osd102doc - Office Of The Secretary Of Defense (OSD)

By Billy Gonzalez,2014-07-10 18:30
12 views 0
osd102doc - Office Of The Secretary Of Defense (OSD) ...

    Office of the Secretary Of Defense (OSD)

    Director of Defense Research & Engineering

    Research Directorate

    Small Business Innovation Research (SBIR)

    FY2010.2 Program Description


    The OSD Director of Defense Research & Engineering (Research Directorate) SBIR Program is

    sponsoring topics in the following technology themes: Anti-Tamper (AT) Technology; Cognitive

    Readiness Technology; Energy and Power Technology; Human, Social, Cultural & Behavioral (HSCB)

    Decision Support Tools Technology; Information Assurance Cyber Conflict Defense Technology; and

    Large Data Handling Technology in this solicitation.

    The Army, Navy, Air Force and DARPA are participating in the OSD SBIR Program on this

    solicitation. The service laboratories act as our OSD Agent in the management and execution of the

    contracts with small businesses. The service laboratories, often referred to as a DoD Component acting

    on behalf of the OSD, invite small business firms to submit proposals under this Small Business

    Innovation Research (SBIR) Program solicitation. In order to participate in the OSD SBIR Program this

    year, all potential proposers should register on the DoD SBIR Web site as soon as you can, and should

    follow the instruction for electronic submittal of proposals. It is required that all bidders submit their

    proposal cover sheet, company commercialization report and their firm‘s technical and cost proposal form

    electronically through the DoD SBIR/STTR Proposal Submission Web site at If you experience problems submitting your proposal, call the help

    desk (toll free) at 1-866-724-7457. You must include a Company Commercialization Report as part of

    each proposal you submit; however, it does not count against the proposal page limit of 25 pages. Please

    note that improper handling of this form may result in the proposal being substantially delayed.

    Information provided may have a direct impact on the review of the proposal. The DoD SBIR Proposal

    Submission Web site allows your company to come in any time (prior to the proposal submission

    deadline) to edit your Cover Sheets, Technical and Cost Proposal and Company Commercialization


    We WILL NOT accept any proposals that are not submitted through the on-line submission site. The submission site does not limit the overall file size for each electronic proposal; there is only a

    25-page limit. However, file uploads may take a great deal of time depending on your file size and your

    internet server connection speed. If you wish to upload a very large file, it is highly recommended that

    you submit prior to the deadline submittal date, as the last day is heavily trafficked. You are responsible

    for performing a virus check on each technical proposal file to be uploaded electronically. The detection

    of a virus on any submission may be cause for the rejection of the proposal. We will not accept e-mail


    Firms with strong research and development capabilities in science or engineering in any of the

    topic areas described in this section and with the ability to commercialize the results are encouraged to

    participate. Subject to availability of funds, the DUSD(S&T) SBIR Program will support high quality

    research and development proposals of innovative concepts to solve the listed defense-related scientific or

    engineering problems, especially those concepts that also have high potential for commercialization in the

    private sector. Objectives of the DUSD(S&T) SBIR Program include stimulating technological

    innovation, strengthening the role of small business in meeting DoD research and development needs,

    fostering and encouraging participation by minority and disadvantaged persons in technological

    innovation, and increasing the commercial application of DoD-supported research and development


    results. The guidelines presented in the solicitation incorporate and exploit the flexibility of the SBA Policy Directive to encourage proposals based on scientific and technical approaches most likely to yield results important to DoD and the private sector.

Description of the OSD SBIR Three Phase Program

    Phase I is to determine, insofar as possible, the scientific or technical merit and feasibility of ideas

    submitted under the SBIR Program and will typically be one half-person year effort over a period not to exceed six months, with a dollar value up to $100,000. We plan to fund 3 Phase I contracts, on average, and down-select to one Phase II contract per topic. This is assuming that the proposals are sufficient in quality to fund this many. Proposals are evaluated using the Phase I evaluation criteria, in accordance with paragraph 4.2 of the DoD Solicitation Preface. Proposals should concentrate on that research and development which will significantly contribute to proving the scientific and technical feasibility of the proposed effort, the successful completion of which is a prerequisite for further DoD support in Phase II. The measure of Phase I success includes technical performance toward the topic objectives and evaluations of the extent to which Phase II results would have the potential to yield a product or process of continuing importance to DoD and the private sector, in accordance with Section 4.3.

