Office of the Secretary Of Defense (OSD)
Director of Defense Research & Engineering
Small Business Innovation Research (SBIR)
FY2010.2 Program Description
The OSD Director of Defense Research & Engineering (Research Directorate) SBIR Program is
sponsoring topics in the following technology themes: Anti-Tamper (AT) Technology; Cognitive
Readiness Technology; Energy and Power Technology; Human, Social, Cultural & Behavioral (HSCB) –
Decision Support Tools Technology; Information Assurance – Cyber Conflict Defense Technology; and
Large Data Handling Technology in this solicitation.
The Army, Navy, Air Force and DARPA are participating in the OSD SBIR Program on this
solicitation. The service laboratories act as our OSD Agent in the management and execution of the
contracts with small businesses. The service laboratories, often referred to as a DoD Component acting
on behalf of the OSD, invite small business firms to submit proposals under this Small Business
Innovation Research (SBIR) Program solicitation. In order to participate in the OSD SBIR Program this
year, all potential proposers should register on the DoD SBIR Web site as soon as you can, and should
follow the instruction for electronic submittal of proposals. It is required that all bidders submit their
proposal cover sheet, company commercialization report and their firm‘s technical and cost proposal form
electronically through the DoD SBIR/STTR Proposal Submission Web site at
http://www.dodsbir.net/submission. If you experience problems submitting your proposal, call the help
desk (toll free) at 1-866-724-7457. You must include a Company Commercialization Report as part of
each proposal you submit; however, it does not count against the proposal page limit of 25 pages. Please
note that improper handling of this form may result in the proposal being substantially delayed.
Information provided may have a direct impact on the review of the proposal. The DoD SBIR Proposal
Submission Web site allows your company to come in any time (prior to the proposal submission
deadline) to edit your Cover Sheets, Technical and Cost Proposal and Company Commercialization
We WILL NOT accept any proposals that are not submitted through the on-line submission site. The submission site does not limit the overall file size for each electronic proposal; there is only a
25-page limit. However, file uploads may take a great deal of time depending on your file size and your
internet server connection speed. If you wish to upload a very large file, it is highly recommended that
you submit prior to the deadline submittal date, as the last day is heavily trafficked. You are responsible
for performing a virus check on each technical proposal file to be uploaded electronically. The detection
of a virus on any submission may be cause for the rejection of the proposal. We will not accept e-mail
Firms with strong research and development capabilities in science or engineering in any of the
topic areas described in this section and with the ability to commercialize the results are encouraged to
participate. Subject to availability of funds, the DUSD(S&T) SBIR Program will support high quality
research and development proposals of innovative concepts to solve the listed defense-related scientific or
engineering problems, especially those concepts that also have high potential for commercialization in the
private sector. Objectives of the DUSD(S&T) SBIR Program include stimulating technological
innovation, strengthening the role of small business in meeting DoD research and development needs,
fostering and encouraging participation by minority and disadvantaged persons in technological
innovation, and increasing the commercial application of DoD-supported research and development
results. The guidelines presented in the solicitation incorporate and exploit the flexibility of the SBA Policy Directive to encourage proposals based on scientific and technical approaches most likely to yield results important to DoD and the private sector.
Description of the OSD SBIR Three Phase Program
Phase I is to determine, insofar as possible, the scientific or technical merit and feasibility of ideas
submitted under the SBIR Program and will typically be one half-person year effort over a period not to exceed six months, with a dollar value up to $100,000. We plan to fund 3 Phase I contracts, on average, and down-select to one Phase II contract per topic. This is assuming that the proposals are sufficient in quality to fund this many. Proposals are evaluated using the Phase I evaluation criteria, in accordance with paragraph 4.2 of the DoD Solicitation Preface. Proposals should concentrate on that research and development which will significantly contribute to proving the scientific and technical feasibility of the proposed effort, the successful completion of which is a prerequisite for further DoD support in Phase II. The measure of Phase I success includes technical performance toward the topic objectives and evaluations of the extent to which Phase II results would have the potential to yield a product or process of continuing importance to DoD and the private sector, in accordance with Section 4.3.
