Knowledge Library

The Knowledge You Need for Familiarization Is Here

Our Knowledge Library focuses on three distinctive areas: Artificial Intelligence Technology, Intelligent System Business Design, and Security and Risk Management. Let us know if there is anything else we can get for you. We will provide it free of charge.

AI Technology

Artificial Intelligence Technology is the foundation upon which we build our systems. The articles and white papers provided below explain how we use AI Technology in the field to help keep our warfighters safe.

Scroll down and click on the corresponding links to read the full text.

Courtesy of Army Research Laboratory

By Norbou Buchler, Laura Marusich, Jonathan Z. Bakdash, Stacey Sokoloff, and Robert Hamm

The Warfighter Associate: Objective and Automated Metrics for Mission Command

The Warfighter Associate Agent (WAA) improves an operators abilities to find the “best” solution to a problem based on currently available information. The Agent supports the user if a different course of action is chosen. WAA is a knowledge-based system that is designed to work in conjunction with a human operator. WAA assesses the state of the world and the activities and objectives of the operator, it can, within the bounds of its authority, carry out activities on behalf of the user, make the user aware of events particularly relevant to his activities, and manage the information content of the user’s displays resulting in the best possible performance.

Click here to read the full paper.

– June 2016

John Merrihew & Dana Bevan, Ph.D.

(U) Improved Fusion Algorithm System

The objective of the Improved Fusion Algorithm System (IFAS) technology demonstration program is to develop advanced stochastic risk assessment technologies for information fusion in Associate Systems. The program is in Phase II of am OSD SBIR and has developed approaches for detecting and localizing OPFOR Tactics, Techniques and Procedures (TTPs) such as IED emplacement, VBIED emplacement, Ambush and Complex Attacks. IFAS fuses data from several sources including GMTI, GMTI MASINT, text reports and chat room conversations. IFAS demonstration systems have successfully yielded quantified risk assessment fusion that was both transparent and understandable for the operator.

Click here to read the full paper

John Merrihew, Larry Lafferty, Charles M. Shepard

Adaptive Distributed Aviation Asset Optimization for Operational Effectiveness (Phase II)

The paper describes the use of an Intelligent Decision-aiding Agent (IDA) associate for management of distributed aviation assets during warfighter net-centric operations. VELOXITI, Inc. (formerly Applied Systems Intelligence, Inc.), is collaborating with government personnel to demonstrate and evaluate a Situational Awareness Fusion Enhancement (SAFE) Aid in a man-in-the-loop experimentation environment as part of an Aviation Development Directorate – Applied Aviation Technology Directorate (ADD-AATD)

Click here to read the full article.

VELOXITI has released a new whitepaper for review. This document focuses on a unified approach to building and managing Network Operating Environments within the context of tactical missions and other warfighting functions.

Melinda Gresham, Josip Pilipovic – US Army
Eric Drucker, Larry Lafferty – Veloxiti, Inc.

S-6 Associate

Abstract—A data fusion software capability called the S-6 Associate is being developed at Aberdeen Proving Ground inside the Space and Terrestrial Communications Directorate at the Communications-Electronics Research, Development and Engineering Center. This intelligent cognitive software will assist the battalion (BN) S-6 and his staff manage complex tactical communications networks while increasing the networks’ agility, efficiency, and responsiveness, whether a unit is stationary or on the move. This intelligent tool leverages proven technology to help soldiers manage existing network resources more efficiently, including soldiers without in-depth network administration skills. Once fielded, the S-6 Associate will enable battalions to build a Network Common Operating Picture (N-COP) and perform NetOPS monitoring and management under conditions of rapid changes in tactical movement. In addition, it will cooperate with WIN-T NMS to ensure communications from division down to company/platoon level. N-COP will allow commanders to see how bandwidth is used for mission-critical information and how network failures affect the current mission.

Click here to read the full whitepaper.