    Subsequent Phase II awards will be made to firms on the basis of results from the Phase I effort

    and the scientific and technical merit of the Phase II proposal in addressing the goals and objectives described in the topic. Phase II awards will typically cover 2 to 5 person-years of effort over a period generally not to exceed 24 months (subject to negotiation). Phase II is the principal research and development effort and is expected to produce a well defined deliverable prototype or process. A more comprehensive proposal will be required for Phase II.

    Under Phase III, the DoD may award non-SBIR funded follow-on contracts for products or

    processes, which meet the Component mission needs. This solicitation is designed, in part, to encourage the conversion of federally sponsored research and development innovation into private sector applications. The small business is expected to use non-federal capital to pursue private sector applications of the research and development.

    This solicitation is for Phase I proposals only. Any proposal submitted under prior SBIR

    solicitations will not be considered under this solicitation; however, offerors who were not awarded a contract in response to a particular topic under prior SBIR solicitations are free to update or modify and submit the same or modified proposal if it is responsive to any of the topics listed in this section.

    For Phase II, no separate solicitation will be issued and no unsolicited proposals will be accepted.

    Only those firms that were awarded Phase I contracts, and have successfully completed their Phase I efforts, will be invited to submit a Phase II proposal. Invitations to submit Phase II proposals will be released at or before the end of the Phase I period of performance. The decision to invite a Phase II proposal will be made based upon the success of the Phase I contract to meet the technical goals of the topic, as well as the overall merit based upon the criteria in section 4.3. DoD is not obligated to make any awards under Phase I, II, or III. DoD is not responsible for any money expended by the proposer before award of any contract. For specifics regarding the evaluation and award of Phase I or II contracts, please read the front section of this solicitation very carefully. Every Phase II proposal will be reviewed for overall merit based upon the criteria in section 4.3 of this solicitation, repeated below:

    a. The soundness, technical merit, and innovation of the proposed approach and its incremental

    progress toward topic or subtopic solution.


    b. The qualifications of the proposed principal/key investigators, supporting staff, and consultants.

    Qualifications include not only the ability to perform the research and development but also the

    ability to commercialize the results.

    c. The potential for commercial (defense and private sector) application and the benefits expected to

    accrue from this commercialization.

    In addition, the OSD SBIR Program has a Phase II Plus Program, which provides matching SBIR

    funds to expand an existing Phase II contract that attracts investment funds from a DoD acquisition program, a non-SBIR/non-STTR government program or Private sector investments. Phase II Plus allows for an existing Phase II OSD SBIR contract to be extended for up to one year per Phase II Plus application, to perform additional research and development. Phase II Plus matching funds will be provided on a one-for-one basis up to a maximum $500,000 of SBIR funds. All Phase II Plus awards are subject to acceptance, review, and selection of candidate projects, are subject to availability of funding, and successful negotiation and award of a Phase II Plus contract modification. The funds provided by the DoD acquisition program or a non-SBIR/non-STTR government program must be obligated on the OSD Phase II contract as a modification just prior to or concurrent with the OSD SBIR funds. Private sector funds must be deemed an ―outside investor‖ which may include such entities as another company, or an investor. It does not include the owners or family members, or affiliates of the small business (13 CFR 121.103).

