Defense Advanced Research Projects AgencyTagged Content List


A process or rule set used for calculations or other problem-solving operations

Showing 60 results for Algorithms RSS
In supervised machine learning (ML), the ML system learns by example to recognize things, such as objects in images or speech. Humans provide these examples to ML systems during their training in the form of labeled data. With enough labeled data, we can generally build accurate pattern recognition models.
| AI | Algorithms | Data |
LADS will develop a new protection paradigm that separates security-monitoring functionality from the protected system, focusing on low-resource, embedded and Internet of Things (IoT) devices. The program will explore technologies to associate the running state of a device with its involuntary analog emissions across different physical modalities including, but not limited to, electromagnetic emissions, acoustic emanations, power fluctuations and thermal output variations.
The goal of the Modeling Adversarial Activity (MAA) program is to develop mathematical and computational techniques for modeling adversarial activity for the purpose of producing high-confidence indications and warnings of efforts to acquire, fabricate, proliferate, and/or deploy weapons of mass terror (WMTs). MAA assumes that an adversary’s WMT activities will result in observable transactions.
Computational capability is an enabler for nearly every military system, but increases in this capability are limited by available system power and constraints on the ability to dissipate heat. This is a challenge for embedded applications such as soldier-borne applications, UAVs and command and control systems on submarines. Today’s intelligence, surveillance and reconnaissance (ISR) systems have sensors that collect far more information than they can process in real time; as a result, what could be invaluable real-time intelligence data in the hands of our warfighters is simply discarded, or perhaps recorded and processed hours or days after it was collected.
From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images—once relegated to the sidelines of strategic planning—is poised to become ever more critical to national security and military success around the globe.