Artificial Intelligence Techniques for Surface Threat Identification
Navy SBIR FY2005.2


Sol No.: Navy SBIR FY2005.2
Topic No.: N05-129
Topic Title: Artificial Intelligence Techniques for Surface Threat Identification
Proposal No.: N052-129-0159
Firm: Stottler Henke Associates, Inc.
951 Mariner's Island Blvd., STE 360
San Mateo, California 94404
Contact: Richard Stottler
Phone: (650) 655-7242
Web Site: www.stottlerhenke.com
Abstract: Stottler Henke proposes a software system, the Intelligent Surface Threat Identification System (ISTIS), based on Artificial Intelligence (AI) techniques and our previous work, an existing Navy ID system, the Intelligent Identification Software Module (IISM). ISTIS will automatically analyze the data associated with a track, hypothesize, draw inferences, and make ID related recommendations. These data include the tracks' location and/or velocity reported over time and other ID related reports such as IFF codes, visual ID reports, acoustic signature, specific emitter ID (SEI), ELINT signature, FLIR reports, intelligence reports, communications, etc. The ultimate goal of this proposed effort is to improve the quality and efficiency of the ID process. This improved performance includes better use of scarce ID resources, better ID estimations from available information, sooner ID determinations, prevention of ID "surprises", and operating successfully in more complex environments. The goals of the Phase I research are to understand the current and potential ID environment, especially in littoral areas of interest to the US Navy; elaborate the heuristics, algorithms and techniques for automatic ID analysis; prove the feasibility of the techniques through prototype development; and develop the Phase II system design.
Benefits: ISTIS will demonstrate a significant potential for improved ID performance and reduced LCS ID manning in Phase II. Other LCS applications and other ship types will also benefit from the techniques. Department of Homeland Security and the Drug Enforcement Agency can use the same anomalous behavior recognition techniques to find terrorists and smugglers.

Return