The Knowledge You Need for Familiarization Is Here
Our Knowledge Library focuses on three distinctive areas: Artificial Intelligence Technology, Intelligent System Business Design, and Security and Risk Management. Let us know if there is anything else we can get for you. We will provide it free of charge.
AI Technology
Artificial Intelligence Technology is the foundation upon which we build our systems. The articles and white papers provided below explain how we use AI Technology in the field to help keep our warfighters safe.
Scroll down and click on the corresponding links to read the full text.
Courtesy of Army Research Laboratory
By Norbou Buchler, Laura Marusich, Jonathan Z. Bakdash, Stacey Sokoloff, and Robert Hamm
The Warfighter Associate: Objective and Automated Metrics for Mission Command
The Warfighter Associate Agent (WAA) improves an operators abilities to find the “best” solution to a problem based on currently available information. The Agent supports the user if a different course of action is chosen. WAA is a knowledge-based system that is designed to work in conjunction with a human operator. WAA assesses the state of the world and the activities and objectives of the operator, it can, within the bounds of its authority, carry out activities on behalf of the user, make the user aware of events particularly relevant to his activities, and manage the information content of the user’s displays resulting in the best possible performance.
– June 2016
John Merrihew & Dana Bevan, Ph.D.
(U) Improved Fusion Algorithm System
The objective of the Improved Fusion Algorithm System (IFAS) technology demonstration program is to develop advanced stochastic risk assessment technologies for information fusion in Associate Systems. The program is in Phase II of am OSD SBIR and has developed approaches for detecting and localizing OPFOR Tactics, Techniques and Procedures (TTPs) such as IED emplacement, VBIED emplacement, Ambush and Complex Attacks. IFAS fuses data from several sources including GMTI, GMTI MASINT, text reports and chat room conversations. IFAS demonstration systems have successfully yielded quantified risk assessment fusion that was both transparent and understandable for the operator.
John Merrihew, Larry Lafferty, Charles M. Shepard
Adaptive Distributed Aviation Asset Optimization for Operational Effectiveness (Phase II)
The paper describes the use of an Intelligent Decision-aiding Agent (IDA) associate for management of distributed aviation assets during warfighter net-centric operations. VELOXITI, Inc. (formerly Applied Systems Intelligence, Inc.), is collaborating with government personnel to demonstrate and evaluate a Situational Awareness Fusion Enhancement (SAFE) Aid in a man-in-the-loop experimentation environment as part of an Aviation Development Directorate – Applied Aviation Technology Directorate (ADD-AATD)
VELOXITI has released a new whitepaper for review. This document focuses on a unified approach to building and managing Network Operating Environments within the context of tactical missions and other warfighting functions.
Melinda Gresham, Josip Pilipovic – US Army
Eric Drucker, Larry Lafferty – Veloxiti, Inc.
S-6 Associate
Abstract—A data fusion software capability called the S-6 Associate is being developed at Aberdeen Proving Ground inside the Space and Terrestrial Communications Directorate at the Communications-Electronics Research, Development and Engineering Center. This intelligent cognitive software will assist the battalion (BN) S-6 and his staff manage complex tactical communications networks while increasing the networks’ agility, efficiency, and responsiveness, whether a unit is stationary or on the move. This intelligent tool leverages proven technology to help soldiers manage existing network resources more efficiently, including soldiers without in-depth network administration skills. Once fielded, the S-6 Associate will enable battalions to build a Network Common Operating Picture (N-COP) and perform NetOPS monitoring and management under conditions of rapid changes in tactical movement. In addition, it will cooperate with WIN-T NMS to ensure communications from division down to company/platoon level. N-COP will allow commanders to see how bandwidth is used for mission-critical information and how network failures affect the current mission.
Watson for the Warfighter: Decision Support Software for the Battle Command Staff
Abstract— This paper discusses an application of Associate Technology, presently the Warfighter Associate (WA), to improve the warfighter’s abilities in developing situation awareness, collaboration, and decision making, resulting in increased staff performance, as part of the Tactical Human Integration of Networked Knowledge (THINK) initiative. Associates are agent-based decision aids that assist human operators in complex tasks requiring a high cognitive workload.

The S-6 Associate software developed by CERDEC S&TCD aims to simplify building and monitoring the tactical network, diagnosing and addressing problems and ensuring each Soldier remains connected during critical moments.
Photo Credit: Spc. Nathan Goodall
Signal Soldier “Associate” Provides Real-Time Network Diagnostics
VELOXITI’s further work with CERDEC on intelligent associates is highlighed in an article here on the U.S. Army site.
ABERDEEN PROVING GROUND, Md. (Sept. 19, 2013) — As the number of electronic devices on the battlefield grows, so does the challenge of managing the network that links them together. Army researchers continue to work to create a better way to build and monitor the tactical network, diagnose and address problems, and ensure each Soldier remains connected during critical moments.
Engineers from the U.S. Army Research, Development and Engineering Command’s communications-electronics center, or CERDEC, are developing software called S-6 Associate that will consolidate existing information, simplify network monitoring and better equip the network operations staff officer, commonly known as the S-6.
These companies are pitching AI to the US military
Of the 42 businesses interested in attending the event, six are owned by veterans, according to the contracting documents. John Merrihew, VP government solutions at AI contractor Veloxiti, says his military experience puts him in a different category of tech company than Silicon Valley.
“I’m an Army retiree after 24 years and a half-dozen combat tours, so I have an obligation to [provide this technology],” Merrihew told Quartz. “I’m not a guy out on the west coast who’s made a lot of money like Google. [...]we’re pretty bought in on trying to help the military in this area.”
Intelligent System Business Design
Profitably support business objectives and create value in process improvements, innovation, or new paradigm. The articles provided below explain the use of Intelligent Agents.
SPE 124926
Real Time Diagnostics of Gas Lift Systems Using Intelligent Agents: A Case Study
G. Stephenson, SPE, Occidental Petroleum Corporation; R. Molotkov, SPE, Weatherford; N. De Guzman, SPE and L. Lafferty, SPE, Intelligent Agents Corporation
SPE 150285
Decision Support and Workflow Automation for the Development and Management of Hydrocarbon Assets Using Multi-Agent Systems
Amr S. El-Bakry, SPE, Michael C. Romer, SPE, ExxonMobil Production Company; Peng Xu, Anantha Sundaram, and Adam K. Usadi, ExxonMobil Research and Engineering; H. Lane Morehead, SPE, ExxonMobil Upstream Research; Mark L. Crawford, SPE, Bryce A. Holloway, and Charles A. Knight, ExxonMobil Information Technology
Security & Risk
Security and Risk Management are crucial to success in any deployment of products and services.

Unrestricted Warfare
Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.

Mandiant APT1 Report
The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.

SANs 20
The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.
Privacy & Content Disclaimer
This site includes links to information created by other public and private organizations. These links are provided for the user’s convenience. Veloxiti does not control or guarantee the accuracy, relevance, timeliness, or completeness of this information. The inclusion of these links is not intended to reflect their importance, nor is it intended to endorse views expressed, or products or services offered.