Abstract:ABSTRACT: Historically, fiberglass/composite manufacturing processes were focused on the fabrication of structural/mechanical subcomponents. For UAVs this would include components such as wings, fuselage, and panels. To accommodate electronic functions, appliques are used with certain antennas.… more
Abstract:An energy recovery reverse osmosis pump (RO) capable of delivering 16,000 gallons per day is proposed. The final product after the Phase II option will be a titanium pump to reduce the weight and enhance the corrosion resistance. The new RO pump will provide potable water using the most efficient… more
Abstract:ABSTRACT: This proposal is aiming for sensor integration into small form-factor applications, such as helmet mounted systems (HMS) and small uninhibited air vehicles (UAV), by demonstrating the concepts of a curved sensor array for vision system (CSVS) capable of being integrated to small form… more
Abstract:ABSTRACT: This proposal is to develop a curved flat panel microdisplay for the purpose of simplifying optics and reducing the weight of the optical system in near eye head-mounted systems, 3D and other projection designs. The curved image generation is achieved by fabricating AMOLED directly on the… more
Abstract:To defend against cyber adversaries, we need to disrupt the adversary's mission, so they no longer have the advantage. Because the battlefield in the
cyber defense arena is a computing system under the defender's control, we have the opportunity to prepare the battlefield in a way that tilts… more
Abstract:The ability to reliably track and recognize individuals inside a security perimeter is a critical component of next-generation distributed security
systems. While state-of-the-art surveillance systems can reliably track pedestrians in sparse, static environments with minor occlusions and few… more
Abstract:Transportation Security Officers (TSOs) are tasked with exploiting x-ray inspection systems to detect potential threats. To ensure the safety and
security of the traveling public and to ensure efficient operation, TSOs must maintain a 100% probability of detection (Pd) rate while… more
Abstract:ABSTRACT: Recent years have seen an explosion in the number and sophistication of malware attacks. The sheer volume of novel malware has made purely manual signature development impractical and has led to research on applying machine learning and data mining to automatically infer malware… more
Abstract:The Army has a clear need for an unmanned ground vehicle (UGV) capable of autonomously accompanying a single soldier or vehicle. Such a UGV would help solve both logistical problems of soldiers needing to transport more equipment and supplies than they can carry in a backpack, and tactical problems… more
Abstract:ABSTRACT: Networked PCs are critical to the success of data-driven missions, and the complex software they execute is both the source of their power and their primary vulnerability. Applications and services are often composed of multiple software components developed by different vendors or open… more
Abstract:Military personnel are asked to interact effectively, under stress, with individuals from both similar and dramatically different backgrounds and cultures. The desire for automated, operationally deployable capabilities to improve such interactions has created an interest in the development of… more
Abstract:Training first responders to efficiently select and effectively carry out emergency medical procedures in dynamic, highly stressful, and novel environments remains a challenge. Many traditional training techniques focus on frequent repetition and memorization of basic lifesaving tasks. However,… more
Abstract:Post-deployment psychological health issues such as posttraumatic stress disorder (PTSD), substance abuse, and comorbid stress and anger management disorders are experienced by substantial numbers of our past and returning Veterans. Fortunately, a number of proven, evidence-based treatments have… more
Abstract:Increasingly, tactical personnel such as CoISTs, are responsible for making qualitative judgments of local conditions, or"atmospherics,"to provide insight to decision-makers in their unit as well as in higher echelons, despite a high op tempo and limited training. Tactical personnel must… more
Abstract:Company intelligence support teams (CoISTs) must successfully collect, analyze, report, and disseminate soft information from numerous heterogeneous sources through a variety of software applications, all while collaborating with other CoISTs and Battalion intelligence officers. To support these… more
Abstract:Counter-insurgency (COIN) and irregular warfare (IW) missions have placed an emphasis on the role of tactical intelligence. Increasingly, tactical personnel such as Company-Level Intel Support Team (CoIST) members are responsible for assessing situations, providing insightful intelligence reports to… more
Abstract:A key challenge to higher level information fusion is fusing data originally collected for disparate tasks. Although much data may be available, data collected for a particular task may not be well suited to subsequent tasks because it embodies biases inherent in the original data collection process… more
Abstract:A wealth of sensor data is available to address the information needs of tactical Warfighters. However, this data resides in diverse, large, remote data stores. Delivering actionable information to the Warfighter requires discovering the relevant sources, retrieving relevant information, integrating… more
Abstract:As cyber attacks become increasingly and more effectively targeted, so must our cyber defenses become less"one size fits all."We need to develop active defenses that can adapt themselves to an attack in progress. This development will require not only improvements in our detection… more
Abstract:Cyber defenders must interact with a variety of diverse feeds and explore network information in many abstract contexts. Unfortunately, existing digital tools provide poor affordances for the perception and manipulation of critical metrics of network trustworthiness, unnecessarily complicating the… more
Abstract:ABSTRACT: Assured Cloud Computing is needed by US Cyber Command to implement the USAF vision of global vigilance, global reach, and global power. When an Air Force application runs in a third-party"gray"cloud, the trustworthiness of the application is of special concern because there is… more
Abstract:ABSTRACT: Although Partial Task Trainers PTTs have been shown to have a cost savings of 60 percent over training on actual systems, they routinely cost the government in manpower, maintenance, and upgrades. Furthermore, PTTs are often designed for general use, failing to address the individual… more
Abstract:ABSTRACT: In a growing number of current and near-future Air Force mission contexts, Head and Helmet Mounted Displays (HMDs) are providing critical information for pilots and warfighters. The recent availability of stereoscopic HMD technology provides an additional visual dimension to reduce… more
Abstract:ABSTRACT: Intelligence analysts across the Department of Defense identify and act on threats to national security. Their analyses must encompass both individuals and groups of potential interest, which analysts can identify by examining discourse in communications made by individuals through blogs,… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.