You are here
DOD DOD/ARMY DOD/NAVY DOD/DARPA DOD/OSD SBIR 2011.3 4
Navy
Defense Advanced Research Projects Agency
Office of the Secretary of Defense
NOTE: The Solicitations and topics listed on this site are copies from the various SBIR agency solicitations and are not necessarily the latest and most up-to-date. For this reason, you should use the agency link listed below which will take you directly to the appropriate agency server where you can read the official version of this solicitation and download the appropriate forms and rules.
The official link for this solicitation is: http://www.acq.osd.mil/osbp/sbir/solicitations/sbir113/
Release Date:
Open Date:
Application Due Date:
Close Date:
Available Funding Topics
- A11-119: High Rate High Energy Storage Devices
- A11-120: Clean Electromagnetic Environment (EME) Generation
- A11-121: Body Wearable Radio Direction Finding (DF) Antenna
- A11-122: Therapy for Secondary Lymphedema
- A11-123: Maintenance of Tissue Metabolism for at Least 3 Hours between 20-28oC with an Asanguinous Fluid
- A11-124: Provide Human Reticulocytes for in vitro Culturing of Malaria Parasites
- A11-125: Multiplex Immunoassays in the Development of Vaccines Against Enteric Pathogens
- A11-126: Energy Reducing, Ruggedized, Solar Lighting System
- A11-127: First Generation of Controlled-Release Bacteriocins/Anti-Microbials
- A11-128: Lightweight Material for Full-Scale Parachutes
- A11-129: Methodologies and Algorithms for Ground Soldier Load and Route Selection Decision Applications
- A11-130: High-Efficiency Energy-Harvesting Battery Charger/Storage Unit
- A11-131: Aviator Mission Tasker of Distributed Unmanned Assets
- A11-132: Low-Profile Wideband SATCOM Antennas (LPWSA) for Airborne Platforms
- A11-133: Statically Operated Ramjet
- A11-134: Nanostructured High Performance, High Angle of Incidence Anti-Reflection Coatings
- A11-135: Thermally Responsive Fibers for Environmentally Adaptive Textiles
- A11-136: Nanosatellite Ground Station Communications Phased Array Antenna
- A11-137: Femto Second Laser Adaptive Optics
- A11-138: Cyber Supply Chain Risk Management
- A11-139: Silicon Carbide based 28 VDC Distribution
- N113-171: Long Range Laser Induced Plasma
- N113-172: Innovative tie down
- N113-173: Desktop Software for First Order Approximations of the Effects of Blast and Ballistic Impact on Vehicles
- N113-174: Encapsulation and Delivery of Non-Lethal Malodorant in a 40mm-munition or Hand-thrown Grenade
- N113-175: Optical Perception System for Situational Awareness and Contact Detection for Unmanned Surface Vessels
- N113-176: Multi-Target High Probability of Kill Weapons Engagement
- N113-177: Battery Management, Monitoring and Diagnostic Device for Navy Energy Storage Modules
- N113-178: Investigate Alternate Sealant Materials for Countersunk Fasteners Head and Hole Cavities on Exterior of Submarines
- N113-179: Automated Radio Frequency (RF) Spectrum Management for Wideband Electronic Warfare (EW) Systems
- N113-180: Line-Distributed Hoop Strain Sensor
- N113-181: Advanced Medium-Voltage, High-Power Charging Converter for Pulsed Power Applications
- OSD11-CP1: Enhancing Code Awareness in Software Development Environment
- OSD11-CR1: Adaptive, individualized training assessment capability (AITAC)
- OSD11-CR2: Adaptive Desktop Trainer for ISR Imagery Analysis Based on Contextual Factors
- OSD11-CR3: RPA Simulated Operational Communications and Coordination Integration for Aircrew Learning (SOCIAL)
- OSD11-CR4: Integrated Adaptive SCORM, HLA and DIS Compliant Learning Content Management System
- OSD11-DR1: Contextual Sociocultural Reasoning in Weak Signal Environments
- OSD11-DR2: Collaborative Visual Analytics Approach for Reasoning in Soft Information Fusion Domains
- OSD11-DR3: Visual Representation and Implementation of Culturally Significant Information for Enhanced Tactical Decision-making
- OSD11-DR4: Building Semantic Knowledge of Large Data Sets through Collaborative Visual Approaches
- OSD11-DR5: Innovative approaches to Situation Modeling, Threat Modeling and Threat Prediction
- OSD11-DR6: Discovering Valued Information in a Cloud Environment
- OSD11-DR7: Video Data to DDMS Cards
- OSD11-EP1: Silicon Carbide Device Model Development for Circuit Simulations
- OSD11-EP2: Human Machine Interface to Power and Energy Network
- OSD11-IA1: Anti-Exploitation Software Protection Systems
- OSD11-IA2: Software Deception as a Countermeasure to Attacks on Software Protection Systems
- OSD11-IA3: Identification of Critical Resources and Cyber Threats in the Physical Domain
- OSD11-IA4: Cyber Security High Abstraction Contextual Visualization and Decision Support System
- OSD11-IA5: Deterministic Detection for Hijacked Program Execution
- OSD11-IA6: Active Software Defense to Reduce Threat Capability Effectiveness
- SB113-001: Lightweight Public Key Algorithms (PKA) for Low Power Environments
- SB113-002: Wafer-level Short Wave Infrared (SWIR) Micro-Camera
- SB113-003: Silicon based Millimeter-Wave (MMW) sparse array radiometer receiver for photonic processing
- SB113-004: Advanced Propellants Capable of Controllable and Regulated Burns
TECHNOLOGY AREAS: Ground/Sea Vehicles, Electronics
ACQUISITION PROGRAM: PEO Ground Combat Systems
OBJECTIVE: The objective of this project is to develop new energy storage materials capable of absorbing and delivering large amounts of energy in short periods of time. Phase 1 will investigate the feasibility of various materials, study the ability to absorb energy at very high rates and also deliver large amounts of power to electrical loads. Furthermore, the feasibility studies would provide options for developing and prototyping classes of rechargeable energy storage materials that could be used in munitions power sources to provide the capability of multiple uses in a volumetric efficient format for high power delivery in small and lightweight packages that would meet all military requirements.
Progress has been made in the search for materials and devices that have both a very high power density as well as a very high energy density. Such devices effectively would combine the power density of a capacitor and the energy density of a battery to create the ultimate energy storage medium for portable electronics in general and gun fired munitions in particular. This technology could allow the dumping of a large amount of energy in very short time periods and would allow the simplification of munition power sources from a combination of batteries and capacitors to a single device capable of satisfying the entire power budget. For munitions applications, such a device could be charged completely during the initialization sequence of the round to provide power throughout the entire munition power budget, which would typically last for a few seconds. The energy stored would need to be on the order of 10s of kJs for the intended applications with typical runtimes maxing out on the order of several minutes. Devices capable of meeting these requirements as well as the standard munition environmental requirements would have widespread use among munitions applications.
DESCRIPTION: Power sources for munitions have relatively strict requirements, and consequently are limited to a narrow selection of conventional solutions. These conventional solutions are expensive, large, and will not generally support a significant amount of commercial attractiveness. Reserve batteries are typically utilized in order to meet the 20-year shelf life, but they suffer from reduced power and energy densities because of the separation of electrolyte from the cell, and/or suffer from a limited run time, or power capability depending on the application. It would be desirable to have a device, which could store a large amount of energy over the time period of a few seconds and satisfy the complete munition power budget. Combining the multiple power sources within some munitions maximizes the volumetric efficiency of the munition power source, allowing for high power delivery in small and lightweight package that would meet all military requirements.
This has advantages in munitions since it provides significant flexibility in power system design. Currently, there may be up to three energy storage components in munitions The replacement of these three elements with a single energy storage component would reduce weight and volume and provide system flexibility and would require a rechargeable high power battery with characteristics similar to a high power capacitor but with an energy storage capability of a battery. Identification and production of a suitable high power rechargeable electrochemical power source is the objective of this program. In addition there are operational and military operational temperature requirements (–40 to +145 degrees F), a required shelf life of 20 years and a manufacturability for these power sources. Voltage outputs should extend from a few volts to 2 Kilovolts. There is a lack of suitable solutions to meet the Army munitions needs for rechargeable high power batteries with capacitor-like power delivery capabilities.
PHASE I: Feasibility evaluation of proposed high power high energy storage power will include identification of electrochemical power source materials and suitable engineering architectures to deliver high power and acquire energy at rates similar to high power capacitors. In addition to power delivery performance, capabilities to operate under military conditions – e.g. over wide temperature ranges, and to retain their storage characteristics over a period of 20 years will also be included in the search for suitable chemistries and engineering. The selection will then down select to candidate prototypes for transition to Phase II. The energy storage component will also offer high safety throughout a range of environmental and operational conditions.
PHASE II: Build full-scale rechargeable high power and high energy storage prototypes and test in relevant environments. Demonstrate that prototypes can survive in operational environments while providing voltages from a few volts to up to 2000 volts with the capability of integration into munitions power systems to.
PHASE III: Develop a manufacturing plan for transition from prototypes to low rate initial production. Possibility for application not limited to the realm of munitions. Examples include electric vehicle transportation, high power tools, medical devices, communications and entertainment.
TECHNOLOGY AREAS: Sensors, Electronics
OBJECTIVE: The contractor shall develop a methodology to greatly reduce the occurrence or magnitude of intermodulation products in an RF environment generation system.
DESCRIPTION: The US Army Electronic Proving Ground (EPG) is the Army’s Developmental Tester for tactical electronic warfare (EW) systems. The Army needs these EW systems to be able to operate effectively in very dense and complex Radio Frequency (RF) Environments. In our testing we often are tasked to generate a tailored Electromagnetic Environment (EME) specific to the area of interest for the System Under Test (SUT) or to play out a specific operational scenario. Some scenarios are so specific that a set of signals and protocols, must be transmitted in the correct sequence with the exact content in order to test an SUT. These special signal sets may be transmitted with additional environment signals or they may be in a more benign environment. Often EPG’s goal is to develop a valid signal script for the SUT or area of operation and faithfully transmit this script over the air to immerse the SUT in this desired environment. A natural consequence of generating many signals within a simulator system and then transmitting them through a common amplifier and antenna system is that intermodulation products are produced. These intermodulation products are extraneous, unwanted signals with no universal method to remove them. They take up a percentage of the amplifier’s power. present extraneous signals to the SUT that were not called for in the test, or occur in unauthorized frequencies. One method to partially reduce these unwanted signals is to use higher power output amplifiers but that comes with a much higher price along with increased power draw and cooling requirement. Both of which limits our ability to field EME generation systems.
The goal of this project is to develop a methodology to analyze the signal scripts as a time ordered event list and by knowing which signals are present simultaneously, estimate the intermodulation products that would be produced. Then provide a methodology to greatly reduce or eliminate each of the intermodulation products before it can exit the amplifier. Does knowing the intermodulation products ahead of time give us an opportunity to be able to cancel them out within the amplifier before they are amplified and transmitted? If we did not have a time ordered event list and the mix of signals transmitted were a freeplay scenario of random signals is there a way of stopping these intermodulation products from complicating our transmissions, amplifiers, and environment?
Typical amplifier band breaks for our EME systems would be:
1 – 30 MHz
20 – 500 MHz
500 – 1000 MHz
1000 – 3000 MHz
The successful methodology would allow for quicker EME scenario generation without requiring extensive test equipment to confirm the quality of the environment to be presented. On site operators could use this tool to modify test sequences with less risk involved in producing a poor quality script. In addition it is anticipated that existing test equipment will be use in a larger set of scenarios minimizing the equipment that needs to be supported and fielded for testing.
Although the testing example described here is a rather specialized case EME generation is becoming common in many testing and training applications. EPG also tests tactical radio frequency (RF) networks and their performance in dense urban environments is also an issue. Many urban training sites have been built in the last decade and primary component of the environment is the electromagnetic environment. The training takes in to account the inability to communicate as hostilities escalate so does the use of the RF spectrum and good communications deteriorate just as they are needed most. One of the biggest investments in an urban setting is the Army’s Brigade Combat Team Modernization (BCTM) program is setting up EME generation systems for that training site. Thus numerous opportunities exist in creating EME systems for government testing and training organizations. In the commercial sector the manufacturers of automobiles, aircrafts, ships etc also expose their vehicles to high powered signals and also to dense environments to ensure their control systems are shielded well enough to survive these environments. Again numerous opportunities exist for this technology to greatly reduce costs in the makeup of the EME generation systems. A technology that could reduce or eliminate intermodulation produces would reduce the RF amplifier costs, operation, maintenance, and cooling costs of the entire system.
PHASE I: Determine the technical feasibility for a methodology to eliminate or greatly reduce the magnitude of intermodulation products from signals mixing in an active RF device. Provide a clear path to accomplish this methodology in an automated manner. Show analysis or modeling that proves the viability of the methodology.
PHASE II: Develop the methodology in its automated form to a prototype or proof of concept level for demonstration purposes. By the end of Phase II provide a demonstration of the desired performance enhancement of the methodology to the Government and deliver a final report on all plans and results.
PHASE III: The intention for Phase III is to procure a production ready capability based upon the successful demonstration of Phase II. The form of this capability is unknown at this time but expected to be readily adaptable to existing RF amplifiers and current EPG test operations. There will be many other Government customers for this technology to increase the fidelity and reduce the cost of their own EME generation which has become a backdrop to all manner of test items. This would also benefit military electronic countermeasure systems, Electronic Attack, (EA) to be more efficient and more precise in the target frequency bands. The technology would be adaptable to the next generation EA systems that attempt to surgically target specific signals rather than utilize a wide band barrage of noise. The surgical method would transmit several narrow band signals, each to counter a specific target and this technology would avoid the creation of numerous unintended intermods that parasitically drain power from the intended targets and may unintentionally jam the friendly signals. Commercial applications for this technology would include broadband amplifier manufacturers and manufacturers of multichannel communications systems.
TECHNOLOGY AREAS: Electronics
ACQUISITION PROGRAM: PEO Intelligence, Electronic Warfare and Sensors
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: To develop a practical Body Wearable Radio Direction Finding (DF) Antenna, or “DF Mantenna”, that will provide the soldier with a low profile antenna for tactical environments that performs in the 50 MHz to 500 MHz range with 0dB Gain.
DESCRIPTION: The DF Mantenna is required to provide the desired capabilities without a large visual signature. An antenna mounted on a mast would provide a noticeable, unique appearance in combat environment, along with a likelihood of entanglement with obstructions during Soldier maneuvers. This appearance may bring attention to the soldiers and reveal their mission to observers. Antenna size constraints can result in DF accuracy performance tradeoffs over the frequency bands of interest. In order to overcome some of the possible problems with a mast-mounted antenna, the DF Mantenna could be the solution to resolving these issues.
PHASE I: This SBIR Phase 1 proposal will focus on designing and developing a body-wearable antenna system, such as a one-size-fits-all vest with adjustable straps, with a desired weight of less than 2 pounds. The DF Mantenna will operate in the 50 MHz to 500 MHz range with 0 dB Gain.
PHASE II: During Phase II The DF Mantenna will be developed further to increase its performance capabilities and integrate the design into an actual IOTV (improved outer tactical vest). The DF Mantenna must have the capability to provide an easy to use, user adjustable functionality, to allow the DF Mantenna to cover the 50 MHz to 500 MHz range. The projected cost of the DF Mantenna should not exceed $50,000. The installation of the DF Mantenna into the vest shall not impede the protective capability of the vest. Three prototypes will be provided for government test and evaluation at government selected facilities. Design considerations must be given to future manufacturability and installation into the vest. Additional engineering development will further improve the design to allow the DF Mantenna to be completely integrated into the soldier combat uniform and function properly in the actual combat environment.
PHASE III: Further engineering design efforts will continue to develop the antenna system design further to include manufacturability and additional frequency bands of operation. Emphasis will be on improvements to SWAP (size weight and power). Consideration will be given to integrate the DF Mantenna into other soldier vests and/or soldier ensembles. The integration of the DF Mantenna concept into clothing will have potential application in the non-military, commercial electronics market, as well as with first responders (police and fire fighters) as well as in the construction industry.
TECHNOLOGY AREAS: Biomedical
ACQUISITION PROGRAM: Office of the Principal Assistant for Acquisition
OBJECTIVE: Develop an innovative, curative treatment for secondary lymphedema that will restore the function of the lymphatic vessel system.
DESCRIPTION: Secondary lymphedema is a condition in which blockage or damage to the lymphatic drainage system leads to the retention and build-up of lymphatic fluid in the surrounding tissue. The most common cause of lymphedema in the United States is the surgical removal of part of the lymphatic system in cancer patients, most significantly in breast cancer patients. Chemotherapy and radiation therapy in breast cancer patients can also damage the function of lymph nodes, leading to lymphedema. There are approximately 2.4 million breast cancer survivors in the United States, and each year, about 240,000 women are diagnosed with breast cancer. A recent prospective study found that 42% of breast cancer survivors developed secondary lymphedema within 5 years of their treatment.
Other causes of secondary lymphedema include trauma from burns, surgery, and physical injuries, as well as parasitic infection. Filariasis, a parasitic insect-transmitted infection that is prevalent in tropical regions, is the most common cause of secondary lymphedema internationally. Lymphedema in filariasis infection can progress to a debilitating condition known as elephantiasis.
There is no cure for lymphedema. Quality of life for individuals with lymphedema is diminished. Although lymphedema may be temporary in some cases, chronic lymphedema is an irreversible, debilitating, and lifelong condition that can cause pain and discomfort, disfigurement, skin damage, limb impairments, fibrosis, and recurring risk of infection in the affected tissue. Current treatment options are limited to palliative treatments, including compression sleeves, massage, skin care, bandage wrapping, and exercise.
Recent studies have shown that lymphangiogenesis, or the generation of new lymphatic vessels, can be stimulated by growth factors, such as vascular endothelial growth factor-C (VEGF-C) and angiopoietin-2. Studies combining VEGF-C with other biologics, such as adipose-derived stem cells and autologous lymph nodes, have also demonstrated enhanced lymphangiogenesis compared to VEGF-C alone. The delivery systems tested in these preliminary studies, which were done in animal models, have included novel gel-based systems. Indeed, injectable hydrogel-based systems for drug delivery are a state-of-the-art biomaterials technology, underscoring the potential for developing novel therapies to treat secondary lymphedema.
This topic is seeking to develop and test an innovative curative strategy that will stimulate lymphangiogenesis, resulting in functional lymphatic vessels and restoring lymphatic fluid drainage. An example of a therapeutic strategy would include a combination of molecules or components delivered via an injectable gel, matrix, or other vector that has already demonstrated safety and tolerability in vivo. Administration of the therapeutic will be localized to the affected tissue and will be minimally invasive.
PHASE I: Phase I work will conceptualize the strategy, design the therapeutic system, and test its feasibility. Data obtained in Phase I will provide proof-of-concept that the therapeutic strategy can stimulate lymphangiogenesis using appropriate in vitro cell and tissue culture systems. Assays to test the lymphangiogenic properties of the therapeutic may include lymphatic endothelial cell proliferation, migration, and tube formation and branching. Parameters including optimal concentrations, biological activity, and toxicity will be defined. Appropriate controls will be used. During Phase I, the delivery system will be developed for localized administration in vivo.
PHASE II: Based on Phase I results, Phase II work will demonstrate, optimize and validate the therapeutic strategy in animal models of secondary lymphedema. The FDA approval pathway should be outlined and considered at each developmental stage. Parameters including optimal concentrations, biological activity, and toxicity will be defined. Effectiveness will be determined through histological and/or physiological evidence of lymphangiogenesis and lymphatic flow. Validation of curative success will include the regression or resolution of lymphedema symptoms. During Phase II, clinical experts with insight into relevant patient populations should be consulted during system optimization.
PHASE III: A successful Phase II project will result in a minimally invasive therapeutic modality that restores lymphatic function in secondary lymphedema. During Phase III, additional experiments will be performed as necessary to prepare for FDA review of an IND application. A plan for protection of intellectual property should be created and executed. A detailed market analysis will be conducted, an initial clinical application for the therapeutic will be selected, and a Phase I clinical trial will be initiated. Military application: The therapeutic will be available to service women and men who suffer from lymphedema caused by: treatments for breast or other cancers; burn or other combat- or service-related traumas; and/or infection with filariasis as a result of their deployment in tropical regions. Commercial application: Health professionals worldwide could utilize this therapeutic to treat cancer, trauma, and filariasis patients who suffer from secondary lymphedema.
TECHNOLOGY AREAS: Biomedical
ACQUISITION PROGRAM: Office of the Principal Assistant for Acquisition
OBJECTIVE: To determine if fluids such as transplantation solutions or tissue culture medium have potential as resuscitation fluids with the goal of better preservation of physiological function in the traumatically injured patient in an austere environment as compared to the currently used saline or Hextend®.
DESCRIPTION: Hemorrhage, or rapid loss of blood, is the single greatest cause of morbidity and mortality during combat (9) as well in civilian trauma (13). When more than half of the circulating blood is removed, death quickly ensues if bleeding is not stopped and blood or blood substitutes are not provided. Even after return of oxygen-carrying capacity to near normal, the poor oxygenation and/or nutrient delivery to tissues result in organ damage to the injured. Several reports have indicated some benefit by the addition of single components such as glutamine (21) arginine (4) glycine (22) or estrogen (3). The benefits of hypothermia as protective against hemorrhagic shock are well-known (11, 14, 20), and it has been demonstrated that blood can be replaced in animal models with fluids designed for low temperature preservation of organs (1, 2, 10, 16). However, carrying out hypothermic resuscitation in an austere environment without means to rapidly reduce body temperature is not possible at the present time.
Recently, organ transplant medicine has sought to improve the methods and techniques of organ preservation. Some of these improvements may be applicable to resuscitation medicine. The current approved transplantation fluids have minimal nutrients and rely on low temperature for their hypo-metabolic effect. However, demand for organs for use in transplantation has stimulated new technologies for preserving organs. Examination of recent literature in the area of transplantion surgery indicates that experimental transplantation fluids have been developed. These fluids have shown increases in time-to-transplant, as well as increases in the storage temperature, therefore, reducing the need for cold storage (5-8, 12, 15, 18, 19). The described fluids provide both nutrients and oxygen, which may be the reason for their success. These results indicate that a fluid more complex than saline solutions, yet simpler than blood or plasma, and relatively free of protein and therefore less labile, could legitimately maintain metabolism and tissue perfusion These solutions are asanguinous, i.e. are not derived from blood; therefore any oxygen carrying capacity must be related to its delivery by constituents not based on hemoglobin. In prior research, solutions based on oxygen delivery by hemoglobin were shown not to be efficacious (17); therefore, the solutions of interest should not use hemoglobin as the oxygen transport mechanism.
Desired Capability: The goal of this SBIR initiative is to determine if the advancement in the capabilities of transplantation fluids or other physiologic solutions may lead to their additional use as a resuscitation fluid to extend survivability of the traumatically injured until definitive care can be provided. This is not a solicitation for the development of a fluid, rather it is meant to be an evaluation of fluids designed for organ preservation at ambient temperature as a possible resuscitation fluid. The commercial potential for a resuscitation fluid would increase the usefulness ten-fold both for the military and the general public. The fluid should be shelf-ready without the need for mixing. The end product should not require refrigeration during storage, nor should there be the requirement for cold infusion, reducing the logistical footprint necessary to send the product far-forward into extreme environments. The unit size for the fluid should be of comparable size with current resuscitation fluids so that no revisions will be needed to incorporate this into the current supply chain.
PHASE I: The selected contractor will report on the feasibility of their proprietary asanguinous solution being used to maintain the kidney or heart of a mammal prior to transplantation. Due to the requirement of a second level Animal Use review there will not be time in Phase I (6 months) to get approvals in place to demonstrate the feasibility. Therefore, the PI will also need to include data from in vitro tissue culture studies demonstrating the viability of mammalian cells in their fluid.
PHASE II: If selected for Phase II, the deliverable will be the validation of the fluid in a large animal model (swine) by completely replacing the blood with the fluid and determining for how long at a temperature between 20-28oC the animal can be maintained before death is certain. If the animal remains alive for three hours, it should be resuscitated with its blood and remain alive for 48 hours with no evidence of physiological decrements. If the fluid performs as expected, the US Army Institute of Surgical Research would like to evaluate the fluid in their validated hemorrhage model through a Materials Transfer Agreement.
PHASE III: Since this fluid would be used in patients, FDA approval would be sought in this phase. It is anticipated during the approval process that the fluid would be tested in surgical patients for safety and efficacy as a blood supplement or replacement. Fluid production would follow close behind the approval due to the need for a more effective resuscitation fluid. The resultant fluid would be of great value to the military, however, civilian populations would also benefit significantly from the development of this fluid. The technology would provide a means to resuscitate and save lives and reduce morbidity by preventing the progression to more serious complications including multiple organ failure. The so-called “golden hour” might be extended allowing the treatment of the traumatically injured en route prior definitive care in a combat support hospital or civilian trauma center. Additionally, there would also be practical applications to blood loss during both emergency and routine surgeries. The potential usefulness of the fluid is an indication of the likely market for the product.
TECHNOLOGY AREAS: Biomedical
ACQUISITION PROGRAM: Office of the Principal Assistant for Acquisition, USAMRMC
OBJECTIVE: To provide human reticulocytes capable of being invaded by the malaria parasite Plasmodium vivax in numbers sufficient to support long term in vitro culturing of the parasite.
DESCRIPTION: Malaria is an infectious disease caused by protozoan parasites of the genus Plasmodium transmitted by Anopheles mosquitoes. While five species have been shown to infect humans, two malaria species cause the majority of disease burden. Plasmodium falciparum (P. falciparum), the most virulent of these, is associated with the majority of severe malaria and mortality. P. vivax, the second major cause of malaria worldwide and the major cause of malaria outside Africa, is associated with chronic malaria characterized by relapse after months to years of asymptomatic dormancy. P. vivax differs considerably from P. falciparum in that it invades only reticulocytes (immature red blood cells) expressing Duffy blood group surface antigens; produces mature, infective gametocytes prior to clinical symptoms; and can produce dormant liver-stage hypnozoites responsible for relapse many months after the initial infection. Robust in vitro culture methods are critically needed for basic and applied research to develop new vaccines and drugs for malaria. As an example, many of the advances in P. falciparum research were enabled by the continuous propagation methods developed in the 1970’s.
The greatest impediment in developing in vitro blood culture methods for P. vivax is that normal peripheral blood contains only 0.5-1.5% reticulocytes, an insufficient number for maintaining long term P. vivax cultures in vitro. The key deliverable for this SBIR will be a method of producing large numbers (log 12 to log 13) of reticulocytes on a regular basis (Monthly) suitable for use in long term cultures of P. vivax. Two characteristics of reticulocytes are critical to P. vivax invasion and propagation (competent). The Duffy blood group surface antigens must be expressed and adult hemoglobin levels must be high. Preliminary, proof of concept studies will require log9 to log10 competent reticulocytes on a by-weekly basis. In the assay development phase log10 to log11 reticulocytes monthly will be required. Finally, the active screening will require methods of providing log12 to log13 and greater competent reticulocytes on a monthly basis. In addition to the reticulocytes, all appropriate specialized media will need to be developed.
