Abstract:
A system and method are presented for generating shearograms from raw specklegram images which may, for example, be collected from airborne or other mobile shearography equipment. The system and method is used to detect and characterize buried mines, improvised explosive devices (IEDs), and underground tunnels, bunkers, and other structures. Amongst other purposes, the system and method may also be used for rapid scanning of ship hulls and aircraft for hidden structural defects, rapid pipeline inspection, and non-contact acoustic sensing for in-water and underground sources.
Abstract:
A two-part fiber optic collimator has a precision adjuster for controlling the position of a spring-biased lens carrier with respect to the collimator's body. An interchangeable fiber optic connector adaptor is attached to the collimator body for accurately positioning the end of a fiber optic cable in the collimator.
Abstract:
A fiber laser having a thermal controller operatively connected to one or more fiber Bragg gratings is provided. The thermal controller does not impart much or imparts very little mechanical stress or strain to the optical fiber in which the FBGs reside because such forces can alter the FBG performance. Rather, the thermal controller utilizes a thermally conductive semi-solid or non-Newtonian fluid to submerge/suspend a portion of the optical fiber in which FBG resides. Temperature control logic controls whether a thermoelectric heater and cooler should be directed to increase or decrease its temperature. The thermoelectric heater and cooler imparts or removes thermal energy from the FBG to efficiently control its performance without the application of mechanical stress. The fiber laser having a thermal controller generally is able to increase laser output power greater than two times the amount of output power of a similarly fabricated fiber laser free of the thermal controller(s).
Abstract:
The system and method for protecting multiple networked enclaves each having one or more insecure machines. The system may include an attack detector as part of a secure node (e.g., SAFE node) proxy. The system may include an attack detector external to the proxy. The proxy may support multiple detectors and its actions may include isolating an insecure machine, cleansing an insecure machine, or tattling on (impugning the reputation of) an insecure machine.
Abstract:
What is provided is recording capability for each of the modules utilized by the first responders and other personnel within the area of the incident, with the stored information at each of the first responders' modules being read out through the ad hoc network, where it can be uploaded to storage. The stored information can be displayed at an incident commander work station in real time to give the incident commander a realistic view of the timeline and the severity of the incident, as well as the response. The use of the ad hoc network permits offloading stored information from each of the first responders' modules so as to free up storage within the modules. By providing storage at every node of the ad hoc network, one has access to a timeline of the actions at the incident as well as redundancy, which enhances the memories and observational skills of the first responders. Incident reporting is made complete due to the fact of all recordings being made available at one node on the temporary ad hoc network from which information reports and analysis can proceed, as well as subsequent training.
Abstract:
The current disclosure is directed to broadcasting information among nodes in the network. More specifically, the current disclosure relates to directional networking among nodes in the network. The directional broadcasting system allows for a more efficient way to deliver broadcasting information among nodes where at least some of the nodes use directional antennas.
Abstract:
The system and method for destroying compromised objects, including electronic devices. The system and method utilizes a barrier separating two reagents that can be rapidly mixed to form a base when desired. The system and method have a barrier configured to be triggered remotely. The barrier comprises an aluminum foil layer.
Abstract:
The invention measures the frequency of a heterodyne laser radar (LADAR) system signal in the input cell of a focal plane array (FPA). Embodiments amplify the return signal, and drive it into a counter for a fixed period of time. The frequency is the number of counts divided by the count time. An example design amplifier amplifies the return of a single photon response of an avalanche photodiode with a gain of 100 into a digital signal level at a 200 MHz rate with only 84 μW, demonstrating the feasibility of the approach.
Abstract:
A high powered armor panel having the wideband embedded antenna for operation in severe environmental conditions. The armor panel comprises a driven bowtie dipole electrically coupled to at least one driven resistor, a parasitic bowtie dipole electrically coupled to at least one parasitic resistor, a composite structure which has the driven bowtie dipole and the parasitic bowtie dipole embedded therein, a heat sink supported on a first side of the composite structure for dissipating heat, and an armor layer supported on an opposite second first side of the composite structure. The heat sink supports the at least one driven resistor electrically coupled to the driven bowtie dipole and the at least one parasitic resistor electrically coupled to the parasitic bowtie dipole.
Abstract:
An electrical connector assembly adapted for military use comprising a high-density maintenance connector which supports high bandwidth video export and low level maintenance functions, a lower density I/O connector, the stacking feature allows multiple branches in a distribution center, custom to each user, and the programmability allows for identical cables/stacking connectors to be used in different configurations.