Abstract:The proposed Spotter effort develops the algorithms necessary to exploit large format (LF) imagery in an operational environment with layered sensor platforms by cueing high-resolution sensors in order to reduce downstream data volume. In order to support analysts conducting intelligence,… more
Abstract:Cyber networks are a critical part of the nation's security. Not only do cyber networks protect critical and sensitive information, they also enable vital functions both in the U.S. and abroad, in the military as well as in the commercial realm and are therefore a valuable target for international… more
Abstract:The Department of Defense (DoD) requires an automated process to aid the timely dissemination of information to those with need to know without exposing secure information. Though security requirements often take a higher priority than users' need for information, it is also imperative that… more
Abstract:The transition of Department of Defense (DoD) infrastructure to a Net-centric Enterprise Services (NCES) architecture on a Global Information Grid (GID) is dramatically increasing the connectedness between military, civilian, and intelligence personnel and the networks they employ. With the… more
Abstract:21st Century Technologies (21CT) proposes PRESAGE, a fast, mobile, and robust computational tool for automated analysis of extremely large sets of unstructured information to assist commanders in proactively responding to asymmetric threats. Understanding and influencing the sympathies of the… more
Abstract:21st Century Technologies, Inc. (21CT) presents the Human and Unmanned Teaming for Tracking Elusive Dismounts (HUNTED) effort. HUNTED gives small units direct control over a coordinated team of two or more unmanned systems (UMS) to perform superior search, detection, and tracking of elusive… more
Abstract:Foveated imagery is ubiquitous in nature, and foveating sensors offer the potential for superior performance in artificial vision systems. However, technical and user acceptance barriers caused in part by a lack of mature theory currently hinder the exploitation of foveated imagery on the… more
Abstract:According to the Iraq Study Group, US Forces must continue to support Iraq to prevent the government from falling and being influenced by neighboring countries (Syria and Iran) and to prevent a propaganda coupe for Al Qaeda and the spread of radical Islam. Our soldiers, marines, and sailors are… more
Abstract:The ability to efficiently process intelligence data is critical to fighting the global war on terror. A major source of this data is recorded speech. Therefore, the performance of speech processing applications (speech recognition and speaker identification applications, for example) depends on… more
Abstract:DESCRIPTION (provided by applicant): Since the earliest examination of cellular structures, biologists have been fascinated by observing cells using light microscopy. The advent of fluorescent labeling technologies plus the plethora of sophisticated light
microscope techniques now available make… more
Abstract:Historically organophosphorus compounds such as insecticides and nerve agents have been susceptible to decomposition by proteinaceous enzymes. Organophosphate hydrolases (OPH) represent a practical method to deactivate such compounds peripherally and on surfaces. However, when such organophosphates… more
Abstract:DESCRIPTION (provided by applicant): Nutrition Initiative for Small Chain Restaurants (NISCR) Project Summary/Abstract To help combat obesity and diet-related diseases prevalent in the U.S., the proposed project will develop a program that enables and enco
urages small chain restaurants to (1) serve… more
Abstract:The CRIPTC Secure Processor executes encrypted code directly - the code and data are never decrypted, never existing as plaintext once within the system, including the memory, cache, and CPU. A would-be attacker is never given the opportunity to probe to capture the unencrypted code. CRIPTC… more
Abstract:3 Sigma Research proposes an innovative approach to develop a open architecture based data model and process for adding self-identifying information to a datagram. The power of our potential solution is in applying results from our research of Packaged Ontology Certificates to the unique… more
Abstract:This Small Business Innovation Research (SBIR) Phase I project proposed the development and evaluation of a new class of adaptive interference mitigation techniques via smart antenna beamforming algorithms. Current blind (no user or interference information required) beamforming algorithms require… more
Abstract:Adaptive Materials, Inc. (AMI) proposes to evaluate technologies and mission profiles for use in the development of an efficient power management system for the United States Marine Corps Distributed Operations Squads. The base Phase I effort will focus on optimizing existing AMI power management… more
Abstract:PALS for Sniper Detection (PALS-SD) is a straightforward near-term evolution of A2-T2's existing PALS 3D for enhanced long-range facial identification technologies. Essentially, our existing multi-modal Electro-Optical/IR/Laser-Sight/Designator/Range-Finder configurations will be upgraded to include… more
Abstract:There are often secondary or tertiary effects to blast-related injuries including ear injury and hearing loss, which may also result in cognitive and linguistic deficits. The PALS medical Phase I prototype will be a modular addition to our existing technologies that assist with the rehabilitation of… more
Abstract:R3Logic, Inc., in collaboration with Tezzaron Semiconductor will develop a rad-hard multi-core embedded processor / memory system that will be fabricated in a multi-layer 3-D integrated circuit. Phase I will focus on the system design. We will complete the RTL to GDSII synthesis of the processor and… more
Abstract:An integrated computational environment for multidisciplinary, physics-based simulation and analyses of airbreathing hypersonic flight vehicles will be developed. These vehicles are among the most promising alternatives for the next generation of Highly Reliable Reusable Launch Systems (HRRLS). The… more
Abstract:Aluminum-made LG outer cylinders easily become damaged developing nicks and scratches of 5 thousandths of an inch or deeper on the inner surface (ID). This leads to a premature condemnation. There is currently no repair technique to restore the LG outer cylinders to serviceable condition. The EPVDr… more
Abstract:The objective of this proposal is to demonstrate the feasibility of developing variable speed speech synthesis technology. We plan to use open source TTS systems because they often provide flexibility and interoperability, which is essential for research oriented work. To modify speaking speed, we… more
Abstract:Voice transformation is altering one person's voice into another person's voice in such a way that the source speaker's words sound like they are the target speaker's. In Phase I, we have studied various algorithms for voice transformation. The project has come to grips with the feasible methods for… more
Abstract:We propose a method that specifically addresses the requirement for helicopter engine torque sensor validation by integrating the engine component level model, model reduction techniques, and real-time parameter estimation algorithms. The method starts with a component level turboshaft model.… more
Abstract:The Air Force seeks a large production wind tunnel seeding system with full field steering capability. Additionally, the system must offer control of the particle size and density along with minimal maintenance and flow disturbance characteristics. These features will increase tunnel productivity,… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.