One promising approach to the production of high numbers of blood cells is to use the expansion and differentiation of Human Stem Cells (HSC). With the advent of innovative stem cell technologies, an abundant new source of reticulocytes is possible. Defense Advanced Research Projects Agency (DARPA) is currently funding projects which support the generation of large numbers of mature erythrocytes from placenta- and umbilical cord- derived stem cells. Dr. Douay, University of Paris, has developed HSC expansion and differentiation media conditions for producing large numbers of erythrocytes. (Giarratna M, Kobari L, Lapilloni H, Chalmers D, Kirer L, Cynober T, Marden M, Wajcman H and Douay L. Ex vivo Generation of Fully Mature Human Red Cells From Hematopoetic Stem Cells. Nature Biotechnology. 23: 69 2005.). The key to leveraging these technologies is to arrest erythrocyte development at the reticulocyte stage.
Although there are no continuous in vitro P. vivax cultivation systems, several laboratories have reported limited in vitro blood- and liver- stage cultivation [see reviews, Udomsangpetch et al Parasitology international 56(1):65-9, 2007 and Trends in Parasitology. 24: 85. 2008]. These studies demonstrate that in vitro culture of P. vivax is possible. A continual supply of reticulocytes at low cost in great numbers is the key to the development of useful culture technologies.
Finally, the ability to aggregate large numbers of reticulocytes might be an enhancement to the efforts to establish a donor-free blood supply. The differentiation of reticulocytes to mature erythrocytes is an incompletely understood process. Performing this differentiation in vitro in high efficiencies is likely to be difficult. One way to bypass this would be to transplant reticulocytes and allow them to differentiate in vivo.
PHASE I: This Phase will demonstrate the feasibility of producing log9 to log10 Duffy positive reticulocytes with adult hemoglobin greater than 50% and will identify demonstration success criteria.
PHASE II: Awardee will provide WRAIR with log9 to log10 viable, Duffy positive human reticulocytes along with any specialized procedures or media needed to maintain the cells. The % reticulocytes and % Duffy positive of each shipment will be monitored and reported. The reticulocyte fraction should be greater than 60% of the whole cell count. Greater than 50% of the reticulocytes should be Duffy positive. These cells will be tested by WRAIR to determine their ability to sustain parasite invasion.
PHASE III: The awardee will have the capacity to provide log12 to log13 Duffy positive reticulocytes with adult hemoglobin greater than 50% and with the reticulocyte count being 60% of the whole cell count or greater on a monthly basis. The cells should be capable of supporting P. vivax growth in culture. This technology will provide military and civilian laboratories the capability of screening chemical compounds in vitro for efficacy against P. vivax malaria parasites. Culture capability is the first step used for drug discovery efforts against P. falciparum and has been a major contributor to the fielding of all current anti-falciparum treatment and prophylactic drugs. Efforts to develop anti malarial vaccines are also highly dependent on culturing capability. This technology would open P. vivax vaccine development to government and civilian laboratories. Finally the technology developed here can also be applied to blood farming/blood banking activities. The availability of producing large numbers of reticulocytes with specific characteristics would be useful for transfusion purposes in a clinical setting.
TECHNOLOGY AREAS: Biomedical
ACQUISITION PROGRAM: Office of the Principal Assistant for Acquisition
OBJECTIVE: Develop an efficient, cost-effective serum-based multiplex assay platform that will identify vaccine candidates, determine immune responses and serve as a potent diagnostic tool for epidemiological and clinical studies.
DESCRIPTION: Based on their impact on the military and global health, the United States Department of Defense (DoD) has placed a high priority on the development of vaccines against enteric pathogens causing diarrhea. Enterotoxigenic Escherichia coli (ETEC), Shigella, Campylobacter and norovirus are significant causes of diarrhea and represent significant targets of military, industry, academic and non-governmental (PATH Global Health) vaccine programs. These pathogens cause a high level of morbidity and significantly impact the military in lost manpower days, reduced effectiveness and increased treatment costs. The emerging awareness of post-infection complications further adds to the impact of these infections. In addition, these same pathogens are associated with hundreds of thousands of deaths among children under 5 in the developing world. Specific knowledge regarding the potential risks for infectious diseases in certain areas is critical to preventing disease as well as directing vaccine research efforts. Key areas in the development of successful vaccines are the identification of novel antigen targets, determination of the immunogenicity of a candidate vaccine, development of efficient means to determine prior pathogen exposure, and identification of correlates of protective immunity.
At present, the gold standard immunoassay for detecting prior exposures (non-stool-based) to infectious disease agents is the enzyme linked immunosorbent assay (ELISA). In this relatively laborious assay, antibodies in serum samples are tested for binding to antigens specific for a given enteric pathogen. Such assays have significant limitations with respect to the amount of sample required, technical man-hours (6-24 hours) to complete the assay, and an inability to multiplex in a single well, the latter resulting in increased costs and reagents. Thus, a more efficient assay is desired.
An ideal immunoassay would allow for the assaying of sera from exposed individuals against a panel of pathogen components that would provide valuable information regarding the response to a pathogen-specific vaccine, and the risk for a given infectious disease exposure and associated chronic health outcomes within a population subset. In addition, the flexibility of the platform would allow for customizing the assay for a specific disease agent, which would aid in vaccine discovery, as well as, for testing of immune responses against candidate vaccines undergoing clinical trials. Lastly, the ideal assay system would not be cost-prohibitive and allow for dissemination to and standardization in multiple research sites.
PHASE I: This phase will demonstrate the feasibility of the immunoassay platform to detect exposure(s) of individuals to ETEC, Shigella, Campylobacter and norovirus utilizing defined historical serum samples archived by NMRC and/or samples from the DoD serum repository. The use of human samples with a known medical history of the targeted infection will allow for determination of the sensitivity and accuracy of the assay in detecting responses induced by natural infection. In addition, this Phase will also evaluate the flexibility of the platform to allow for customizable assays specific to a single pathogen or vaccine that will be tested using existing animal models. Results will be compared using current methodologies (e.g. ELISA) to determine the reproducibility and repeatability of the multiplex assay.
PHASE II: In this Phase, the immunoassay developed in Phase I will be validated using human serum samples obtained through an ongoing multisite clinical research study (TravMil) based at DoD travel medicine clinics investigating the epidemiology of travel and deployment related infectious disease threats to U.S Department of Defense (DoD) active duty members and beneficiaries. The organism-specific relative risk of traveler’s diarrhea among DoD travelers as determined by pre- and post-travel serological testing and PCR amplification of organism-specific genetic material collected by participants during illness on a stool filter paper card. This phase will further demonstrate the ability of the assay platform to identify and differentiate between exposures to enteric pathogens. Furthermore, this Phase will provide a practical implementation of the assay for use in the clinic and/or field.
PHASE III: The developed immunoassay would be a significant aid to global health initiatives focused on preventing enteric diseases due to these pathogens. Military, industry, academic and public health institutions would benefit greatly from the described assay in aspects of vaccine research and epidemiological measures. The end-state of this technology would allow for the rapid identification of immune responses to various components of an infectious agent, which would be invaluable in discovering new vaccine candidates and defining exposures to enteric infections of interest. In addition, this assay will allow for using reduced amounts of valuable samples (e.g. clinical specimens) while also significantly increasing throughput while simultaneously reducing work time. Spin-off technologies would include customizing the assay to detect additional infectious agents that have relevance not only to human health, but also veterinary health and/or the food industry.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Materials/Processes, Electronics
OBJECTIVE: To develop a solar lighting system that allows the use of daylight as an interior lighting solution for expeditionary shelters while continuing to satisfy military requirements and mitigating negative solar effects (solar heat gain, UV damage).
DESCRIPTION: Lighting in deployable shelters is required 24 hours a day and, typically, more power is used on lighting during the daytime hours. Utilizing sunlight as interior lighting for the daytime hours will enable energy savings and significantly reduce reliance on power management systems. Unfortunately, the downsides to simple solutions like windows and skylights include solar heat gain, loss of insulation properties, and material fogging/discoloration.
Current powered lighting systems generate an amount of heat in addition to their power requirements. The heat generated by current lighting systems, or windows, adds an additional thermal burden to the Environmental Control Unit (ECU). Lighting loads increase the amount of fuel needed by the shelter for both powering the lighting system and compensating for the heat generated by the lighting system. A daylighting solution could provide working, living, or emergency lighting during the daylight hours without the need for electricity or generation of excess heat to burden the ECU.
Hybrid Solar Lighting (HSL), which utilizes the fiber optic transmission of concentrated solar light, could eliminate the need for powered lights in shelters through a majority of the daylight hours. Research performed at Oak Ridge National Laboratory shows great promise for hybrid solar lighting applications [3, 4, 5]. The technology is currently used in some large commercial and industrial buildings [6, 7]. HSL systems are able to monitor the light in the shelter and attenuate the powered lighting according to the amount of fiber optic solar light available, if needed. The basic concept behind fiber optic transmission is to concentrate sunlight to a bundle of polymer or glass fiber optics. Fiber optic transmission filters out UV and IR from the sunlight. Blocking UV makes fiber optics safe to the warfighter and any UV sensitive fabrics or devices. Filtering IR allows the luminaires to be cool to the touch and produce no excess heat.
Acceptable daylighting solutions are not limited to HSL techniques; this is only used as an example that would be of interest because of its no-heat-gain, blackout compliant nature. Producing a compact, lightweight, and sufficiently ruggedized solar lighting system is the key to an effective solution for this solicitation.
The currently implemented MIL-PRF-44259D compliant florescent lights are rated at 300 W per system. If all the light needed during daylight hours is provided by solar lighting than the energy saved is 2.1 kWh/day, or 767 kWh/yr (2,617,234 BTU/yr). That is about 83 gallons/yr of JP-8 per shelter, or more than 4600 gallons/yr for a 600 man base camp. These estimates do not include fuel savings via the ECU due to no additional heat load.
PHASE I: Develop a robust concept for a solar lighting or a hybrid solar lighting system for use in expeditionary shelters. This concept must demonstrate the feasibility of a solar/hybrid lighting system in a military soft-walled shelter (although the technology could be applied to rigid-walled shelters as well). The concept must contain a solar concentrating mechanism, a transmission method (fiber optics, reflective material, etc.), and diffuser element to redistribute the light. Lux measurements must comply with MIL-STD-1472F for the “Office work, general” requirement of 755 lux (recommended)/540 lux (minimum). The solution will be compared to existing military light system performance found in MIL-PRF-44259D. A life cycle cost analysis report will be an expected deliverable along with the detailed concept system. Total packed volume, weight, and cost are all important factors as with any soft walled shelter component and should be weighted heavily during conceptual design.
PHASE II: Deliverables expected for Phase II will include a full-scale solar/hybrid lighting prototype system and a lighting level/effectiveness demonstration implemented in a 32 foot TEMPER Air-supported shelter [11]. The full-scale prototype should leverage off of the previous detailed concept developed through Phase I. Investigation of large scale production costs will be reported, this should include additional system improvement recommendations before production would begin.
By the conclusion of Phase II, an acceptable solar lighting system prototype must have the ability to be set up and provide light to a 32 x 20 foot shelter in less than 20 minutes by 4 warfighters with limited/no special tools. As required by current lighting solutions, the system must be able to function in a variety of applicable environmental conditions discussed in MIL-PRF-44259D. All blackout requirements must be met by the solution (if applicable). To be viable as a transition worthy system, the prototype performance must not degrade after 25 strike/erect cycles.
By the end of a Phase II contract, the target cost per system to effectively illuminate a 32 x 20 foot shelter should be $8,000.
PHASE III: Solar lighting has the possibility to be greatly utilized in both the consumer, commercial, and industrial applications. As mentioned, most lighting is used during the day at home, at work, in production facilities, and in retail. Utilizing the daylight as the main source of light will provide significant annual savings in any application, all while limiting solar heat gain and retaining insulation.
TECHNOLOGY AREAS: Biomedical, Human Systems
ACQUISITION PROGRAM: Combat Feeding Research and Engineering Program
OBJECTIVE: To minimize the threat of bioterrorism and the proliferation of foodborne illness that will adversely affect the performance of the Warfighter by the development of a controlled release mechanism of bacteriocins/anti-microbials to effectively inhibit a broad range of spoilage bacteria, pathogens and spores over the extended shelf life of ration components.
DESCRIPTION: Along with the Warfighter need for a wider variety of higher quality IM ration components there is the ever threatening possibility of bioterrorism and the proliferation of foodborne pathogens (E.coli 0157H: 7, Salmonella spp, and Listeria monocytogenes). This was evident in the US Military “Do Not Consume Recall” (July 2009) of the dairy shake due to the unintended presence of Salmonella. This recall had a far-reaching impact on military subsistence, since the dairy shake is a regular component of Meals Ready-to-Eat, Unitized Group Rations, and Tailored Operational Training Meals that dated back to menus of 2002 and could have resulted in a deadly lesson learned. Bacteriocins/Anti-Microbials added to IM rations in the form of mixed time-release preparations will serve as a biopreservative with the ability to inhibit a wide range of microbes.
Ready to eat products are the mainstay of the military ration platform because Warfighters need high quality components that require little preparation, no refrigeration, and are easily consumable while on the move. Intermediate Moisture (IM) ration components (i.e. Shelf-Stable Sandwiches) are the centerpiece of the First Strike Ration®, however, a wider variety of components are required to keep up with Warfighter demand for variety and prevent menu monotony. Current IM components become noticeably dry or acidic during extended storage. Existing microbial hurdle guidelines restrict a product’s pH and water activity (aw) to ensure the safety of IM foods. However, these restrictions do not take into account the impact on a product’s organoleptic attributes (i.e., flavor, texture, color, etc) over time. To improve organoleptic attributes, pH and aw will have to be elevated, which in turn makes the IM product susceptible to spoilage and foodborne illness. Current IM components have a pH less than 5.2 with aw below 0.88. The goal of this SBIR is to achieve optimum organoleptics (pH > 5.0, aw > 0.90) by developing a time-released complex of bacteriocins/anti-microbials to give the ration developer greater flexibility with IM product formulations. This will lead to greater ration acceptance, consumption and increased component variety. Further, the innovative development of Controlled-Release Bacteriocins/Anti-microbials will provide a major technological advancement that will assure the safety of IM ration components. All Bacteriocins/Anti-microbials investigated in this study must have a status of Generally Recognized as Safe (GRAS) by the FDA.
The innovative challenge in this SBIR lies in the intricacy of multicomponent food systems, the physical/chemical properties of food materials, and the intermolecular interactions of these bacteriocins/anti-microbials components (i.e., nisin) in intermediate moisture foods. Nano-encapsulation may be an ideal mode of delivery for a complex of bacteriocins; a key ingredient in the first generation of novel biopreserved foods. Nano-technology is one means of providing a controlled release of bacteriocins/anti-microbials, which is vital in keeping levels of the bioactive compounds at an effective concentration over the ration’s three year shelf life. This would eliminate the less effective and costly method of over loading the ration with the bioactive up front to account for its likely decrease in effectiveness over the course of the three year shelf life. Conversely, a bacteriocin or complex of bacteriocins or other anti-microbial compounds released in a controlled manner throughout the ration’s shelf life will maintain hurdles needed to sustain pathogen inhibition as well as enhance overall acceptability. The utilization of bacteriocins/anti-microbials in hurdle technology may reduce the need of chemical preservatives while also providing a safe high-quality IM ration component resistant to spoilage, pathogens and endospores for its required shelf life under extreme environmental conditions.
Nanoparticle concern has been addressed in many studies where they have been shown to have very limited GI absorption, thus demonstrating low systemic exposure following oral conception (Kreyling et al., 2002). However, the fact remains that by changing nanoparticle properties, such as surface characteristics, the biocompatibility of the particle can be dramatically altered (Stern and McNeil, 2008). According to Gilor et al., 2008, the human GI tract is a balance complex system between the individual and the intestinal microflora that is dominated by two main genera of lactic acid bacteria of which most have means of producing bacteriocins. These same species of lactic acid bacteria are used in the production of most bacteriocins and antimicrobials that are being looked at as future antibiotics and probiotics. Nisin (GRAS) the most commercially used bacteriocin is produced in this manner and studies have shown that it does not possess any sub-chronic or chronic toxicity, reproductive/devolomental toxicity, genotoxicity, or carcinogenicity (Reddy et al., 2004; Hagiwara et al., 2010). This supports earlier findings of Bernbom et al., 2006 where it was reported that the intestinal microbiota in human flora-associated rats was not affected after dosages of nisin in that ingested nisin is easily inactivated by trypsin and pancreatin of which should remain true on the nano scale.
PHASE I: Combat Feeding Directorate is currently exploring new biopreservatives alone and in combination to support this goal, but identifies the need of a controlled release mechanism to maintain the needed activity level throughout shelf-life requirement. Thus, in support of this project, innovative research is needed to explore, develop and design a controlled release mechanism for a complex of bacteriocins. This complex should work in synergy over time to effectively control and kill both gram negative and positive foodborne pathogens, with a release mechanism such as but not limited to nano or micro encapsulation. Thus, phase I should identify potential bacteriocins/anti-microbials, their potential complex mixture, and encapsulation technique for controlled release of the bacteriocins. The control mechanism must release the bacteriocins in a manner that ensures a minimum two year shelf life for military IM ration components. This effort should provide technical specifications for a broad range of nano-encapsulated bacteriocins that are time released but effective against all foodborne pathogens and can be later identified as a commercial-off-the-shelf (COTS) product to be used to develop the first generation of novel biopreserved foods for military feeding.
Identify optimal bacteriocin form to incorporare in an intermediate or low moisture food system. Current forms available include liquid, powder, solid (pellet) or volatile. Potential carriers should be identified to determine bacteriocin delivery in system e.g. sachet, packaging, ingredient. At this time favorable release mechanism (pH, moisture temperature or light) should also be identified. Deliverables will be a final report addressing feasibility and practicality of the proposed concept; technical hurdles that must be achieved as they relate to form, carrier, or release mechanism; associated risks and factors limiting development of a functional prototype of the First Generation of Controlled Released Bacteriocins. Minor exploratory testing may be used to confirm efficacy.
PHASE II: Develop, test and demonstrate a functional prototype of the First Generation of Controlled Released Bacteriocins/Anti-microbials (FGCRB/A) as identified in Phase I. Initially this can be verified by cocktail inoculation studies in broth and media systems. Conduct preliminary test, including accelerated storage studies using model systems or computer simulation, to assess the design and performance of the time release matrix of bacteriocins. Identify potential intermediate moisture ration components that will benefit from this bioactive system and determine optimal way of integrating this additive (micro pellet, powder, liquid) into select matrix or food system. Demonstrate and validate concept by using in an existing ration component, such as a beef/pork wrap, with elevated pH and aw. Demonstrate the efficiency of the FGCRB/A over a range of aw (ie. 0.88, 0.90, 0.95) and pH (ie. 5.0, 5.5, 6.0). Demonstrate the FGCRB/A ability to inhibit pathogen growth (inoculated pack study) under storage conditions of 80F, 100F and 120F. Efficacy should be shown at microbial populations of 102, 104 and 106 colony forming units/ml or gram. Maturity of this food additive technology will ensure the ability to biopreserve a safe, high quality ration component through life cycle and environmental testing to confirm the conceptual design from Phase I. The potential for adverse events will also be documented. This effort will support the development of future ration components. Deliver a report documenting the research effort along with a detailed description of the proposed technique/system and protocol to include specifications and performance of key components.
PHASE III: Produce and deliver prototypes to support technical and user testing in the field with military personnel. Make modifications to most successful prototype based on organoleptic testing and feedback. A small-scale production capability will be established to demonstrate the manufacturing feasibility of the proposed FGCRB/A. Deliver a report documenting the theory, design component specifications, performance characterization and scale-up projection for establishing a large-scale production capability, to include all relevant microbiological data ensuring wholesomeness, safety and adverse event issue if any. The concept meeting the requirement outlined in this effort would be applicable to military feeding, the commercial food industry, space feeding and emergency relief (camping, trucking, disaster relief). A commercialization strategy shall be outlined and a commercialization partner, if required, shall be defined to demonstrate a well-defined path toward commercialization of the FGCRB/A.
TECHNOLOGY AREAS: Materials/Processes
ACQUISITION PROGRAM: PEO Combat Support & Combat Service Support
OBJECTIVE: Develop novel materials and innovative design techniques to fabricate a low cost, lightweight, high strength, low porosity, and flexible fabric or membrane for use in parachute canopies.
DESCRIPTION: The intent of this solicitation is to develop a lightweight, high strength fabric or membrane which could be used as a replacement for current parachute fabrics at cost metrics which reduce (desired) or match the cost of current parachute fabrics. Reducing parachute equipment weight is a known concern and was expressed at the most recent General Officer Integrated Product Review Meeting. Joint Precision Airdrop Delivery System (JPADS) 2k and 10K, Maneuverable Canopy 6 (MC6) Personnel Parachute System and Advanced Tactical Parachute System (T11) are Programs on Record that have established Pre-Planned Product Improvements in place to decrease system weight and increase accuracy. For MC6 and T11 parachute canopies, reducing the weight of the fabric by a factor of two would reduce the weight of the canopy by 13% and 17% respectively. In addition to full-scale parachutes, lightweight and flexible fabrics also have applications for fabrication of small-scale parachute models for wind tunnel testing.
There are number of fabrics currently in use with parachute systems depending on the purpose of the parachute. For unguided parachutes, high permeability (90-200 cfm) nylon fabrics are used such as PIA-C-7020, Type II and PIA-C-7350, Types I & II, these fabrics range in weights from 1.6 to 3.5 oz/yd2. For guided parachute systems, low permeability fabrics (0.5-3.0 cfm) such as PIA-C-44378, Types IV & VI and PIA-C-7020 Type I are used. These fabrics are woven with ripstop, twill, or hybrid ripstop/twill weaves. A goal of 50% weight reduction is preferred, although lesser reduction levels will be considered. It is desired to reduce the cost of the new lightweight material to levels lower than the cost of current nylon fabrics. Besides the significant reduction in weight, the newly developed material should have mechanical properties which are similar or better than the existing parachute fabrics such as break strength, elongation, durability, flexibility, chemical resistance, stability to water immersion, air permeability, etc. While the individual requirements for the material properties are listed in the fabric specification, if some parameters are not explicitly listed, the newly developed lightweight material must meet or exceed the performance of the current nylon fabrics used in parachutes. For example, although there is no abrasion resistance requirement in the PIA-C-7020 specification, it is expected the new lightweight material should achieve comparable or better performance as the current nylon material. The lightweight material could be a replacement for current parachute fabrics so the performance of the parachute system must be maintained or improved with the new material. It is essential that the developed material also meet the requirements of the Berry Amendment.
Recent advances in textile fiber production and material fabrication make a 50% weight reduction in canopy cloth plausible. Examples of these advances include nonwoven fabrics and nanofibers. Nonwoven fabric design processes are now flexible and can systematically vary fabric areal density and permeability. Candidate processes include but are not limited to spunbonded, spunlaced, and the combination of nanofiber meltblowing and electrospinning. Since fiber stiffness depends on the fiber diameter, fabrics made from nanofibers with diameter less than 1 micrometer should offer various degrees of flexibility to match that of a full-scale parachute canopy. Therefore, fabrication of fabrics made of nanofibers using nonwoven fabric manufacturing technology appears to be a feasible approach to achieve a flexible material with a low density and low permeability. It should be noted that other solutions to this topic which are not fabrics (such as films or membranes) will be considered.
PHASE I: Develop novel fibers and innovative manufacturing technologies to fabricate a lightweight, high strength flexible material for use as a parachute fabric. Primary focus of this phase is developing a material with properties similar to Type IV, PIA-C-44378 fabric with the exception of achieving lighter weights. The objective is to reduce the weight by 50% while retaining the strength, flexibility, permeability, and other properties of the original fabric. Cost analysis should also be included to show the final cost for the new lightweight material is either reduced or match the cost of the current parachute fabric. Evidence must also be provided that the resulting fibers, fabrics, and/or materials will meet Berry Amendment requirements. Samples of the novel fibers and materials, if available, should be delivered along with a detailed report of the development and testing of the new lightweight material.
PHASE II: Phase II should include finalizing the material development from Phase I and refine its properties to achieve the desired requirements. Examine the material properties in detail and compare them with those of the current nylon fabric. Methods for increasing the production rates for the material are to be developed during Phase II. The development of additional materials which could match the performance of other traditional fabrics (such as PIA-C-7020, Type I or PIA-C-7350, Type I) while reducing their weight by a factor of 2 or more should also be conducted during Phase II. It could be possible that a single new lightweight material could replace multiple traditional parachute fabrics thereby reducing the number of fabrics used in different parachute designs. While fabrication of a parachute prototype is not required during Phase II, evidence must be provided that traditional canopy fabrication methods (i.e. sewing, stitching, etc) would be compatible with the new lightweight materials or alternative fabrication methods must be demonstrated to build confidence that parachutes could be fabricated from the new materials without a loss of the current performance capabilities from the parachute system. For example, it should be demonstrated that the strength of a seam in the new materials would be comparable to a traditionally stitched seam in the current nylon fabric. Detailed cost analysis must be provided for all developed lightweight materials showing that the cost has either been reduced or match current cost for the traditional parachute fabric which would be replaced. Evidence must also be provided that the resulting fibers, fabrics, and/or materials will meet the Berry Amendment. Required Phase II deliverables include 100 yards (42-inch width) of the new material and all pertinent material properties data along with a detailed report of the results.
PHASE III: Lightweight fabrics or materials are used extensively commercially in the area of industrial filters, medical hygiene, clothing, etc. In addition to making full scale and parachute models, lightweight materials can also be used to make model tents for wind load study, kites, model airships, etc. There are a variety of dual-use applications that a Phase III can pursue.
TECHNOLOGY AREAS: Information Systems, Ground/Sea Vehicles, Human Systems
OBJECTIVE: To research, develop, and demonstrate tools that could support tactical small unit load planning and route selection.
DESCRIPTION: The Army’s small units (Infantry Company and below) will benefit from decision applications that support mission planning and execution of their operational tasks. The selection of equipment to take on a mission and the selection of routes can be based upon numerous factors that are quite complex, to include the METT-TC elements (mission, enemy, terrain and weather, troops and support available, time available and civil considerations), work-rest cycles, Soldier performance, resupply, contingency planning and terrain analysis. Terrain analysis is often further broken out by the OACOK rubric, with the major elements including: Observation and Fields of Fire, Avenues of Approach, Cover and Concealment, Obstacles, and Key or Decisive Terrain. Tools can be developed to support execution of these interdependent tasks.
