Submission of proposals



Download 1.85 Mb.
Page22/46
Date28.03.2018
Size1.85 Mb.
#43492
1   ...   18   19   20   21   22   23   24   25   ...   46
Chemical/biological/olfactory sensor development to detect explosives is a new area of interest. Also, it is of the high importance that the sensor design should be able to decipher between types of explosives. The sensor will need the capability to detect explosives through materials such as, plastic, metal, and wood, as well as through walls, casings, luggage, and boxes, or any non-buried ordnance.
The sensor should be able to operate under all environmental and climate conditions. The sensor/sensors would be particularly useful in urban warfare, where warfighters would need to secure buildings and therefore be required to locate and compromise all booby-trap type ordnances. Within the matter of seconds, the sensors should be able to identify explosive material at a specific range.
PHASE I: The proof of feasibility phase will focus on laboratory experiments investigating signature behavior of explosives and extraction of vapor molecules and/or particulate matter within the vapor. Discrimination between explosive related chemicals (ERCs) will be tested.
PHASE II: The purpose of this phase is to test and fabricate a sensor in the laboratory and confirm/verify detection capability under various environmental conditions. The sensitivity, selectivity, and range capability of the sensor will be determined. Optimization will also be a task as well as development of a prototype sensor that will be employed for use in blind-test experiments. Practical application of this technology will be investigated to transition it to the commercialization phase.
PHASE III: This technology has numerous applications in the objective force as well as counter terrorism. This tool could be utilized either in a joint mode with identification/imaging techniques or independently. Airport screening applications of this device could be used similar to that of the current metal detector.
REFERENCES:

1) Jenkins, T.F., Marianne E. Walsh, Paul H. Miyares, Jessica A. Kopczynski, Thomas A. Ranney, Vivian George, Judith C. Pennington, and Thomas E. Berry, Jr. (2000). “Analysis of Explosives-Related Chemical Signatures in Soil Samples Collected near Buried Land Mines.” U.S. Army Engineer Research and Development Center, Cold Regions Research and Engineering Laboratory, ERDC/CRREL TR-00-5.

2) Phelan, J. M. and Stephen W. Webb, Matt Gozdor, Mark Cal, and James L. Barnett. (2001). “Effect of soil wetting and drying on DNT vapor flux: laboratory data and T2TNT model comparisons.” Proceedings of the SPIE 15th Annual International Symposium on Aerospace/Defense Sensing, Simulation and Controls, Detection and Remediation Technologies for Mines and Minelike Targets VI, April 16-20, 2001, Orlando, FL.

3) Hutchinson, Kira, Scott Grossman, Thomas F. Jenkins, and Kelly Sherbondy. (2002). “Explosives-related chemical concentrations in surface soils over buried land mines.” Proceedings of the SPIE 16th Annual International Symposium on Aerospace/Defense Sensing, Simulation and Controls, Detection and Remediation Technologies for Mines and Minelike Targets VI, April 1-5, 2002, Orlando, FL.

4) Rodacy, P. J., S. F. A. Bender, J. J. Bromenshenk, C. B. Henderson, G. Bender. (2002). “Training and deployment of honeybees to detect explosives and other agents of harm.” Proceedings of the SPIE 16th Annual International Symposium on Aerospace/Defense Sensing, Simulation and Controls, Detection and Remediation Technologies for Mines and Minelike Targets VI, April 1-5, 2002, Orlando, FL.
KEYWORDS: Olfactory sensors, explosive-related chemical detection, real-time chemical sensing technologies,
A03-110 TITLE: Lightweight Laser Designator
TECHNOLOGY AREAS: Electronics
ACQUISITION PROGRAM: PM SOLDIER WARRIOR
OBJECTIVE: Develop a compact, rugged, lightweight and efficient 1 mm solid-state laser for Army designator requirements.
DESCRIPTION: The Army has fielded several target designators over the past twenty years for both hand-held and airborne applications. Current technology, while an improvement over previous designs, is still relatively heavy. This SBIR topic seeks to push the current state-of-the-art in laser technology for operation over a large temperature range while maintaining minimum performance requirements and reducing the system mass by at least 50% of current lasers. Special consideration will be given to design concepts that can show operation over a large temperature range with little or no conditioning. System requirements are shown in Table 1.
Requirements