Watson for the Warfighter: Decision Support Software for the Battle Command Staff

Abstract— This paper discusses an application of Associate Technology, presently the Warfighter Associate (WA), to improve the warfighter’s abilities in developing situation awareness, collaboration, and decision making, resulting in increased staff performance, as part of the Tactical Human Integration of Networked Knowledge (THINK) initiative. Associates are agent-based decision aids that assist human operators in complex tasks requiring a high cognitive workload.

Click here to read the full whitepaper.

Soldier looking at a computer screen.

The S-6 Associate software developed by CERDEC S&TCD aims to simplify building and monitoring the tactical network, diagnosing and addressing problems and ensuring each Soldier remains connected during critical moments.

Photo Credit: Spc. Nathan Goodall

Signal Soldier “Associate” Provides Real-Time Network Diagnostics

VELOXITI’s further work with CERDEC on intelligent associates is highlighed in an article here on the U.S. Army site.

ABERDEEN PROVING GROUND, Md. (Sept. 19, 2013) — As the number of electronic devices on the battlefield grows, so does the challenge of managing the network that links them together. Army researchers continue to work to create a better way to build and monitor the tactical network, diagnose and address problems, and ensure each Soldier remains connected during critical moments.

Engineers from the U.S. Army Research, Development and Engineering Command’s communications-electronics center, or CERDEC, are developing software called S-6 Associate that will consolidate existing information, simplify network monitoring and better equip the network operations staff officer, commonly known as the S-6.

Soldiers launching a rocket.

AI would be used for tasks like analyzing drone footage.

Courtesy of Quartz – November 13, 2018

By Dave Gershgorn & Justin Rohrlich

These companies are pitching AI to the US military

Of the 42 businesses interested in attending the event, six are owned by veterans, according to the contracting documents. John Merrihew, VP government solutions at AI contractor Veloxiti, says his military experience puts him in a different category of tech company than Silicon Valley.

“I’m an Army retiree after 24 years and a half-dozen combat tours, so I have an obligation to [provide this technology],” Merrihew told Quartz. “I’m not a guy out on the west coast who’s made a lot of money like Google. [...]we’re pretty bought in on trying to help the military in this area.”

Click here to read the full article.

Intelligent System Business Design

Profitably support business objectives and create value in process improvements, innovation, or new paradigm. The articles provided below explain the use of Intelligent Agents.

SPE 124926

Real Time Diagnostics of Gas Lift Systems Using Intelligent Agents: A Case Study

G. Stephenson, SPE, Occidental Petroleum Corporation; R. Molotkov, SPE, Weatherford; N. De Guzman, SPE and L. Lafferty, SPE, Intelligent Agents Corporation

Click here to read the PDF.

SPE 150285

Decision Support and Workflow Automation for the Development and Management of Hydrocarbon Assets Using Multi-Agent Systems

Amr S. El-Bakry, SPE, Michael C. Romer, SPE, ExxonMobil Production Company; Peng Xu, Anantha Sundaram, and Adam K. Usadi, ExxonMobil Research and Engineering; H. Lane Morehead, SPE, ExxonMobil Upstream Research; Mark L. Crawford, SPE, Bryce A. Holloway, and Charles A. Knight, ExxonMobil Information Technology

Click here to read the PDF.

Security & Risk

Security and Risk Management are crucial to success in any deployment of products and services.

Aircraft flying over mountains

Unrestricted Warfare

Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.

Click here to read the PDF.

Decorative code

Mandiant APT1 Report

The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.

Click here to read the full article.

Artistic shot of the tops of skyscrapers

SANs 20

The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.

Click here to see the full poster.

Privacy & Content Disclaimer

This site includes links to information created by other public and private organizations. These links are provided for the user’s convenience. Veloxiti does not control or guarantee the accuracy, relevance, timeliness, or completeness of this information. The inclusion of these links is not intended to reflect their importance, nor is it intended to endorse views expressed, or products or services offered.