    The Fast Track provisions in section 4.0 of this solicitation apply as follows. Under the Fast

    Track policy, SBIR projects that attract matching cash from an outside investor for their Phase II effort have an opportunity to receive interim funding between Phases I and II, to be evaluated for Phase II under an expedited process, and to be selected for Phase II award provided they meet or exceed the technical thresholds and have met their Phase I technical goals, as discussed Section 4.5. Under the Fast Track Program, a company submits a Fast Track application, including statement of work and cost estimate, within 120 to 180 days of the award of a Phase I contract (see the Fast Track Application Form on Also submitted at this time is a commitment of third party funding for

    Phase II. Subsequently, the company must submit its Phase I Final Report and its Phase II proposal no later than 210 days after the effective date of Phase I, and must certify, within 45 days of being selected for Phase II award, that all matching funds have been transferred to the company. For projects that qualify for the Fast Track (as discussed in Section 4.5), DoD will evaluate the Phase II proposals in an expedited manner in accordance with the above criteria, and may select these proposals for Phase II award provided: (1) they meet or exceed selection criteria (a) and (b) above and (2) the project has substantially met its Phase I technical goals (and assuming budgetary and other programmatic factors are met, as discussed in Section 4.1). Fast Track proposals, having attracted matching cash from an outside investor, presumptively meet criterion (c). However, selection and award of a Fast Track proposal is not mandated and DoD retains the discretion not to select or fund any Fast Track proposal.

Follow-On Funding

    In addition to supporting scientific and engineering research and development, another important

    goal of the program is conversion of DoD-supported research and development into commercial (both Defense and Private Sector) products. Proposers are encouraged to obtain a contingent commitment for follow-on funding prior to Phase II where it is felt that the research and development has commercialization potential in either a Defense system or the private sector. Proposers who feel that their research and development have the potential to meet Defense system objectives or private sector market needs are encouraged to obtain either non-SBIR DoD follow-on funding or non-federal follow-on funding, for Phase III to pursue commercialization development. The commitment should be obtained during the course of Phase I performance, or early in the Phase II performance. This commitment may


be contingent upon the DoD supported development meeting some specific technical objectives in Phase

    II which if met, would justify funding to pursue further development for commercial (either Defense

    related or private sector) purposes in Phase III. The recipient will be permitted to obtain commercial

    rights to any invention made in either Phase I or Phase II, subject to the patent policies stated elsewhere in

    this solicitation.

Contact with DoD

    General informational questions pertaining to proposal instructions contained in this solicitation should be directed to the topic authors and point of contact identified in the topic description section.

    Proposals should be electronically submitted. Oral communications with DoD personnel regarding the

    technical content of this solicitation during the pre-solicitation phase are allowed, however, proposal

    evaluation is conducted only on the written submittal. Oral communications during the pre-solicitation

    period should be considered informal, and will not be factored into the selection for award of contracts.

    Oral communications subsequent to the pre-solicitation period, during the Phase I proposal preparation

    periods are prohibited for reasons of competitive fairness; however, to obtain answers to technical

    questions during the formal Solicitation period, please visit Refer to the front

    section of the solicitation for the exact dates.

Proposal Submission

    Proposals shall be submitted in response to a specific topic identified in the following topic description sections. The topics listed are the only topics for which proposals will be accepted.

    Scientific and technical information assistance may be requested by using the SBIR/STTR Interactive

    Technical Information System (SITIS).

    It is required that all bidders submit their proposal cover sheet, company commercialization report and their firm‘s technical and cost proposal form electronically through the DoD SBIR/STTR

    Proposal Submission Web site at (This applies to both Phase I and

    Phase II proposal submission.) If you experience problems submitting your proposal, call the help desk

    (toll free) at 866-724-7457. You must include a Company Commercialization Report as part of each

    proposal you submit; however, it does not count against the proposal page limit of 25 pages. Please note

    that improper handling of this form may result in the proposal being substantially delayed. Information

    provided may have a direct impact on the review of the proposal. The proposal submission Web site

    allows your company to come in any time (prior to the proposal submission deadline) to edit your Cover

    Sheets, Technical and Cost Proposal and Company Commercialization Report. We WILL NOT accept

    any proposals which are not submitted through the on-line submission site. The submission site

    does not limit the overall file size for each electronic proposal, only the number of pages is limited.

    However, file uploads may take a great deal of time depending on your file size and your internet server

    connection speed. You are responsible for performing a virus check on each technical proposal file to be

    uploaded electronically. The detection of a virus on any submission may be cause for the rejection of

    the proposal. We will not accept e-mail submissions.

