archive-org.com » ORG » T » TECHLINKCENTER.ORG

Total: 656

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • High Assurance Solution for Secure Network Data Transfer | TechLink
    and protected data transfer Most existing high security systems are largescale cross domain solutions which can be costly in addition to being dependant and restrictive to the types of applications data and network architectures involved To address this problem the NRL has developed a method for providing increased computer security through the use of their Network Pump device and a library of custom software wrappers Benefits Certified by the National Security Agency NSA and presently in use at several federal agencies Cost effective solution that assures data transfer between two networks is one way only Through secure acknowledgements applications on a lower security network are allowed to transfer data to those on a higher security network with guarantee that the information is successfully received and without compromising data that is resident to the high security side The pump is application independent can serve several applications at once and can be used in any multi level distributed architecture where data transfer occurs across trusted and non trusted networks The Opportunity Patent Application No 2005 0022023 is available for licensing or Cooperative Research and Development Agreements Additional details IP and NRL contacts are available through TechLink Contacts Sean Patten CLP Senior Technology

    Original URL path: http://techlinkcenter.org/summaries/high-assurance-solution-secure-network-data-transfer (2016-02-09)
    Open archived version from archive


  • Software Suite for Identifying Suspicious Individuals | TechLink
    Link Discovery based on Correlation Analysis LDCA a new methodology to discover social groups The purpose is to greatly reduce the time required for analysts to discover and analyze communities of interest and key figures where explicit relationships are not obvious AFRL RI has developed and tested a suite of mathematical models and software to extract pertinent data from large data sets paper electronic and online analyze complex data sets determine key groups within those datasets and provide visualization tools Key developments include a name resolution system for data extraction and a mathematical approach that is insensitive to transaction errors The AFRL RI system has successfully validated using actual data from two large financial frauds 1 A 45 million money laundering and Ponzi scheme based in the US and 2 the Enron scandal Benefits Robust Core algorithms are simple and insensitive to errors Efficient Suite of tools and algorithms greatly reduces the time and energy required by analysts to focus in on core data and identify potential key members of a target group Proven on Real World Data AFRL RI s system was honed with complex information from two massive financial fraud cases using paper electronic and online datasets The

    Original URL path: http://techlinkcenter.org/summaries/software-suite-identifying-suspicious-individuals (2016-02-09)
    Open archived version from archive

  • Email Based Personal Information Assistant | TechLink
    infrastructure to provide a real time search and information delivery system The email based Personal Information System is currently written in PHP and is prototyped and tested The Personal Information System can work on any hardware device that has email capabilities for example smart phones tablets and computers Since it relies on standardized email networks it is platform independent and works with PC Apple Google etc devices All software is installed on the email server so there is no software installation on the user device The Personal Information Assistant allows greater intimacy and security with customers and users Information can be user initiated on demand or pre scheduled and pushed out This software works with standard email to text platforms Benefits Utilizes email infrastructure no web surfing No software installation on the user device Provides a more intimate relationship with users Allows for high security information exchange The Opportunity The email based Personal Information Assistant is patented and is available for licensing from the US Air Force Collaborative R D with the Air Force is a possibility Contacts Sean Patten CLP Senior Technology Manager Leader for Software Licensing Montana State University TechLink Bozeman Montana spatten montana edu 406 994 7721

    Original URL path: http://techlinkcenter.org/summaries/email-based-personal-information-assistant (2016-02-09)
    Open archived version from archive

  • Bearing Fault Signature Detection Algorithm | TechLink
    variable operating conditions The Navy solution can be applied to data from currently available sensor systems methods and is adept at identifying faults in inner race faults The key is a fault detecting system that searches for frequency components with phase coupled sidebands whose spacing is predicted by the algorithm Benefits Sensitive Able to detect single point defects early and more accurately Simple Does not require baseline measurements or calibration Robust Not susceptible to changes in machine mounting load speed or other alterations of a machine s vibration signature The Opportunity Most existing fault detection systems that measure machine vibrations are susceptible to changes in the machine s operating baseline such as changes in machine mounting load torque coupled loads and changes in machine speed Those changes shift and or dampen the signals that other methodologies rely upon and thus adversely impact the sensitivity and accuracy of those methods The Navy s solution does not require baseline machine measurements and is unaffected by alterations in machine setup and loading The algorithm is highly sensitive and is adept finding challenging single point defects even those on the inner race The technology has applications for companies that build or monitor electric motors

    Original URL path: http://techlinkcenter.org/summaries/bearing-fault-signature-detection-algorithm (2016-02-09)
    Open archived version from archive

