Defense Advanced Research Projects AgencyTagged Content List

Algorithms

A process or rule set used for calculations or other problem-solving operations

Showing 7 results for Algorithms + Analytics RSS
05/26/2015
The chikungunya virus (CHIKV) is quickly spreading through the Western Hemisphere; as of May 15, 2015, the Pan-American Health Organization (PAHO) had tallied close to 1.4 million suspected cases and more than 33,000 confirmed cases since the virus’ first appearance in the Americas in December 2013. Spread by mosquitoes, chikungunya is rarely fatal but can cause debilitating joint and muscle pain, fever, nausea, fatigue and rash, and poses a growing public health and national security risk. Governments and health organizations could take more effective proactive steps to limit the spread of CHIKV if they had accurate forecasts of where and when it would appear. But such predictions for CHIKV and other emerging infectious diseases remain beyond the reach of current modeling capabilities.
09/07/2017
DARPA published its Young Faculty Award (YFA) 2018 Research Announcement today, seeking proposals in 26 different topic areas—the largest number of YFA research areas ever solicited.
August 11, 2016,
George Mason University – Arlington, VA Campus (Founders Hall)
The Defense Advanced Research Projects Agency (DARPA) Microsystems Technology Office (MTO) is hosting a Proposers Day in support of the Hierarchical Identify Verify Exploit (HIVE) Program on August 11, 2016, at George Mason University – Arlington, VA Campus (Founders Hall), located at 3351 North Fairfax Drive, Arlington, VA, 22201, from 9:00 AM to 12:30 PM, Eastern Daylight Time (EDT).
The goal of the Modeling Adversarial Activity (MAA) program is to develop mathematical and computational techniques for modeling adversarial activity for the purpose of producing high-confidence indications and warnings of efforts to acquire, fabricate, proliferate, and/or deploy weapons of mass terror (WMTs). MAA assumes that an adversary’s WMT activities will result in observable transactions.
From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images—once relegated to the sidelines of strategic planning—is poised to become ever more critical to national security and military success around the globe.