Wavelength................................................................1.064 microns

Output Energy................................................100 mJ (typ), 80 mJ (min)

Pulselength .....................................................11-20 nsec FWHM

Beam Quality....................................................<8 mm-mrad

Mass...................................................<1.5 kg (goal) including all batteries

Operating Temperature.......................................-32 C to +50 C

Maximum Allowable StandbyTime before Commencing Output....30 sec,

with preference for instant “ON”

Repetition Rate...........................................10-20 PPS

Period of Operation....................................0-60 sec Continuous Operation

with a Minimum of 4 Minutes

between Periods of Operation

Minimum Number of Periods of Operation

between Battery Changes.......................................50

System Lifetime...................................................1x10^7 Shots


Table 1
PHASE I: Analysis and design of a prototype laser concept to meet the requirements in Table 1. Proposals must include optical, mechanical and electrical design concepts to address the needs for compactness, ruggedness and means of achieving the requirements. Any experimental work that can show evidence the design concept can meet the requirements will be considered for evaluation of Phase II award.
PHASE II: Contractor will build a prototype laser designator as designed under Phase I. The contractor will also perform measurements on the device to assess its performance against system requirements and specifications.
PHASE III: After successful completion of testing and evaluation of prototype, design and construction a production system for handheld and/or airborne platforms. PHASE III APPS: Phase III applications include use of a lightweight laser for marking and micro-machining/welding. A small lightweight laser can be easily mounted directly on robotic arms for use in cramped environments.
REFERENCES:

William T. Thodos, John Stanfill, “Lightweight Laser Designator Rangefinder (LLDR): Next-Generation Targeting for US Ground Forces,” Proc. Military Sensing Symposium, Vol. 45, No 2, Dec 2000.


KEYWORDS: Laser, Designator, Optics, Weapons

A03-111 TITLE: Near Infrared Streak Tube


TECHNOLOGY AREAS: Sensors
OBJECTIVE: Develop a streak tube lidar receiver that is suitable for operation in the near infrared region of the optical spectrum.
DESCRIPTION: Imaging laser radar (LADAR or LIDAR) systems are needed for future military systems. The applications range from navigation and terrestrial mapping to missile targeting systems. Such applications could benefit greatly from the three-dimensional imaging capability of LADAR systems; however, the present technology needs further maturation.
Streak tubes provide high gain with a relatively low noise factor and the ability to convert high bandwidth information to spatial information that can be imaged and read out at a much lower bandwidth. These characteristics make them well suited for imaging lidar receivers[1]. Two systems, based on streak tube lidars, are being produced for oceanic mine counter measures for the Navy[2,3]. In those applications the streak tube response is optimized to provide good response at wavelengths compatible with transmission through seawater.
For many applications it would be preferable to have the wavelength of operation compatible with the so-called “eye-safe” region of the spectrum, i.e. near 1.54 micrometers. However, development of a streak tubes with near IR (NIR) photocathode has not been realized although suitable photocathode materials exist. In fact, there are no US vendors of streak tubes though there are companies with the capabilities required to do so. The DoD has made a significant investment in streak tube imaging lidars. The development of NIR sensitive streak tube and NIR streak tube lidar receivers will provide access to imaging lidar sensors appropriate for numerous applications.
PHASE I: Design a streak tube system capable of operation in the NIR.
PHASE II: Develop and build the streak tube designed in Phase I. Incorporate the streak tube in a lidar system and demonstrate operation at an “eye-safe: NIR wavelength.
PHASE III: A streak tube imaging lidar operating in the NIR has numerous applications in security, terrain mapping, and high-resolution imaging. Military applications include battlefield damage assessment, targeting, and identification.
REFERENCES:

1) McLean, J. W., "Streak-tube lidar allows 3-D ocean surveillance," Laser Focus World, January 1998: 171-176.