  • Highly Effective Data Compression & Pattern Recognition Software for Hypersensor Data | TechLink
    the processing efficiency by employing two types of algorithms Focus Searching algorithms and Compression Packaging algorithms The Focus Searching algorithms reduce the computational burden by reducing the number of comparisons necessary to determine whether or not data is redundant Compression is realized by constructing the data set from the exemplars defined in the prescreening operation and expressing those exemplars in wave space with the necessary scene mapping data or further processing the exemplars and expressing the exemplars in terms of endmembers to facilitate the efficient storage download and the later reconstruction of the complete data set with minimal deterioration of signal information Application Examples Compression and analysis of data in applications with a hyperspectral multispectral Raman or FTIR data cube examples include remote sensing medical optical imaging and industrial QA QC Automated pattern target recognition Automated terrain classification Benefits Efficient compress hypersensor data up to 20 1 with virtually no loss Easy perform analysis on compressed data without reconstructing the entire image set Effective find desired information in a complex matrix of information Economical can operate on a Pentium class PC without the need for expensive workstation The Opportunity Development Status Originally developed for the Naval Earth Mapping Observer NEMO

    Original URL path: http://techlinkcenter.org/summaries/highly-effective-data-compression-pattern-recognition-software-hypersensor-data (2016-02-09)
    Open archived version from archive

  • CORBA Universal Client and Consumer Tool | TechLink
    systems for all classes of submarines The UCC allows for the verification of server and producer interactions as well as inspection of the data being provided The UCC is composed of two main components the CORBA Control and the GUI Control Display The UCC CORBA Control is the engine which makes the actual connections to the CORBA Servers and Producers Event Channels in the system It manages those connections and keeps statistics and information on those connections for the user The UCC Display provides a GUI for the control and status displays and the data displays The UCC CORBA Control and UCC Display can run on the same machines or different machines Benefits Key Advantages Interactive visual CORBA interface Low level verification debugging and server producer status logging for system integration and interface development Provides developers with Unit Test Client to reduce software test time and development Key Features Visual display of all CORBA methods and data Text recording for all methods and data for off line viewing Drag and Drop of method parameters and return values The Opportunity The UCC tool is currently being used by the United State Navy UCC is patent pending and is available for licensing

    Original URL path: http://techlinkcenter.org/summaries/corba-universal-client-and-consumer-tool (2016-02-09)
    Open archived version from archive

  • Graphical User Interface Selection Algorithm | TechLink
    apparatus for enhancing computer user selection of computer displayed objects through dynamic selection area and constant visual feedback The advanced algorithm supports and enhances existing user interface designs by visually displaying a selectable cursor target that is closest to the cursor position or pointing object at any given time Current userinterface designs typically require an end user to place a cursor directly on an object to be selected Most current designs only provide feedback after the user performs an action to select the desired object With the Navy algorithm the distance to displayed objects is computed in real time as the cursor is moved The effective object selection area is increased without enlarging the displayed size of either the object or the cursor The system identifies the selectable object by providing a visual indication of the closest object to the cursor before a user selection action is made This will provide vast improvements over current designs where object symbols are closely clustered overlap or are small or where improved selection speed is highly desirable Benefits Substantial improvement in object selection speed More precise selection of closely clustered or overlapping objects Fewer incorrect mouse clicks Benefits available across platforms and all

    Original URL path: http://techlinkcenter.org/summaries/graphical-user-interface-selection-algorithm (2016-02-09)
    Open archived version from archive

  • JCAT Scenario and Planning Outcome Analysis Software | TechLink
    quickly overcome analysts and computers attempting to process complex situations When a temporal element is added the complexity increases even further rendering most Bayesian analysis techniques ineffective either through overwhelming mathematical requirements or the necessity to grossly oversimplify the model The US Air Force Research Laboratory Information Directorate AFRL RI has developed and continues to improve JCAT Java Causal Analysis Toolkit JCAT allows analysts to provide exact model parameters for important elements while estimating the remaining factors using causal not statistical reasoning The mathematical basis behind the causal estimations Recursive Noisy OR maintains a theoretically sound implementation of Bayesian theory while also simplifying the process by incorporating a semantic approach to model development The end result is a user friendly software tool with the power to tackle complex analytical tasks modeled dynamically through time Notable implementations of JCAT include a detailed analysis that predicted unrest in Thailand in 2010 and a complex model to identify potential outcomes of missile defense politics and policy Use of JCAT within the US government is growing and the core elements of the software are potentially readily adaptable to a broad range of analytical applications and techniques Benefits Powerful Able to process large models with temporal connections spanning significant time lengths where competing techniques cannot User Friendly JCAT simplifies the modeling process making meaningful analysis possible for users lacking an intense mathematical background JCAT makes it feasible and relatively easy for any analyst to develop and assess complex models Broadly Applicable Wide potential for use including marketing communication campaign and financial market analysis to investigations into deconflicting airspace that would improve civilian air travel The Opportunity JCAT software code available for license Potential for collaboration with US Air Force Research Laboratory Information Directorate inventors Additional information is available at the JCAT research team s website

    Original URL path: http://techlinkcenter.org/summaries/jcat-scenario-and-planning-outcome-analysis-software (2016-02-09)
    Open archived version from archive



  •