Subsequent Phase II awards will be made to firms on the basis of results from the Phase I effort
and the scientific and technical merit of the Phase II proposal in addressing the goals and objectives described in the topic. Phase II awards will typically cover 2 to 5 person-years of effort over a period generally not to exceed 24 months (subject to negotiation). Phase II is the principal research and development effort and is expected to produce a well defined deliverable prototype or process. A more comprehensive proposal will be required for Phase II.
Under Phase III, the DoD may award non-SBIR funded follow-on contracts for products or
processes, which meet the Component mission needs. This solicitation is designed, in part, to encourage the conversion of federally sponsored research and development innovation into private sector applications. The small business is expected to use non-federal capital to pursue private sector applications of the research and development.
This solicitation is for Phase I proposals only. Any proposal submitted under prior SBIR
solicitations will not be considered under this solicitation; however, offerors who were not awarded a contract in response to a particular topic under prior SBIR solicitations are free to update or modify and submit the same or modified proposal if it is responsive to any of the topics listed in this section.
For Phase II, no separate solicitation will be issued and no unsolicited proposals will be accepted.
Only those firms that were awarded Phase I contracts, and have successfully completed their Phase I efforts, will be invited to submit a Phase II proposal. Invitations to submit Phase II proposals will be released at or before the end of the Phase I period of performance. The decision to invite a Phase II proposal will be made based upon the success of the Phase I contract to meet the technical goals of the topic, as well as the overall merit based upon the criteria in section 4.3. DoD is not obligated to make any awards under Phase I, II, or III. DoD is not responsible for any money expended by the proposer before award of any contract. For specifics regarding the evaluation and award of Phase I or II contracts, please read the front section of this solicitation very carefully. Every Phase II proposal will be reviewed for overall merit based upon the criteria in section 4.3 of this solicitation, repeated below:
a. The soundness, technical merit, and innovation of the proposed approach and its incremental
progress toward topic or subtopic solution.
b. The qualifications of the proposed principal/key investigators, supporting staff, and consultants.
Qualifications include not only the ability to perform the research and development but also the
ability to commercialize the results.
c. The potential for commercial (defense and private sector) application and the benefits expected to
accrue from this commercialization.
In addition, the OSD SBIR Program has a Phase II Plus Program, which provides matching SBIR
funds to expand an existing Phase II contract that attracts investment funds from a DoD acquisition program, a non-SBIR/non-STTR government program or Private sector investments. Phase II Plus allows for an existing Phase II OSD SBIR contract to be extended for up to one year per Phase II Plus application, to perform additional research and development. Phase II Plus matching funds will be provided on a one-for-one basis up to a maximum $500,000 of SBIR funds. All Phase II Plus awards are subject to acceptance, review, and selection of candidate projects, are subject to availability of funding, and successful negotiation and award of a Phase II Plus contract modification. The funds provided by the DoD acquisition program or a non-SBIR/non-STTR government program must be obligated on the OSD Phase II contract as a modification just prior to or concurrent with the OSD SBIR funds. Private sector funds must be deemed an ―outside investor‖ which may include such entities as another company, or an investor. It does not include the owners or family members, or affiliates of the small business (13 CFR 121.103).