    The following pages contain a summary of the technology focus areas, followed by the topics.


    Anti-Tamper (AT) Technology Focus Area

    DoD Anti-Tamper policy directives outline requirements to provide anti-tamper protection to

    Critical Program Information (CPI) on all new start programs, all pre-planned product improvement or technology insertion efforts, and FMS/DCS programs. Although significant advances have been made in a number of enabling technologies for Anti-Tamper, such as protective materials, microelectronics, and software protection techniques, significant technical challenges remain to address the full scope of the exploitation threat. Studies indicate that approximately 80% of all CPI is contained in software/firmware. A broader range of robust techniques or technologies that protect software, data, and firmware is essential and will have a broad impact on protecting CPI. Secure programmable logic devices and secure processors are needed. Improvements are needed in existing protective coating technologies in order to reduce the impact on system reliability. The ability to detect the wide range of potential tamper events requires new and innovative approaches to tamper sensor technology. Finally, power solutions that would provide primary or secondary latent power for tamper sensors and responses are needed.

    This focus area includes: development of protection techniques against reverse engineering of

    Electro-Optical detectors and Optical components; development of a practical physical unclonable function with higher entropy for use in a field programmable gate array; new innovative technology or techniques to verify that a system‘s configuration matches the intended baseline configuration as a normal part of its startup routine, in order to detect system modification or tampering; research and development of technology, tools, and/or fabrication/design guidelines and methods to prevent, identify, or severely limit reverse engineering techniques on microelectronic devices; development of a tamper resistant, multiprocessor, embedded computer system architecture consisting of a microprocessor, a digital signal processor, field programmable gate array and graphics processing unit technology; research the existence, detection and analysis of an electromagnetic field radiated during FPGA bit stream operation; Development of innovative trusted intellectual property (circuit designs, embeddable micro-code, and the like) that will prevent other portions of an integrated circuit or field programmable gate array design from operating in modes, malicious or accidental, other than those intended by the designer; make possible trusted intellectual property in untrusted fabrication environments through the development of methods and designs that allows the determination that no unintended functionality has been added to a hardware device in the time between when the design is provided to the foundry and when the finished device is provided to the user; development of zero power/ultra low power tampering/reverse engineering sensor technology for use at the printed circuit board level, or integrated circuit level, including sensor, material, or techniques capable of mitigating the effectiveness of nondestructive probing by an exploiter seeking to conduct localized buried structure analysis.

The Anti-Tamper (AT) Technology topics are:

OSD10-A01 EO/Optical Protection

    OSD10-A02 Field Programmable Gate Array (FPGA) Physical Unclonable Functions

    OSD10-A03 System Configuration Verification

    OSD10-A04 Anti-Reverse Engineering (RE) Techniques

    OSD10-A05 Tamper Resistant UAV/UGV Embedded Architecture

    OSD10-A06 FPGA Bit Stream Data Electromagnetic Field Analysis

    OSD10-A07 Incorporation of Trust into Integrated Circuit (IC) and Field Programmable Gate

    Array (FPGA) Design

    OSD10-A08 Intellectual Property (IP) in Untrusted Fabrication Environments

    OSD10-A09 Zero Power/Ultra Low Power Tamper Detection Sensors


    Cognitive Readiness Technology Focus Area:

    Cognitive readiness is the mental preparation (including skills, knowledge, abilities,

    motivations, and personal dispositions) an individual needs to establish and sustain competent performance in the complex and unpredictable environment of modern military operations. Cognitive readiness may be understood as a combination of three basic abilities: 1) Recognize new situational patterns in the battle space (requiring adjustments in situation awareness, new knowledge, and transfer of training); 2) modify problem solutions associated with these patterns as required by the current situation (requiring adjustments in meta-cognition, socio-cultural agility, and creativity); and, 3) design and implementation of plans of action based on these solutions (requiring adjustments to decision-making, leadership, and controlling emotions in new social environments).