There are currently several tools that have some applicability to load planning and route selection, but they all have significant shortcomings for the Small Unit (SU). Most planning is currently done using a paper map or digital imagery from Falcon View, Google Earth or some other source. The unit leader must interpret this terrain data and integrate it with other sources of information. Force XXI Battle Command Brigade and Below (FBCB2) provides battle command and situational awareness information, but focuses on enemy locations and higher echelon decision makers. There are commercial mobile applications that could be used for route planning for civilian applications, but almost all focus on vehicle transportation. Commercial mobile application have little to no utility for the kind of route planning that SU Soldiers/Leaders in the battle space are required to do (i.e. Soldiers rarely get to travel on improved roads, they must be concerned with elevation and navigation in under/undeveloped areas, and they must conduct topographical analysis to understand areas along the route that could provide ambush and or attack opportunities for the enemy). As a result, we know there are shortcomings that need to be addressed in the following areas:
• Ability to conduct terrain analysis to accurately determine where Soldiers can move and the difficulty (energy cost) associated with the movement
• Linking the energy cost of movement with resulting impacts on Soldier and SU performance of critical cognitive and physical combat tasks
• Estimating time to arrival based upon load, terrain, Soldier state and other parameters
• Estimating impacts of terrain, load and other parameters on thermal burden and heat strain
• Linking key Personal Status (PERSTAT) parameters with ability to execute missions that involve significant movement
• Ability to use intervisibility tools to aid the SU leader in identifying areas of cover and concealment and in identifying potential avenues of approach and egress
This effort would research, develop, and demonstrate methodologies and algorithms that enhance tools for load planning, route selection and in making changes during mission execution. It would also be desirable that the route and load planning tools be compatible with and support the military planning process, e.g. generation of Operation Order. Potential approaches should address the data, methodologies, algorithms, and validation audit trail. Proposals should identify how the proposed research will advance the current state of the art. The products should support development or improving battlefield and training decision support applications focused on Soldier load issues. The SU leader is responsible for making the final decision and we are trying to provide actionable information (e.g. timely, accurate or more complete) in which to do so. Elements that could be important to execution of this work include: identifying the SU leader decisions that are to be supported, understanding user needs; identifying the factors that are important; identifying, researching, and developing methods of obtaining the data needed; developing user interfaces that meet user needs; developing methodologies and computer algorithms; providing the desired output in a useful form; and addressing software and platform integration issues. Since validation is a critical issue, the algorithms and decision aid application must accurately represent the intended real world phenomena from the perspective of its intended use. At this point, we are assuming that the SU will have: intermittent network connectivity, some resident computational capabilities, terrain databases, and some form of display available to them. At this time, it is not clear if the products of this effort would be integrated with other existing battle command systems, become a module in an integrated application or be utilized as a stand-alone application.
PHASE I: Phase I will provide a proposed concept for the generation of methodologies and algorithms that would be needed and could be incorporated into an application to support load planning and route selection at the SU level. The focus should be on the METT-TC and/or OACOK elements. This will include identifying a number of specific operationally relevant decisions and actions that could be at least partially supported by a decision support application. The proposal should also show how the proposed methodologies and algorithms would provide the SU leaders with useful information to support his decision making. As a result, it is important that verification and validation planning be initiated at this stage. It is desirable that algorithms be computationally efficient within a potential battlefield and training decision support aid. Any data needs and assumptions required by the concept to be compatible with a SU decision aid should be clearly outlined and explained. Phase I should also include identification and discussion of additional operationally relevant algorithms that could support equipment and route selection at the SU level.
Phase I will perform a proof of concept that describes how one proposed concept may be utilized within a ground Soldier battlefield decision support aid. Metrics in phase I will include:
• The usefulness of the methodology or algorithm to support load planning or route selection across a range of situations,
• The applicability and utility of an initial methodology and algorithm to be implemented within a decision application,
• The degree that it represents the important elements of the real world (valid),
• Documentation and ability to demonstrate the methodology or algorithm,
• Modularity and ability to be incorporated into a route selection cost function that incorporates other factors, and applicability of the selected approach to the development of additional algorithms.
PHASE II: Phase II will include research, design and implementation of multiple methodologies and algorithms necessary in accordance with the topic objective. Knowledge elicitation may need to be conducted with tactical small unit SME’s to ensure that critical real world factors (i.e. METT-TC or OACOK) are identified and included in such a way as to support the development of each methodology, to include the necessary data elements and data structures. In Phase II, validation and verification will have to be addressed. The plan may also include how specific applications could be developed. A set of use cases that describe relevant military operations or missions will be provided to guide research, methodology development and support testing and experimentation. The work effort will lead to demonstration of the products developed in phase II within an appropriate environment.
Other tasks include documenting and delivering a report including all user needs assessments, methodologies, algorithms, and any data structures or software products necessary to support transition of the work to DoD materiel developers. The phase II report should also demonstrate and document how algorithms may be transitioned to support implementation into battlefield and training decision support applications. Metrics for this effort will include the number of methodologies and algorithms developed, the degree to which they represent the important elements of the real world, their potential utility within the decision application, documentation and their ability to be demonstrated. Other considerations include the degree to which the algorithms are computationally efficient, can be modified if additional factors need to be included, and can be implemented within appropriate decision applications of the governments’ choosing. Because we do not yet know if the products of this effort will lead to a stand-alone system or be integrated within another system, compatibility is an important issue. As a result, the architecture, modularity and interfaces are all important.
PHASE III DUAL-USE APPLICATIONS: The developed methodologies and associated implementation have commercial applications of these simulation products to proposed DoD materiel solutions whose goal is to provide Soldier’s applications that will support enhanced Soldier situational awareness and improved decision-making. Also, there is potential application to future automated or semi-automated ground Soldier battlefield systems, such as an Unmanned Ground Vehicles. Non military applications could relate to route selection where there are common elements with tactical small unit operations.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Materials/Processes
ACQUISITION PROGRAM: PEO Ground Combat Systems
OBJECTIVE: Develop an innovative lightweight, rugged, durable, high-efficiency battery charger/storage unit (BCSU), capable of continuous conversion of radiative environmental energy into usable direct current (d.c.), to charge Soldier batteries at a rate of 20 W in five hours (at night and in poor weather), while weighing much less than the batteries it replaces. The BCSU must involve novel materials approaches, not traditional photovoltaics (PVs), to harness radiative environmental energy (e.g., infrared, solar, THz) and provide on-demand recharging of the Soldier’s batteries in the field under battle conditions, while fitting into the dismounted Soldier’s equipment.
DESCRIPTION: The battery is as integral to the Soldier’s mission and equipment as his/her firearm, and must reliably power electronic functions. To ensure that equipment is always energized, extra batteries are carried into remote locations, restricting Soldier mobility under dangerous conditions. Because current portable solar-powered PV battery chargers [1] operate only under bright, sunny conditions (rare in Afghanistan), dismounted Soldiers use them only as a lightweight, emergency back-up. We propose a lightweight, reliable, portable BCSU to go beyond PV cells (while building on their success) by using novel technologies to efficiently convert environmental energy (e.g., infrared/visible/THz energy from the Earth and other warm sources) into continuous (e.g., 24-hour, under all weather conditions, nighttime, etc.) d.c. for charging batteries. The Army’s Land Warrior concept requires that Soldiers carry at least 12 2 lb. 100 W-h batteries over a 72-hour unsupplied mission, so the proposed BCSU must output at least 20 W in order to recharge a battery in a reasonable amount of time (~5 hours). The BCSU (which must be flexible and easily rolled/folded) would, after development, replace ~ 9 of these batteries, requiring the Soldier to carry only 2-3 batteries (one always operating), considerably lessening the Soldier’s load. The BCSU should weigh less than 4 lb. (the weight of one commercially-available PV cell and one battery that it replaces).
Innovative, perhaps nanomaterials-based approaches (not traditional PVs and infrared/THz technology) will be considered for this SBIR topic. Higher efficiency conversion of radiative environmental energy, potentially a very disruptive technology (since it permits rapid battery recharging), could be enabled by nanomaterials such as plasmonic or dielectric nanoparticles for confining/scattering light within [2,3], or metallic nanopatterning for better contacting, a semiconductor, improved quantum dots (QDs), polymer-based PVs with variable bandgaps, thermophotovoltaics or thermoelectrics, nanorectennas, etc.
Commercial PV cells have efficiencies limited to 40% at AM1.5 [4], due to their intrinsic bandgap (tuned to only one photon wavelength). QDs and “nanorectennas” are thought capable of much higher efficiencies in the vis/ir regime [5,6]. QDs have demonstrated multiple exciton generation, one route to very high efficiency, in the laboratory [5], and could convert incident vis/nir energy into an engineered infrared spectrum, which is then harvested by a tuned absorber. A “nanorectenna” consists of an antenna, coupled to a rectifying diode, working at the nanoscale to convert incident vis/ir light into direct current. Rectenna arrays are very efficient in the radio frequency regime and can be designed to resonate over any desired wavelength range (no bandgap) [6].
Because rectenna efficiency scales with incident power [7], it is conceivable that power could be beamed to a small squad of Soldiers from nearby, if a new airborne platform and lightweight, portable receiver could be developed. Efficiency, and therefore charge time, would be greater for this “power beaming”.
PHASE I: Research and propose an innovative technology for a high-efficiency, radiative energy-harvesting BCSU to generate 20 W of continuous power for 10 hours total under all relevant weather conditions and during both day and night, from radiative environmental energy and stored power. For example, the BCSU may be similar to a commercially available PV cell [1], with an additional coating/electronics (negligible weight) to harvest infrared environmental energy. The BCSU must weigh less than 4 lb., and must be conveniently carried in a rucksack (if a “roll-away”, like PV cells, that roll out into a flat area < 2 m2 in area like in Ref.[1]) or on a Soldier’s helmet (in which case the BCSU must be less than 100 cm2 in area, sufficiently flexible to mount on a helmet, and not produce a visible signal when illuminated), be reliable, and be realistically manufacturable. Consider nanomaterials-based technologies, such as nanoparticles to enhance scattering, quantum dots, nanorectennas, thin film supercapacitors, etc. Traditional PVs will not be considered. Mitigate risk by identifying and addressing the most challenging technical hurdles in order to establish viability of the technology (including proper thermal coupling of the BCSU to the environment to ensure continuous, efficient energy conversion from the environment). Perform proof-of-principle experiments in a laboratory environment, and predict the BCSU’s efficiency at AM1.5. Provide credible projections of performance, size, weight, energy requirements, and cost of a system suitable for fielding. Power beaming is acceptable only if the target is large, lightweight (carried by one person), and can receive sufficient power from approximately ¼ mile away.
Physical specification Value
Weight < 4 lb. (less than PV module + battery)
Cost Less than nine batteries planned for displacement
Power output 20 W continuous (all-weather, day/night) in the field, capable of supplying 200 W-h total before resupply
Area < 2 m2 (roll-away) or < 100 cm2
Fire retardant Toxicity In accordance with MIL-PRF-44103D
Toxicity/mildew Fire Retardant In accordance with MIL-PRF-44103D
Temperature range In accordance with MIL-PRF-44103D
Durability 6 months’ operation in the field
PHASE II: Carry through the Phase I proposal by fabricating/developing a high-efficiency energy-harvesting, lightweight, portable BCSU harvesting energy under all environmental conditions, and demonstrate 20 W continuous output over a 10-hour period (minimum total 200 W-h stored energy) in the field. The BCSU must be sufficiently mature for technical and operational testing, limited field-testing, demonstration, and display. Determine the appropriate technology for the BCSU, and characterize its efficiency at AM1.5.
Characterize and refine the performance of the BCSU in accordance with the goals in the description above. Deliver a report documenting the theory, design, component specifications, performance characterization, and recommendations for optimizing the BCSU’s efficiency and power output. Address manufacturability issues related to full-scale production for military and commercial utilization within applicable systems. Predict and optimize the usage cycle of the BCSU; i.e., how many times these battery chargers can be used in the field, without resupply. Provide user manuals and training to support government testing of this equipment.
PHASE III: The BCSU developed in Phases I and II will be the first high-efficiency energy-harvesting battery charger that meets military standards (i.e., recharges at the rate of 20 W in 5 hours ten times before resupply). Phase III will develop, through technology transition and/or commercialization, the full battery charging and storage system required for the dismounted Soldier to recharge batteries. This reliable, portable, low-weight flexible battery-charging and storage system must be manufacturable at a reasonable cost. In general, efficient conversion of solar and infrared energy into electrical energy is one of society’s most important technological challenges, and solving this problem for the Soldier would enable commercialization of efficient, inexpensive solar and infrared energy for the general public. TRL 8
TECHNOLOGY AREAS: Information Systems
ACQUISITION PROGRAM: PEO Aviation
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: Develop a software toolkit that will enable Army system developers, tacticians, and aviators to define and tailor cockpit automation, aiding, and tasking associated with mission planning, coordination, and execution to facilitate optimal usage of unmanned systems within an evolving mission context.
DESCRIPTION: Current integration of manned aviation assets with unmanned assets is limited both by the workload imposed on the aviators by the mechanics of conventional Unmanned Aerial Systems (UAS) control techniques, and the cognitive difficulty of integrating “heads up” local information from the manned aviation platform with “heads down” information from the UAS. Manned-unmanned (MUM) teaming combines "the inherent strengths of manned platforms with the strengths of UAS, which produce synergy not seen in single platforms." (U.S. Army Roadmap for UAS 2010-2035, p.15) The Army is moving toward a concept of robotic UAS wingmen to support and team with manned aircraft, expanding sensor coverage and extending standoff ranges. MUM teaming between manned and unmanned platforms requires new methods for Army Aviators to task and maintain vigilance over distributed unmanned assets. On-going efforts to develop the first stages in this teaming between Manned Helicopters and Unmanned Air Vehicles include programs like VUIT 2 and the Block 3 Apache.
One of the keys to transitioning to future concepts is the need to develop tools for adding the needed automation and intelligent behaviors to the UAV control systems necessary to keep workload low and create an intuitive and predictable interface to the unmanned systems. Past efforts to define and automate cockpits like in the Rotorcraft Pilot’s Associate Program have relied on significant knowledge acquisition processes and software engineering efforts on the development of basic structure and tasking architectures. Although efforts to develop mission tasking software for unmanned systems have been worked for many years, they have tended to produce highly “engineering” centric controls and displays and don’t flow well into an aviator/warfighter centric planning and execution toolset. The problem is that automation and tasking software that must support and adapt to a changing tactical situations and tactics, techniques and procedures (TTP) requires a complete reengineering and architecting of the software. To make automation and aiding in cockpits more adaptable and evolve to meet future needs, a better means of defining and adapting cockpit system automation is needed.
What is needed to make unmanned systems more assessable and useful is to develop a cockpit-ready mission oversight mechanism for an Army Aviator to task distributed unmanned assets for key Army unmanned missions (such as ISR, logistics, counter-UAV, etc.). The effort should build upon the Army's experience with unmanned mission control and should take a form that is appropriate for cockpit environments (see reference 4 for examples). Critical to the success of manned/unmanned teaming is the ability for unmanned assets to be tasked from manned vehicles in such a way as to expand the capabilities of the manned asset beyond just extending range of sensors. Critical challenges include maintaining aviator awareness of distributed asset mission status in flight, supporting the coordination of multiple unmanned assets in a variety of simultaneous activities, and providing efficient control capabilities to the Army Aviator while minimizing the impact on workload.
This effort is seeking to develop a software toolkit that will enable Army system developers, tacticians, and aviators to define and tailor cockpit automation, aiding, and tasking associated with mission planning, coordination, and execution to facilitate optimal usage of unmanned systems within an evolving mission context. It is envisioned that such a toolkit to define aiding, tasking, and automation within a cockpit would ultimately have significant benefit beyond the management of unmanned assets and it is hoped would lead to broader use of automation within the Army. The interface for the toolkit needs to be designed to be intuitive to both aviators and tactician. It should maintain sufficient oversight and constraints by the software such that it keeps them within system specification and incorporates good human factors. When used to define new tasking and automation or modify existing sets of tasking to incorporate changes in tactics, the system needs be able to validate the behaviors through some level of automation possibly through simulation and /or analysis. The Aviator side of the software will need to work within current planning and cockpit systems while permitting the aviator the ability to easily tailor and modify the mission plan and automation in an intuitive Aviator centric manner. This software toolkit should be able to work with existing systems onboard and off board the aircraft as defined by a systems developer and then integrate the utilization of sensors and payloads of both air and ground unmanned systems as part of an overall mission planning system. This effort should focus on developing intuitive means for defining monitors, cues, and automating tasks to aid the management of unmanned systems throughout an aviator’s mission. Specific areas where it is envisioned such aiding software would be beneficial and where the contractor shall develop a tasking system for include the following: 1) to identify and assess available unmanned assets in an area; 2) conduct planning and set cues to put assets on station; 3) manage the asset and maintain awareness of the unmanned system while being utilized by the aviator; and, 4) coordinate basic system management and safety issues with the owner of the unmanned asset as they arise. This effort is not seeking to develop all the mission specific behaviors for unmanned system utilization by an army aviator but rather develop a set of tools usable at many echelons for defining them both on the general mission templates at command level and to define and tailor them to mission specific requirement by aviators.
To simplify the UAS and payload control interface, the government will provide at contract award the UAS interface based on the UAS PO Interoperability Profiles (IOP) which are based on STANAG 4586. Other standard interfaces for accessing communications, determining available unmanned assets in the field, and setting up control shall be used as identified with commercial/open standards filling in where appropriate military standards do not yet exist.
PHASE I: The contractor shall conduct a trade study analysis to look at technologies options associated with architecting the system. The contractor will use simple mission scenarios and available training material to help scope and develop requirements for the system. The contractor shall conduct a task analysis of potential Aviator and UAS operations to define the scope of tasks and functions that their toolkit must be able to define. The contractor shall develop a proof of concept demo suitable for user review/assessment for key components both tacticians and aviators.
PHASE II: Develop a graphic user interface (GUI) appropriate for aviators in both pre-mission and real-time environments to conduct planning, automating and monitoring for unmanned system. Develop software architecture and interfaces for the key unmanned air vehicles using the UAS PO Interoperability profiles. Coordination with helicopter and unmanned system developers is encouraged enabling compatibility with current Army aviation systems. If appropriate system definitions are not available then appropriate DoD and Industry standards can be substituted. The system shall ultimately be assessed at 2 levels: 1) an assessment of system to define useful mission behaviors in a command and control environment and 2) and assessment of the planning and execution system to meet mission needs in simulated aviator environment.
PHASE III: This technology should have a broad application to all Army and DOD aviation system. Like Kiowa Warrior, Apache, Special Ops 60s, and be able to support unmanned aviation systems, such as Shadow, Raven, Fire Scout, etc. A mission specific planning and execution system like this would have a wide variety of commercial applications such as HLS, Border Patrol, Police Departments, forestry service, and also could prove to be an enabler making unmanned systems operate more cooperatively and make them much more flexible to adapt to new applications.
TECHNOLOGY AREAS: Air Platform, Electronics, Space Platforms
ACQUISITION PROGRAM: PEO Intelligence, Electronic Warfare and Sensors
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: Develop low-profile, wideband antennas for SATCOM systems located on airborne ISR Army platforms with an emphasis on reverse link data rate improvement and radome height reduction.
DESCRIPTION: There is a critical need for miniaturized advanced concept SATCOM antenna designs to improve size, weight and power (SWAP) and provide greater mounting flexibility on airborne Army Intelligence, Surveillance and Reconnaissance (ISR) platforms. Development is needed to advance the state-of-the-art to enable bi-directional high data rates (minimum of 4.0 Mb/s target of 10.0 Mb/s) capable of handling imagery and communications intelligence (IMINT, COMINT) in standard Military bands. In order to reduce aircraft drag count, provide mounting flexibility, improve on-station loiter time and reduce operating and support (O&S) cost, and provide substantially improved mission bandwidth, it is necessary that the size of these antennas be dramatically smaller than similar SATCOM antennas in use today for these applications. Novel approaches to all aspects of antenna design and performance are sought. Antenna concepts should support both transmit and receive functionality with linear (vertical and horizontal) and circular (left and right-handed) polarization and sufficient realized gain to communicate with commercial satellites and military satellites from airborne Army ISR platforms. The target beamwidth should be less than 2 degrees to satisfy Federal Communications Commission (FCC) and International Telecommunication Union (ITU) regulations operating at full power & dates rates. Future electromagnetic modeling of the antenna on a specific aerial platform could be necessary to account for pattern and impedance distortion caused by the interactions between the antenna and the conducting and dielectric structures on the platform. By using electromagnetic analysis computer codes and approximate models of the platforms-of-interest (POI), the simulated radiation performance of the antenna can be calculated. If successful, this effort will produce a novel SATCOM antenna system that will result in significant fuel cost savings for both military and commercial aerial platforms and enhanced battlefield communications and situational awareness for the Army due to its lower profile, high data rate and multiband functionality.
PHASE I: Develop multiple design concepts, conduct a trade study, and identify the 3 most promising concepts for antennas that show promise in meeting the description above. Analyze and report expected RF performance of these design concepts through electromagnetic simulation. Identify risks and approaches for reducing risk toward effecting these designs.
PHASE II: Conduct risk mitigation activities identified in Phase I then fabricate and demonstrate proof-of-concept for the most promising prototype antenna design(s) from Phase I. Measure the RF performance (bandwidth, gain, radiation pattern etc.) both standalone and on a simulated, or surrogate, military platform to validate the proof of concept design. Update Phase I risks and approaches to risk reduction and complete a preliminary design for an aircraft mounted SATCOM antenna as described in the Description. Conduct risk reduction activities to respond to the top two risks for the new preliminary design.
PHASE III: Complete risk reduction activities identified in Phase II then complete design, integration, and fabrication of the advanced concept SATCOM antenna for a specific Army Aviation Platform. Plan for and conduct developmental and operational testing of the advanced concept SATCOM antenna. Transition this antenna technology onto 1) Army Airborne ISR (AISR) RC-12 twin engine turbo prop platforms such as the Enhanced Medium Altitude Reconnaissance and Surveillance System (EMARSS), and Guardrail Common Sensor, 2) the larger four engine Airborne Reconnaissance Low (ARL), 3) general aviation single and multi-engine military and commercial aircraft, and 4) Unmanned Aerial Systems (UASs) such as the low-to-medium altitude Predator B UAS that may be found in Homeland Security and military AISR programs. The resulting fuel cost savings from lowered aircraft drag and enhanced data rates will attract both the Military and the Commercial sectors to procure and productize the antenna technology.
TECHNOLOGY AREAS: Space Platforms, Weapons
ACQUISITION PROGRAM: PEO Missiles and Space
OBJECTIVE: There is no single propulsion cycle in existence that combines the high speed performance of a ramjet and low speed, or static performance of a solid rocket motor. This topic seeks to develop unconventional technologies for such a revolutionary new type of high speed ram air propulsion system with both static and ram air capability. This new technology must meet or exceed the current performance and operational envelope of existing, conventional, state of the art ram air and solid rocket propulsion technology, and must support both current and future weapons systems and space platforms. This effort will require innovative research and advancements in combustion techniques, combustion modeling, materials, and combustion processes. The contractor must analytically prove the effectiveness of the advanced combustion technology using new modeling and simulation techniques and subsequently deliver the analytical combustion models, codes, and simulations to the Army to support missile feasibility studies.
DESCRIPTION: The Army needs increased range and loiter time for certain munitions, such as the Guided Multiple Launch Rocket System (GMLRS) for the Program Executive Office, Missiles and Space Precision Fires Rockets and Missiles Systems Project Office. Conventional high speed ram air propulsion systems offer supersonic, long range and limited loiter capability but are typically limited to operation above Mach 2.5. They do not produce thrust at static flight speeds. Other propulsion cycles develop thrust at static or very low flight speeds, but do not have the required fuel efficiency of the high speed ram air propulsion technologies. A single, revolutionary propulsion system that operates through a wide range of subsonic and supersonic velocities is needed. Such a system does not presently exist and would be ideal to extend range or provide extended capability to long range, high speed munitions. This topic seeks to develop new propulsion technologies and simulations of a revolutionary propulsion system that will operate at zero flight speed, such as needed for launch, as well as at conventional ramjet equivalent flight speeds of at least Mach 2.5. For this topic, a new, novel propulsion technology must be conceived, mathematically modeled and delivered, and should address in detail the revolutionary engine concept intended to maximize static and conventional high speed performance.
PHASE I: The contractor shall create a new, innovative technology and concept plan for a new type of high speed ram air propulsion technology that provides thrust at static operating condition, as well as flight speeds above Mach 2.5. The contractor shall develop a preliminary mathematical analysis plan of the statically operated ram air propulsion technology and describe the specific methods used to predict performance. The contractor must begin to create and author new modeling codes to describe the revolutionary process. The contractor shall develop a baseline reference configuration of a statically operated but yet high speed capable ram air propulsion technology for use in their initial modeling and analysis. Deliverables for Phase I will be the concept plan for a statically operated ram air propulsion technology, as well as the preliminary software, architecture, mathematical analysis and proof of the system. The statically operated ram air propulsion technology should be capable of a minimum Specific Impulse of 250 seconds, both statically and at conventional flight speed of at least Mach 2.5, and a minimum thrust to weight ratio of no less than 4.
PHASE II: The contractor shall execute their plans developed in Phase I for modeling, simulating, analyzing, and predicting the performance of the statically operated, high speed ram air propulsion technology. The reference configuration developed in Phase I will be modeled and optimized into a final, high fidelity performance analysis by the contractor. Deliverables of Phase II are a prototype concept design, performance prediction algorithms and mathematical analysis to confirm the modeling assumptions used in the analysis. The mathematical model of the revolutionary propulsion technology will be delivered including all software, reference data, example cases, source codes, compilation and make files, executable files, and a user’s guide.
PHASE III: The end state of the research may yield a next generation, high speed ram air propulsion technology for use in GMLRS or other similar system. The modeling and simulation codes developed under the SBIR, and used to describe the statically operated ram air propulsion technology will be viable commercial products for the contractor. The contractor may ultimately sell a full scale, high speed, statically operated ram air propulsion system in the role of a propulsion contractor or subcontractor.
TECHNOLOGY AREAS: Materials/Processes
ACQUISITION PROGRAM: PEO Missiles and Space
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: Design, develop and demonstrate robust nanostructured high performance anti-reflection coatings that allow over 98.5% transmission over a broad visible spectral range with cone angles up to 120 degrees.
DESCRIPTION: Soldier warfare requires the accurate detection, recognition and identification of possible targets for engagement without giving away one’s position to the enemy. As such, soldiers rely on optical sighting systems to identify targets while maintaining stealth movement. Anti-reflection coatings are applied to these optical systems to serve a dual purpose. First, reflections from the front lens of the optical train can alert enemy troops to the soldier’s position. An example of this phenomenon can be witnessed when the sun glints off the windows of a distant mountain home to reveal its presence in an otherwise unnoticeable location. A famous example of a glint-induced casualty is exemplified by Gunnery Sergeant Carlos Hathcock, who shot a Viet-Cong sniper after locating the glint from his scope. Secondly, anti-reflection coatings are applied to maximize the transmission throughput of the optical device. By maximizing the transmission throughput, lens apertures can be minimized and overall system sizes can be kept small. Small arms weapon systems are already heavy in nature, therefore it is important to resist adding additional weight to these weapons in the form of large optical sighting systems, so that there is no reduction in the soldier’s combat ability.
Current anti-reflection coatings suffer from transmission losses over broad fields-of-view. As the light source moves from being directly in front of the system to off to the side of the system, the coating spectral properties tend to “blue shift.” In other words, the light transmitted through the coating will shift towards lower wavelengths. If this shift is large enough, critical spectral transmission may be lost, causing either unwanted reflections from the front lens or loss of spectral resolution through the device. In either case, soldier lethality is compromised. To minimize the off-angle glint potential, a honeycomb-type anti-reflection device (ARD) is installed in front of the optic, to eliminate off-angle reflections. However, these ARDs reduce the amount of incident light by approximately 15% and reduce the overall viewing angle of the optic. Both of the aforementioned drawbacks limit the utility of the optic, and in some operational environments may require a larger optic to accommodate the reduced light transmission due to the ARD. Increasing the size of the optic directly correlates to an increase in weight, further burdening the warfighter. In more extreme instances, the ARD is completely removed from the optic to maximize the light throughput and viewing angle, thus exposing the warfighter to a potential glint-induced positional compromise.
