Defense Advanced Research Projects AgencyTagged Content List

Systems of Systems

Related to new capabilities based on synergy among multiple diverse systems

Showing 26 results for Systems + Programs RSS
The Cross-Domain Maritime Surveillance and Targeting (CDMaST) program seeks to identify and implement architectures consisting of novel combinations of manned and unmanned systems to deny ocean environments to adversaries as a means of projecting power.
The Digital RF Battlespace Emulator (DRBE) program aims to create the world’s first, large-scale, virtual radio frequency (RF) environment for developing, training, and testing advanced RF systems, such as radar and electronic warfare (EW) systems. The target DRBE environment will enable numerous RF systems to interact with each other in a fully closed-loop RF arena, replicating dense, responsive, real-world RF environments.
As commercial technologies become more advanced and widely available, adversaries are rapidly developing capabilities that put our forces at risk. To counter these threats, the U.S. military is developing systems-of-systems concepts in which networks of manned and unmanned platforms, weapons, sensors, and electronic warfare systems interact over robust satellite and tactical communications links. These approaches offer flexible and powerful options to the warfighter, but the complexity introduced by the increase in the number of employment alternatives creates a battle management challenge.
The goal of the Fundamental Design (FUN Design) program is to determine whether we can develop or discover a new set of building blocks to describe conceptual designs. The design building blocks will capture the components’ underlying physics allowing a family of nonintuitive solutions to be generated.
Modern computing systems are incapable of creating sufficient security protections such that they can be trusted with the most sensitive data while simultaneously being exposed to untrusted data streams. In certain places, the Department of Defense (DoD) and commercial industry have adopted a series of air-gaps – or breaks between computing systems – to prevent the leakage and compromise of sensitive information.