    This theme supports research that will utilize the knowledge products from disciplines

    such as cognitive science, network science, augmented cognition, neuroergonomics, learning science, psychology, and sociology to pioneer new developments to enable the cognitive

    readiness of warfighters. This theme supports research, such as serious game environments, that can

    be used to develop relevant models and to push the envelope on providing new analysis, decision support, and training capabilities in social, cultural and language domains for the deployed warfighter in organizational echelons from combat teams to Joint Task Force Headquarters. A focus of this technology is developing unique and operationally relevant models and content. Topics seek validated socio-cultural models and content with demonstrated use-case effectiveness. They seek to provide the interactive, dynamic environments that would support better cultural awareness. The technologies should be extensible beyond current operations in Iraq and Afghanistan to other regions and military kinetic and non-kinetic scenarios. Networkable, remote-capable products are desirable with emphasis on insertion into systems of record and Just In Time training environments. Training related topics require SCORM compliance and the adoption of existing /emerging standards for training of language and cultural skills.

The Cognitive Readiness Technology topics are:

OSD10-CR1 Rapid Assessment of Team Cognitive Readiness

    OSD10-CR2 Neuro Cognitive Control of Human Machine Systems

    OSD10-CR3 Immersive Scenario Based Training Environments for Intuitive Decision Making OSD10-CR4 Training Battery for the Rapid Formation of Cognitively Ready, Effective Teams OSD10-CR5 Generation of the Army Cognitive Readiness Assessment (ACRA)

    OSD10-CR6 Distributed Team Workload Assessment Tool

    OSD10-CR7 Improving Team Readiness through the Convergence of Team Mental Models

    OSD10-CR8 Decision Support: Cognitive Readiness Assessment and Reporting

    OSD10-CR9 Embeddable Agents for Assessing Cognitive Readiness

    OSD10-C10 Real-time Cognitive Readiness Assessment Tool


    Energy and Power Technology Focus Area

    Technology advances in electric power generation, distribution, and use are enabling new,

    transformational military capabilities. Advanced energy and power technologies are providing the critical

    concepts, architectures, and systems to enable this revolutionary warfighting advantage. Integrating and

    distributing power on manned and unmanned ships, aircraft, ground vehicles and other platforms leads to

    significant enhancements in platform flexibility, survivability, lethality and effectiveness. The Army‘s

    transformation challenge is to develop a smaller, lighter, and faster force, utilizing hybrid electric drive,

    electric armament and protection, and a reduced logistical footprint. The Navy is developing future

    ships that integrate electric power into a next-generation architecture which enables directed energy

    weapons, electromagnetic launchers and recovery, new sensors, as well as supporting significant fuel,

    maintenance, and manning reductions. The Air Force needs electric power to replace complex

    mechanical, hydraulic and pneumatic subsystems, and also enable advanced electric armament systems.

    Improved batteries/power sources will support the individual soldier by permitting longer mission

    durations and reduced weight borne by the soldier. Space based operational capability improvements

    include a more electric architecture for responsive and affordable delivery of mission assets, and

    powering space based radar systems.

    More electric and all-electric systems have distinct technological advantages but are coupled with

    inherent disadvantages principally, the need for more power generation and a marked increase in waste

    heat generated by ever smaller electronic components. The use of solar power at forward operating

    bases reduces the need for supply convoys transporting batteries and liquid fuels into war zones. Quiet

    systems minimize risk of discovery during field operations. Warfighting capabilities are optimized

    when energy and power systems are quiet, efficient, lightweight, and easy to use, and require minimal

    logistical support.

The Energy and Power Technology topics are:

OSD10-EP1 Parallel Operation of Compact, Efficient Turbogenerators for Robust Tactical

    Energy Independence OSD10-EP2 Rugged, collapsible solar concentration devices to support tactical alternative

    energy production OSD10-EP3 APU Silencing Technology Development

    OSD10-EP4 Near Field Contactless Electric Power Transfer

    OSD10-EP5 Redeployable Solar Combined Heat and Power (RSCHP) System

    OSD10-EP6 Anion Exchange Membranes for Alkaline and Low-temperature Fuel Cell

    Applications OSD10-EP7 Advanced System-Level Integration for High Efficiency Primary and Secondary

    (Waste Heat) Thermoelectric Generation OSD10-EP8 Magnetic Gears and Couplings


Human, Social, Cultural & Behavioral (HSCB) Decision Support Tools Technology Focus Area

    Current military operations need and future operations will demand the capability to understand

    the social and cultural terrain and the various dimensions of human behavior within those terrains.