Nanostructured antireflective coatings can eliminate the aforementioned high angle of incidence issues and alleviate the need for an ARD. Nanostructured coatings have been proposed for solar cell applications to eliminate the need for sun tracking while maintaining high quantum efficiencies. In other words, these nanostructured coatings allow for high light transmission by eliminating the reflections at most angles of incidence, including the reflections at large angles. It is envisioned that the nanostructured technology can be utilized in optical sighting systems to decrease both the off-angle reflections and overall optical system sizes, while reducing the soldier’s signature on the battlefield without the use of ARDs.
PHASE I: Using N-BK7 or equivalent glass substrate, identify materials and methods for preparing nanostructured anti-reflection coatings. Spectral properties shall be modeled and simulated for angular response. Small-scale proof-of-concept samples shall be produced with identified materials and methods.
PHASE II: Develop prototype anti-reflection coatings with broadband visible transmission that demonstrate minimal angular shift. Coatings will be spectrally analyzed for reflection properties from 0 degrees to 80 degrees. Cross-section imaging will be performed to show microstructure of coating. Coatings shall be developed to meet the durability requirements of MIL-C-675 for immersion, adhesion and abrasion. Coatings are expected to operate from -65 degrees F to +160 degrees F with no degradation. Coatings should withstand high relative humidity at elevated temperatures. Delivery of prototype parts on minimum 45 mm diameter substrates required. Investigation of transmission properties into the short-wavelength infrared (1.4 to 3 µm) coatings shall be evaluated.
PHASE III: Develop large scale, sustainable processing capabilities for anti-reflection coatings for a wide variation of substrate materials and substrate sizes. Dual use capabilities include digital camera lens coatings, solar panel coatings, glasses/spectacle coatings, and optical lens coatings for use with CCD and FPA sensors.
TECHNOLOGY AREAS: Materials/Processes
OBJECTIVE: The development of novel fibers or textiles weaves or other insulation material that is environmentally responsive such that at low temperatures the novel material will provide a higher Clo value and at increased temperatures the novel material will exhibits reduced Clo value. The reactive material will physically react to temperature changes in its surrounding environment as well as body temperature.
DESCRIPTION: The current cold weather garment system is comprised of multiple layers providing different levels of cold and wet weather protection. This cold weather system although versatile requires Soldiers to carry a significant amount of weight and cube. By combining and integrating the capability of the multi layered system a Soldier is able to reduce cube and weight from their equipment load and increase mobility by providing fewer layers.
PHASE I: Research and develop a novel material to effectively provide increased Clo values at a decreasing temperature. The material must be able to provide a cyclic Clo value and is not a powered system. The material solution must be cost effective and industrially producible. The material must be operationally durable to provide abrasion resistance and strength to achieve a 120 day operational mission and provide a threshold 500 and an objective of 1000 cycles of change throughout the life of the material through MIL-STD 810G testing from basic cold to intermediate hot. The material must be able to withstand minimum 20 launderings according to AATCC 135 Dimensional Changes of Fabrics after Home Laundering to evaluate dimensional durability. The material must be inert in nature and hypo-allergenic to not cause any skin irritations. Initially the material does not need to be flame resistant due to the placement of the material as an internal layer. Phase I results deliverables are delivery of a 2 yard lab sample and a final report specifying how full-scale performance and requirements will be accomplished in Phase II. The report shall also include any technical test data, Materials Safety Data Sheets (MSDS), and risk migration measures.
PHASE II: Further develop novel material that will demonstrate a minimum 50% swing in Clo insulation value or m2K/W, the novel material must be reactive between 23°C and -30°C. Demonstrate and validate production process and refine manufacturing process to produce a material that can be easily mass produced. Deliver 10-15 yards of material from each process, an minimum of 3 materials at 3 different loft levels, that demonstrates performance in accordance with the goals in Phase I and 50 Production Demonstration Model of a fleece jacket utilizing the novel material. Define manufacturing issues related to full scale production of material for military and commercial application. Identify durability and safety issues associated with material.
PHASE III: Upon successful completion of the research work in Phase I and Phase II, the new multi-functional materials will be evaluated for potential future US Army field testing. The proposed new environmentally multi-functional materials will also have application into civilian markets, including outdoor recreational, law enforcement, and other Emergency Responders.
TECHNOLOGY AREAS: Electronics, Space Platforms
ACQUISITION PROGRAM: PEO Missiles and Space
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: Develop a single multi-band phased array antenna system for a nanosatellite communications ground station with the capability to simultaneously track and communicate with multiple nanosatellites in multi-plane low earth orbit.
DESCRIPTION: The Space & Missile Defense Command responsive space technology program has been developed to meet the space-related urgent needs of the warfighter in a timely manner. The operational concept calls for responsive space satellites to augment or reconstitute existing “big space” systems. Nanosatellites with masses on the order of 10 kg (22 lbs) or less are receiving an increasing level of attention within the national security community. A large constellation of nanosatellites in multiple Low Earth Orbit (LEO) orbital planes could provide persistent, UAV-like effects for warfighters in one or more theaters. Moreover, multiple satellites would need to be simultaneously tracked and multiple communication bands are envisioned to be employed by a single ground station with a single antenna. However, the ground stations for these satellites currently limit the capabilities of communicating with a constellation of nanosatellites. Although technology for ground stations for the larger Geosynchronous Earth Orbit (GEO) satellite classes is mature, much less development has been done towards ground stations for LEO satellites that have much more demanding requirements for pointing and tracking. A key area of need for tactically relevant military nanosatellite systems is a robust stationary electronically steered antenna that gives nanosatellite ground stations the ability to be transportable, reliable, and to transmit encrypted satellite commands as well as receive encrypted nanosatellite telemetry. Current LEO ground station antennas use large mechanically steered antennas which are single band, track one satellite at a time, have moving parts and lack the reliability, mobility, and the pointing accuracy needed for the higher bands being required for future military systems. Nanosatellite-sized phased array ground station antenna units could significantly enhance the functionality of nanosatellites for warfighters. A single electronically steered antenna is envisioned that can communicate with more than one nanosatellite at a time and would have no moving parts. It would replace the current mechanically steered antennas and mechanical actuators required to establish horizon to horizon links to nanosatellites. Furthermore, a single electronically steered antenna could enable the ground station to establish links in multiple bands to multiple nanosatellites at a given time.
Researchers into phased array antenna innovations for nanosatellite ground station communications should take several constraints under consideration, including:
• Phased array antenna
• Simultaneous multiple satellite tracking/communications-2 satellites (Threshold)
• Horizon to Horizon tracking
• Nanosatellite LEO multi-plane constellations-2 orbital planes (Threshold), 500 kilometer nominal orbits
• Multi-band capable- Frequencies = UHF (230-380 MHz) (Threshold), S-Band (2.025-2.29 GHz) (Threshold), C-Band (4.4-5.0 GHz) (Goal)
• Show path to man transportable size and weight in Phase III.
• Array gain and pointing accuracy sufficient to close satellite link. Minimum 10dB in all bands of interest (Threshold), 30dB (Goal)
• Digital processing and beam-forming techniques
• Acquisition and tracking modes
• Bandwidth = 25 KHz (Threshold) – 5 MHz (Goal)
• Data rate = 2 Kbps (Threshold) – 6 Mbps (Goal)
• Compatibility with planned SMDC nanosatellite systems
PHASE I: Conduct feasibility studies, technical analysis and simulation, and conduct small scale proof of concept demonstrations of proposed Nanosatellite Ground Station Communications Phased Array Antenna innovations. Develop an initial conceptual approach to incorporating a Nanosatellite Ground Station Communications Phased Array Antenna into a nanosatellite ground station and include system estimates for mass, volume, power requirements, and duty cycles. Deliverables should include monthly status reports, feasibility demonstration reports and any hardware produced.
PHASE II: Implement technology assessed in Phase I effort. The Phase II effort should include initial Nanosatellite Ground Station Communications Phased Array Antenna designs, mock-ups, and breadboard validation in a laboratory environment. Initial technical feasibility shall be demonstrated, including a demonstration of key subsystem phenomena. Deliverables should include quarterly status reports, design documentation and any hardware produced.
PHASE III: The contractor shall finalize technology development of the proposed nanosatellite ground station phased array antenna system and begin commercialization of the product. In addition to military communications or intelligence, surveillance and reconnaissance (ISR) missions, commercial civilian applications for a nanosatellite ground station phased array antenna could include space-based satellite communications. Phase III should solidly validate the notion of a nanosatellite ground station phased array Antenna with a low level of technological risk. The goal for full commercialization should ideally be Technology Readiness Level 9, with the actual system proven through successful mission operations. Specifically, Phase III should ultimately produce a nanosatellite ground station phased array antenna suitable for nanosatellite ground station applications. The contractor must also consider manufacturing processes in accordance with the president’s Executive Order on “Encouraging Innovation in Manufacturing” to insure that the innovations developed under this SBIR can be readily manufactured and packaged for transportation and deployment.
During Phase III, this antenna could conceivably transition or expand to the appropriate division of the Army Program Executive Office for Missiles and Space (PEO M&S) upon full rate production and deployment. PEO M&S could maintain a stockpile of nanosatellite ground stations to responsively meet urgent warfighter needs. Simultaneously, commercial versions of the nanosatellite ground station phased array antenna innovations could be produced for civilian and scientific applications. Commercial satellite manufacturers could incorporate them into a variety of commercial satellite systems for sale to various interested customers. Commercial companies could also provide competitively priced nanosatellite-based communications or remote sensing services to paying customers, including the national security community.
PRIVATE SECTOR COMMERCIAL POTENTIAL: There is a perceived potential for commercialization of this technology. The primary customer for the proposed technology will initially be the Department of Defense, but there could also be other applications in the areas of commercial satellite communications.
TECHNOLOGY AREAS: Air Platform, Sensors
ACQUISITION PROGRAM: PEO Missiles and Space
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: To develop a rugged Adaptive Optics (AO) system which will enable Ultra-short Pulse Lasers (USPL), femto second class, to deliver the maximum fluence on target, without ionizing the atmosphere along the beam path, at tactically significant distances under a wide variety of atmospheric turbulence conditions.
DESCRIPTION: USPL have achieved a level of reliability, energy, size, efficiency, and ease of use which have made them attractive for a wide variety of applications critical to DoD missions. In particular, several Laser Guided Energy (LGE) applications have been proposed, some of which include using laser-produced plasma channels for guiding high voltage discharges, remote sensing of chem/bio agents using supercontinuum or terahertz generation, plasma waveguides for electromagnetic energy, and generic countermeasures. In all of these applications, a common feature is the requirement to efficiently transfer the very high (typically >10^12 Watts/cm2) peak intensity levels available with the USPL over distances ranging from several tens of meters to many kilometers under a variety of atmospheric conditions. The reason for this, of course, is that the unique features of these lasers at such high intensities is their ability to induce nonlinear responses in materials, including air, which result in ionization, ultra-wideband frequency generation, and white light generation, and to do so remotely and predictably. It is precisely this aspect which demands the use of Adaptive Optics. For this project we require the adaptive optics be able to produce the maximum fluence and ionization at a specific point in space while minimizing the ionization trail along the beam path.
The atmosphere is not the quiescent, benign medium it appears to be on a pleasant sunny day. Temperature gradients result in index of refraction cells which cause laser beams to break apart as if they were traveling through a series of lenses, and reduces the intensity on target since the beam now spreads out. Aerosols from numerous sources can also cause scattering, reducing the energy deposited on target, and thus, the intensity. Since all the processes alluded to above are nonlinear, some of which depend on the intensity raised to the eighth or ninth power, it is obvious that one cannot tolerate these kinds of losses.
AO uses low power light sources to determine the wavefront deviations near the path to be taken by the higher power laser. Through a closed loop series of algorithms, a deformable mirror (DM) compensates for these distortions such that the beam travels through the atmosphere and arrives at the target with the theoretical minimum spot size or highest achievable spatial resolution. This technique is identical to that used in astronomy to correct for the aberrations that occur in the observation of distant stars (twinkling).
Several aspects of USPL make the choice and production of AO a challenge. First, typical USPL have relatively broad bandwidths due to their short (less than 10^-12 seconds) pulse width. The deformable mirror must not introduce uncorrectable dispersion in the beam, since that would limit the available temporal width of the USPL. Second, typical peak powers in these lasers are on the order of several Terawatts. At these power levels, beams width diameters of mm size will damage any material currently used in coatings. Therefore, the size of the DM and number of actuators must be compatible with this limitation. Third, since the requirement is to produce the minimum spot size possible at a variety of distances during an engagement, the temporal response of the DM as well as the time to process the wavefront data from the guide star must be compatible with the change in the engagement range. Of particular importance is the ability to maintain the focusing ability on rapidly moving objects.
PHASE I: Perform a trade study of existing technology and components and compare the capabilities to the requirements stated above for minimizing plasma channel and ionization except at the target point. The result of this study is to be a series of specifications and recommendations for an adaptive optics system which can be used in existing LGE and USPL systems. Demonstrations at this phase are encouraged if practical.
PHASE II: Based on the results and findings of Phase I, demonstrate the technology by fabricating and testing a prototype in a laboratory environment. Assemble a proof-of-principle device and demonstrate the proposed technology and its ability to signal an attack warning and to identify its characteristics. Identify and address technological hurdles. The proposed development and demonstration should be limited to what can be demonstrated in a Phase II program and should identify the means necessary to transition the technology.
PHASE III: This technology could be used in a broad range of military and commercial applications such as rapid remote chemical analysis. The final embodiment of this device would be a standalone hardware package and set of specifications that could be integrated into a mobile military platform.
TECHNOLOGY AREAS: Information Systems, Sensors, Electronics, Weapons
ACQUISITION PROGRAM: PEO Missiles and Space
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: Develop and demonstrate innovative tools, techniques or decision support frameworks for the identification, tracking, and mitigation of risks associated with malicious attacks on critical embedded information and communications technology (ICT) within a weapon system supply chain lifecycle.
DESCRIPTION: As DOD has become increasingly dependent on embedded information and communications technology (ICT) to conduct mission operations, the need for assurance of ICT processing assets has grown. The industrial base for these capabilities is composed of global—and, largely, non-U.S.—suppliers that build, maintain, and upgrade these assets. This reliance upon globally sourced ICT poses unique challenges for acquisition program managers and contracting officers because it exposes DOD systems and networks to an increasing risk of exploitation. These concerns have led Congress to support DOD efforts to develop systemic approaches to managing the risk by focusing on key acquisition programs.
In January 2008, National Security Presidential Directive 54/Homeland Security Presidential Directive 23 and the National Cybersecurity Initiative (CNCI) were launched. They were mutually reinforcing initiatives with major goals designed to secure the United States in cyberspace. The CNCI includes the supply chain risk management (SCRM) initiative, which is the basis for DOD policy directing that supply chain risk will be addressed early and across the entire life cycle to manage ICT integrity within covered systems. The policy will require the services and government agencies to put measures in place to respond to this concern. Addressing this threat to DoD systems and networks will require access to information and effective use of that information. The supplier network for a weapon system for example, can be quite large. The larger the supplier network, the larger the risk. Multiple threat vectors are possible. Being able to visualize and manage the threat based on system priority, component criticality levels, available counter-intelligence data, etc, is essential for mission assurance.
This focus of this topic is to develop tools, techniques and decision support frameworks that will assist key stakeholders in identifying, tracking, and mitigating risk throughout the supply chain lifecycle. Weapon system critical data, hardware, software, firmware, services and system infrastructure are subject to malicious attacks and new techniques are needed to quickly, accurately and reliably identifies threats throughout the lifecycle and integrate this information in an easily understood manner so key stakeholders can make informed decisions. Existing supply chain risk management techniques do not specifically address the unique threats associated with embedded information and communications technology.
The goal is a global picture of the supply chain network that will provide a common interface to assimilate the relevant data and effectively manage and report on the threat within a specific system. New tools, techniques and decision support frameworks that address the uniqueness of the information and communication technology aspects of the supply chain support this goal and will increase the likelihood of mission success.
Innovative solutions are being sought, but not limited to, the following specific areas that support the identification, tracking, and mitigation of risk associated with attacks on the information and communications technology aspect of the supply chain:
1) geospatial visualization of the supply chain network specific to a system and the ability to integrate that information from current available sources where they exist
2) component criticality identification and analysis
3) counter-intelligence information integration
4) component (i.e., bios, firmware) integrity analysis
5) secure portals and frameworks for data assimilation and integration
The technology developed or utilized for this topic should be innovative, collaborative and secure. Collaboration is fast becoming a fundamental component in today’s solutions. The ability to share information securely and efficiently is expected.
PHASE I: 1) Research and develop tools, techniques, or decision support frameworks that assist in supply chain risk management for information and communication technology of weapon systems. 2) Provide a proof-of-concept prototype demonstrating the feasibility of the concept.
PHASE II: Based on the results from Phase I, refine and extend the design into a fully functioning pre-production prototype.
PHASE III: Develop the prototype into a comprehensive solution for the application of supply chain risk management. This capability would not only benefit DoD weapon and support systems, but also commercial organizations.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Electronics
ACQUISITION PROGRAM: PEO Ground Combat Systems
OBJECTIVE: Design a 28VDC 16 channel silicon carbide (SiC) based power distribution box capable of operating across on all military ground vehicles. Using SiC materials; size, weight, and cooling requirements should be reduced while max current throughput is increased from silicon based designs.
DESCRIPTION: Advanced SiC solid state technology is necessary for future military vehicle systems with increased power demand. Vehicle electrical power requirements are growing and without technological advances, trade-offs will have to be made on payload vs. capability. The electrical power distribution devices must account for safety, efficiency, scalability, configurability, CAN control, integration, and robust stable operation. The solution will have the processing power necessary fault detection and handling capabilities, built-in diagnostics, and stand alone and remote control in a compact device suitable for use in military ground vehicle applications. The use of wide temperature power electronics that can operate in a -50C-71C ambient environment is required. Topic proposals should focus on scalable power units capable of distributing 250amps 28VDC from a single 16 channel device and be capable of paralleling devices together to provide 500, 750, and 1000amp distribution to a single load using multiple 16 channel boxes.
PHASE I: Develop a proof of concept for an advanced intelligent 28VDC SiC power module that addresses the features and functionality described above. A technically feasible solution must be analytically or objectively shown in Phase I and meet the same performance requirements as what would be required for a modernized combat vehicle.
PHASE II: Electrical, thermal, mechanical, and functional aspects of a 28VDC solid state SiC 16 channel power control solution will be designed, developed, and built. Demonstration and technology evaluation will take place in a relevant laboratory environment or on a military ground vehicle system. Phase II will reach at least TRL 5 and commercial viability will be quantified.
PHASE III: Mechanical packaging and integration of the solution into a vehicle with low voltage power buses will be achieved and a technology transition will occur so the device can be used in military ground vehicle applications.
TECHNOLOGY AREAS: Sensors, Weapons
ACQUISITION PROGRAM: Joint Non-Lethal Weapons Program; (ACAT IV)
OBJECTIVE: Non-lethal weaponization of ultra-short pulse (pico-femtosecond) laser systems to produce laser induced plasma detonation (LIPD) in air or on material targets in close proximity to targeted humans. Current LIPD systems are capable of producing some optical out-put and a buzzing sound. We are interested in out-puts, comparable to existing flashbang systems. This capability is intended to produce non-lethal effects on human targets. Systems intended for use against material targets cannot be used in non-lethal scenarios and vice versa.
DESCRIPTION: The creation of plasma with a laser beam is utilized in technologies such as laser induced plasma spectroscopy and surface physics ultra-short pulse (pico-femtosecond) lasers. Similar technology could be potentially utilized in the non-lethal weapons sector to create a visual and auditory deterrent at a given range by ionizing air or ablating a solid target. Options are sought to design an above the state of the art non-lethal weapons system capable of creating laser plasma bursts while keeping the optical system resilient and portable by military means (personnel or small vehicle). Recent laser material development can be utilized in the design of the non-lethal system which should radiate at wavelengths greater than 1.4 microns to ensure retinal safety from inadvertent ocular exposure, with as small of a form factor as possible to create apparently continuous plasma. Goals for visual cues or temporary visual impairment include bright flashes and a bright light spray as a result of plasma bursts. Auditory cues should be the result of an extremely irritating buzz to be achieved through highly repeated plasma production at multiple plasma bursts per second and may be modulated to convey coherent, audible messages.
PHASE I: Analytically demonstrate that a laser system is capable of using retina-safe lasers to produce plasma with non-lethal effects at a range of hundreds of meters.
PHASE II: Develop and demonstrate a brassboard system capable of plasma production beyond 100 m.
PHASE III: Develop a system prototype that is portable by military means (personnel or small vehicle).
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: This technology could be used by any branch of the military or by civilian forces as a visual and/or auditory cue as a deterrent at an extended range to deny, move, or suppress personnel with the possibility of physical cues in the form of shockwaves or heat.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Materials/Processes
ACQUISITION PROGRAM: None
OBJECTIVE: Design and demonstrate an innovative tie-down that enables loading more vehicles on amphibious ships, without modifying the ships or the vehicles.
DESCRIPTION: System that meets heavy weather requirements for securing existing vehicles to existing ship decks while reducing broken stow (target broken stow is 20%). Solution must be a product that is lightweight, easily handled, low maintenance and compatible with a salt-water environment. (Broken stow is the ratio of unusable deck space on (due to cargo tie-down configuration, or etc) to total deck space. Broken stow represents lost opportunity to carry additional vehicles, impacting our warfighters. Broken stow is affected by lashing/tie-down requirements, configuration and lashing material used.)
Tie-down standards (number of tie-down provisions and G-force criteria) for vehicles and equipment are outlined in Military Standard 209K. A tie-down configuration that meets heavy weather requirement results in a broken stow of approximately 70%. 70% broken stow reduces the equipment a MEU can transport too much to be effective.
Instead, a typical current tie-down configuration utilizes 4 tie-downs from vehicle to the deck; each is 2-4 ft long, 90 degrees (from the longitudinal axis) and 30-60 degrees (from the vertical axis). Utilizing this configuration results in a broken stow factor of approximately 35%, but it does not meet heavy weather requirements. Typical lashing material is chains with strength ranging from 15,000 lbs to 70,000 lbs. The chains are heavy (weighing up to 90 lbs each), cumbersome and labor intensive.
One approach would be to develop a restraint that can run from attachment points on the deck under the vehicle to the vehicle attachment points. The challenge with such an approach is to design something that can be employed by a service member in the limited space under a military vehicle.
Proposers cannot modify the ship or vehicle designs. The solution must take into account the size and weight of the equipment being restrained.
PHASE I: Research needs to identify possible technologies for cargo restraints onboard amphibious shipping which can meet the below reference criteria (heavy weather).
PHASE II: Develop and demonstrate a prototype system in a realistic environment. Conduct testing to prove feasibility over extended operating conditions. The Marine Corps will provide vehicle(s) and test resources.
PHASE III: This system could be used in a broad range of military and civilian applications where mobile loads have to be secured for transportation. Examples include rail movement and commercial shipboard movement of wheeled heavy vehicles.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: This system could be used in a broad range of military and civilian applications where mobile loads have to be secured for transportation. Examples include rail movement and commercial shipboard movement of wheeled heavy vehicles.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Materials/Processes, Biomedical, Weapons
ACQUISITION PROGRAM: PM Advanced Amphibious Assault, ACAT I
RESTRICTION ON PERFORMANCE BY FOREIGN CITIZENS (i.e., those holding non-U.S. Passports): This topic is “ITAR Restricted”. The information and materials provided pursuant to or resulting from this topic are restricted under the International Traffic in Arms Regulations (ITAR), 22 CFR Parts 120 - 130, which control the export of defense-related material and services, including the export of sensitive technical data. Foreign Citizens may perform work under an award resulting from this topic only if they hold the “Permanent Resident Card”, or are designated as “Protected Individuals” as defined by 8 U.S.C. 1324b(a)(3). If a proposal for this topic contains participation by a foreign citizen who is not in one of the above two categories, the proposal will be rejected.
DESCRIPTION: The Marine Corps has numerous tracked and wheeled vehicles designed to operate over harsh off-road terrain, oceans and riverine environments. Generally the design of a vehicle is subject to competing requirements: 1) mobility, 2) combat effectiveness and carrying capacity, and 3) survivability. All vehicles undergo tests to determine specification compliance and survivability using direct and indirect fire weapons, explosive charges, IED’s etc. Current trends in vehicle survivability are directed towards a base armor with modular appliqué systems available for increased protection geared towards specific threats. With the myriad of configurations of materials available it is desired that desktop software be developed for the evaluation of vehicles subjected to explosions and ballistic impact. Currently several organizations such as DARPA, ARL and NSWC are working on software development. However this work is for hydrocode (finite element) applications such as CTH, LS-DYNA and ANSYS. Current state of the art finite element software require days to weeks to develop a model and require a minimum of an hour to complete one configuration (very simple model). This is the drawback to using finite element models for initial screening of designs. This software is to be used as a design tool able to execute multiple iterations i.e. armor configurations on a desktop or laptop computer and should include the acceleration effects to the vehicle in a short time period compared to 6 finite element analyses. It is envisioned that this application would utilize a spreadsheet as its basic operating system. The first-order design tool is to screen designs solutions so that more detailed finite element analyses can be limited to the most promising designs.. In all cases the software will permit iteration on input parameters.
The desired capabilities are as follows:
1. Estimate V50 and Vxx (V0, V90, V100, etc.) and penetration depth of irregular fragments, projectiles and Fragment Simulating Projectiles (FSP) into various materials used in armor constructions.
2. Estimate crater dimensions from charge weight and depth of burial or estimate charge weight and depth of burst from crater dimensions.
3. Estimate pressure and impulse time histories for both free air and hemispherical surface bursts.
4. Compute blast forces over a 2-D shape, produce side-on and reflected pressure and impulse histories. Produce 3-D plots and animations of the blast.
5. Estimate exterior ballistics data using 3-degree-of-freedom calculations for irregular fragments, projectiles and FSPs in order to produce plots of the output.
6. Estimate plate deflection for homogeneous metals, the likelihood of plate fracture, and the response of a virtual accelerometer placed anywhere on the structure due to blast. Produce plots and animations of the response.
PHASE I: The contractor shall conduct research and develop software for evaluation of vehicles subjected to explosions and ballistic impacts for use in evaluating the vehicles performance. The contractor shall create a software design with either a single (preferred) or separate applications to generate first order performance characteristics. The contractor shall conduct a Kick-off and a Final Review meeting at the Program Office in Woodbridge, VA. Monthly reports are required.
PHASE II: The contractor shall verify and validate the software using existing unclassified ballistic test data to specified performance levels. The contractor shall provide prototype software for evaluation. The contractor shall conduct a Kick-off, 3 Semi-Annual Reviews and a Final Review meeting at the Program Office in Woodbridge, VA. Monthly reports are required.