The Fast Track provisions in section 4.0 of this solicitation apply as follows. Under the Fast
Track policy, SBIR projects that attract matching cash from an outside investor for their Phase II effort have an opportunity to receive interim funding between Phases I and II, to be evaluated for Phase II under an expedited process, and to be selected for Phase II award provided they meet or exceed the technical thresholds and have met their Phase I technical goals, as discussed Section 4.5. Under the Fast Track Program, a company submits a Fast Track application, including statement of work and cost estimate, within 120 to 180 days of the award of a Phase I contract (see the Fast Track Application Form on www.dodsbir.net/submission). Also submitted at this time is a commitment of third party funding for
Phase II. Subsequently, the company must submit its Phase I Final Report and its Phase II proposal no later than 210 days after the effective date of Phase I, and must certify, within 45 days of being selected for Phase II award, that all matching funds have been transferred to the company. For projects that qualify for the Fast Track (as discussed in Section 4.5), DoD will evaluate the Phase II proposals in an expedited manner in accordance with the above criteria, and may select these proposals for Phase II award provided: (1) they meet or exceed selection criteria (a) and (b) above and (2) the project has substantially met its Phase I technical goals (and assuming budgetary and other programmatic factors are met, as discussed in Section 4.1). Fast Track proposals, having attracted matching cash from an outside investor, presumptively meet criterion (c). However, selection and award of a Fast Track proposal is not mandated and DoD retains the discretion not to select or fund any Fast Track proposal.
In addition to supporting scientific and engineering research and development, another important
goal of the program is conversion of DoD-supported research and development into commercial (both Defense and Private Sector) products. Proposers are encouraged to obtain a contingent commitment for follow-on funding prior to Phase II where it is felt that the research and development has commercialization potential in either a Defense system or the private sector. Proposers who feel that their research and development have the potential to meet Defense system objectives or private sector market needs are encouraged to obtain either non-SBIR DoD follow-on funding or non-federal follow-on funding, for Phase III to pursue commercialization development. The commitment should be obtained during the course of Phase I performance, or early in the Phase II performance. This commitment may
be contingent upon the DoD supported development meeting some specific technical objectives in Phase
II which if met, would justify funding to pursue further development for commercial (either Defense
related or private sector) purposes in Phase III. The recipient will be permitted to obtain commercial
rights to any invention made in either Phase I or Phase II, subject to the patent policies stated elsewhere in
Contact with DoD
General informational questions pertaining to proposal instructions contained in this solicitation should be directed to the topic authors and point of contact identified in the topic description section.
Proposals should be electronically submitted. Oral communications with DoD personnel regarding the
technical content of this solicitation during the pre-solicitation phase are allowed, however, proposal
evaluation is conducted only on the written submittal. Oral communications during the pre-solicitation
period should be considered informal, and will not be factored into the selection for award of contracts.
Oral communications subsequent to the pre-solicitation period, during the Phase I proposal preparation
periods are prohibited for reasons of competitive fairness; however, to obtain answers to technical
questions during the formal Solicitation period, please visit http://www.dodsbir.net/sitis. Refer to the front
section of the solicitation for the exact dates.
Proposals shall be submitted in response to a specific topic identified in the following topic description sections. The topics listed are the only topics for which proposals will be accepted.
Scientific and technical information assistance may be requested by using the SBIR/STTR Interactive
Technical Information System (SITIS).
It is required that all bidders submit their proposal cover sheet, company commercialization report and their firm‘s technical and cost proposal form electronically through the DoD SBIR/STTR
Proposal Submission Web site at http://www.dodsbir.net/submission. (This applies to both Phase I and
Phase II proposal submission.) If you experience problems submitting your proposal, call the help desk
(toll free) at 866-724-7457. You must include a Company Commercialization Report as part of each
proposal you submit; however, it does not count against the proposal page limit of 25 pages. Please note
that improper handling of this form may result in the proposal being substantially delayed. Information
provided may have a direct impact on the review of the proposal. The proposal submission Web site
allows your company to come in any time (prior to the proposal submission deadline) to edit your Cover
Sheets, Technical and Cost Proposal and Company Commercialization Report. We WILL NOT accept
any proposals which are not submitted through the on-line submission site. The submission site
does not limit the overall file size for each electronic proposal, only the number of pages is limited.
However, file uploads may take a great deal of time depending on your file size and your internet server
connection speed. You are responsible for performing a virus check on each technical proposal file to be
uploaded electronically. The detection of a virus on any submission may be cause for the rejection of
the proposal. We will not accept e-mail submissions.
The following pages contain a summary of the technology focus areas, followed by the topics.
