Abstract:ABSTRACT: We propose to develop cost and growth-rate models quantifying the capability for Soraa's proprietary SCoRA ammonothermal reactor and associated procedures to produce bulk GaN with low threading dislocation defect concentrations. The new apparatus and methods will enable major… more
Abstract:DESCRIPTION (provided by applicant): Hospitalized patients faced with sudden inability to speak (e.g., patients with tracheal intubation) are unable to verbalize even the most basic comfort and care needs, or their urgent safety needs. These patients and nursing staff must consequently resort to… more
Abstract:Decision makers responding to homeland security incidents must rapidly integrate and manage dynamic, time-sensitive information
from many heterogeneous and multimodal information sources. Responders access this information through numerous software
applications, all while attempting to collaborate… more
Abstract:Emergency responders are tasked with maintaining awareness of a massive number of disparate pieces of information, garnered through a broad
variety of electronic sources (e.g., emergency alerting systems, semi-structured RSS feeds, computer-aided dispatch). To be effective, these responders
Abstract:Obtaining support from the local population is crucial for successful counterinsurgency (COIN) operations. US forces often fail to adequately understand the ethnographic characteristics of foreign populationswarfighters need access to ethnographic methods which help them to rapidly capture and… more
Abstract:The amount of new malware encountered daily is accelerating at an unprecedented rate, an explosion that is also reflected in target and attack vector diversity. There has also been a dramatic increase in the use of malware kits, a problem in its own right because kits allow adversaries to easily… more
Abstract:ABSTRACT: Networked PCs are critical to the success of data-based missions, and the complex software they execute is both the source of their power and their prime area of vulnerability. Applications and services are often composed of multiple software components developed by different vendors or… more
Abstract:Artificial diversity attempts to eliminate the security risks of the IT monoculture. The goal of artificial diversity is to minimize the number of common vulnerabilities across a set of systems by intentionally introducing variations to the structure and process of functionally-equivalent software.… more
Abstract:Submarine commanders must make rapid decisions to carry out increasingly complex missions, while sifting through ever larger masses of information. The scope and complexity of submarine missions has grown such that submarines are now expected to fully participate in net-centric environments and… more
Abstract:While intelligent tutoring systems (ITS) have been shown to improve learning outcomes, Navy training programs have not fully adopted this promising technology because of the costs involved in developing and maintaining them. The key technical contributions of this effort are a set of tools backed by… more
Abstract:Uncertainty on the modern battlefield makes mission planning and decision making extremely complex for field commanders. Mission planners can be aided by initial and ongoing situation assessment, future state estimation, assessment of the current plan"s probability of success, what-if analysis,… more
Abstract:Modern military and security scenarios increasingly demand rapid evaluation of human affective states, accurately detecting stress, anxiety, uncertainty, and fatigue (SAUF) to assess warfighter effectiveness or to advance security screening and interrogation objectives. In our Phase I effort, we… more
Abstract:The proposed Automated Linguistic Analysis Revealing Misrepresentation and Messaging (ALARMM) system significantly advances the state of the art in detecting deception in unstructured data such as websites and chat messages. Our research focuses on automated techniques based on linguistic theory… more
Abstract:Minimally invasive surgery (MIS), including laparoscopic surgery (LS), is beneficial in terms of the improved recovery of the patient, including shorter convalescence times, less postoperative pain, and less scarring. Training surgeons in these new techni
Abstract:Peer support for Warfighters who have suffered traumatic amputation can significantly improve recovery. While peer support is readily available in military treatment facilities (MTFs), veterans with these injuries must continue recovery after leaving the MTF. Unfortunately, veterans in remote areas… more
Abstract:Despite advances to intelligence, surveillance, and reconnaissance (ISR) capabilities, intelligence analysts in the theater cannot achieve true multi-INT exploitation and cross-cueing due to the stove-piped nature of fielded ISR systems. Current ISR systems: 1) force human-to-human interaction to be… more
Abstract:Social network analysis is a powerful method for making sense of an increasingly interconnected world. Developing social network analysis tools requires datasets with which to test them, but sharing datasets is problematic because of privacy issues. Initial attempts to anonymize network datasets… more
Abstract:Missile defense takes place in a dynamic, uncertain environment. Multi-raid attacks threaten to overload sensor capabilities, leaving fewer sensor resources free to observe each target complex. Moreover, the shift in emphasis toward early intercept, coupled with the growing importance of short- and… more
Abstract:Warfighter cognitive readiness has grown increasingly important as the emphasis of military operations shifts towards asymmetric and unpredictable irregular warfare and changing military doctrine provides the Warfighter with greater autonomy. In modern operations, Warfighters must make decisions… more
Abstract:Despite improvements in procedural assessment and training, little advancement has been made in enhancing cognitive readiness, the mental preparation needed to flexibly sustain high levels of performance in unpredictable combat environments. Existing assessment tools, including psychological… more
Abstract:The modern Warfighter is augmented with complex operational systems to improve his situational awareness, increase his performance range, and act as a force multiplier. However, these new systems often come at the price of increased cognitive workload on the part of the Warfighter, and they may even… more
Abstract:Tactical command staffs supporting counterinsurgency and counterterrorism missions are faced with the need to collect and consider not only traditional intelligence about adversaries, but also human socio-cultural and behavioral (HSCB) information about t
Abstract:Human Socio-Cultural Behavioral (HSCB)-based models have the potential to help tactical commanders assess situations and project consequences of actions in counterinsurgency (COIN) missions. Unfortunately, the potential utility of these models been limited due to a lack of area of interest (AOI)… more
Abstract:Intelligence analysts"ability to visualize, understand, and reason about terrorist organizations and other covert groups is limited by the current state of the art in network analysis techniques and tools. These techniques and tools work with homogeneous networks that consist of single types of… more
Abstract:While existing tools such as Carnegie Mellon"s Organizational Risk Assessment (ORA) system provide ways to conduct rapid meta-data social network analysis by automatically extracting information from data and performing predictive analysis, purely automated approaches to network construction… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.