced Replanning and… more
Abstract:Human Intelligence (HUMINT) collectors, whether trained Military Intelligence (MI) experts or Infantrymen, face a transition in the way they collect intelligence from indigenous populations, particularly in Counter-Insurgency (COIN) operations. This transition is driven by the high frequency with… more
Abstract:Cyberspace is a war-fighting domain, and cyber warfare poses a real and significant threat to the security of the United States. Today's nation-state-class attacks target critical software applications and intellectual property via acts of piracy, theft, and reverse engineering. They are… more
Abstract:The U.S. Military relies extensively on space assets to support intelligence, surveillance, communications, and targeting. Effective defensive counterspace (DCS) to protect and defend those space assets begins with the ability to maintain space situational awareness (SSA). The detection and… more
Abstract:Air Traffic Control is a critical function in the U.S. Army, the proper training of which remains of utmost importance to maintain a safe, orderly, and expeditious flow of military air traffic. Fully staffing simulated training exercises with qualified human pilots can be costly and difficult to… more
Abstract:As evidenced by recent events, missile defense remains a crucial component for protecting the United States and her allies from potential long range threats. Modeling and simulation (M&S) is recognized by the Missile Defense Agency as a key enabling technology supporting Warfighters and analysts… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.