Anti-Tamper (AT) Technology Focus Area
DoD Anti-Tamper policy directives outline requirements to provide anti-tamper protection to
Critical Program Information (CPI) on all new start programs, all pre-planned product improvement or technology insertion efforts, and FMS/DCS programs. Although significant advances have been made in a number of enabling technologies for Anti-Tamper, such as protective materials, microelectronics, and software protection techniques, significant technical challenges remain to address the full scope of the exploitation threat. Studies indicate that approximately 80% of all CPI is contained in software/firmware. A broader range of robust techniques or technologies that protect software, data, and firmware is essential and will have a broad impact on protecting CPI. Secure programmable logic devices and secure processors are needed. Improvements are needed in existing protective coating technologies in order to reduce the impact on system reliability. The ability to detect the wide range of potential tamper events requires new and innovative approaches to tamper sensor technology. Finally, power solutions that would provide primary or secondary latent power for tamper sensors and responses are needed.
This focus area includes: development of protection techniques against reverse engineering of
Electro-Optical detectors and Optical components; development of a practical physical unclonable function with higher entropy for use in a field programmable gate array; new innovative technology or techniques to verify that a system‘s configuration matches the intended baseline configuration as a normal part of its startup routine, in order to detect system modification or tampering; research and development of technology, tools, and/or fabrication/design guidelines and methods to prevent, identify, or severely limit reverse engineering techniques on microelectronic devices; development of a tamper resistant, multiprocessor, embedded computer system architecture consisting of a microprocessor, a digital signal processor, field programmable gate array and graphics processing unit technology; research the existence, detection and analysis of an electromagnetic field radiated during FPGA bit stream operation; Development of innovative trusted intellectual property (circuit designs, embeddable micro-code, and the like) that will prevent other portions of an integrated circuit or field programmable gate array design from operating in modes, malicious or accidental, other than those intended by the designer; make possible trusted intellectual property in untrusted fabrication environments through the development of methods and designs that allows the determination that no unintended functionality has been added to a hardware device in the time between when the design is provided to the foundry and when the finished device is provided to the user; development of zero power/ultra low power tampering/reverse engineering sensor technology for use at the printed circuit board level, or integrated circuit level, including sensor, material, or techniques capable of mitigating the effectiveness of nondestructive probing by an exploiter seeking to conduct localized buried structure analysis.
The Anti-Tamper (AT) Technology topics are:
OSD10-A01 EO/Optical Protection
OSD10-A02 Field Programmable Gate Array (FPGA) Physical Unclonable Functions
OSD10-A03 System Configuration Verification
OSD10-A04 Anti-Reverse Engineering (RE) Techniques
OSD10-A05 Tamper Resistant UAV/UGV Embedded Architecture
OSD10-A06 FPGA Bit Stream Data Electromagnetic Field Analysis
OSD10-A07 Incorporation of Trust into Integrated Circuit (IC) and Field Programmable Gate
Array (FPGA) Design
OSD10-A08 Intellectual Property (IP) in Untrusted Fabrication Environments
OSD10-A09 Zero Power/Ultra Low Power Tamper Detection Sensors
Cognitive Readiness Technology Focus Area:
Cognitive readiness is the mental preparation (including skills, knowledge, abilities,
motivations, and personal dispositions) an individual needs to establish and sustain competent performance in the complex and unpredictable environment of modern military operations. Cognitive readiness may be understood as a combination of three basic abilities: 1) Recognize new situational patterns in the battle space (requiring adjustments in situation awareness, new knowledge, and transfer of training); 2) modify problem solutions associated with these patterns as required by the current situation (requiring adjustments in meta-cognition, socio-cultural agility, and creativity); and, 3) design and implementation of plans of action based on these solutions (requiring adjustments to decision-making, leadership, and controlling emotions in new social environments).