2) http://www.dau.mil/pubs/pm/pmpdf00/jacom-j.pdf

3) http://www.chinfo.navy.mil/navpalib/policy/vision/vis02/vpp02-ch3r.html

4) U.S. Patent 5,047,821, Costello, Spicer and Aebi, (1991).
KEYWORDS: Streak Tube

A03-112 TITLE: Security for Wireless Handheld Devices


TECHNOLOGY AREAS: Information Systems
ACQUISITION PROGRAM: PEO-C3T PM Effects
OBJECTIVE: Perform research into strong Authentication Techniques for Handheld Wireless devices. It should be noted that some commercial wireless applications, such as Bluetooth, incorporate weak authentication. The authentication security solutions formulated would be extremely useful to both the commercial and military worlds. Note that it is anticipated that the authentication security solutions formulated would also be extremely beneficial in the Homeland Defense application by protecting critical computer network infrastructures.
DESCRIPTION: In both the commercial world and military world Authentication Techniques are being recognized as a major emerging problem. It is vital to protect computers and computer networks from hacker and foreign power threats. There are a number of commercially available strong Authentication products for larger computers, but there are a dearth of strong Authentication products for Handheld Wireless devices. In particular the Authentication techniques used in commercial wireless products (such as Bluetooth) are weak. This research will investigate new and innovative approaches for strong Authentication solutions for Handheld Wireless devices.
PHASE I: Perform a study of possible computer and computer network strong Authentication solutions for Handheld Wireless devices. A set of alternatives would then be presented to the government. The contractor and the government would make a joint decision on the most promising techniques to pursue in Phase II.
PHASE II: The most promising techniques emerging from the Phase I effort would be further developed and modeled. A performance description or specification would be developed. A prototype software working model will be delivered.
PHASE III: Military use would include strong Authentication solutions for soldiers who are assigned Handheld Wireless devices. These devices are becoming more prevalent in the military. Commercial uses would include personnel who are assigned Handheld Wireless devices in such diverse industries as banking, electric power utilities, water utilities, telephone systems, police and emergency civilian personnel, etc. Note that it is anticipated that the strong Authentication solutions formulated would also be extremely beneficial in the Homeland Defense application by protecting critical computer network infrastructures against outsiders attempting to break into the network.
REFERENCES:

1) "Computer Communications Security" by Warwick Ford. Prentice-Hall 1999.

2) ?Authentication Systems for Secure Networks? by Rolf Oppliger. ARTECH House Inc. 1999

3) www.networkcomputing.com/1013/1013wittmann.html

4) www.bluetooth.com

5) www.blueunplugged.com

6) www.palowireless.com/bluetooth
KEYWORDS: Strong Authentication, Authentication, Handheld Wireless Technologies

