KBSI applied advanced data fusion technologies in investigating methods for increasing the accuracy of non-destructive inspection imaging technology. Using both ultrasonic and eddy current images of KC-135 lap joint coupons, KBSI developed image processing techniques, both classical and wavelet-based, for the pre-processing of image data prior to corrosion quantification and fusion.
Corrosion is considered the most significant form of damage for an aging aircraft—impacting both maintenance costs and readiness. Currently, there is an urgent need to improve on established non-destructive inspection methods that increase detection reliability and accuracy in multi-layer structures.
GRIPS is a methodology and tool suite that allows military planners to define, systematically evaluate, and globally share data concerning future geo-political contexts. GRIPS’s quantitative analysis and knowledge sharing capabilities help military planners to current and future force deployment plans.
Naval planners must often look years and decades into the future to answer complex questions concerning the objectives and composition of future forces. Successful long-term strategic planning starts with a thorough and systematic evaluation of the future states during which the plans will be enacted, followed by an assessment of plan outcomes and trade-offs. Intelligence Analysts must develop supportable predictions of future geo-political contexts within the regions of interest.
The NODE™ system uses data mining and machine learning technologies to provide a more advanced and adaptable computer network defense. The technology executes data mining and machine learning technologies and algorithms over the network hosts; i.e., over the entire computing fabric.
The ubiquity of computing systems and networks has vastly improved the speed and ease of gathering, storing, and disseminating information. Networking on a global scale, however, also gives rise to a significant disadvantage: network vulnerability. Securing data, particularly with respect to sensitive national security data and data transmissions, is a paramount concern, particularly given the increasing sophistication of computer terrorism.
GERMAT™ provides knowledge-based assistance for neural network and fuzzy logic modeling, helping the U.S. Army to significantly improve battleground classification, target/decoy recognition and discrimination, logistics forecasting, intelligent data fusion, data mining, knowledge discovery, and optimization.
Neural networks and fuzzy set theoretic models offer promising results in performing complex mappings and reasoning in a wide variety of commercial and military domains. Although these technologies have been applied extensively for over a decade, their use in complex, real-time domains is just beginning to be tested. With the advent of recent, more robust and “non black-box”-like algorithms [such as wavenets and Fuzzy Associative Memories (FAMs)], these technologies exhibit even greater promise and potential. These new generation information processing systems provide capabilities like adaptability, robustness, generalization, and the ability to work amid the imprecision and uncertainty of the real world–an ability which makes them especially attractive. Neural networks in particular offer massive parallelism and future promise for hardware implementation and are ideal for applications such as forecasting, classification, pattern recognition, customer analysis, data mining, fraud detection, function fitting, etc.
The MAES initiative designed and developed technology that collects data from multiple sources, analyzes the data for trends and patterns, and, using handheld devices, deliver context sensitive, location based alerts and advice to users on healthcare, disease, safety, and environmental related issues.
Humanitarian relief, disaster recovery, nation building: these missions are becoming more significant for both military and non-governmental organizations every day. Health awareness and a proactive approach to health outcomes are critical to these missions, but, in many developing countries, even basic reporting of the health status of affected populations can be a daunting task. Communications infrastructures are minimal, transportation may be difficult, time is short, and the focus is often on addressing basic human survival needs. Establishing baselines for epidemiological awareness may be too time consuming and difficult to be a priority.
The IIWARS system uses text mining technologies and information fusion to mine data from multiple, distributed text sources, extract features and “indicators” of emerging threats, and improve the DoD’s terrorist threat assessment capabilities.
While analysts and strategists are well versed in tracking threats to conventional military targets, the new asymmetric threats posed by terrorist organizations, as 9-11 has made devastatingly clear, are much more difficult to anticipate. Threats to military targets have traditionally required capabilities that are both expensive and take a long time to develop–activities that satellites and other reconnaissance are more likely to notice.
AARDIS researched advanced electronic warfare (EW) training methods and tools that reduce the cognitive workload of instructors, improve training effectiveness, accelerate improvements in student performance, and reduce training costs.
Pilot training at the U.S. Air Force (USAF) faces two fundamental challenges: rising training costs and restrictions and the changing nature of military conflicts around the globe. According to a recent RAND study, the costs of USAF initial skills training (IST) have risen to approximately $750 million per year. In addition, the opportunities for live training exercises, because of limits on training airspace, rising fuel costs and heightened security, have been diminishing.
KBSI is researching the application of advanced semantic technologies to layered sensing networks (LSN) and the use of data mining technologies for discovering and extracting information from large data stores. The research also investigates the automatic generation of ontologies from unprocessed data sources.
The increased use of networked sensor platforms to perform various command and control, surveillance, and reconnaissance missions has resulted in a corresponding increase in the quantity (and variety) of data that must be organized and analyzed as a precursor to extracting useful information. The purpose of this initiative with Ball Aerospace and Technologies Corporation (BATC) and Air Force Research Laboratories, Anti Tamper and Software Protection (AFRL/RYT) is to research various methods and technologies for extracting valuable information from vast quantities of data.
ONSITE uses an innovative approach to natural language processing (NLP) in enabling state of the art natural language processing rates in support of military tactical operations. The initiative also investigated ontologies for higher processing throughput and the improved semantic resolution of extracted information.
KBSI has been awarded funding from the Defense Advanced Research Projects Agency (DARPA) to research, design, and demonstrate enabling technology for Open-Source Information Tactical Exploitation (ONSITE). The ONSITE initiative applies an innovative approach to natural language processing (NLP) that aims at achieving state of the art processing rates for the understanding of natural language in support of military tactical operations. DARPA’s goal is to improve natural language processing speed and efficiency despite constrained computational resources, accelerated operational timelines, and specific intelligence objectives. Improving the speed and efficiency of NLP allows war fighters to more quickly process data in the bid for tactical advantage.
The ETHOS™ method is used for securing trust based on the information exchanged between the different nodes of a sensor network. The initiative investigated various trust metrics and algorithms to define a set of trust metrics that use information entropy as the basis for calculating the reputation of particular nodes.
In this U.S. Air Force Research Laboratory (AFRL) – Wright-Patterson AFB funded effort KBSI developed an Entropy-Trust-Homology Operational Security (ETHOS™) method for securing trust that is based on the information exchanged between the different nodes of a sensor network. Trust entropy metrics are created based on both the patterns of information entropy flow between nodes and on usage behavior. Usage behavior includes both user behavior (user monitoring) as well as CPU behavior (process monitoring). Each node in the system creates a set of trust metrics that corresponds to the set of directly observable neighboring nodes. A trust metric that reflects the reputation of a particular node could then be calculated by the direct and indirect querying of nodes in the network.