Defense Advanced Research Projects AgencyTagged Content List

Algorithms

A process or rule set used for calculations or other problem-solving operations

Showing 92 results for Algorithms RSS
Most camera designers seek to maximize spatial resolution and signal-to-noise (SNR). A wealth of information in the optical domain, however, is lost under those constraints. Specialty cameras exist to capture other types of information, but are not normally able to provide high SNR imagery at high spatial resolution from a single focal plane, and are used infrequently due to demands of additional camera systems. Today’s imaging systems primarily perform a single or limited set of measurements due, in part, to the underlying readout integrated circuits (ROICs), which sample the signal of interest and transfer the values off of the chip. Typically, ROICs are designed for a specific mode of operation, and, in essence, are application specific integrated circuits (ASICs).
Current artificial intelligence (AI) systems excel at tasks defined by rigid rules – such as mastering the board games Go and chess with proficiency surpassing world-class human players. However, AI systems aren’t very good at adapting to constantly changing conditions commonly faced by troops in the real world – from reacting to an adversary’s surprise actions, to fluctuating weather, to operating in unfamiliar terrain.
Serial Interactions in Imperfect Information Games Applied to Complex Military Decision Making (SI3-CMD) builds on recent developments in artificial intelligence and game theory to enable more effective decisions in adversarial domains. SI3-CMD will explore several military decision making applications at strategic, tactical, and operational levels and develop AI/game theory techniques appropriate for their problem characteristics.
In modern warfare, decisions are driven by information. That information can come in the form of thousands of sensors providing information, surveillance, and reconnaissance (ISR) data; logistics/supply-chain and personnel performance measurements; or a host of other sources and formats. The ability to exploit this data to understand and predict the world around us is an asymmetric advantage for the Department of Defense (DoD).
As new defensive technologies make old classes of vulnerability difficult to exploit successfully, adversaries move to new classes of vulnerability. Vulnerabilities based on flawed implementations of algorithms have been popular targets for many years. However, once new defensive technologies make vulnerabilities based on flawed implementations less common and more difficult to exploit, adversaries will turn their attention to vulnerabilities inherent in the algorithms themselves.