A03-113 TITLE: Terrain Aware Network Planning Tools


TECHNOLOGY AREAS: Information Systems
ACQUISITION PROGRAM: PM WIN-T
OBJECTIVE: Future Army tactical networks will require a network management tool that can assist the soldier with planning and designing the topology of on-the-move networks to support the Army Objective Force (OF) and Future Combat Systems (FCS) operations. This is a requirement from the battle command chunk lead that is responsible for C4ISR operational capabilities. This planning tool must indicate the performance, throughput, bandwidth, link quality and ad hoc capability of a tactical network topology by analyzing terrain data (both elevation and surface features), RF propagation of relevant Army tactical radio frequencies, weather effects, node mobility, and network topology (routing convergence and dynamic reconfiguration latencies) using embedded modeling and simulation capabilities. The Net planning aspect relating terrain to placement of communications assets is not being addressed by any comms program. This tool must have the capability to provide a visual indication of network topology and performance changes caused by mission related node mobility for dynamic re-planning purposes and the overall system must be fully integrated with the ability to be hosted in a small hardware footprint (e.g., notebook computer).
The objective is to utilize network and communications-provided information in order to adaptively and independently automate the planning of the information and signaling flows thereby improving maintaining the quality of voice, data and video applications using state-of-the-art microprocessor technology. The terrain aware network planning tools are needed to automatically and systematically control and maintain, and in real-time, the individual information and signaling flows caused by terrain, mobility, and environmentally induced variations characterized by sporadic connectivity and varying quality in the networking and communications links thereby aiding and maintaining the required quality of voice, data and video applications used in the Warfighter network supporting the OF and FCS.
DESCRIPTION: Future Army tactical communications networks must adapt to evolving combat doctrine that requires clients and hosts in the communications network to be on-the-move and operational over multiple terrain topologies, radio frequency spectrum environments, and atmospheric weather conditions. The communications networks supporting the Warfighter’s OF and FCS will utilize a multitude of platforms – mobile terrestrial nodes, unmanned aerial vehicles, manned aerial vehicles, and satellite assets. The planning phase of the Warfighter network will be continuous throughout all phases of military operations. The management of the multiple platforms supporting the Warfighter network requires a complex innovative integration of technologies that must be provided to the soldier in a user friendly, concise, and effective planning tool. Given inputs from the military mission, situational awareness of communications assets, terrain topology, radio frequency environment, and atmospheric conditions, the terrain aware network planning tools must provide the soldier a means to configure the Warfighter network to support the mission. This planning tool must indicate the performance, throughput, bandwidth, link quality and ad hoc capability of a tactical network topology through analysis of the terrain data (both elevation and surface features), RF propagation of relevant Army tactical radio frequencies, weather effects, node mobility, and network topology (routing convergence and dynamic reconfiguration latencies) using embedded modeling and simulation capabilities. This tool must provide the soldier doing the planning with a visual display of network topology and performance changes caused by changing mission requirements related platform node mobility and dynamic real-time Warfighter network re-planning. This planning tool must be fully integrated with the ability to be hosted in a small hardware footprint (e.g. notebook computer).
PHASE I: Research, trade-off and design prototype hardware/software modules for microprocessor-based platform for automated Terrain Aware Network Planning Tools using embedded modeling and simulation to provide a capability to automatically and efficiently analyze terrain and environmental data in real-time to control the communication flows, and therefore, the quality of voice, data and video applications required to support delivery of battle command and control for the Warfighter network. Phase I addresses networking and communications systems design for hardware/software modules and includes the required design documentation. Phase I must includes a program management plan delineating the program tasks to achieve a Phase II prototype of the Terrain Aware Network Planning Tools.
PHASE II: Develop, test, integrate and demonstrate the microprocessor-based platform for automated Terrain Aware Network Planning Tools using embedded modeling and simulation to provide a capability to automatically and efficiently analyze terrain and environmental data in real-time to control the communication flows, and therefore, the quality of voice, data and video applications required to support delivery of battle command and control for the Warfighter network. Demonstration will first be performed at the contractor’s plant and may include demonstration at a Government installation (e.g., CECOM). Phase II must includes a program management plan delineating the program tasks to achieve a Phase III commercial product or equivalent of the Terrain Aware Network Planning Tools.
PHASE III DUAL USE COMMERCIALIZATION (Real-world Examples): The Phase III microprocessor-based automated Terrain Aware Network Planning Tools will bring advanced technology to military networking and communications planning to deliver quality commander's critical information. The primary military application is developing advanced network aware technology for network-centric communications directly to the military commander's real-time products used in the delivery of Warfighter critical information. The primary commercial application will bring new network planning technologies offering the opportunity of network equipment manufacturers to develop new products for use in situations such as disaster relief and actions required by emergency task force efforts by local, state, and federal agencies.
REFERENCES:

1) Battle Command Handbook found on the WWW Site: http://cacfs.army.mil/index1.htm.)

2) Joint Tactical Architecture (JTA) available at http://www-jta.itsi.disa.mil/jta/JTA40_071702.pdf
KEYWORDS: Battle Command, IETF, Network Planning, Warfighters Information Network (WIN), Objective Force, Future Combat Systems, Wide Area Network (WAN), Terrain Analysis, Mobile Networking, Internet, Mobile IP, Modeling, Simulations, Network Management, Frequency Spectrum Management

