Information Technology

Latest Stories

INSIDER
RF & Microwave Electronics

Army Gets a Clearer View of Multi-Domain Battlefield

The Assured Positioning, Navigation and Timing/Space Cross-Functional Team (APNT/Space CFT) takes a multi-dimensional approach to understanding and preparing for future warfare. The...

Feature Image

Articles
Communications

Transforming Battlespace Communications

The Russian invasion in Ukraine has certainly raised the security stakes and intensified the need for simultaneous communications streams over a single platform.

Feature Image

Articles
RF & Microwave Electronics

The Next Generation of Mission-Critical Communications Infrastructure is Here

The critical role of spectrum superiority in the success of battlefield campaigns is evidenced by the enormous investments being made in electronic warfare (EW)...

Feature Image

Products
Information Technology

New Products

Modeling and Simulation Software

COMSOL (Burlington, MA) announced a major update to the COMSOL Multiphysics ® software version 6.0. The update builds out the Model Manager server with a web interface — an...

Feature Image

Articles
RF & Microwave Electronics

What is Pulse Shaping?

Pulse shaping, as it is done today, is an effort to fix fidelity issues caused by the transmitting amplifier and is accomplished by a combination of imperfect methods, most external to the amplifier. This article...

Feature Image

INSIDER
Defense

Portable Servers Enhance Army Geospatial Intelligence Training

The Army Geospatial Center has assisted in further modernizing the 412th Theater Engineer Command’s Engineer-Focused Intelligence Training (ENFIT), geospatial intelligence...

Feature Image

INSIDER
Sensors/Data Acquisition

New Method Accelerates AI Decision-Making

A new solution compresses and offloads critical data from battlefield machines more efficiently, enabling faster AI processing and decision-making on the battlefield.

Feature Image

INSIDER
Communications

Special Forces Get a Small, Powerful Cyber Support Device

U.S. Special Operations Forces have a new aid in the fight against cyber-attacks. The Tactical Key Loader (TKL) cryptographic key device, which answers the Army’s call for the...

Feature Image

INSIDER
Sensors/Data Acquisition

Creating Cross-Domain Kill Webs in Real Time

Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent Air Force demonstration of the...

Feature Image

Briefs
Sensors/Data Acquisition

Covariance and Uncertainty Realism in Space Surveillance and Tracking

Characterizing uncertainty in estimating the state of a resident space object is one of the fundamentals of many space surveillance tasks.

Feature Image

Briefs
Aerospace

Co-Prime Frequency and Aperture Design for HF Surveillance, Wideband Radar Imaging, and Nonstationary Array Processing

A co-prime array uses two uniform linear subarrays to construct an effective difference coarray with certain desirable characteristics, such as a high number of degrees-of-freedom for DOA estimation. In this case, the co-prime...

Briefs
Information Technology

Multi-Temporal Analysis of Underbody IED Theater Events on Ground Vehicles

Recently, modeling and simulation (M&S) engineers have made impressive strides in improving ground vehicle reliability and soldier safety. This work involved...

Feature Image

Briefs
Defense

Ontology for Insider Threat Indicators

The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending...

Feature Image

Briefs
Aerospace

Data Mining in Cyber Operations

Defending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the...

Feature Image

Briefs
Information Technology

Framework for Resilient Remote Monitoring

This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.

System administrators and cyber defenders continue to face challenges in...

Feature Image

Briefs
Defense

Communication Protocol for CyAMS and the Cyber Fighter Associate Interface

This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.

As the military adopts more networked...

Feature Image

Briefs
Information Technology

Reduced Order Modeling for Rapid Simulation of Blast Events of a Military Ground Vehicle and its Occupants

Improvised Explosive Devices (IEDs) pose a significant threat to military ground vehicles and soldiers in the field. Full-system...

Feature Image

Briefs
Materials

Materials Design Principles for the Dynamic Fracture of Laminar Composite Structures

Crack bridging (e.g., from stitches or pins) and friction have profound and potentially very useful effects on delamination crack growth, controlling growth rates (damage levels) and the energy absorbed. However, the implications for structural design principles...

Briefs
Information Technology

Developing and Validating Statistical Cyber Defenses

Enterprise business processes are more connected than ever before, driven by the ability to share the right information with the right partners at the right time. While this...

Feature Image

Briefs
Aerospace

Supervisory Control State Diagrams to Depict Autonomous Activity

The military seeks to enable agile and adaptive mission management and control for a team comprised of unmanned aerial vehicles (UAVs), unattended ground sensors (UGS),...

Feature Image

Briefs
Information Technology

Aerodynamic Modeling of a Flapping Wing Unmanned Aerial Vehicle

The phenomenon of flapping wing flight in nature has been studied for centuries. Recently, flapping flight for unmanned aerial vehicle (UAV) applications has become of interest....

Feature Image

Briefs
Aerospace

Queuing Model for Supervisory Control of Unmanned Autonomous Vehicles

One critical aspect in developing a quantitative model of unmanned autonomous vehicle (UAV) operator and system performance has been to adopt a task-centric approach to...

Feature Image

Briefs
Information Technology

Real-Time, High-Fidelity Simulation of Autonomous Ground Vehicle Dynamics

Integrated simulation capabilities that are high-fidelity, fast, and have scalable architecture are essential to support autonomous vehicle design and performance...

Feature Image

Briefs
Information Technology

Software for Material/Structural Characterization Across Length Scales

Synthetic and natural micro-architectures occur frequently, and multiphase functionally graded composites are becoming increasingly popular for applications requiring...

Feature Image

Briefs
Information Technology

Model Development Using Accelerated Simulations of Hypersonic Flow Features

Currently, the two main computational tools used by the aerothermodynamics community to model hypersonic flows are Computational Fluid Dynamics (CFD), and the direct...

Feature Image

Briefs
Aerospace

Terrain Model as an Interface for Real-Time Vehicle Dynamics Simulations

In order to enable off-road vehicle dynamics analysis simulations when traveling on soft soil, a deformable Vehicle Terrain Interface (VTI) model that interfaces with...

Feature Image

News
Data Acquisition

FEV/DGE System Automates HMI Validation Process

With a multitude of infotainment system options currently on the market, and more coming soon, ensuring that these systems perform as intended in the vehicle prior to release is of utmost importance for automakers.

Feature Image

Application Briefs
Defense

Intelligence Analysis System

Air Force intelligence analysts must assess an adversary’s capability to achieve their objectives, including their offensive and defensive systems, state of readiness, training, and conditions such as weather. To effectively assess these capabilities, analysts must integrate a tremendous amount of data from a...

Briefs
Sensors/Data Acquisition

Thermal-to-Visible Face Recognition

For nighttime surveillance, acquisition of visible light imagery is impractical due to the lack of illumination. Thermal imaging, which acquires mid-wave infrared or long-wave infrared radiation naturally...

Feature Image