PHASE III: Transition technology into production via sales to the US Army and US Marine Corps.
Private Sector Use of Technology: Successful development and characterization of ballistic evaluation software has direct application to a wide variety of requirements for use in development and evaluation of various military and commercial vehicles. This technology is directly applicable to all combat vehicle development and test and the evaluation of protection requirements of body armor.
TECHNOLOGY AREAS: Weapons
ACQUISITION PROGRAM: Joint Non-Lethal Weapons Program; (ACAT IV)
OBJECTIVE: To develop a non-lethal malodorant weapon which can be dispersed from a 40mm delivered munition (fired from standard 40mm launcher) or a hand-thrown munition. Malodorous payloads must be effective at repelling humans, while being maintained at concentrations that do not trigger trigeminal nerve activation. Above the concentration threshold of trigeminal nerve activation, chemicals must be classified as Riot Control Agents per the Chemical Weapons Convention.
DESCRIPTION: The Department of Defense (DoD) has developed and tested a malodorant payload, potentially capable of repelling humans at concentrations that do not cause trigeminal nerve activation. Previous attempts to seal this payload into a tactical form-factor, such as a hand-thrown grenade or 40mm-muntion have not been successful as the chemical composition is highly volatile. A malodorant weapon could therefore be created by two means: 1) Developing a sealing or encapsulation technique capable of preventing leaks of the government developed malodorous payload 2) Developing a new malodorous payload.
PHASE I: If a new payload is proposed, develop and submit IRB protocols for two sequential experiments. The first will use a lateralization test to determine the threshold at which trigeminal nerve activation occurs. The second will determine the effectiveness at repelling human subjects from an area at concentrations below the established threshold. Perform these two tests.
If it is proposed to use the government developed malodorous payload, develop and submit an IRB protocol to determine the effectiveness at repelling human subjects from an area at concentrations below the established threshold. Perform this test.
Using the results of these tests, determine the feasibility of using malodorants to remove individuals from enclosed spaces. Estimate the number of munitions required t0 generate effective concentrations in an enclosed 5m x 5m x 3m space.
PHASE II: Develop and demonstrate an initial prototype of a malodorant munition that does not leak payload despite the shock expected from transportation and handling in military environments. Show concentration measurements as a function of time and area/volume denied.
PHASE III: Develop and test a mature prototype in a relevant military environment. Demonstrate effectiveness against highly and lightly motivated personnel.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: This technology could be used by any branch of the military or by civilian forces to deny, move, or suppress personnel.
TECHNOLOGY AREAS: Sensors
ACQUISITION PROGRAM: PMS 406 Unmanned Influence Sweep System Program of Record - ACAT III
OBJECTIVE: To develop an optical perception system for unmanned surface vessels (USVs) to support the lookout function as defined by COMDTINST M16672.2D, “Navigation Rules” Rule 5.
Transition Path: Littoral Combat Ship (LCS) Mine Warfare Mission Package: Unmanned Influence Sweep System (UISS) and other Navy USVs under PEO LMW PMS420 Unmanned Maritime Systems Program Office
DESRIPTION: The Unmanned Surface Vehicle (USV) at the heart of the UISS is required to follow Navigation Rule 5: “Every vessel shall at all times maintain a proper look-out by sight and hearing as well as by all available means appropriate in the prevailing circumstances and conditions so as to make a full appraisal of the situation and of the risk of collision.” Since the vessel is unmanned, the lookout function must be supported by a perception system consisting of sensors and processing that provide situational appraisal to a remote operator of the USV and to an onboard automated command and control system.
The current capability for providing the lookout function onboard the USV consists of a camera system, a radar and microphone. These provide only a rudimentary situational awareness without sufficient data to enable appropriate action based on a full appraisal of the situation and the risk of collision. The focus of this topic is to develop an innovative optical sensor and processor subsystem for the total perception processing system. The optical subsystem will provide a continuous 360 degree field of view, process the raw data and provide the contact attributes as an output to an operator or an onboard autonomous control system to support obstacle/collision avoidance in accordance with Navigation Rule 5. Current state of the art optical perception systems do not meet the goals of USV operational needs with respect to the Navigation Rules. The Navy has reviewed and used a variety of optical technologies and strategies to provide USVs with optical situational awareness (SA) and contact detection (CD), but to date these approaches lack the ability to satisfactorily capture images and process the digital data, and fail to meet requirements with respect to performance (stabilization, coverage, range, obstacle detection) and environment (shock, water intrusion, green water impact).
These existing technologies, furthermore, are not suitable for supporting even basic USV operation by a remote operator. Existing technology simply overloads the operator with information. A human onboard a craft can quickly rotate to get a 360 degree appraisal of the environment and is self stabilizing. An operator behind a remote console controlling a pan-tilt-zoom camera or switching between multiple fixed camera views, as is required by current technology, is an extremely ineffective and fatiguing approach. The processor subsystem should collect all data from the sensor and process the data into a useable output format. Output types would include streaming video, still pictures of contacts of interest and contact attribute data.
Contacts may include all sizes of power and sailing vessels, buoys and other navigation markers, structures on land including light houses and floating, semi-submerged debris (log to ISO container). Attributes may include contact size, height to length ratio, range, bearing and speed/direction. The objective is to provide the contact attributes a person would need to make a full appraisal of the situation and of the risk of collision.
The processor shall have the capability to detect navigation lights and day shapes on other vessels (Navigation Rules, Part C) from the raw sensor data and provide their attributes. The processor shall also have the capability to detect and provide attributes of navigation aids such as color, lights and shapes.
Environmental effects must be taken into account in developing the optical subsystem. These include water intrusion/impacts and craft motions. State of the art systems not been operated in higher sea states and thus have not addressed such issues as motions, shock, vibration, water spray and water impact. The optical subsystem must be capable of both performing and surviving in the intended environment.
The subsystem must be able to receive communications directing it, for example, to zoom in on an image or replay a captured sequence. This communication could come from a remote human operator or an onboard autonomous control system, both of which will be receiving inputs from the radar and audio sensor subsystems. Such communications will allow the optical subsystem to “focus” both the optical sensor as well as processing power on an indicated area. This would be similar to a human operator who hears something coming from a particular direction and focuses in that direction. Further development and integration into a complete perception processing system could occur under Phase III, but it is only the intent of this topic to define such interfaces.
Reference 1, slide 14, provides a picture of the USV and its principal hardware including the current navigation sensors. The desired camera subsystem should have a field of view (FOV) that provides 360 degrees in the horizontal plane and be able to view contacts on the water surface from within 10 yards (man in the water and larger) of the vessel to the horizon (12m long by 3m high and larger) during operation, which includes significant vessel motions (e.g., incurred during sea state 3 operations) and operations in all visibility conditions (day, night, rain, snow, fog, etc.). The processor shall have the capability to detect a contact on the water or shore from the raw sensor data, and provide contact attributes. Maximum detection range for navigation aids, such as buoys, and other vessels is two nautical miles and minimum detection range is 10 yards. Determination of specific requirements for resolution will be the responsibility of the proposer and shall be based on the processors’ requirements to perform contact detection as defined below. The camera subsystem would typically be mounted on an arch approx 10’ off the water, and is subject to sea spray, direct sunlight and occasional green water impacts.
This SBIR topic is not soliciting the development of computer hardware technology as part of the perception processing system. Ruggedized computing systems exist on the market. Environmental requirements can be met by either using a ruggedized computer able to directly handle the environment or by repackaging the system (shock mounts, cooling, etc.). However, novel optical processing techniques and technologies shall be used to minimize the required processing power and footprint. Hardware selection shall address environmental issues. The processor would normally be installed below decks, in a relatively sheltered compartment not directly exposed to the elements.
PHASE I: Complete preliminary design for the proposed optical sub-system. The design should include details on system hardware and software architecture and should specify key system components and their expected performance. Provide convincing evidence of the feasibility of the system design to meet the objectives of the topic. Perform bench top experimentation where applicable to demonstrate concepts.
PHASE II: Develop detailed hardware and software design for the optical sub-system. Fabricate and test a prototype. In a laboratory environment demonstrate that the prototype meets the performance goals established in Phase I. Verify final prototype operation in a representative environment and provide results. Develop a cost benefit analysis and a Phase III installation, testing, and validation plan.
PHASE III: Construct a full-scale prototype and install on board a selected combatant craft. Conduct extended shipboard testing. Support transition and integration of the subsystem into a full system, including radar and audio subsystems.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: The technology developed under this topic will be applicable to any Unmanned Surface Vehicle of similar size and outfitting as the UISS USV. As radar has greatly helped the maritime industry with regards to safe navigation, optical perception systems can also enhance safe navigation of manned and unmanned craft alike.
TECHNOLOGY AREAS: Information Systems, Sensors, Weapons
ACQUISITION PROGRAM: Undersea Defensive Warfare Systems Program Office (PMS 415). ACAT III
RESTRICTION ON PERFORMANCE BY FOREIGN CITIZENS (i.e., those holding non-U.S. Passports): This topic is “ITAR Restricted”. The information and materials provided pursuant to or resulting from this topic are restricted under the International Traffic in Arms Regulations (ITAR), 22 CFR Parts 120 - 130, which control the export of defense-related material and services, including the export of sensitive technical data. Foreign Citizens may perform work under an award resulting from this topic only if they hold the “Permanent Resident Card”, or are designated as “Protected Individuals” as defined by 8 U.S.C. 1324b(a)(3). If a proposal for this topic contains participation by a foreign citizen who is not in one of the above two categories, the proposal will be rejected.
OBJECTIVE: The objective of this SBIR is to optimize fire control through innovative research and development in machine cognitive decision theory to develop a fire control decision engine that addresses the complexities associated with the simultaneous engagement of multiple concurrent hostile torpedoes while addressing the uncertainty dimensions and associated constraints.
DESCRIPTION: The Torpedo Warning System is a man-in-the-loop system that couples active and passive sonar components with a fire control decision engine to engage incoming torpedoes with CATs. The man-in-the-loop role is to apply situation awareness using a clear and simple information display to validate automated torpedo alerts and to make decisions concerning launch of CATs and ship’s evasive maneuvers. The actual fire control guidance to optimize CAT effectiveness is automated. Current program-of-record fire control solutions are built upon an explicit enumeration of inputs and behaviors where system designers attempt to anticipate all possible behaviors of the system. This solution provides a base capability that is repeatable and auditable, but not robust in the entire solution space.
Recent academic developments in the area of adaptive machine learning have not been applied in this arena. This SBIR seeks research only in the application of Adaptive Learning techniques to the TWS multi-target problem. Machine learning systems adaptively improve with exposure to the problem space. Evolutionary algorithms, genetic programs, classical neural networks, spiking nets, and learning classifier systems seem suitable to address this problem. This topic does not seek development of all the technologies mentioned above but does seek the application of one or more of these implicit techniques to the Torpedo Warning System (TWS) problem that is measurably superior to the program-of-record approach. Small businesses will utilize modeled or simulated data based upon publicly available information to develop the Adaptive Learning approach through phase II. Given that learning systems provide limited auditability, the proposed solution must prove to be deterministic in the sense that, once deployed, the behavior in a given set of circumstances must always be the same (repeatable).
PHASE I: Develop criteria concepts to discriminate amongst modern machine learning approaches with applicability to Torpedo Warning System (TWS). Provide recommended approach/design for prototype system with Phase II program plan.
PHASE II: Develop prototype machine learning system based upon results of Phase I, using simulated data. Develop Metrics and assess relative performance of learning system against explicit enumerated system.
PHASE III: Provide development of a scalable system with interfaces to Torpedo Warning System (TWS) and implement the recommended system developed under Phase II. Evaluate and demonstrate the system’s ability to augment the Torpedo Warning System (TWS).
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Advances in machine cognitive decision theory are applicable to automation efforts going on in commercial rail industry, automobile automation programs, robotics industry, as well as the commercial power industry.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Electronics
ACQUISITION PROGRAM: PMS 320, Electric Ships Office
OBJECTIVE: Develop a battery energy, storage management/electrical safety device to ensure correct operation, prevention of abusive conditions and storage system condition awareness pertaining to large rechargeable energy storage systems.
DESCRIPTION: Energy storage is an enabler for a growing number of applications onboard Navy platforms to enhance functionality and fuel savings. In certain situations, an energy storage device may serve as the primary power source for operations, in other applications the device might be required to monitor a distributed network of devices of various types which must collectively work together in order to meet specific power requirements. Current battery management systems are disparate in nature, resident within the battery itself and typically only perform minimal operational monitoring (voltage and temperature cut-outs) of energy storage devices for the purpose of preventing abusive conditions. Regardless of application, safety and the individual as well as collective condition awareness of the energy storage devices which comprise an overall system are key areas of technology need for which there is no currently available solution. Independent of host platform and application, the management and monitoring of future energy storage systems will need to be able to diagnosis and prognosis battery health, identify and report anomalies associated with battery degradation, and ultimately have the capability to provide forewarning of a potential casualty event.
This topic seeks to explore innovative approaches to the development of a Battery Management System (BMS) device which would allow ships force the ability to control critical parameters associated with thresholds of abusive or otherwise hazardous or non-optimal conditions in energy storage architectures up to 1000 VDC minimum. Proposed concept(s) should employ open architecture design principles to enable the ability to be tuned to a variety of secondary battery chemistries, device types (including the batteries, energy storage capacitors, hybrid devices, etc. from different manufacturers and of different sub-varieties (not associated with any one type or manufacturer)) and architectures to provide awareness of the operational characteristics of the system on a cell-by-cell basis. A key technical challenge will be in the ability to develop sophisticated algorithm(s) that will permit the integration of relevant operational and physical data, which can be obtained from both normal use and enhanced monitoring, while being able to determine changes in performance and forecast degradation and pending failures within the energy storage system or a singular cell. Additional inputs for consideration could be, but are not limited to, current probe monitoring of the battery string, gas/smoke sensor signals, and outputs to control contactors, switches, relays, warning lights, etc. Proposed concepts must be adaptable and applied in a simple and straightforward manner such that any number of end-users can utilize the system with minimal learning curve. In addition, proposers should be mindful of the goal of a flexible design to allow for application on future battery designs and naval applications with interface, input-output and processing capability while allowing for enable local monitoring and control as well as connectivity and communications with the various shipboard controls and reporting systems. Upon completion of Phase II proposed concepts should address the ability to pass Navy standard electrical safety device certification tests (in accordance with ref. 1 & 2, NAVSEAINST9310, S9310-AQ-SAF-010 Section 2.3.7.2.5, and modified as needed for all implemented cutout parameters, e.g. voltage, temperature, etc.).
PHASE I: Demonstrate the feasibility of the innovative approaches to the development of a Battery Management System (BMS) device which would allow ships force the ability to control critical parameters associated with thresholds of abusive or otherwise hazardous or non-optimal conditions in energy storage architectures up to 1000 VDC minimum. As applicable, demonstrate the effectiveness of the solution with modeling and simulation and engineering analysis. Establish performance goals and provide a Phase II developmental approach and schedule that contains discrete milestones for product development.
PHASE II: Develop, fabricate and demonstrate a prototype as identified in Phase I. In a laboratory environment, demonstrate that the prototype meets the performance goals established in Phase I. Conduct performance integration and risk assessments. Develop a cost benefit analysis and cost estimate for a naval shipboard unit. Provide a Phase III installation, testing and validation plan.
PHASE III: Working with the Navy and applicable Industry partners, demonstrate application with an energy storage module to be implemented within shipboard and/or land-based test site to support fuel saving or other applications. This initial testing will then support transition into numerous energy storage applications. This effort will provide detail drawings and specifications, including documentation for manipulation of management operations and detailed explanation of the operation of the device software. The Proposer will perform Electrical Safety Device evaluation in accordance with reference 2 for the module as defined.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Commonality within battery management system interfaces, communications and architectures will enable standards to be set which can effect applications associated with smart grid, vehicle applications, renewable, etc., particularly when implemented in large storage systems.
TECHNOLOGY AREAS: Materials/Processes
ACQUISITION PROGRAM: PMS 392 IN-SERVICE STRATEGIC AND ATTACK SUBMARINES AND NEW CONSTRUCTION.
OBJECTIVE: To develop a sealant, equivalent to the existing PR-944F polysulfide material, to fill and fair-in the fastener head and cavities on submarine exterior hulls in order to level the surface and protect the fasteners from seawater. The sealant must be significantly easier to remove than PR-944F without increasing installation and cure times.
DESCRIPTION: Countersunk fastener hole cavities (up to 5” diameter and up to 3” thick) on submarine exterior hulls are filled and faired with PR-944F polysulfide sealant to level the surface and protect fasteners from seawater. In order to remove the fasteners the polysulfide sealant, PR-944F, must first be removed. The removal of this sealant is very labor intensive and requires hand tools. For example, ship yards estimate that to remove the PR-944F polysulfide from submarine hulls takes 1251 man hours of labor to remove all PR-944F seam filler during a typical major availability.
An equivalent, alternate sealant that is easier to remove is sought to reduce the time and labor currently required for maintenance, thus reducing costs to the navy. The sealant must exhibit hydrolytic stability when immersed in seawater and exposed to pressure cycling; must be environmentally friendly; safe for workers to use; have no adverse impacts on fastener materials, epoxy paint, rubber, urethane, metallic and Glass Reinforced Plastic (GRP) substrates; and provide adequate adhesion to fastener materials, metallic/nonmetallic substrates, paint systems and hull coatings to remain affixed while at sea. It must exclude water under pressure from the surfaces it adheres to and have minimal compression/set under pressure. The application method must be feasible from a vertical, horizontal, or overhead location with minimal sags, runs, or drips without increasing installation and cure times beyond those currently existing for the PR-944F. Installation, storage, shipping environments and requirements must be no more stringent than those currently required for PR-944F. Sealant packaging costs and shelf life shall be equivalent or superior to those for the current system.
PHASE I: Develop and define a concept to identify an environmentally friendly, safe sealant that is easier to remove than the current PR-944F. Define concepts to show its capability to replace PR-944F on submarine hulls with equivalent capability to exclude water under pressure from the surfaces to which it is applied. Concepts must include test methodologies for measuring hydrolytic stability when immersed in seawater and exposed to pressure cycling with minimal compression/set. Conceptual materials must have no adverse impacts on fastener materials, epoxy paint, rubber, urethane, metallic and Glass Reinforced Plastic (GRP) substrates, and provide adequate adhesion to fastener materials, metallic/nonmetallic substrates, paint systems and hull coatings to remain affixed in an at-sea environment.
PHASE II. Demonstrate and validate the sealant identified from Phase I to replace PR-944F on representative submarine hull section or mock-up that incorporates the desired typical features of interest. This includes countersunk fastener hole cavities up to 5” diameter and up to 3” thick. Evaluate the sealant from Phase I to validate that it can be prepared and installed without increasing installation and cure times beyond those required by PR-944F. Verify installation environment requirements. The application method must be demonstrated to be feasible from a vertical, horizontal, or overhead location with minimal sags, runs, or drips. Ensure cured sealant does not shrink causing separation from edges or exposing substrate.
Removal methods shall be identified and employed to evaluate the ease of removal for the sealant. During removal of the selected material, it shall be demonstrated that there is no adverse impact on fastener materials, surrounding paint and hull coatings, as well as substrates.
The environmental requirements for material installation, storage and shipping will be determined and must be no more stringent than those currently required for PR-944F. MSDS and material data sheets for the material shall be generated and supplied. The required sealant kit packaging costs shall be determined and must be no more than the existing material costs. Determine and evaluate any receipt inspection and quality assurance testing necessary for the sealant from Phase I including periodicity and test procedures.
PHASE III: Evaluate and validate the sealant to ensure that it meets the prescribed properties through testing a representative fabricated submarine hull section with fastener cavities. A representative fabricated hull section should also be tested to evaluate the ease of removal of the sealant. The application method must be demonstrated to be feasible from a vertical, horizontal, or overhead location with minimal sags, runs, or drips, and the sealant must also be verified to be environmentally friendly and safe. Evaluate the sealant from Phase II to validate that it can be installed without increasing installation and cure times beyond those required by PR-944F. Verify installation environment requirements.
The environments and requirements for material installation, storage and shipping will be determined and must be no more stringent than those currently required for PR-944F Material Safety. Data Sheets for the material shall be generated and supplied. The required sealant kit packaging costs shall be determined and must be no more than the existing material costs. The shelf life for the sealant from Phase II shall be determined and shall be no less than 1-year (preference for over 2 years). Determine and evaluate any receipt inspection and quality assurance testing necessary for the sealant from Phase II including periodicity and test procedures.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Marine and architectural sealant.
TECHNOLOGY AREAS: Sensors
ACQUISITION PROGRAM: PMS-450 Virginia Class (ACAT I)
OBJECTIVE: Modern electronic warfare systems typically operate over very wide bandwidths of up to 40GHz. The goal of next generation WB EW systems is to ensure 100% POI with high dynamic range in order to detect and classify signals of interest (SOI) in dense target environments while reducing size, weight, power (SWaP) and cost. In order to effectively perform in this manner and over these bandwidths, innovative end-to-end spectral processing and analysis improvements are needed from the antenna to the receiver. Current IFM, notch filtering, analog channelization, high speed scanning and automatic gain control technologies as well as digital signal processing techniques can help overcome certain aspects of this problem, but have their own shortcomings with respect to the overall system SWaP, cost and performance.
What is needed is an innovative WB (up to 40GHz) RF spectrum management architecture that can tolerate and dynamically adapt in response to large in-band interferers. This will improve the EW system’s ability to effectively detect and classify SOIs in dense, interference dominated RF environments, such as those encountered in the littorals. In other words, an architecture is needed which continually attempts to maximize S/(N+I) over wide bandwidths, but does not significantly increase system SWaP and cost.
DESCRIPTION: Modern electronic warfare systems typically operate over very wide bandwidths of up to 40GHz. The goal of next generation WB EW systems is to ensure 100% POI with high dynamic range in order to detect and classify signals of interest (SOI) in dense target environments while reducing size, weight, power (SWaP) and cost. In order to effectively perform in this manner and over these bandwidths, innovative end-to-end spectral processing and analysis improvements are needed from the antenna to the receiver. Current IFM, notch filtering, analog channelization, high speed scanning and automatic gain control technologies as well as digital signal processing techniques can help overcome certain aspects of this problem, but have their own shortcomings with respect to the overall system SWaP, cost and performance.
What is needed is an innovative RF spectrum management architecture that can tolerate and dynamically adapt in response to large in-band interferers. This will improve the EW system’s ability to effectively detect and classify SOIs in dense, interference dominated RF environments, such as those encountered in the littorals. In other words, an architecture is needed which continually attempts to maximize S/(N+I) over wide bandwidths, but does not significantly increase system SWaP and cost.
PHASE I: Develop an innovative and cost effective RF spectrum management architecture which provides 100% POI with a minimum of 70dB (80dB desired) of dynamic range over 18GHz (40GHz desired) and maximizes S/(N&I). Demonstrate the performance of the approach via simulation. Show how the architecture cost vs. performance scales as a function of instantaneous BW and total N+I power (assume both NB and WB interference).
PHASE II: Implement a scaled prototype of the proposed architecture based on the concept developed in Phase I over a subset of the overall required instantaneous BW. The prototype must provide a means to measure S/(N+I) when connected to an RF input with a BW greater than or equal to the prototype. If possible, a demonstration on a representative system (e.g., radar band EW system) in a laboratory environment is preferred.
PHASE III: The architecture will be transitioned to one or more Navy EW and airborne early warning programs, such as the AN/BLQ-10 or AN/SLQ-32. This improved architecture will be ideal for Virginia (VA) Block IV/V and Ohio Replacement Program (ORP) to realize the full potential of EW sensor improvements for these platforms.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: The technology developed here for EW sensors should be readily applicable to commercial and military communications systems, radar systems and Counter Radio Controlled IED detection systems.
TECHNOLOGY AREAS: Sensors
ACQUISITION PROGRAM: PMS397 OHIO-Replacement Program ACAT I
RESTRICTION ON PERFORMANCE BY FOREIGN CITIZENS (i.e., those holding non-U.S. Passports): This topic is “ITAR Restricted”. The information and materials provided pursuant to or resulting from this topic are restricted under the International Traffic in Arms Regulations (ITAR), 22 CFR Parts 120 - 130, which control the export of defense-related material and services, including the export of sensitive technical data. Foreign Citizens may perform work under an award resulting from this topic only if they hold the “Permanent Resident Card”, or are designated as “Protected Individuals” as defined by 8 U.S.C. 1324b(a)(3). If a proposal for this topic contains participation by a foreign citizen who is not in one of the above two categories, the proposal will be rejected.
OBJECTIVE: The objective of this task would be to research, develop, and demonstrate a strain gage (sensor) capable of measuring axisymmetric hoop strain of a large diameter shell. The sensor must be accurate over a broad frequency range, down to and including zero Hz.
DESCRIPTION: Large structures acted upon by external forces exhibit complex vibrations. A complex vibration pattern consists of a superposition of many simpler vibration patterns (modes), each of which has a characteristic wavelength. Often the impact on the overall health of a structure depends more heavily on the vibration of modes with long wavelengths. For cylindrical shells, hoop strain is a key indicator of structural health. The current method of estimating the hoop strain is to place a large number of point sensors (accelerometers) around the circumference of the structure and apply geometrical weighting to the sensor signals. Many sensors are needed to filter out the shorter wavelength vibration content that can dominate the signals of the individual sensors. Each point sensor requires a cable to provide electric power and to transmit the measured signal to a centralized signal processing unit. Thus, to extract the single measure of axisymmetric hoop strain can require a significant amount of hardware and signal processing.
This proposal is looking for an innovative and cost reducing method that can measure the required strain over a long line or large area. Such a sensor must operate with minimal signal processing and low electrical power. It must operate over a range of environmental conditions (temperature, humidity, noise, and vibration). It must be capable of installation, operation, and maintenance by trained personnel. It should provide a significant signal-to-noise (SNR) improvement over current technology. Such a technology could intrinsically eliminate the need for spatial filtering, thereby radically reducing the signal processing and cabling demands and greatly reducing installation, operational, and servicing cost.
PHASE I: Develop concepts for a field of distributed sensor technology and propose a candidate set of technologies to test and evaluate in Phase II. The contractor will develop distributed hoop strain sensor concepts to address the requirements mentioned above. Criteria for assessing the technology will include accuracy, latency, linearity, ease of calibration, durability, fragility, electrical power/voltage/current requirements, and electro-magnetic interference.
PHASE II: The contractor will expand upon the Phase I work to develop a representative prototype of selected sensor concepts. The prototypes will then be demonstrated and tested under a number of operating conditions (temperature, humidity, noise and vibration level) that the government will specify.
PHASE III: The contractor will support the government in field testing the distributed strain sensor. The contractor will acquire the capability to manufacture the distributed strain sensor and the capability to provide technical support to the government in installation, operation, and maintenance of the strain sensors.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: The benefits from a distributed strain sensor in reducing installation and servicing cost can be adopted by the private sector for commercial purposes. Such applications include installation of distributed strain sensors on pressure tanks and in the aircraft industry.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Electronics
ACQUISITION PROGRAM: PMS 320, Electric Ship Office
RESTRICTION ON PERFORMANCE BY FOREIGN CITIZENS (i.e., those holding non-U.S. Passports): This topic is “ITAR Restricted”. The information and materials provided pursuant to or resulting from this topic are restricted under the International Traffic in Arms Regulations (ITAR), 22 CFR Parts 120 - 130, which control the export of defense-related material and services, including the export of sensitive technical data. Foreign Citizens may perform work under an award resulting from this topic only if they hold the “Permanent Resident Card”, or are designated as “Protected Individuals” as defined by 8 U.S.C. 1324b(a)(3). If a proposal for this topic contains participation by a foreign citizen who is not in one of the above two categories, the proposal will be rejected.