    Behaviors in the social and cultural terrain context extend across the spectrum, from adversaries to our

    joint U.S. forces, with our coalition partners, and with government and non-government organizations.

    For operational, strategic and tactical warfighters, there is a significant need for socio-cultural models that provide predictive capabilities with regard to the behavior of adversaries and contested populations.

    The Department of Defense is increasing the investment in ―non-kinetic‖ capabilities, relative to

    the traditional ―kinetic‖ capabilities of weapons platforms and munitions. A portion of this new

    investment strategy is focused on increasing awareness and understanding of the impact of cultural, social, and behavioral variables within the operational environment. Additionally, Irregular Warfare (IW) and

    the subsequent need of non-kinetic capabilities are a matter of strategic importance to the military, on par with our capability to wage traditional warfare.

    DoD‘s HSCB technology area emphasizes the application of knowledge, skills, and supporting technologies to give the DoD the ability to understand the complex human terrain and socio-cultural

    environments in which we operate. This work merges the social and behavioral sciences with the

    computational and computer sciences to deliver the methodologies and tools to support Phase 0

    (planning/shaping) to Phase 4 (stabilization) military operations critical to success in military operations (DDR&E Strategic Plan). OSD‘s HSCB modeling efforts are focused on narrowing the gap between

    social and behavioral science capabilities and military utility via the development of cross-domain

    capabilities and tools. Investment in enhanced HSCB modeling capabilities and tools requires the

    simultaneous development of decision support tools and systems that enable the end-user to make optimal

    use of HSCB model outputs and data.

The HSCB Technology topics are:

OSD10-HS1 Decision Superiority through Enhanced Cultural Intelligence Forecasting

    OSD10-HS2 In Situ Collection of Human Social Cultural Behavioral Data

    OSD10-HS3 Neuromorphic Models of Human Social Cultural Behavior (HSCB)

    OSD10-HS4 Dynamic Meta-Network Measures

    OSD10-HS5 Visualization Methods and Tools for Human, Social, Cultural, and Behavioral


    OSD10-HS6 Automated Network Construction

    OSD10-HS7 Analytical Tools for Local Economic Analysis

    OSD10-HS8 An Adaptive Cultural Trainer for Development of Cultural Aptitude in


    OSD10-HS9 Developing and Modeling Social Networks inside Technology Poor Societies


    Information Assurance Cyber Conflict Defense Technology Focus Area

    As the cyber threat continues to increase in sophistication and complexity, the DoD must be prepared to defend the ability to provide the information and processing needed to support critical

    missions during a cyber conflict. Networks and systems must be built with the ability to use alternate

    paths and survivable architectures and algorithms to get the critical work done even when attacked in

    unanticipated ways that may succeed in interfering with their normal operation. We also need to make it

    harder for a determined adversary to succeed against us, for instance, by increasing redundancy, diversity, and agility to disrupt attack planning. The DoD needs new tools and technologies to force capable

    adversaries to spend more, move more slowly, and take bigger risks, while providing mission assurance

    by enabling us to fight through cyber degradation. The DoD must go beyond efforts to build and

    maintain security in systems overwhelmingly built from commercial off-the-shelf technology.

    Hardening DOD networks will require key security components with high assurance and of known

    pedigree as well as adaptable and robust defenses.

    As envisioned, the Global Information Grid (GIG) will connect the roughly 3 million computers,

    100,000 LANs, 100 long distance networks, and a multitude of wireless networks and devices in support

    of all DoD. It will underlie the increased ability to conduct network-centric operations, providing the

    joint warfighter with a single, end-to-end information system capability, built on a secure, robust

    network-centric environment. It will allow users to post and access shared data and applications

    regardless of their location while inhibiting or denying an adversary‘s ability to do the same – in a

    converged heterogeneous enterprise capable of protecting content of different sensitivities. DoD‘s

    unprecedented enterprise vision for future information operations must simultaneously address protecting

    and defending its critical information and information technology systems by ensuring availability,

    integrity, authentication, confidentiality and non-repudiation; and by providing security management and

    operations that incorporate the requisite protection, detection, and quick reaction capabilities.

