You are here

Awareness and Recognition of Behavioral Threat within Complex Environments: Detection of Intent from Biomotion Signatures

Award Information
Agency: Department of Defense
Branch: Army
Contract: W911QX-07-C-0030
Agency Tracking Number: A062-071-1068
Amount: $729,934.00
Phase: Phase II
Program: SBIR
Solicitation Topic Code: A06-071
Solicitation Number: 2006.2
Timeline
Solicitation Year: 2006
Award Year: 2007
Award Start Date (Proposal Award Date): 2007-09-26
Award End Date (Contract End Date): 2009-09-30
Small Business Information
727 Airport Boulevard
Ann Arbor, MI 48108
United States
DUNS: 197187602
HUBZone Owned: No
Woman Owned: Yes
Socially and Economically Disadvantaged: Yes
Principal Investigator
 Charles Cohen
 Senior Research Engineer
 (734) 668-2567
 ccohen@cybernet.com
Business Contact
 Charles Jacobus
Title: President
Phone: (734) 668-2567
Email: proposals@cybernet.com
Research Institution
N/A
Abstract

The main focus of our proposed research and technology development is to enhance existing security and surveillance operations by increasing the ability to detect threats and decreasing the resources necessary for those operations. The technology will leverage Cybernet’s enhanced computer vision algorithms to produce an automatic behavior and intent recognition systems that improves the performance of security and surveillance operations. Cybernet and its key personnel have decades of experience in image processing, gesture recognition, behavior recognition, multiple feature and multiple object tracking, and Cybernet has the unique ability to deploy military systems that combine diverse image processing and software solutions with new or existing hardware platforms.For the Phase II, we will create an automated surveillance system (Behavior Detection Module) which consists of an 1) automated tracking system, 2) an intent and behavior recognition system, and 3) open architecture for maximizing compatibility with existing Army (and other military) sensor platforms.Our work plan is based on a spiral development methodology, enabling us to transition systems to the Army early in the Phase II. By releasing the completed and tested technology incrementally, we can more rapidly enhance and augment the security operational missions of the U.S. Army.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government