You are here

CEDAR (Complex Event Discovery, Analysis, and Ranking)

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N00014-11-C-0496
Agency Tracking Number: N10A-040-0061
Amount: $742,293.00
Phase: Phase II
Program: STTR
Solicitation Topic Code: N10A-T040
Solicitation Number: 2010.A
Timeline
Solicitation Year: 2010
Award Year: 2011
Award Start Date (Proposal Award Date): 2011-09-28
Award End Date (Contract End Date): 2013-11-06
Small Business Information
6011 West Courtyard Drive Bldg 5, Suite 300
Austin, TX -
United States
DUNS: 158034665
HUBZone Owned: No
Woman Owned: Yes
Socially and Economically Disadvantaged: Yes
Principal Investigator
 Matt McClain
 Principal Invesatigator
 (512) 682-4735
 mmcclain@21technologies.com
Business Contact
 Irene Williams
Title: CEO
Phone: (512) 682-4700
Email: SBIR_Admin@21technologies.com
Research Institution
 CUBRC
 William A Tagliaferri Jr
 
4455 Genesee Street
Buffalo, NY 14225-
United States

 (315) 339-2077
 Nonprofit College or University
Abstract

Successful intelligence operations require the ability to anticipate enemy actions in time to prevent or mitigate their impact. These actions are often part of a complex set of events; for example, an assault on a specific place can involve planning and logistics activity as well as the coordinated movement of multiple actors. Complex event processing (CEP) techniques are a promising technology to enable the detection of emerging threats by monitoring intelligence, surveillance, and reconnaissance (ISR) data for combinations of simple behaviors which are indicative of enemy attack planning. By recognizing emerging complex events in this way, ISR data can be interpreted to extract timely actionable intelligence. 21st Century Technologies, Inc. with academic partner Calspan-University of Buffalo Research Center (CUBRC), is developing the Complex Event Discovery, Analysis, and Ranking (CEDAR) system to meet this operational need. In the STTR Phase 2 effort, we propose to enhance CUBRC"s existing CEP technology to operate in the asymmetric threat domain, where enemy tactics are highly variable and dynamic. We will also perform research to leverage the simple behaviors detected from multiple INT sources. By the end of Phase 2, we will have produced a prototype system that can detect emerging threats on operational data.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government