OBJECTIVE: Develop an advanced, modular, scalable, converter charger for a 250 kilo-joule (KJ) capacitor for the Electromagnetic Railgun's (EMRG's) Pulsed Power System (PPS).
DESCRIPTION: The Navy is currently developing a Pulsed Power System (PPS) to power an Electromagnetic Railgun (EMRG). The PPS uses a capacitor bank as the source of the very high current (on the order of several mega-amps) required by the EMRG for operation. EMRG requirements necessitate the use of a high power density (>1MW/m3) DC/DC converter capable of high, repetition-rate charging of capacitor banks. This capacitor bank is comprised of 250 KJ capacitor “rep-rate” modules which must recharge from the ship’s power system in no more than several seconds (equating to an average power draw of greater than 40 KW per module, or a total of greater than 8 MW for a 50 MJ system) in order to achieve the desired EMRG repetition rate. Presently, the available state-of-the-art in commercial capacitor chargers is not optimal for the anticipated high repetition-rate EMRG application. They have insufficient power ratings, with a unit size of less than 35KW, which would require that a very large number of systems be operated in parallel. They have power density of <0.2MW/m3 as single units which becomes significantly worse as units are ganged together in cabinets. They are not configured for the projected DC voltage input that they will see in this application and would require external rectifiers, further reducing power density. They are not suitable for shipboard use and would need significant modifications to meet military standards for shock, vibration, EMI, and power quality. Lastly, the volume and interior space air conditioning limits of shipboard application dictate the use of liquid cooling. Commercial chargers are nearly exclusively air cooled, which imposes a significant volume penalty and results in heat being dissipated into the interior spaces of the ship, placing a large heat burden on the air conditioning system. These shortcomings necessitate the development of a capacitor charger capable of being used to meet the more robust requirements of the EMRG pulsed power system.
This topic seeks to explore innovative approach(es) to the development of an advanced, modular, converter charger for a 250 KJ capacitor. The proposed converter charger concept must be able to: draw power from a 700-900 VDC battery bank; provide sufficient power to charge the 250 KJ capacitor to 10 kVDC within several seconds; have a repetition rate of 6 charges/minute; have a peak-to-average power ratio of no more than 1.3 over the charge cycle. As necessary, the proposed concepts should incorporate liquid cooling and other technologies (such as but not limited to: advanced power electronic devices, novel topologies, etc) for reducing the overall system size (>1MW/m^3). This system should be designed so that the devices and topologies employed will be scalable during the Phase III to the voltage and power levels (10kV and 8MW) needed for a 50+ MJ capacitor bank with 1 MJ capacitor converter chargers that can be operated separately or ganged together without compromising volume.
PHASE I: Demonstrate the feasibility of an advanced, scalable, modular converter charger for a 250 KJ capacitor. As applicable, demonstrate the effectiveness of the solution with modeling and simulation and engineering analysis. Establish performance goals and provide a Phase II developmental approach and schedule that contains discrete milestones for product development.
PHASE II: Develop, demonstrate and fabricate a prototype as identified in Phase I. In a laboratory environment, demonstrate that the prototype meets the performance goals established in Phase I. Conduct performance, integration, and risk assessments. Develop a cost benefit analysis and cost estimate for a naval shipboard unit. Provide a Phase III installation, testing, and validation plan. Proposer should demonstrate that the proposed components and concepts would be scaleable up to full voltage and power levels of 50 MJ.
PHASE III: Working with the Navy and Industry, as applicable, design and construct a fully functional 250 KJ charger converter capable of being scaled to 1 MJ for future use in a 50+ MJ capacitor bank. The goal is to be able to utilize the proposed converter charger concept on the EMRG proof-of-concept demonstration and design efforts and, ultimately, in a system onboard a ship.
PRIVATE SECTOR COMMERCIAL POTENTIAL/DUAL-USE APPLICATIONS: Technologies developed in this program are applicable utility and industrial applications requiring high density dc power conversion, especially those involving the charging of large banks of capacitors. Examples include fusion research facilities such as the National Ignition Facility (NIF) which use 100’s of megajoules of stored energy. Technologies would also be applicable to more general medium voltage power electronics applications such as High-Voltage DC transmission (HVDC) systems, medium-voltage motor drives, and systems designed to interface alternative energy supplies to the medium voltage distribution grid.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: The objective to this solicitation is to develop techniques and methods for enhancing software robustness and security during development by enhancing software developers’ understanding and awareness of their works, via automated capture and documentation of design decision (ACD3).
DESCRIPTION: Achieving information dominance requires Department of Defense (DoD) to maintain trust, availability and security within its information infrastructures. COTS based hardware and software in our computing systems and the network are large, complex and hence inherently insecure. Currently flaws in software are the major contributor to the vulnerability of cyber systems. Most if not all of these vulnerabilities originate from improper software implementations. Identified flaws that lead to improper implementations include, and are not limited to; buffer overflow, stack and heap overflow, dangling pointers, input data format violation, race conditions and deadlocks, etc. Significant investment has been made to address this issue through techniques that seek to provide formal or other forms of software verification. However, complementary efforts to verification, an automated method to enhance programmers awareness of his/her work during software development is under-explored.
Only rarely are all of the details for the implementation of software be specified in advance. Currently, programmers make instantaneous detailed design decisions during software coding. These instantaneous decisions (and assumptions) have far reaching effects, and they are often forgotten and lost. A tool that captures and documents these design decisions (and hence assumptions) automatically as coding is in progress can significantly enhance maintainability, robustness, and security of codes. The availability of these tools also presents an opportunity to provide feedback to programmers to improve the correctness of their product and enhance productivity and efficiency.
The objective to this solicitation is to develop techniques and methods for enhancing software robustness and security during development by enhancing software developers’ understanding and awareness of their works and to develop a working prototype of a software development tool which performs automatic capture and document programmer's design decisions (ACD3), as coding is in progress. This software development tool should be applicable to one or more widely used programming languages, within common software development frameworks. The development of this tool may employ one or more of the following (partial) list of methods: capture and visualization of program structure and data, variable, and subroutine dependencies, capture of programmer's intent, analysis and prediction of consequences, formal analysis, etc. This solicitation does not entertain methods and tools specifically targeted for software verification.
PHASE I: Architectural analysis and design for the automated capture & documentation of design decision (ACD3) tool for an open-source software development environment of choice. Develop a proof of concept prototype for ACD3. Identify the metrics that determine the prototype’s value-added.
PHASE II: Develop a full functioning prototype of a tool which performs automated capture & documentation of design decision (ACD3) for an open-source software development environment of choice. Demonstrate the efficacy for the tool.
PHASE III Dual Use Application: ACD3 is a valuable tool for both the DoD as well as for software developing public. It should find its role in, and can be ported into, various open-source and proprietary software development environments. ACD3 should also be applicable and portable to development environments of many different programming languages for many different application spaces, such as high performance computing, mobile devices, embedded systems, finance applications, cloud computing, the web and service oriented applications, etc.
TECHNOLOGY AREAS: Information Systems, Human Systems
OBJECTIVE: The objective of this topic is to develop and implement a technique for building individualized representations of trainee performance that can be used to assess current performance and to forecast future training needs.
DESCRIPTION: Increasingly, instructional system developers are focusing their efforts on developing individualizable and adaptable training capabilities [1]. The benefits of providing this type of instruction are well documented [2] and are a direct result of the fact that individuals learn in different ways [3]. At the core of any adaptive training system are representations of the trainee, in terms of their knowledge, skills and abilities [4]. These representations are used by the instructional system to assess current trainee performance and to forecast the timing and content of future instructional remediations. A key challenge with building truly individualizable and adaptable training systems rests in the manner in which these trainee representations are developed. Typically, these representations are created using pre-defined performance measures, bounded by static parameters. Once a boundary is passed, a standard intervention is applied until the next iteration of performance assessment shows a return to within-parameter conditions.
The challenges with this approach are threefold. First, the set of performance measures used in a training system is often based on speed and accuracy characteristics. This approach precludes adding individual trainee-and training domain - unique measures, leading to a significant reduction in individualizability and adaptability. Second, the selected set of performance measures relies on establishing predefined thresholds to establish ‘good’ and ‘poor’ performance. This approach removes much of the richness and complexity of individual trainee performance, leading to inadequate timing, presentation and selection of training remediation. Lastly, because training systems base their anticipated training remediations on these static, average measurements, their future predictions of when trainees will need remediation, and what the content of that remediation should be, are inaccurate.
The current topic seeks to address these three challenges by developing and implementing a technique for building individualized representations of trainee performance that can be used to assess current performance and to forecast future training needs. The desired approach includes three elements. The first element includes developing a performance ontology that will: represent domain knowledge, reason about the elements and relations of that domain, support evaluation of performance and interpretation of data and provide scoring models and criteria for performance – to include cognitive, behavioral and physiological data [5]. The second element includes linking the resultant ontology to artificial intelligence or machine learning techniques to: dynamically make inferences and predictions about performance; and to handle uncertainty arising from latent variables or missing data [5]. The last element requires demonstrating the effectiveness of this capability to both accurately assess current trainee performance and to forecast future remediation requirements.
PHASE I: Define requirements for developing and implementing a technique for building individualized representations of trainee performance that can be used to assess current performance and to forecast future training needs. Requirements definition must include: a description of the overall ontology structure, the artificial intelligence technique that will be used and how the two will integrate; a determination of the types and characteristics of metrics that will be captured and used; a detailed discussion of the specific domain to be represented; and; and, a discussion of analysis and assessment techniques to be used. Phase II plans should also be provided, to include key component technological milestones and plans for testing and validation of the proposed system and its components. Phase I should also include the processing and submission of any necessary human subjects use protocols.
PHASE II: Develop a prototype system based on the preliminary design from Phase I. All appropriate engineering testing will be performed, and a critical design review will be performed to finalize the design. Phase II deliverables will include: (1.) a working prototype of the system, (2) specification for its development, and (3) demonstration and validation of ability to both accurately assess current trainee performance and to forecast future remediation requirements.
PHASE III: This technology will have broad application in military as well as commercial settings.
Within the military, there is increasing emphasis on the ability to develop training systems that tailor their instruction to individual trainee needs. Developing these ‘cognitive tutors’ is costly. Tools that will make building these systems more cost effective, as well as make the training more effective are needed. The proposed effort will enable the delivery of more effective training and will support knowledge sharing and reuse, leading to reduced up-front development costs. Commercially, the last several years has witnessed a resurgence in interest in developing individualized ‘digital tutor’ types of training systems for classroom (grades K-12) use (e.g. President Obama’s 2011 State of the Union address), in support of Science, Technology, Engineering and Mathematics (STEM) education. The much wider range of learner characteristics of the K-12 student population can only be addressed by the types of technologies developed under this effort. Lastly, training in the commercial labor market is a multi-billion dollar business. Technologies that facilitate the application of adaptive training tools to a wide range of domains will lead to reduced cost and enhanced trainee learning experiences.
TECHNOLOGY AREAS: Information Systems, Human Systems
OBJECTIVE: Develop an adaptive desktop training device with underlying learning management system (LMS) architecture to train ISR imagery analysis for better decision making by warfighters.
DESCRIPTION: ISR imagery data has become paramount to military success in current operations in Iraq and Afghanistan. As more and more ISR platforms are being pushed into the operational environment it is becoming increasingly important to provide training that educates users on what they should expect to see from this imagery in the context that these assets will be deployed. Cultural, environmental, behavioral, economic, religious, and other factors play a significant role in the types of imagery users will observe in the AOR. Being aware of the context within a particular situation provides necessary information to determine if a potential target is for example: just filling in a hole as part of his/her job or covering up an IED. Additionally, understanding current and evolving tactics of insurgent operations are also an important factor in recognizing what is truly happening or about to happen in a situation and can mean the difference between life or death of troops and innocent civilians. A desktop training system is needed to train these users (Distributed Common Ground Station (DCGS) imagery analysts, Remotely Piloted Aircraft (RPA) crew members, ground troops who utilize ROVER feeds, etc) on how to interpret the actions they are seeing on the ground in order understand the significance of what is occurring and make better decisions about what actions to take. This system should provide an individually adaptive imagery training capability based on an underlying LMS architecture to bring users to a high degree of skill level to recognize events and situations on the ground using simulated Electro-Optical, Infrared, and Full Motion Video imagery. Furthermore, this system should have the ability to ingest new insurgent TTP information and other important factors (cultural, environmental, behavioral, economic, religious, etc) to adapt intelligent agent models and scenarios presented to users so that training can remain up-to-date with current operations. Finally, this system, though first developed as a standalone desktop environment, should have the capability for expansions into more complex operational simulation environments.
PHASE I: This phase will identify content for the development effort based on an assessment of operational needs. In addition, Phase I will develop a proof-of-concept desktop exemplar of the training and rehearsal concept to be fully developed in the Phase II effort.
PHASE II: Will build upon Phase I to fully develop, refine, test and evaluate the components of the system to include the underlying LMS, adaptive training course content, intelligent agent technologies and modular design for integration with an operational simulation environment. The final prototype will demonstrate these capabilities as well as the ability to ingest new or update material.
PHASE III DUAL-USE COMMERCIALIZATION:
Military Application: Imagery data for ISR is a major component of operations across all services. The developed technology would be beneficial for imagery analysts and warfighters who utilize IMINT sensors in DCGS, RPA, and ground operations.
Commercial Application: This training system would provide a beneficial tool for US Customs and Border Protection, homeland security, and natural disaster relief personnel who perform analysis on imagery data for decision making.
TECHNOLOGY AREAS: Electronics, Human Systems
OBJECTIVE: The objective of this effort is to research, develop and implement prototype capabilities to simulate the communication and coordination of an operational Intelligence Surveillance and Reconnaissance environment for the purpose of providing: (a) Realistic RPA crew mission task saturation; (b) enhanced integration and coordination across an operational testbed environment; (c) a system to prototype, integrate and evaluate intelligent agents and synthetic teammates from both government and commercial sources at various levels of fidelity.
DESCRIPTION: In August 2010 operational Remotely Piloted Aircraft (RPA) crews visited AFRL Mesa to attend a training effectiveness workshop. During the workshop operators were asked for ideas to improve training. The consistent answer was to provide a capability for the RPA operators to interact and coordinate with other members of the ISR community (e.g. Mission Intelligence Coordinators) as they do in real world operations. Again in September 2010 during a follow up meeting with additional RPA crews, the same question was posed and the same answer was given. A system is needed that will create realistic task saturation in a simulated environment for ISR communication and coordination for improved training effectiveness for RPA operations and other command and control assets. This system should employ synthetic and intelligent agent technology to provide operationally realistic communication and coordination in the midst of a scenario but also have the capability to monitor individual performance and adapt the level of saturation to provide the appropriate level based on individual operator capabilities, essentially adaptive training for personalized learning. Additionally, the system should be designed to utilize existing operational community text based communication mediums (e.g. mIRC chat) to communicate. The modeled entities should be constructed synthetically and formatted so that both government and COTS systems may be used in parallel. The level of fidelity can interchangeably range from basic scripting to advanced intelligent architecture. The system should be capable of supporting multiple simulators for command and control training within an operational testbed.
PHASE I: Will research the operational needs, and result in the development of the initial underlying software architecture for this system and demonstrate its capabilities in a proof of concept to show functionality of each component of the total system.
PHASE II: Will fully develop the prototype software technology and underlying architecture and demonstrate the capability to provide task saturation and adapt the levels of saturation in an operational testbed in three different scenarios.
PHASE III DUAL-USE COMMERCIALIZATION:
Military Application: The military is increasingly relying more and more on chat communication for C2 operations. The development of this system would provide a capability that would apply to several domains and provide a new capability to improve operator ability to handle task saturation through personalized and adaptive training.
Commercial Application: This capability provides an adaptive training technology for task saturation for chat based communications in civilian contexts.
TECHNOLOGY AREAS: Human Systems
OBJECTIVE: Develop or modify existing Learning Management Systems (LMS) and Learning Content Management Systems (LCMS) to be able to use a Computerized Adaptive Testing (CAT) like process to adapt to a pre-established knowledge/skill baseline to dynamically alter SCORM, DIS, or HLA training content delivery
DESCRIPTION: Current military training is often linear and non-discriminatory. That is regardless of an individual’s base knowledge and skills the training content remains the same. This is especially true for DoD Computer Learning Content Information Management Systems (CLCIMS). In order to be effective in these times of high ops tempo with less and less opportunities for training, we need a training solution that is adaptive to an individual’s needs and can customize training to better prepare them for their mission and career. For this training solution to be a success at least four different components are required to interact with each another. 1) Develop or modify existing Learning Management Systems (LMS) to allow easy incorporation of ever changing essential competencies, skills, knowledge, and experience such as those defined in Air Force Mission Essential Tasks Lists (METLs), Training Task Lists (TTLs) or the Mission Essential Competencies (MEC) analysis to establish baseline skills and knowledge required for an individual to be successful in their mission/career rather than just training modules. 2) Develop a way to capture performance during training content delivery and mapping them to the establish baseline in the LMS. 3) Develop or modify existing Learning Content Management Systems (LCMS) to be SCORM, DIS, and HLA compliant. 4) Incorporate a Computerized Adaptive Testing (CAT) like process into the Learning Content Management System. Fully integrated we expect the LMS to track an individual’s performance mapped to an established baseline while the LCMS then dynamically adapt training scenarios/content based on the information stored in the LCMS. Additionally having the LCMS SCORM, DIS, and HLA compliant, content delivery can be in the form of Computer Based Training (CBT) or through a variety of Modeling and Simulation tools that utilizes DIS/HLA protocols depending on what training content/scenario is delivered. This allows training scenario/content to better fit the type of delivery to an appropriate learning environment. For the scope of this effort the targeted training audience will be the Senior Intelligence Duty Officer (SIDO) and Intelligence Duty Officer (IDO) of the Air and Space Operations Center (AOC). Their primary duties are Command and Control (C2) coordination as it relates to intelligence on the combat ops floor. However, the architecture in this training solution is ideally content-agnostic such that you can adapt the system for a multitude of military and civilian application.
PHASE I: Define and document the framework to easily incorporate new data sets such as knowledge, skills, and experiences into a LMS, identify how performance during content delivery is tracked and mapped to the LMS, to develop or modify existing LCMS to be SCORM, HLA, and DIS compliant, and define how to integrate a CAT like process into the LCMS. This includes identifying current LMS and LCMS and how they can be modified. Or if it is determined that a new LMS/LCMS is needed, define the approach.
PHASE II: Fully develop a proof of concept prototype to verify and demonstrate the four integrated component capabilities using the SIDO and IDO as usage cases. This includes the ability to add new data sets into the LMS, the ability for the LCMS to deliver SCORM, HLA, and DIS content, and the LCMS dynamically altering training content delivery based on performance tracking mapped to the baseline in the LMS.
PHASE III DUAL-USE COMMERCIALIZATION:
The proposed training solution is applicable to a variety of military and civilian applications. The immediate usage case is directly applicable to most individuals with C2 coordination as a primary duty on the military side such as those in Air Support Operations Centers (ASOC), Tactical Operation Centers (TOCs), Maritime Operation Centers (MOCs). On the civilian side these will include personnel assigned to homeland security or natural disaster relief C2 organizations at the county, state, or federal level. Additionally since the architecture is ideally content-agnostic, it can be modified for the Human Resources domain, education domain, etc.
TECHNOLOGY AREAS: Information Systems, Human Systems
OBJECTIVE: Develop a method and implement a technique to correlate a variety of sociocultural, environmental, and geospatial data gathered from a region of interest to perform correlations and forecast likely future impacts of observations.
DESCRIPTION: Irregular warfare, non-state terrorism movements, and uncertain environmental patterns that trigger major weather disasters are producing a reality for military and government leaders where traditional physics-based sensors alone are insufficient to plan current and future actions in a region on interest or need. Context awareness is a critical requirement for decision makers because it provides important information about situations and dynamics relevant to goals, functions, and data needs [1]. Strategies for achieving contextual understanding can include observational data, a priori knowledge models, and inductive knowledge [2]. Contextual understanding is generally achieved through a combination of human and computer processing techniques that take advantage of a person’s cognitive ability to fuse and assimilate multiple sources and types of information for new insights [3]. In the domains identified earlier in this topic, it is critical to incorporate both hard and soft data to gain an understanding of the delicate balance between individuals and groups in society and the environments (geopolitical, social, agricultural, etc.) upon which they depend. Test and evaluation of methods that fuse hard and soft data are challenging due to the nature of the data, the test environment, and the metrics for determining outcomes [4]. Unlike traditional military test and evaluation, however, data sources for this new type of problem are not classified or difficult to obtain; open source data is available and plentiful but it is collected by a diverse group of researchers. The challenge becomes correlating data of many different types that represent various aspects of a region of interest. This approach is similar to the signal processing approach of weak signal detection, that is used to extract received signals [5], identify images in noisy backgrounds [6], and conduct remote sensing of land and water resources for sustainable development of natural resources [7]. A novel approach to correlating a variety of data sources to understand problems in an area and forecast conflict is described by [8]. In this example, the potential conflict is the weak signal that is detected through the correlation of diverse datasets describing many features of the region, to include demographic, political, social, economic, educational, agricultural, weather, etc. A key challenge in integrating these disparate data is the semantic meaning implicit in the components of the overall structure of the region.
The challenges with this approach include the following. First, a method for collecting various datasets for a region of interest and correlating these for overall understanding and meaning is a nontrivial task. Many of the datasets are based on different scales and involve different referents to the population or the environment. Second, a weighting scale must be developed sufficient to provide representational meaning and inferential capabilities to the reasoning tool. Third, a visual representation must be developed sufficient for a human to reason about the correlations; a display that provides all of the facts but does not suggest inferences is insufficient and meaningless. Finally, a performance measurement capability is needed to compare the reasoning analytics to reasonable expectations for use of such a tool. Quantitative and qualitative metrics will be needed for such an application.
This topic seeks to address these challenges by developing and implementing a technique for correlating multiple datasets for a region of interest, weighting significant factors, and producing a set of forecasting alerts for a human user sufficient to trigger planning and course of action considerations.
PHASE I: Define requirements for developing and implementing a technique for building a technique that can be used to detect a ‘weak signal’ or troublesome behavior in a population or region of interest. Requirements definition must include: a description of the model components and the supporting relationships, the computational processing technique that will be used and a description of the integration mechanisms, a determination of the types and characteristics of the metrics that will be captured and used, a detailed discussion of the specific domain to be represented, and a discussion of analysis and assessment techniques to be used. Phase II plans should also be provided, to include key component technological milestones and plans for testing and validation of the proposed system and its components.
PHASE II: Produce a prototype system based on the preliminary design from Phase I. All appropriate engineering testing will be performed, and a critical design review will be performed to finalize the design. Phase II deliverables will include a working prototype of the system, specification for its development, and a demonstration and validation of the ability to both accurately represent the model of the soft information fusion and the collaborative visual analytics representation of the data.
PHASE III: This technology will have broad application in military, government, and commercial settings. Within the military and government, there is an increasing emphasis on understanding and forecasting group behaviors or regions that are prone to conflict or environmental degredation. Currently, fusing information from these multiple and divergent sources is extremely labor intensive and costly in terms of labor and time. Developing models that can forecast likely disruptions to fragile populations or environments will be a powerful addition to strategic, operational, and tactical decision making. The proposed effort will enable the delivery of more informed courses of action supported by tractable information sources in a display environment that provides multiple views into the problem space. Commercially, the advanced sensor technologies have produced unprecedented amount of digital information and applications by which to sort, collect, and share data. This sector has also witnessed a surge in analytic processing, dissemination, and display capabilities. Harnessing these for multiple uses will reduce the cost of integrating these techniques and improve the human decision making process.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop a method and implement a technique for using a collaborative visual analytics approach to the soft information fusion domain to enable humans to reason more efficiently in this complex information space.
DESCRIPTION: Increasingly, information fusion for strategic and tactical military decisions is driven less by the traditional physical domain and more by human or ‘soft’ sensor collectors and data products [1]. Recent trends in social networking and advanced computing have contributed to a significant change in the ways in which humans are represented in the information fusion domain; as targets and as sources of information [2]. As targets of the fusion system, individuals and groups, operating as open or hidden networks, are less tractable by physical sensors and the resulting behavior is difficult to infer and understand in advance of trigger events [3]. As information sources, human reports are subject to reporting bias, uncertainty, incompleteness, ambiguity, corruption, and perceptual/social bias [2, 6]. Finally, as decision makers, humans are distributed in time and space and require access to collaborative technologies to synchronize data, share information, and visualize potential courses of action [4]. In this extremely complicated space, understanding the data and manipulating the reasoning and display technologies through a user interface are basic starting points for more advanced capabilities [5]. The field of visual analytics has contributed tools to allow humans to solve analytical problems similar to those described above, albeit in a single user environment [7] or in a co-located team [8]. Collaborative Visual Analytics (CVA) is explored by [9], who describe an environment to allow remote-collaborative information exploration and task sharing with linked graphical interfaces. CVA has been used by an interdisciplinary team to predict the impact of global climate change on US power grids [10] and emergency response management [12]. The power of CVA for decision making in the soft information fusion domain stems from the inclusion of the social process of effort sharing, discussion, and consensus building [11] as well as the technical ability for team members to share representations, translate differing perspectives, articulate arguments, update conclusions, and justify actions [13].
The challenges with this topic are twofold. First, the soft information fusion domain is often described as ‘data rich and model poor’, which leads to the underlying need for a model that is flexible enough to incorporate disparate data and structured enough to support a decision maker’s need to reason about the data. Second, collaborative visual analytics that can display information relationships and a team of users’ individual reasoning requirements over those data artifacts is a complicated proposition and demands careful study and technical design.
The current topic seeks to address those challenges by developing and implementing a technique for building a collaborative visual analytics application for reasoning in a soft information fusion domain. The desired approach includes three elements. The first element includes developing a semantic model that can incorporate and parse elements of data into meaningful representations that are amenable to visual representation and manipulation. The second element is a performance evaluation and scoring mechanism by which a user community can be rated on ability to extract meaningful representations from the data. The last element requires demonstrating the effectiveness of this capability to model adaptations based on information inputs and also to assess user decision making as a function of the collaborative visual applications in a small team.
PHASE I: Define requirements for developing and implementing a technique for building a semantic model of soft information fusion that can be used in a collaborative visual analytics application for a small distributed team. Requirements definition must include: a description of the model components and the supporting relationships, the computational processing technique that will be used and a description of the integration mechanisms, a determination of the types and characteristics of the metrics that will be captured and used, a detailed discussion of the specific domain to be represented, and a discussion of analysis and assessment techniques to be used. Phase II plans should also be provided, to include key component technological milestones and plans for testing and validation of the proposed system and its components.