This theme supports research that will utilize the knowledge products from disciplines
such as cognitive science, network science, augmented cognition, neuroergonomics, learning science, psychology, and sociology to pioneer new developments to enable the cognitive
readiness of warfighters. This theme supports research, such as serious game environments, that can
be used to develop relevant models and to push the envelope on providing new analysis, decision support, and training capabilities in social, cultural and language domains for the deployed warfighter in organizational echelons from combat teams to Joint Task Force Headquarters. A focus of this technology is developing unique and operationally relevant models and content. Topics seek validated socio-cultural models and content with demonstrated use-case effectiveness. They seek to provide the interactive, dynamic environments that would support better cultural awareness. The technologies should be extensible beyond current operations in Iraq and Afghanistan to other regions and military kinetic and non-kinetic scenarios. Networkable, remote-capable products are desirable with emphasis on insertion into systems of record and Just In Time training environments. Training related topics require SCORM compliance and the adoption of existing /emerging standards for training of language and cultural skills.
The Cognitive Readiness Technology topics are:
OSD10-CR1 Rapid Assessment of Team Cognitive Readiness
OSD10-CR2 Neuro Cognitive Control of Human Machine Systems
OSD10-CR3 Immersive Scenario Based Training Environments for Intuitive Decision Making OSD10-CR4 Training Battery for the Rapid Formation of Cognitively Ready, Effective Teams OSD10-CR5 Generation of the Army Cognitive Readiness Assessment (ACRA)
OSD10-CR6 Distributed Team Workload Assessment Tool
OSD10-CR7 Improving Team Readiness through the Convergence of Team Mental Models
OSD10-CR8 Decision Support: Cognitive Readiness Assessment and Reporting
OSD10-CR9 Embeddable Agents for Assessing Cognitive Readiness
OSD10-C10 Real-time Cognitive Readiness Assessment Tool
Energy and Power Technology Focus Area
Technology advances in electric power generation, distribution, and use are enabling new,
transformational military capabilities. Advanced energy and power technologies are providing the critical
concepts, architectures, and systems to enable this revolutionary warfighting advantage. Integrating and
distributing power on manned and unmanned ships, aircraft, ground vehicles and other platforms leads to
significant enhancements in platform flexibility, survivability, lethality and effectiveness. The Army‘s
transformation challenge is to develop a smaller, lighter, and faster force, utilizing hybrid electric drive,
electric armament and protection, and a reduced logistical footprint. The Navy is developing future
ships that integrate electric power into a next-generation architecture which enables directed energy
weapons, electromagnetic launchers and recovery, new sensors, as well as supporting significant fuel,
maintenance, and manning reductions. The Air Force needs electric power to replace complex
mechanical, hydraulic and pneumatic subsystems, and also enable advanced electric armament systems.
Improved batteries/power sources will support the individual soldier by permitting longer mission
durations and reduced weight borne by the soldier. Space based operational capability improvements
include a more electric architecture for responsive and affordable delivery of mission assets, and
powering space based radar systems.
More electric and all-electric systems have distinct technological advantages but are coupled with
inherent disadvantages – principally, the need for more power generation and a marked increase in waste
heat generated by ever smaller electronic components. The use of solar power at forward operating
bases reduces the need for supply convoys transporting batteries and liquid fuels into war zones. Quiet
systems minimize risk of discovery during field operations. Warfighting capabilities are optimized
when energy and power systems are quiet, efficient, lightweight, and easy to use, and require minimal
The Energy and Power Technology topics are:
OSD10-EP1 Parallel Operation of Compact, Efficient Turbogenerators for Robust Tactical
Energy Independence OSD10-EP2 Rugged, collapsible solar concentration devices to support tactical alternative
energy production OSD10-EP3 APU Silencing Technology Development
OSD10-EP4 Near Field Contactless Electric Power Transfer
OSD10-EP5 Redeployable Solar Combined Heat and Power (RSCHP) System
OSD10-EP6 Anion Exchange Membranes for Alkaline and Low-temperature Fuel Cell
Applications OSD10-EP7 Advanced System-Level Integration for High Efficiency Primary and Secondary
(Waste Heat) Thermoelectric Generation OSD10-EP8 Magnetic Gears and Couplings
Human, Social, Cultural & Behavioral (HSCB) – Decision Support Tools Technology Focus Area
Current military operations need and future operations will demand the capability to understand
the social and cultural terrain and the various dimensions of human behavior within those terrains.