A03-114 TITLE: Network Protocols for Onboard Satellite Packet Routing


TECHNOLOGY AREAS: Information Systems
ACQUISITION PROGRAM: PM WIN-T
OBJECTIVE: Develop packet switching protocols capable of providing efficient network access to satellite resources with the intention of passing IP traffic across onboard satellite router/switches. This will involve analysis of Layer 2 versus Layer 3 techniques for packet switching/routing. Developed protocols will perform packet switching according to pre-defined IP Quality of Service prioritization to maintain the overarching end-to-end QoS Scheme, as well as be able to incorporate some means of securing network traffic.
DESCRIPTION: The Future Combat Systems (FCS) / Objective Force (OF) communications architecture places reliance on satellite communications as a means of maintaining connectivity across remote units. The employment of IP routers on satellites is a future capability envisioned for Transformational Communications to reduce packet latency and minimize the ground infrastructure necessary to support satellite communications. Part of this function involves passing encrypted IP packet traffic with different priorities across satellite links between terrestrial networks. This effort is required to ensure that critical drivers to implement IP routers in the satellite and ground stations. This includes identifying the various options such as layer 2 vs. layer 3 solutions, protocols on satellites and in the terminals, and impacts of crypto on the implementation scheme. In addition, these solutions shall be analyzed and prototyped, to enable the Army to move forward with insight into the technology necessary to fulfill its planned future SATCOM architecture. Additionally, efficient network access protocols that link terrestrial networks via satellite routers/switches are required to bring this SATCOM architecture. This should include all tradeoff analysis to determine the best means of this satellite access. Layer 2 vs. Layer 3 solutions exist, however, a comparative study is required to identify a solution that is efficient and maximizes performance. Packet encryption needs to be included in this analysis.
PHASE I: Perform qualitative trade studies and analyze existing satellite access protocols. The primary focus should be on the advantages and disadvantages between Layer 2 and Layer 3 approaches to packet routing over satellites. Also to be addressed is the method of maintaining a MOSIAC-like QoS scheme end-to-end across satellite links, as well as providing the means to secure these links. Additionally, a forward-looking architecture document will be written which identifies the operational, technical, and functional characteristics of an efficient system comprised of a router-in-the-sky and ground terminals. It should detail these characteristics and the design approach that can be employed to yield the desired system. Included should be anticipated issues, both in transition and objective systems, as well as justifications for the future approach to be taken.
PHASE II: Develop and demonstrate a protocol model suite to support the identified objectives. The protocol approach taken should reflect conclusions drawn from the trade study from Phase I. Conduct simulation testing to prove concept feasibility and performance in an operational scenario. The results of developed models should provide input to a technical report describing the detailed defined system architecture and its expected performance parameters. Included should be a protocol design document used as the basis for the generated models that provides enough detail to yield a coded implementation.
PHASE III DUAL USE APPLICATIONS: This system could be used in a broad range of military and civilian communications applications where there is a need to reduce the management of resources and increase the efficiency while maintaining robust wide-area connectivity with minimal or no terrestrial infrastructure. Requirements and demand in commercial markets are real and growing to include sporting events and highly populated areas. An example of HLS applicability would be overseas peacekeeping operations or emergency response/disaster relief operations.
REFERENCES:

1) http://www.utdallas.edu/~ravip/papers/ets99.satellite.pdf Routing in Leo-based satellite networks.

2) http://citeseer.nj.nec.com/cache/papers/cs/11051/http:zSzzSzwww.ee.surrey.ac.ukzSzPersonalzSzL.WoodzSzpublicationszSzWood-et-al-ip-routing-issues.pdf/wood01ip.pdf IP; Routing over satellite constellations.

3) http://www.ee.surrey.ac.uk/Personal/L.Wood/publications/Wood-et-al-effects-on-TCP.pdf; Effects on TCP of Routing Strategies in Satellite Constellations.


Directory: osbp -> sbir -> solicitations
solicitations -> Army sbir 09. 1 Proposal submission instructions dod small Business Innovation (sbir) Program
solicitations -> Navy sbir fy09. 1 Proposal submission instructions
solicitations -> Army 16. 3 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Air force 12. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Army 14. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Navy small business innovation research program submitting Proposals on Navy Topics
solicitations -> Navy small business innovation research program
solicitations -> Armament research, development and engineering center
solicitations -> Army 17. 1 Small Business Innovation Research (sbir) Proposal Submission Instructions
solicitations -> Navy 11. 3 Small Business Innovation Research (sbir) Proposal Submission Instructions

Download 1.85 Mb.

Share with your friends:
1   ...   18   19   20   21   22   23   24   25   ...   46




The database is protected by copyright ©ininet.org 2024
send message

    Main page