PHASE II: Produce a prototype system based on the preliminary design from Phase I. All appropriate engineering testing will be performed, and a critical design review will be performed to finalize the design. Phase II deliverables will include a working prototype of the system, specification for its development, and a demonstration and validation of the ability to both accurately represent the model of the soft information fusion and the collaborative visual analytics representation of the data.
PHASE III: This technology will have broad application in military, government, and commercial settings. Within the military and government, there is an increasing emphasis on understanding and forecasting group behaviors from social media and online social communities in foreign nations that are potentially hostile to US and Coalition interests. Currently, fusing information from these sources is extremely labor intensive and costly in terms of labor and time. Developing models that can be adaptive to new information and that can be utilized by a team of people with collaborative visual analytics reasoning tools will be a powerful addition to strategic, operational, and tactical decision making. The proposed effort will enable the delivery of more informed courses of action supported by tractable information sources in a display environment that provides multiple views into the problem space. Commercially, the online social blogs and social networking sites have produced unprecedented amount of digital information and applications by which to sort, collect, and share data. This sector has also witnessed a surge in analytic processing, dissemination, and display capabilities. Harnessing these for multiple uses will reduce the cost of integrating these techniques and improve the human decision making process.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Using a visual analytics approach, develop a reasoning and display tool that will enable the visual representation and implementation of culturally significant information for enhanced tactical decision-making in a foreign and hostile environment.
DESCRIPTION: Modern warfare and conflict environments are drastically different from what was once considered to be the norm [8]. Where once the norm consisted of countryside “battlefield combat with distinct front lines,” modern conflict increasingly occurs in urban areas lacking distinct boundaries [8], within foreign cultures, where the focus is centered on the civilian population instead of the battlefield [1]. The discerning combatants from civilians has become increasingly complex in that combatants are frequently dispersed throughout the civilian population and without any clear uniform, it can be extremely difficult to discern friend from foe [8]. To further complicate combatant and civilian distinctions, a civilian encountered as such one day may present as a combatant another [8]. The conventional goal of overcoming an armed enemy is expanding, incorporating goodwill missions where the goal is to win over local civilians [8]. Operating in foreign environments, warfighters often find themselves in unfamiliar situations where they need to know how to resolve a situation appropriately in the context of an alien culture [4]. Due to these expansions in military conflict norms, sociocultural knowledge has become a critical factor for success in modern warfare environments [8]. Soldiers must understand a society’s values, motivations, culture, and subcultures within in [1]. For mission success, it is critical for all Soldiers and commanders to maintain cultural situational awareness when in a foreign environment [1]. Effective situational awareness depends on the ability to collect data from many distributed, heterogeneous information-sources and through visual analytics, display the data so that it facilitates understanding of evolving events occurring within complex and dynamic environments [3]. The military has applied visualization techniques to enhance decision making [2]. Incorporating culturally significant information into a military database accessible by Soldiers and commanders will enhance decision-making.
The challenges with this topic are threefold. First, building and maintaining foreign cultural awareness and understanding societies where military operations are conducted has not always been a priority of the U.S. military [7]. It has been suggested that the lack of preliminary efforts to understand the local populace and culture that our forces operate in resulted in many of the early challenges encountered during Operations Iraqi Freedom and Enduring Freedom (OEF and OEF) [7]. Therefore, we are having back-track in order to develop and share cultural awareness while still immersed in these foreign cultures, and situations that have been exasperated by our lack of sociocultural awareness. Secondly, there are many challenges regarding data collection, entry, management, and quality. For instance, in regards to data entry, a large issue occurs with entity resolution and relationship awareness. How will a user discern two individuals with the same name? Answering these questions as well as exploring how to best visually represent this information to a user will be some challenges developers will confront. Regarding data quality, given that information may be coming from many different sources, data may overlap, be incomplete, or incorrect [5]. Determining how to overcome and compensate for these issues is an ongoing challenge for developers. Developers will have to determine how to fuse information collected from various types of data sources into meaningful information that will enhance human understanding without increasing user stress [3] and while compensating for any data errors [5].
The current topic seeks to address these challenges by developing and implementing a visual analytics technique for representing culturally significant information for enhanced tactical decision-making. This will include developing a semantic model that can incorporate and parse elements of data into meaningful representations that are amenable to visual representation and manipulation. Visual representations for sociocultural data that would prove critical for military operations regarding mission planning, hostile conflicts, and goodwill encounters. Visual and computer analytics should be employed to develop soft information and multi-source data fusion techniques. The tool should enable reasoning so that the sociocultural information could be applied to relevant mission scenarios such as route planning.
PHASE I: Define requirements for developing and implementing a technique for building a reasoning and display tool for enhanced visual representation of culturally significant information to promote commander decision making. Requirements definition must include: a description of the model components and the supporting relationships, the computational processing technique that will be used and a description of the integration mechanisms, a determination of the types and characteristics of the metrics that will be captured and used, a detailed discussion of the specific domain to be represented, and a discussion of analysis and assessment techniques to be used. Phase II plans should also be provided, to include key component technological milestones and plans for testing and validation of the proposed system and its components.
PHASE II: Produce a prototype system based on the preliminary design from Phase I. All appropriate engineering testing will be performed, and a critical design review will be performed to finalize the design. Phase II deliverables will include a working prototype of the system, specification for its development, and a demonstration and validation of the ability to both accurately represent the model of the soft information fusion and the collaborative visual analytics representation of the data.
PHASE III: This technology will have broad application in military, government, and commercial settings. Within the military and government, there is an increasing emphasis on understanding sociocultural norms and behaviors of communities in foreign nations that are potentially hostile to US and Coalition interests. Currently, fusing information from these sources is extremely labor intensive and costly in terms of labor and time. Developing collaborative visual analytics reasoning tools will be a powerful addition to strategic, operational, and tactical decision making. The proposed effort will enable the delivery of more informed courses of action supported by tractable information sources in a display environment that provides multiple views into the problem space. Commercially, the online social blogs and social networking sites have produced unprecedented amount of digital information and applications by which to sort, collect, and share data. This sector has also witnessed a surge in analytic processing, dissemination, and display capabilities. Harnessing these for multiple uses will reduce the cost of integrating these techniques and improve the human decision making process.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Provide a technology application that builds semantic knowledge through metadata tagging capabilities and collaborative visual approaches, and includes multi-modal data feeds including text and visual data.
DESCRIPTION: Today’s information systems generate massive amounts of data and the areas of Defense and Homeland Security have the difficult task of quickly understanding and determining the crucial information from complex data systems [2,8]. Visual data mining and collaborative visual approaches to information can help handle the influx of information [6]. There is a corpus of data that, if sufficient data mining capabilities existed, could aid intelligence analysts in understanding information in near-real time [3]. A system that can extract information automatically from various multi-modal data sources and the efficient customization of a system to a new domain while defining a set of features and extraction rules are challenging tasks [1,7]. Many of the current folksomies do not control for spelling variations, synonyms, or clarification of homonyms. Controlled vocabularies such as a thesauri, classification schemes, and tools such as spell check or “text of 9 keys (T9)” could vastly reduce errors within reported data, improve search quality as well as enhance information discovery within a large database system [4]. Even if we could mine information via the tagged data, it is useless to users if it cannot be analyzed and employed in an operational setting [5]. These controlled tags should be easily accessible and users should be able to select and change appropriate tags at any time. An application with various user defined displays and layouts would be most useful in building semantic knowledge [2].
Challenges for this topic include 1) identifying relevant multi-modal data sets that incorporate various forms of text and visual data, 2) determine an effective tagging technique that can be used to increase accuracy of information systems, 3) develop a method to run the application with supporting tags in a pre-existing system, 4) demonstrate the ability to search and/or navigate the tagged database, 5) show the application’s capability for visual analysis with various display options that can be utilized by distributed collaborative teams, 6) demonstrate the usefulness of this application in the broad realms of military, government, and commercial settings.
PHASE I: Develop a research plan that establishes the proof of concept for the application that will enable data tagging capabilities within a pre-existing large data set including text and visual data. Describe how the increased tagging abilities will support advanced searching and integrated visual analysis of various display options. Estimate the technical feasibility and value of the system and identify the essential technology issues that must be overcome to achieve success. Prepare a comprehensive research and development proposal for Phase II that includes critical plans for testing and evaluation of the system and its components.
PHASE II: Based on the preliminary plans of Phase I, produce a prototype application that is capable of enabling the tagging of various forms of data within an existing data set. The prototype should lead to a demonstration of the capability. Test the prototype in a large multi-sensor database including text and visual data to demonstrate the technical feasibility and merit of the product. Demonstrate a capability of enhanced data search capabilities that return relevant and related information for analysis that can be displayed in a variety of display options. Propose a verification and validation process.
PHASE III: Produce an application capable of deployment in an operational setting that can be utilized by distributed collaborative teams. Test the system in an operational setting as a component of a larger pre-existing multi-sensor database. The application should provide metrics for performance assessment. The work should focus on the ability to transition the tagging and searching system into the realm of military applications, other Federal Agencies, and/or private sector markets.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Innovative approaches to Situation Modeling, Threat Modeling and Threat Prediction for improved Situational Awareness.
DESCRIPTION: The Joint Directors of Laboratories (JDL) Subpanel on Data Fusion has defined Data Fusion as “a process dealing with the association, correlation, and combination of data and information from single and multiple sources to achieve refined position and identity estimates, and complete and timely assessments of situations and threats, and their significance. The process is characterized by continuous refinements of its estimates and assessments, and the evaluation of the need for additional sources, or modification of the process itself, to achieve improved results”.
Steinberg, et al [Reference 1] later defined data fusion as “the process of combining data to refine state estimates and predictions.” A breakout of the functional levels [1] is:
• Level 0 - Sub-Object Data Assessment: estimation and prediction of signal/object observable states on the basis of pixel/signal level data association and characterization;
• Level 1 - Object Assessment: estimation and prediction of entity states on the basis of observation-to-track association, continuous state estimation (e.g. kinematics) and discrete state estimation (e.g. target type and ID);
• Level 2 - Situation Assessment: estimation and prediction of relations among entities, to include force structure and cross force relations, communications and perceptual influences, physical context, etc.;
• Level 3 - Impact Assessment: estimation and prediction of effects on situations of planned or estimated/predicted actions by the participants; to include interactions between action plans of multiple players (e.g. assessing susceptibilities and vulnerabilities to estimated/predicted threat actions given one's own planned actions);
• Level 4 - Process Refinement (an element of Resource Management): adaptive data acquisition and processing to support mission objectives.
To date the majority of data fusion research, development, and applications focus primarily on the lowest levels of data fusion (e.g., Level 1 – Object Refinement). The higher levels of information fusion (HLF) are inadequately being addressed, in particular the areas of Situation Modeling, Threat Modeling, and Threat Prediction. This SBIR effort will therefore address these three domains, taking into account bias, uncertainty, and ambiguity within the data.
The specific area of research to be addressed for this topic is: research, development and application of novel methods to model and characterize the quality of data when it is reused for alternative purposes. This includes estimating the uncertainty or error in the resulting analysis due to the alternative data usage. The data that are available for reuse could include a mixture of quantitative/qualitative data types and are from structured and unstructured repositories or sources.
Impact: One could understand what is missing in the data and fill in the gaps by gaining a better understanding of how and why the original data were collected. Of particular interest are situations where data are gathered across different domains (physical, non-physical, cyber, medical, etc.) and are subsequently used for analysis in another domain.
PHASE I: The proposal for Phase I should identify an innovative approach for improving situational awareness through the use of novel methods to model and characterize the quality of data when it is reused for alternative purposes. This includes estimating the uncertainty or error in the resulting analysis due to the alternative data usage. The data that are available for reuse could include a mixture of quantitative/qualitative data types and are from structured and unstructured repositories or sources. The study should provide a detailed discussion on uncertain, incomplete and ambiguous data/information and how it is used in the Higher Level Fusion process.
PHASE II: In Phase II, development of a prototype Higher Level Information Fusion system based on the Phase I design. Demonstrate the developed Higher Level Information Fusion prototype to prove feasibility for improving situational awareness by novel methods to model and characterize the quality of data when it is reused for alternative purposes through the development of novel methods to model and characterize the quality of data when it is reused for alternative purposes.
PHASE III Dual Use Applications: There are many dual use applications of Information Fusion techniques. For example in the law enforcement community, this research could be applied to counter narcotics arena or Homeland Defense. On the commercial side, this research is applicable to business intelligence, where companies attempt to determine what their competitors are doing by collecting and analyzing data available over the web.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Design and implement a populated architecture that can quickly and efficiently discover actionable tactical information contained or derived from large parallel data stores. A user friendly interface should be able to translate a condition of interest into a parallelized map reduce job. The system should also be able to recognize redundancies in data held within large parallel data stores to prevent sparse evidence from being viewed as a well supported inference. The mature system should provide a common data currency for exchange across a large parallel enterprise through use of data dictionaries, shared ontologies and maps to data sources. A request for unusual events must be understand in the context of many types of data and many different types of mission information requirements. All data and services should be discoverable by a tactical user equipped with only a PDA.
DESCRIPTION: In combating terrorism the need exists to monitor at risk individuals and groups. The data sources to achieve this goal can consist of military sensors and sources as well as open source literature. Key data types that may contain valued information include unstructured text, audio files, images, high resolution imagery, wide area airborne imagery and biometric data Currently, there does not exist a way to run specific searches in response to a tactical information need against large distributed data stores. Sensor data can be 1) stored in a large data archive for retrieval and extraction, 2) kept at an aggregation node (gateway), or 3) remain close to smart sensor and triggers provided for data distribution. The goal of the topic is to mature a set of map reduce tools that can address key warfighter questions quickly by fusing interim results obtained by running code in parallel across numerous multi-INT data stores. Map reduce jobs must be configured and activated by an easy to use tactical PDA based user interface that understands the language commonly used to express priority and specific information requirements. After a single knowledge product is produced from the combination of many work tasks applied across many data stores, that product must be delivered to the warfighter. The matured system must be able to produce answers in real time. For this topic, offerors may work with the following distributed data sources; warfighter observations containing time/location stamps and unstructured text, images with time/location stamps and unstructured text comments; and biometric reports containing time/location stamps. Phase 1 performers may work with synthetic data. The Hadoop framework should be utilized. The offeror should work towards a capability to allow a warfighter to ask for activity reports relevant to a location over a specified time and receive a summary derived from the content of distributed data stores. The specific challenges of this topic include: 1) Maturing a set of related map reduce jobs that can act on distributed stored images/imagery, unstructured text and biometrics data to find data that relates to a priority or specific information requirement 2) Development of a level one fusion engine based on FrameNet that can combine the output of a number of map reduce jobs run against a distributed data store to produce a single knowledge product 3) Development of a user GUI that allows the warfighter to input a time/space bounded information requirements and be returned successfully mined information 4) development of semantic search map reduce jobs and a PDA triggered workflow manager.
Research in the areas of mathematics, statistics, computational data analysis and visualization, computational sciences and computer science are of interest. In addition to the application of research methods and approaches, it is important to evaluate the impact of these efforts areas with regards to the way they change how data is collected, analyzed and assessed to meet a prescribed time for operational necessity and efficiency. It is of value to use open standards to reduce costs [4].
The OSD is interested in innovative R&D that involves technical risk. Proposed work should have technical and scientific merit. Creative solutions are encouraged.
PHASE I: Complete a plan and detailed approach for populating an architecture that can address warfighter questions by simultaneously processing multi-INT distributed data stores. Identify the critical technology issues that must be overcome to achieve success. Technical work should focus on the reduction of key risk areas. For a constrained set of warfighter questions and distributed data stores, demonstrate that phase 1 risk reduction work has shown that a full implementation of the approach is technically tractable. Prepare a revised research plan for Phase 2 that addresses critical issues.
PHASE II: Produce a prototype system that is capable of distributed processing in a cloud environment. The prototype system should assemble information by automated means, provide performance metrics and offer visualization appropriate to user’s device. Produce a prototype distributed processing service that can produce accurate answers to warfighter questions by simultaneously processing large distributed varied data sources. The prototype should enable a demonstration of the capability to be conducted using relevant data sources, some of which may be classified. The prototype should be capable of operating in a real time mode. Identify appropriate test performance dependent variables and make trade-off studies. Address bias in data processing due to redundant sampling. The prototype should be relevant to both DoD and commercial use cases.
PHASE III: Produce a system capable of deployment in an operational setting. The work should focus on a specific user environment intended for product transition. Test the system in an operational setting in a stand-alone mode or as a component of shared processing environment. The work should work towards a transition to program of record, military organization or commercial product. The system should adhere to open standards and use registered COI vocabulary and ontologies where feasible.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Design and system that can automatically generate a stream of metadata cards consistent with the DoD Discovery Metadata Specification (DDMS). Currently the dissemination of video data requires that a human isolates and annotates specific frames. Metadata cards that are exposed to DoD ISR enterprise contain little more that the coordinates of the area that was imaged and the time markers for the first and last frame. Semantic searches on large video holdings cannot currently be done. This topic seeks to support technology maturation as needed to enable real time and forensic semantic searches on video data.
DESCRIPTION: In combating terrorism the need exists to better exploit video data in real time for force protection and mission execution. In recent years, major advancements in video analytics have enabled object and selected rule based behavior recognition, but connecting the expressions used in describing these detections semantically to priority and specific intelligence requirements has lagged. The specific challenges of this topic include:
1) Authoring a mapping of typical tactical warfightr priority and specific intelligence requirements to the possible output of video analytic engines 2) Development DDMS compliant real time video analytic engines 3) Expansion of the DDMS specification as needed to better capture the semantics of video understanding and mission intelligence requirements 4) Focusing and expansion of video analytic capabilities to be more responsive to priority and specific tactical intelligence requirements 5) Development of a user GUI that allows the warfighter to input priority and specific information requirements and map those questions into standing DDMS compliant metadata card searches 6) development of the overall system architecture that enables the workflow described above 7) development of visualization technology that allows the warfighter to quickly understand the significance of returned data to his/her set of information requirements.
Research in the areas of mathematics, statistics, computational data analysis and visualization, computational sciences and computer science are of interest. In addition to the application of research methods and approaches, it is important to evaluate the impact of these efforts areas with regards to the way they change how data is collected, analyzed and assessed to meet a prescribed time for operational necessity and efficiency. It is of value to use open standards to reduce costs.
The OSD is interested in innovative R&D that involves technical risk. Proposed work should have technical and scientific merit. Creative solutions are encouraged.
PHASE I: Complete a plan and detailed approach for populating an architecture that enables video processors to automatically publish metadata cards that are compliant to the DDMS specification and responsive to tactical priority and specific intelligence requirements. Identify the critical technology issues that must be overcome to achieve success. Technical work should focus on the reduction of key risk areas. For a constrained set of warfighter priority and specific intelligence requirements and a constrained set of entities and behaviors of interest, demonstrate that phase 1 risk reduction work has shown that a full implementation of the approach is technically tractable. Prepare a revised research plan for Phase 2 that addresses critical issues.
PHASE II: Produce a prototype system that is capable of translating full motion video into a set of DDMS compliant semantic meta data cards that can be automatically connected to subscribed to priority and specific intelligence requirements. The prototype system should run at the sensor and fully connect to the DoD ISR enterprise and command and control programs of record. Produce a prototype distributed processing service that can automatically deliver the right video clip to the right warfighter by simultaneously tagging video and understanding information subscriptions. The prototype should enable a demonstration of the capability to be conducted using relevant data sources, some of which may be classified. The prototype should be capable of operating in a real time mode. The prototype should be relevant to both DoD and commercial use cases.
PHASE III: Produce a system capable of deployment in an operational setting. The work should focus on a specific user environment intended for product transition. Test the system in an operational setting in a stand-alone mode or as a component of shared processing environment. The work should work towards a transition to program of record, military organization or commercial product. The system should adhere to open standards and use registered COI vocabulary and ontologies where feasible.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Electronics
ACQUISITION PROGRAM: PEO CS&CSS
OBJECTIVE: The development of fast SiC device models for high level circuit-design packages such as, for example, Pspice and Sabre.
DESCRIPTION: The military has been developing advanced high-power wide bandgap semiconductor electronic devices, especially in silicon carbide (SiC), for improved efficiency and high-temperature (100 to 200 ºC) operation. SiC Schottky diodes are beginning to be broadly incorporated into power electronic systems, with the expectation that SiC-based power switches (such as MOSFETs and JFETs) will soon follow. Design of efficient SiC-based power systems requires a detailed understanding of the circuit operation of SiC power devices. Compact circuit models with a high degree of accuracy, yet portable, are critical to the design process and require fast device models.
Much work has gone into developing device models to accurately predict performance of individual devices and such devices are now commercially available. There is a need to develop the next level of models to provide circuit designers the ability to evaluate circuits that utilize these devices such as been done for silicon-based electronic packages. These models will need to take into account the multi-disciplinary modeling requirements to accurately predict how the devices will function in circuits. The models should address electrical, thermal, mechanical, and material calculations while providing the designer accurate results in steady state, time, and frequency domains. Particular challenges include the development of high-speed models appropriate for circuit level design while maintaining the accuracy of models based on first principles from device physics, thermodynamics, heat transfer, mechanics, and material science.
PHASE I: Provide initial innovative device modeling that can enable the reliable design of SiC power circuits. Demonstrate the feasibility of expanding the initial modeling concept to all design criteria desired in the above description. All models should be scalable and of flexible use for multiple applications.
PHASE II: Develop and mature the model from Phase I to include electrical, thermal, mechanical, and material calculations. The model’s reliability should be demonstrated on at least two independent SiC circuits of differing utility while providing accurate results in steady state, time, and frequency domains.
PHASE III: Further expand the utility of the model under varying circuit design and conditions while enhancing portability. Undergo more rigorous test and evaluation on a greater variety of circuits.
TECHNOLOGY AREAS: Ground/Sea Vehicles, Electronics
ACQUISITION PROGRAM: PEO CS&CSS
OBJECTIVE: To develop a semi-autonomous operator's control center for operational power and energy networks in military systems.
DESCRIPTION: The military has been developing advanced Power and Energy Networks that will allow for more efficient, flexible, and resilient energy security systems. There is a need to develop the human-machine interface enabling the operator to control and influence the network, ensuring the network is achieving its optimal potential in relevant operational environments. The interface would need to display the state of the system and all components that make up the power and energy network as well as allow for controlling that state, including alerts of power spikes or drains, thermal issues, electrical parameters and discontinuities, and mechanical health. The interface will display recommendations for steps the operator may undertake to mitigate any problems, ranging from additional focused monitoring to manual emergency shut-down.
Challenges include the development and integration of appropriate models that represent the power and energy system and obtaining accurate sensor information from constituent devices. Further challenges are displaying the information in an understandable format and allowing for an efficient response time for the operator interaction with the network's mechanics.
PHASE I: Catalogue and report the current state of the art cognitive visualization models. To be included is the human factor engineering specifications of utilizing the visual space and design for optimizing understanding of the network state. Care should be directed to determining when the network state goes beyond specific metrics requiring human interruption to restore normalcy with suggested actionable options. Catalogue and report the current state of the art of autonomous technology for power and energy networks and controls. Report the possible integration points of combining the two areas into a system that would allow for semi-autonomous control of a power and energy system.
PHASE II: Identify the technical gaps from merging the cognitive visualization with the autonomous tools that engage the user and allow for understanding at an unburdened state. Begin the process of modeling, prioritizing and solving the gaps to create a system that is adaptable and robust to meet any unanticipated, emergent phenomenon. Begin preliminary design of system architecture and hardware for the automated control of simple and complex power network, with human-machine information exchange displays and interaction.
PHASE III: Further expand the utility of the model and the interaction hardware for display and controls. Undergo more rigorous test and evaluation on complex networks likened to large Forward Operating Base, Remote-Austere Airfields, Electric Ships, and vehicles.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop software protection systems that are difficult to exploit once an adversary gains entry.
DESCRIPTION: State-of-the-art software protection and anti-tamper systems are built based upon three basic tenets: (1) reduce system susceptibilities, (2) move critical information out-of-band to the attacker, and (2) reduce the effectiveness of our adversaries’ capabilities through detection, response and adaptive mechanisms [1]. For the most part, however, computer, sensor, and weapons systems are built using untrusted commercial-off-the-shelf (COTS) parts. Supply chain threats to critical components, such as hardware or firmware Trojans, have invalidated the assumption that we can move our critical software and data “out-of-band” to the adversary, such as in a hypervisor or on “secure” hardware, since the hardware components on which the software ultimately executes is untrusted [2]. Detection techniques currently being researched to address this class of threat, while important and useful, only reduce the likelihood of exploitation, not eliminate it; and it is only a matter of time before those measures fail. In short, the concept of keeping an adversary outside of a protected volume, layer, or device has been completely eroded by supply chain threats. As a result, one must take a long-term strategic view and assume in designing protection systems that an unknown subset of the system on which that software executes (e.g., an integrated circuit, printed circuit board, or subsystem) will eventually be compromised.
While novel techniques have been proposed for mitigating low-level persistent threats, such as firmware and hardware Trojans in COTS hard disk drives and other peripherals in desktop systems, the typical attack surface of a computer or weapon system is so large that these approaches and concepts, even if successfully applied to these devices, will not scale to protect the entire system. One must, therefore, re-think the fundamental approach to building software protection and anti-tamper systems. The goal of this topic is to maintain mission assurance and the protection of the critical intellectual property in the event a subset of the system is exploited (e.g., due to supply chain compromise).
Desired architectural attributes of the protection system include, but are not limited to, dynamic/maneuverable protections that force the adversary to exploit a moving target; systems that distributed/fractionate [3] the critical information being protected and force the adversary to attack multiple nodes simultaneously to avoid attack mitigation; redundant systems that maintain mission assurance even in the presence of a subset of compromised and exploited end-nodes; heterogeneous systems that force the development of multiple attack delivery methods and payloads; metamorphism that changes the perceived operational environment and targeted vulnerabilities, and disruptive techniques that break command and control of malicious agents to prevent exploitation.
PHASE I: 1) Design and architect a software protection system containing one or more of the above-mentioned attributes. Development of a minimal prototype to demonstrate feasibility would be beneficial, but is not required provided sufficient design documentation is made available. 2) Develop metrics and a strategy for measuring the effectiveness of the proposed approach. 3) Produce a detailed research report outlining the design and architecture of the system, as well as the advantages and disadvantages of the proposed approach.
PHASE II: 1) Based on the results from Phase I, design and implement a fully functioning prototype solution. 2) Provide test and evaluation results that demonstrate the effectiveness of the overall system. 3) Develop a final report completely describing the design and architecture.
PHASE III DUAL-USE APPLICATIONS: The technology developed under this research topic will maintain mission assurance in the presence of compromised end-nodes and exploited subsystems. DoD applications that will benefit from this technology include a wide range of embedded, sensor, navigation, avionics, and communication systems. Commercial applications include financial, communication, and SCADA systems. As a result, this technology is vital for both the DoD and commercial organizations.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop innovative countermeasures to attacks on critical software using software decoys and deception.