Behaviors in the social and cultural terrain context extend across the spectrum, from adversaries to our
joint U.S. forces, with our coalition partners, and with government and non-government organizations.
For operational, strategic and tactical warfighters, there is a significant need for socio-cultural models that provide predictive capabilities with regard to the behavior of adversaries and contested populations.
The Department of Defense is increasing the investment in ―non-kinetic‖ capabilities, relative to
the traditional ―kinetic‖ capabilities of weapons platforms and munitions. A portion of this new
investment strategy is focused on increasing awareness and understanding of the impact of cultural, social, and behavioral variables within the operational environment. Additionally, Irregular Warfare (IW) and
the subsequent need of non-kinetic capabilities are a matter of strategic importance to the military, on par with our capability to wage traditional warfare.
DoD‘s HSCB technology area emphasizes the application of knowledge, skills, and supporting technologies to give the DoD the ability to understand the complex human terrain and socio-cultural
environments in which we operate. This work merges the social and behavioral sciences with the
computational and computer sciences to deliver the methodologies and tools to support Phase 0
(planning/shaping) to Phase 4 (stabilization) military operations critical to success in military operations (DDR&E Strategic Plan). OSD‘s HSCB modeling efforts are focused on narrowing the gap between
social and behavioral science capabilities and military utility via the development of cross-domain
capabilities and tools. Investment in enhanced HSCB modeling capabilities and tools requires the
simultaneous development of decision support tools and systems that enable the end-user to make optimal
use of HSCB model outputs and data.
The HSCB Technology topics are:
OSD10-HS1 Decision Superiority through Enhanced Cultural Intelligence Forecasting
OSD10-HS2 In Situ Collection of Human Social Cultural Behavioral Data
OSD10-HS3 Neuromorphic Models of Human Social Cultural Behavior (HSCB)
OSD10-HS4 Dynamic Meta-Network Measures
OSD10-HS5 Visualization Methods and Tools for Human, Social, Cultural, and Behavioral
OSD10-HS6 Automated Network Construction
OSD10-HS7 Analytical Tools for Local Economic Analysis
OSD10-HS8 An Adaptive Cultural Trainer for Development of Cultural Aptitude in
OSD10-HS9 Developing and Modeling Social Networks inside Technology Poor Societies
Information Assurance – Cyber Conflict Defense Technology Focus Area
As the cyber threat continues to increase in sophistication and complexity, the DoD must be prepared to defend the ability to provide the information and processing needed to support critical
missions during a cyber conflict. Networks and systems must be built with the ability to use alternate
paths and survivable architectures and algorithms to get the critical work done even when attacked in
unanticipated ways that may succeed in interfering with their normal operation. We also need to make it
harder for a determined adversary to succeed against us, for instance, by increasing redundancy, diversity, and agility to disrupt attack planning. The DoD needs new tools and technologies to force capable
adversaries to spend more, move more slowly, and take bigger risks, while providing mission assurance
by enabling us to fight through cyber degradation. The DoD must go beyond efforts to build and
maintain security in systems overwhelmingly built from commercial off-the-shelf technology.
Hardening DOD networks will require key security components with high assurance and of known
pedigree as well as adaptable and robust defenses.
As envisioned, the Global Information Grid (GIG) will connect the roughly 3 million computers,
100,000 LANs, 100 long distance networks, and a multitude of wireless networks and devices in support
of all DoD. It will underlie the increased ability to conduct network-centric operations, providing the
joint warfighter with a single, end-to-end information system capability, built on a secure, robust
network-centric environment. It will allow users to post and access shared data and applications
regardless of their location – while inhibiting or denying an adversary‘s ability to do the same – in a
converged heterogeneous enterprise capable of protecting content of different sensitivities. DoD‘s
unprecedented enterprise vision for future information operations must simultaneously address protecting
and defending its critical information and information technology systems by ensuring availability,
integrity, authentication, confidentiality and non-repudiation; and by providing security management and
operations that incorporate the requisite protection, detection, and quick reaction capabilities.