    Further, as operations are ever-more enmeshed in the decentralized fabric of the GIG, the converged, decentralized vision of the future network requires a parallel adoption of a decentralized trust paradigm. Degrees of trust and robustness hitherto provided by enclave isolation and separation must be

    distributed across the networks down to the tactical edge devices. DoD is making significant IA

    investments in ensuring the security of net-centric operations of the GIG. The scope of the challenges,

    the dynamics of the information technology industry, and the need for dynamically optimizing defenses

    within particular mission contexts provide multiple opportunities for new and innovative security

    solutions. In particular new technology solutions are needed for supporting the edge users who must

    operate across multiple domains and communications paths, on less hardened networks, to reach other

    tactical mission players, and to access protected core information systems and data warehouses.

The Information Assurance Technology topics are:

OSD10-IA1 Countermeasures to Malicious Hardware to Improve Software Protection


    OSD10-IA2 Effective Portable Data Content Inspection and Sanitization

    OSD10-IA3 Robust and Efficient Anti-Phishing Techniques

    OSD10-IA4 Preventing Sensitive Information and Malicious Traffic from Leaving Computers

    OSD10-IA5 Biometric-based Computer Authentication During Mission Oriented Protective

    Posture Scenarios


     Large Data Handling Technology Focus Area

    As the Department of Defense increases the capability and capacity to generate increasing

    amounts of data from the numerous sensors in the battlespace, the issue of handling very large data sets has become more challenging. This is in part due to Department of Defense response to a changing threat environment where there is an expansion of the types of sensors deployed, new types of information collected, and different features used to classify these new threats. From a technical perspective, sensor processing speeds have outpaced the speed and ability to transport, store and process the data created.

    Research in the areas of Architecture, Shaping Data for Exploitation, and Data Discovery for

    Exploitation are of interest. In addition to the research and development of technology and approaches, it is important to evaluate the impact of these efforts areas with regards to the way they change how large data sets are handled.

    (a) Architectures Both the size of the data to be transferred and the growing size of databases

    requires novel architectural approaches to provide the adaptability and usability (automation and performance impact of human in the loop). Current databases, file systems and network protocols will not keep pace.

    (b) Shaping Sensor Data for Exploitation When tracing the processing chain from multi-source

    sensor inputs to the user/analysts, the techniques that are known and used become fewer and less mature. The simple process chain view goes from (1) metadata tagging to (2) pre-processing to (3) multi-source common data representation to (4) triage/identify high priority data subsets for analysis and action. Candidate research areas include pattern analysis, data classification for importance and prioritization, criticality assessment, change detection, uncertainty management and reduction, high level structures, data search and retrieval, feature extraction, automatic translation, and automated or assisted pattern recognition.

    (c) Data Discovery for Exploitation In order to better to discover and exploit the growing

    amount of sensor data, the following areas of research are considered: Object recognition in scenes and streams, discovery and exploitation at the edge, structuring knowledge for discovery, improving analytic throughput, aiding ISR functions, layered analysis and interpretation, effects prediction for decision support and cross domain access for effective ISR

The Large Data Handling topics are:

OSD10-L01 Temporal and Conceptual Extractions of Complex Social Network Data

    OSD10-L02 Multi-sensor Extraction for Social Network Analysis - Tactical

    OSD10-L03 End to End Analysis of Information Architectures

    OSD10-L04 Automated Scene Understanding

    OSD10-L05 Shaping Sensor Data for Exploitation

    OSD10-L06 Knowledge Discovery using Mobile Devices

    OSD10-L07 Data Discovery for Exploitation from Distributed Sources

    OSD10-L08 Real-time Resource Allocation Co-Processor

    OSD10-L09 Framework for Large Streaming Data Analysis


Report this document

For any questions or suggestions please email