DESCRIPTION: The effective use of deception in traditional warfare dates back thousands of years [1]. Most notably, its effective use has been demonstrated in World War II [2] and Operation Desert Storm [1]. However, research on the use of software decoys and deception, as a defensive mechanism in software protection systems is currently limited. There are a number of possible reasons for this. First, deceptive techniques do not (by themselves) provide secure systems, since they often are dependent on the mindset of the adversary, which is either not known or not well modeled. Secondly, deception techniques are often viewed as ‘single use’ technology, since once the deception is exposed that particular deceptive technique can no longer be used in the same scenario. Third, software decoys often cannot be generalized and require tailoring by subject matter experts to make them indistinguishable from the legitimate applications that are the target of attack. Software deception [3] has, therefore, become a highly underutilized tactic in an overall strategy to defeat cyber attacks by providing a layered defense.
To remedy the disadvantages noted above, we desire to develop a software deception strategy and architecture, with techniques that can measurably increase the effectiveness of software protection systems with statistical significance. This topic will contribute to an overall plan to understand the adversary’s strategies and tactics in order to build real-time adaptive software protection systems. Components to the plan include inferring adversarial intent to determine the purpose of the attack; extracting adversarial reasoning to determine our opponents goals and strategy in order to predict their ‘next move’, and the use of deception for tactical advantages, including attack misdirection and avoidance. Research areas of interest include, but are not limited to, the use of deception for (1) adversarial intent (2) adversarial reasoning [4], (3) attacker attribution, (4) attack avoidance/delay, and (5) intelligence gathering.
PHASE I: 1) Develop a strategy and architecture using software decoys and deception as a countermeasure to attacks on critical software and data. 2) Develop a concept for building individual software decoys and deceptive techniques that will plug into the overall system, and design one or more individual decoys or deceptive techniques, 3) Develop metrics and a strategy for measuring the effectiveness of the proposed decoys and/or deceptive techniques. 4) Produce a detailed research report outlining the design and architecture of the system, as well as the advantages and disadvantages of the proposed approach.
PHASE II: 1) Based on the results from Phase I, design and implement a fully functioning prototype solution. 2) Provide test and evaluation results that demonstrate the effectiveness of individual software deception techniques and decoys, as well as the effectiveness of the overall system 3) Develop a final report describing the strategy, architecture, and the design and development of individual decoys or deceptive techniques.
PHASE III DUAL-USE APPLICATIONS: The technology developed under this research topic will mitigate the risk of attack on software protection systems and lead to mission assurance. DoD applications that will benefit from this technology include a wide range of embedded systems, such as weapons systems, avionics, communications, and sensor systems. Commercial applications include insider threat attribution, communication systems, SCADA systems, and other high-value targets, such as banking systems. As a result, this technology is vital for both the DoD and commercial organizations.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: The focus of this research is to develop an innovative system that assists users in rapidly identifying and mapping cyberspace and physical infrastructure to analyze critical threats and vulnerabilities that impact both DOD force projection and mission assurance.
DESCRIPTION: Cyber attacks have become a significant threat for DoD operations that are increasingly more connected and integrated. As DoD relies more on commercial support for communication, troop movement, bases logistical infrastructure support, the threat to those operations from a cyber warfare perspective increases. Much research has been performed to date; however there is a strong need for technologies that automatically discover and correlate physical threats to or critical centralization of cyber resources. Current cyber and network defense is too focused on virtual resources alone. Almost all cyber defense is performed “on the network” ignoring other critical factors. These methods often ignore threats in the physical (kinetic) domain. Importantly, these threats can go both ways. For example, a physical threat to a military installation can map to a particular threat source, but cyber threats can map to multiple communication nodes across multiple DoD networks without geographic constraints. Proposed solutions should allow users to easily provide mappings, automatically identify as many mappings as possible, and provide mechanisms to incorporate new discovery schemes. Furthermore, the solution should help users quickly identify single-points of failure and to measure criticality of components. Commercial, government, DoD, and ad-hoc networks have become nearly ubiquitous. Through extensive abstraction, heterogeneous systems interconnect and interoperate. Unfortunately, these abstractions make system characterization difficult at best. For example, an organization may lease network resources from two different providers for redundancy. These networks may be carried on a single fiber, owned by a common single carrier further upstream. For example, long-haul fiber and Dense Wavelength Division Multiplexing (DWDM) network increase the likelihood that multiple carriers share physical infrastructure. Further, off-network infrastructure requirements such as power, cooling, and maintenance complicate an assessment. The focus of this research is threefold. First involves the development of a methodology for gathering the critical cyberspace and physical data. Second, it involves the development of algorithms, tools, and techniques to automatically generate mappings of virtual to physical resources, and to isolate critical components. The third is the development of a modular operations visualization and analysis framework. New technologies are needed to gather data, assess vulnerabilities, identify critical dependencies and develop capabilities to help in understanding the 1st, 2nd, and 3rd order of effects to DOD when critical infrastructure like power plants, air traffic control systems, sensor webs, and the electrical grid do not perform correctly. The new framework should allow for quick integration of data sources, provide intuitive visualization (such as a geo-located threats on a world map), and allow users to manually map between the cyber and physical domains to support decision aiding and assessment. The framework and these data should be structured such that future components can analyze the multi-domain model for effective and innovative operations.
PHASE I: Develop a design that will acquire, store, map, and visualize information linking cyber and physical resources in a coherent operational picture. Technical work should focus on reducing risk for future phases and developing key technologies to facilitate future work. Special attention should be paid to gathering the data, to identifying potentially complex mappings and identifying gaps. Phase I will include a proof of feasibility of key enabling technologies.
PHASE II: Develop prototype software that can be accredited at Technical Readiness Level 6 (TRL 6), that will effectively acquire, store, manipulate and present the cyber threat and infrastructure data. Create an effective demonstration that uses representative data to provide proof of concept for computer network defense systems that defend against emerging threats.
PHASE III -- DUAL-USE COMMERCIALIZATION: Military Application: Military operations through cyber attacks and the ability to quickly and efficiently identify threats and vulnerability to infrastructure as they relate to cyber assets. Commercial Application: The monitoring, identification, and reconstitution of cyber threats is a critical component of overall readiness and infrastructure information to both the planners and first responders.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop dynamically adjustable trustworthiness metrics that are tuned to human relevance and to automated protocols and that can be manipulated with a highly abstract, tangible interface.
DESCRIPTION: During a cyber attack, Continuity of Operations, or other high-rate dynamic context shift of events, trustworthiness metrics can be so dynamic that cyberspace operators need a real-time high-abstraction interface that enables on-the-fly control of autonomic systems. Allowing users to control the scope of what they believe is currently relevant may help enable autonomic and net-centric system of systems to aid the operation of highly volatile situations encountered during net-enabled spectrum warfare.
Cyberspace analysts must monitor vast amounts of information to enable secure and effective operations. There are human and automated protocols in place to support this activity, but the subsequent presentation of this information is not optimized. Therefore, the intent of this research is to develop a simple-looking visualization and control system that semi-automatically adjusts to events of relevance in the cyberspace domain in an intuitive way to provide only the appropriate trustworthiness metrics needed for the human supervision of the autonomic trust protocols.
By allowing very high abstraction control of the top four to seven (+/- 2) things that users care most about at the moment of use (see citations 5 & 6 below), the system could re-orient the display based on the dynamic scope control of an underlying ontology representing the breadth of many possible trustworthiness measures that may be of interest at different phases of sensor system of system operation and context of use. By allowing the system to dynamically choose scope using abstract representations like topic maps (see 1 below), the appropriate trustworthiness metrics would be presented to the user and subsequent demand for that kind of data passed to relevant cyberspace systems for cyber protocol tasking and refinement of data fusion and data analysis.
With the convergence of several streams of technology and with new understanding from the social sciences, a new capability has emerged in the visualization and control of cyber security systems. Protocols for maintaining operator trust are based on trustworthiness metrics of the underlying computer and communication systems that are context dependent. Some protocols may be more efficaciously invoked than others depending on the situation. Which protocols the system invokes may be determined before hand by the weightings and priorities of decision support algorithms, but those traditional artificial intelligence and machine learning approaches have yet to enable fully automated control of sophisticated protocols across the vast array of possible situations that may arise. Therefore, a mixed initiative human-machine system is required that blends initiative taken by human operators with their automated systems.
Mixed-initiative control is premised on functional abstraction hierarchy representations that look like a work-breakdown structure of activity from strategic level objectives down to actual protocol invocation by automated systems. Adjustment of the displayed level of abstraction requires a dynamic representation of the context to know what is most important for the user to see at any given moment. The traditional means of addressing visualization and control of trustworthiness metrics have been tried and found wanting (4 & 7), and are therefore excluded from this call for proposals unless they include novel application of emerging technologies. One such possibility has emerged from the convergence of three schools of diverse disciplines of Topic Maps, Tangible Interfaces and Sandplay Therapy. (1, 2 & 3) This convergence may be further aided by the advance in electronic location technologies such as RFID. A final enabler of this convergence is the growing youth culture of gaming. Combining gaming culture’s use of tangible and computer displays with the social, psychological and computer interface technologies could be a convergence that allows for a long sought advance in high abstraction interfaces that control other displays, algorithms and devices while being tightly synchronized with the current situation and context of use for easy manipulation by a user. Thus, proposals are being sought that offer any effective set of novel combinations of new and emerging interdisciplinary technologies while excluding solutions that offer single discipline, traditional approaches.
The goal of this topic is to conduct new and innovative, interdisciplinary research and development in technologies for selecting appropriate trustworthiness protocols using advanced human/machine interfaces for the visualization and control in a cyberspace security contexts of use.
PHASE I: Phase I activity shall include: Design and develop new visualization and control interface technologies that finds the relevant subset of trust measures and uses these to adjust context dependent trustworthiness metrics, which will thus enable semi-automated use of trust maintenance protocols and demonstrate a proof-of-principle prototype for a cyberspace security scenario that shows the control of high abstraction representations and their linkage to underlying trustworthiness metrics.
PHASE II: The researcher shall develop and demonstrate a comprehensive prototype implementing the Phase I technologies to show ability for extending this to many relevant trustworthiness metrics for cyberspace use cases with several realistic trust protocols and demonstrating a high abstraction representation and interface controlling automated trust maintenance protocols. The researcher shall detail the Phase III plan.
PHASE III -- DUAL USE COMMERCIALIZATION:
Military application: The desired product for cyber security applied to Command, Control, Intelligence, Surveillance and Reconnaissance (C2ISR), Electronic Warfare Battle Management or sensor resource management.
Commercial application: This system would benefit any commercial application dealing with gaming and psychology research or psychotherapy instrumentation or analysis.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: The objective of this SBIR topic is to design and develop a method for reliable and deterministic detection method for hijacked execution (D2HE), and to evaluate its capability, performance, and cost.
DESCRIPTION: Achieving information dominance requires Department of Defense (DoD) to provide information assurance within its information infrastructures. COTS based hardware and software in our computing systems and the network are large, complex and hence inherently insecure. Malwares and adversaries regularly exploit our inherently insecure computing infrastructure. Many approaches have been used to detect malwares and adversarial intrusion activities. The approach varies from detecting the malware signatures, heuristics behavior monitoring, white-listing, marking data entering the system (taint tracking), etc. However, even with all of these security mechanisms, malwares and adversaries still manage to penetrate our system.
One of the often used detection approaches is to insert checkpoints or assertions into the body of the program via code rewriting process. The location of the check points can be derived from code-analysis or from formal model of the program. This approach can be effective in detecting error and improper state in a program. An issue with this approach, in an adversarial situation, is that if the execution of the program is maliciously diverted by an adversary (or malware), the subsequent checkpoint may never be reached, and the execution flow diversion may never raise any alarm.
It is desirable to have a reliable and deterministic alarm which will always ring every time a program is hijacked. The word reliable indicates that the alarm cannot be circumvented and deterministic means that the detection mechanism is has 0% false positive (not statistical or probabilistic). Furthermore, it can be observed that a simple mechanism operating on one or small number of invariants, as oppose to complex state/rule-based system operating on multiple events/sequence of events, such as behavior based detection [3][4][5], may be advantageous for achieving 0% false positive while minimizing false negatives. An example of a deterministic method for recognizing hijacked execution is the venerable taint-tracking method [1][2]. An invariant in this case is a physical and/or logical condition which always occurs during execution hijacking, for example, an external data/string being executed during execution hijacking is the invariant used in the taint tracking methods [1][2].
Understanding of the invariants in an execution hijacking process plays important roles in deterministically recognizing it. The challenge in this topic is to develop a reliable and deterministic detection method for hijacked execution, making use of one or small number of the invariant properties of the execution hijacking process.
PHSE I: Design and develop an efficient method for a reliable and deterministic detection method for hijacked execution flow (D2HE). Develop a proof of concept prototype for D2HE in an open-source OS environment, and investigate its cost and effectiveness.
PHASE II: Further develop and mature D2HE method, develop a full scale D2HE protected system, and perform full-scale evaluation on the system.
PHASE III Dual Use Application: This system could be used in a broad range of information security products within the military, as well as in civilian enterprise applications. The technologies developed in this SBIR will be beneficial in providing additional resiliency to networked enterprise computing system against malwares and intrusions.
TECHNOLOGY AREAS: Information Systems
OBJECTIVE: Develop innovative software protection technology containing the ability to support the active defense of critical software applications.
DESCRIPTION: Current software application defenses are largely passive in nature [1]. When an attack is detected, these defenses often impose indirect penalties (e.g., deleting cryptographic keys or zeroing memory) in such a manner that it forces the adversary to reacquire the software and hardware assets, but impose no real-time penalties on the attacker that prevent the application from becoming compromised in the first place [2] [3].
The focus of this topic is to develop intelligent and cooperative software protection agents that can deploy active defensive countermeasures [4] and be used in conjunction with other forms of software protection. The desired software protection system should meet the following requirements: (1) have the ability to monitor, in real-time, protected end-nodes and report suspicious activity indicating a possible attack; (2) have the ability to gather forensic information on the protected host related to the attack; (3) have the ability to synthesize and assess the collected information to form a response to an attack; and (4) have the ability to impose direct penalties on the attacker within the boundaries of the protected host or network environment.
The software protection solution should contain the ability to perform surveillance as well as protection, and should have the ability to discriminate between a legitimate user and an attacker. Using the captured surveillance information, the solution should have the ability to react to an attack (e.g., terminating the network connection, stopping malicious processes, or denying the use of attack tools). Surveillance information of interest includes, but is not limited to, knowledge of the attacker’s behavior, attack tools and methods used, the type of information being sought in the attack, and the origin of attack. In the absence of connectivity with human operators, the active defensive system must have the ability to act autonomously and respond to an attack, contingent upon meeting pre-determined criteria. Proportional and subtle responses to an attack are important elements in the protection scheme. Responses must only occur once it is determined with a high degree of certainty that the host or network the application resides on is under attack or has been compromised, and the proposal should specify a policy for when such penalties will be invoked and with what severity.
An example of a system employing active defense is a protection system that (upon attack detection) can intelligently and proportionally respond to the attack, including sending a warning to a system administrator for a benign policy violation, redirecting an attacker to a honeypot for intelligence gathering, terminating a network connection, or covertly degrading the target application prior to piracy by the adversary.
PHASE I:
1) Research and develop a concept for an active software defense that meets the above mentioned requirements. Operating systems of interest include Linux or Windows.
2) Provide design and architecture documents of a prototype tool that demonstrates the feasibility of the concept.
3) Provide a minimal software prototype that meets one or more of the four requirements listed above.
PHASE II:
1) Based on the results from Phase I, refine and extend the design of the active software defensive system prototype to a fully functioning solution.
2) Provide test and evaluation results demonstrating the ability of the prototype to deploy active countermeasures on attackers.
PHASE III DUAL-USE APPLICATION: Active software defensive technology will serve to protect critical intellectual property by preventing attacks in real-time, gathering forensic evidence concerning the attack, or invoking a penalty on the attacker; and as such will find application in both the government and commercial sectors. Commercial applications can use the active defensive software protection technology described above to monitor, control, debug, configure, authenticate, update, and patch critical software and data with a reduced risk of exploitation [5]. Enterprise software that has embedded situational awareness can be used to authenticate and ensure trust in end-node applications.
TECHNOLOGY AREAS: Information Systems, Sensors
OBJECTIVE: Identify and develop potential new Public Key Algorithms (PKAs) that can be implemented in low size, weight and power (SWAP) environments. Demonstrate their efficacy in providing low latency communications in dynamically configurable networks. Quantify performance of proposed algorithms with respect to figures of interest such as network size, desired throughput, etc.
DESCRIPTION: The reliance on networks of all kinds is pervasive throughout the Department of Defense (DoD). Of particular and growing importance is the use of networks of distributed, low size, weight and power (SWAP) sensors of limited range that can, by acting cooperatively, provide widearea capability. The informative power of this capability is often directly dependent on the relative quality of communications, both intraand internetwork, that are available to the constituent nodes. Consequently, communication capacity emerges as a vital component of the networked system, and thus its integrity must be ensured. Encryption is typically employed to ensure communication security, but many cryptographic techniques rely on static configurations (e.g., the ability to ensure secure key distribution) to achieve the desired level of protection. Conversely, public key algorithms (PKAs) can be used in dynamic settings. However, standard implementations such as RSA or those based on discretelogarithms are computationally intensive and have not been designed for use in low SWAP environments.
DARPA is interested in research and development into new classes of PKAs that are particularly well suited for low SWAP network settings. Investigations should include quantitative analysis of the relative strength of any proposed algorithm, as well as characterization of its complexity (both in space and time) and its scalability.
PHASE I: Investigate and identify potential new PKAs. A detailed mathematical analysis of strengths and weaknesses must be provided. Quantify computational complexity, both in space and time, and determine scalability (in terms of network size) of any proposed approach. While this analysis may be supported by simulation, rigorous derivation of all claims is to be preferred. Phase I deliverables should also include a preliminary conceptual design of a network of generic low SWAP sensors on which the proposed PKAs are hosted.
PHASE II: Further develop, demonstrate and validate the efficacy of the PKAs proposed in Phase I. Early proof-of-concept demonstrations should take the form of software simulations that verify the complexity and scalability claims derived earlier in the effort. Later phase effort should be directed toward the construction of a hardware based demonstration comprising networks of low SWAP nodes. For both demonstrations, developers will be responsible for formulating meaningful performance metrics, and constructing a relevant test plan based on these. In addition, it is highly desirable that late phase demonstrations are motivated by realworld applications, and resources should be devoted to ensuring that proposed architectures align with current and future DoD relevant scenarios.
PHASE III: In the commercial realm, this work has the potential for use in mobile ad hoc networks (MANETs), and hence will be of interest to a wide range of telecommunications providers. Because of prevalence of networks and networked sensors throughout the DoD, the research to be undertaken in this effort is of potential value in many military applications. One potential customer is USMC, which makes use of distributed sensors in providing force protection to its expeditionary forces.
TECHNOLOGY AREAS: Materials/Processes, Sensors
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: Develop manufacturing approaches and sensor configurations for short wave infrared (SWIR) focal plane arrays (FPAs) that significantly reduce the cost of SWIR FPA packaging, optics and integration into micro-systems.
DESCRIPTION: SWIR imaging technology has significant advantages over conventional low light level imaging approaches, providing increased sensitivity and capturing unique target characteristics associated with the SWIR spectral band. SWIR FPAs are sensitive from the visible to short wave infrared with spectral band cutoff at 1.7um, where there is a large ambient signal level due to “night glow.” In addition to sensitivity advantages, SWIR imaging adds the capability for covert illumination outside the spectral range of conventional low light level devices; the capability to detect hidden and camouflaged targets; and sensitivity to battlefield lasers and target designators.
Widespread military application of these significant system performance advantages requires high quality SWIR FPAs affordable for general use in military systems. Recent improvements in SWIR detector and FPA technology have led to sensors with considerable system advantages. The dark current of shortwave sensitive material, indium gallium arsenide, has been substantially reduced, enhancing the signal-to-noise and increasing the operating temperature, ultimately with the potential for room temperature operation. Likewise, the noise of the readout integrated circuit has been reduced without sacrifice of dynamic range.
Transition of these substantial performance improvements into affordable systems will establish digital low light level imaging for military systems. Successful transition of SWIR FPAs can be facilitated by a substantial reduction in the cost of SWIR imaging sensors. New sensor configurations and innovative system designs are needed to capitalize on the recent advances in material and device technology and establish an affordable SWIR camera technology. In current manufacturing approaches, SWIR FPAs are individual packaged and integrated with optics. A wafer scale approach for die packaging and optics integration would significantly reduce sensor cost. New sensor concepts are also needed to achieve large format arrays, providing large field of view, with high resolution focused on critical areas of interest in the scene. These design innovations and low cost manufacturing approaches could also lead to micro-cameras with significant reduction in camera size and open new applications in helmet mounted systems and sensors for micro-air and ground vehicles.
PHASE I: Investigate packaging and optics integration for short wave infrared focal plane arrays to include assessment of materials and manufacturing approaches amendable to the manufacture of wafer level camera; Determine optimum array format and pixel size for imaging at a target identification range of 100 to 1,000 meters with minimum of horizontal field of view of forty (40) degrees; Assess the potential to produce a large format SWIR imager with size less than 20 cm3. Perform thermal, mechanical, optical analysis of encapsulation and optical materials to assess compatibility with SWIR FPA manufacturing.
PHASE II: Demonstrate with a small format SWIR array the design developed in Phase I, leading toward a wide field of view SWIR camera. The design shall demonstrate the potential for 10X cost reduction relative to current camera cost, and the potential for the overall volume reduction.
PHASE III: SWIR cameras currently have military and commercial applications, both benefiting from the cost and size reduction associated with wafer level focal plane arrays. Commercial applications include homeland security, industrial process control, and biomedical applications. Military applications are focused on night imaging for a wide range of areas, including both man-portable systems and micro air and ground vehicles. The contractor shall fabricate the wide field o f view SWIR camera and show volume and size reduction relative to state of the art SWIR cameras. The camera shall demonstrate imaging over a minimum forty (40) degree horizontal field of view with target identification range for tactical applications. The contractor shall demonstrate the potential for 10X cost camera cost reduction, while maintaining performance for man-portable applications, such as helmet mounted and rifle sight applications.
TECHNOLOGY AREAS: Sensors, Electronics
ACQUISITION PROGRAM: DARPA Multifunction RF
The technology within this topic is restricted under the International Traffic in Arms Regulation (ITAR), which controls the export and import of defense-related material and services. Offerors must disclose any proposed use of foreign nationals, their country of origin, and what tasks each would accomplish in the statement of work in accordance with section 3.5.b.(7) of the solicitation.
OBJECTIVE: Demonstrate a single chip silicon based circuit forming the receiver of a MMW sparse array radiometer with an output suitable for photonic processing.
DESCRIPTION: Passive millimeter wave technology has been investigated for over five decades as a sensing modality with unique properties that may prove useful for military and commercial applications. Recent applications have ranged from screening personnel for contraband at military checkpoints and commercial distribution centers to providing video rate imaging for combat helicopters to land in degraded visual conditions such as dust, snow, and fog. Work from the 90’s up to the current time has been ongoing to demonstrate the utility of using photonics for processing the down converted (not detected) output from MMW receivers in such a manner that video cameras are used to transform images into video data streams [1]. A challenge to practically realizing such a system has been the inability to achieve sufficient sensitivity with purely photonic receivers and maintain inter-channel balance and single receiver stability in an affordable manner [2]. With recent advances in SiGe RF circuits [3], we may have reached a point where all of these issues can be addressed in a single silicon based circuit.
PHASE I: Design the architecture of a single chip silicon based circuit forming the receiver of a MMW sparse array radiometer with an output suitable for photonic processing. Establish the potential processes ensuring the receiver is stable and calibrated, how it will achieve sufficient sensitivity to be useful in a passive MMW system, and how it will interface with a photonics processor suitable for processing sparse aperture imagery.
PHASE II: Based on the Phase I results, design and fabricate a silicon based circuit and demonstrate capability to operate with a photonics image processor. Sufficiently demonstrate the stability of the circuit, the variations in performance from chip to chip, and the ability to interface the chip to a photonics processor. Include antennas required for matching the circuit to the scene to be imaged.
PHASE III: Under Phase III it is expected that the performer will transition the design of the circuit developed into a system suitable for use in pilotage and navigation under degraded visual environments or in to security screening imagers used for contraband detection and security screening imagers used for military checkpoints.
TECHNOLOGY AREAS: Materials/Processes, Weapons
OBJECTIVE: Identify and develop advanced, high efficiency propellants and/or divert actuator and attitude control systems exhibiting highly controllable and steady burn properties for endo-atmospheric and exo-atmospheric use. The system shall be operational at ambient temperatures from -60 deg F to 170 deg F. Fast reaction times for the propellant systems are desired with a goal of less than 10 ms. The goal is also to produce a green propellant that meets insensitive munitions requirements. Novel concepts for propellant systems that have a high system mass fraction (greater than 40%) and a high delta velocity (greater than 1000 m/s) are desired.
DESCRIPTION: Current US Navy missile systems can be made more capable with controllable, high efficiency divert actuator control systems and attitude control systems with innovative designs and novel propellants. Unsteady burn properties can result in high rates of jitter or vibrational noise, which can affect missile performance in target acquisition, track, and the required precision in missile orientation. Future missile systems will probably require the kill vehicle to travel longer distances and achieve higher divert margins than their predecessors. To achieve future requirements the divert actuator control systems and the attitude control systems will require more efficient designs and higher energy density. Systems that can regulate the burn rate to conserve fuel are of interest. Increased efficiency may reduce kill vehicle weight which would allow move velocity from the main propulsion system to achieve faster target intercepts and improve the opportunities to engage the target. Increased fuel efficiency is also desired to achieve the longer range, larger divert requirements as well as maintain or reduce the current weight and/or volume of propellant used within the missile. In addition, US Navy missile requirements aim to use propellant materials and missile designs that facilitate the release of explosive energy without violent reaction or fratricide of adjacent munitions. This requirement has significantly limited the implementation of proposed hypergolic liquid propellant designs. Hypergolic liquid propellants’ inherent toxicity is a cause of concern for current US Navy missile applications.
This topic is soliciting innovative propellant materials of any state (solid, liquid or other) and system designs for innovative divert actuator control systems and attitude control systems, and includes evaluating thrust diverter actuator systems for new and innovative methods to achieve a higher level of missile kill vehicle performance and enhancing system predictability.
PHASE I: Develop a concept for an innovative propellant system and/or new propellant material that meets the objective listed above. In addition, create a plan of approach, or roadmap, to develop, test and demonstrate the proposed technology. Phase I deliverables will include a technical report and brief describing the technical feasibility and merit of the use of advanced propellants and/or innovative propellant system. The deliverables shall also include the plan of approach.
PHASE II: Develop the concepts investigated in Phase I. Develop, test and demonstrate concept feasibility in a missile environment. In addition, deliverables will include a report and brief describing the technical merit of the use of advanced propellants and the propellant system design approach and the feasibility of use in future Navy missile programs.
PHASE III: Finalize the design and manufacture of high efficiency propellants and propellant actuator systems exhibiting highly controllable and steady burn properties while facilitating the release of explosive energy without violent reaction. Possible applications may include, but are not limited to the following:
• Commercial Applications: Spacecraft, Satellites, Rockets, Unmanned vehicles
• DoD/Military Applications: Missiles - Strike, Ballistic Missile Defense (Phased Adaptive Approach), Land Based, Sea Based (surface launched, submarine launched, air launched)