Further, as operations are ever-more enmeshed in the decentralized fabric of the GIG, the converged, decentralized vision of the future network requires a parallel adoption of a decentralized trust paradigm. Degrees of trust and robustness hitherto provided by enclave isolation and separation must be
distributed across the networks down to the tactical edge devices. DoD is making significant IA
investments in ensuring the security of net-centric operations of the GIG. The scope of the challenges,
the dynamics of the information technology industry, and the need for dynamically optimizing defenses
within particular mission contexts provide multiple opportunities for new and innovative security
solutions. In particular new technology solutions are needed for supporting the edge users who must
operate across multiple domains and communications paths, on less hardened networks, to reach other
tactical mission players, and to access protected core information systems and data warehouses.
The Information Assurance Technology topics are:
OSD10-IA1 Countermeasures to Malicious Hardware to Improve Software Protection
OSD10-IA2 Effective Portable Data Content Inspection and Sanitization
OSD10-IA3 Robust and Efficient Anti-Phishing Techniques
OSD10-IA4 Preventing Sensitive Information and Malicious Traffic from Leaving Computers
OSD10-IA5 Biometric-based Computer Authentication During Mission Oriented Protective
Large Data Handling Technology Focus Area
As the Department of Defense increases the capability and capacity to generate increasing
amounts of data from the numerous sensors in the battlespace, the issue of handling very large data sets has become more challenging. This is in part due to Department of Defense response to a changing threat environment where there is an expansion of the types of sensors deployed, new types of information collected, and different features used to classify these new threats. From a technical perspective, sensor processing speeds have outpaced the speed and ability to transport, store and process the data created.
Research in the areas of Architecture, Shaping Data for Exploitation, and Data Discovery for
Exploitation are of interest. In addition to the research and development of technology and approaches, it is important to evaluate the impact of these efforts areas with regards to the way they change how large data sets are handled.
(a) Architectures – Both the size of the data to be transferred and the growing size of databases
requires novel architectural approaches to provide the adaptability and usability (automation and performance impact of human in the loop). Current databases, file systems and network protocols will not keep pace.
(b) Shaping Sensor Data for Exploitation – When tracing the processing chain from multi-source
sensor inputs to the user/analysts, the techniques that are known and used become fewer and less mature. The simple process chain view goes from (1) metadata tagging to (2) pre-processing to (3) multi-source common data representation to (4) triage/identify high priority data subsets for analysis and action. Candidate research areas include pattern analysis, data classification for importance and prioritization, criticality assessment, change detection, uncertainty management and reduction, high level structures, data search and retrieval, feature extraction, automatic translation, and automated or assisted pattern recognition.
(c) Data Discovery for Exploitation – In order to better to discover and exploit the growing
amount of sensor data, the following areas of research are considered: Object recognition in scenes and streams, discovery and exploitation at the edge, structuring knowledge for discovery, improving analytic throughput, aiding ISR functions, layered analysis and interpretation, effects prediction for decision support and cross domain access for effective ISR
The Large Data Handling topics are:
OSD10-L01 Temporal and Conceptual Extractions of Complex Social Network Data
OSD10-L02 Multi-sensor Extraction for Social Network Analysis - Tactical
OSD10-L03 End to End Analysis of Information Architectures
OSD10-L04 Automated Scene Understanding
OSD10-L05 Shaping Sensor Data for Exploitation
OSD10-L06 Knowledge Discovery using Mobile Devices
OSD10-L07 Data Discovery for Exploitation from Distributed Sources
OSD10-L08 Real-time Resource Allocation Co-Processor
OSD10-L09 Framework for Large Streaming Data Analysis