SOLICITATION NOTICE
A -- Information Institute Research Program (Set Aside)
- Notice Date
- 5/30/2007
- Notice Type
- Solicitation Notice
- NAICS
- 541710
— Research and Development in the Physical, Engineering, and Life Sciences
- Contracting Office
- Department of the Air Force, Air Force Materiel Command, AFRL - Rome Research Site, AFRL/Information Directorate 26 Electronic Parkway, Rome, NY, 13441-4514, UNITED STATES
- ZIP Code
- 00000
- Solicitation Number
- Reference-Number-BAA-06-01-IFKA-SETASIDE-PART2
- Description
- Modification 02 to BAA-06-01-IFKA THIS IS PART 2 OF 2 Reference Basic Solicitation BAA-06-01-IFKA published Oct 11, 2005. http://www.fbo.gov/spg/USAF/AFMC/AFRLRRS/Reference%2DNumber%2DBAA%2D06%2D01%2DIFKA/listing.html Research directed at identifying unique and improved hardware and software methods employing evolutionary algorithms (EAs) for attacking a variety of hard optimization problems of interest to the Military. Genetic algorithms, genetic programming, particle swarm optimization, artificial immune system, evolutionary strategies and the like are examples of stochastic search methods modeled on biological processes that can excel at robustly searching large dimension parameter hyperspaces that characterize a number of persistently difficult problems associated with scheduling, multi-objective optimization, constrained resource allocation, logistics, multiple frequency antenna design, frequency allocation in communication systems, composing non-interacting DNA code word libraries, and even the design of pipelined hardware and optimizing compilers for computing systems. We are interested in the design, implementation, and application of fast, scalable, parallel, fully embedded instances of EA optimizer/problem execution engines targeted for Heterogeneous High Performance and Polymorphic Computer Architectures. Theory and experiments relative to evolvable approaches to the design, implementation, and use of scalable computing architectures to support cognitive-like processing functions are also of interest under this topic. Topic 4.3 Biocomputing: This topic addresses the merging of biological, nanoelectronic, quantum and photonic technologies to revolutionize information collection, processing and dissemination. This includes: (a) Biological computing architectures, (1) New operation modes and orders of magnitude increases in computing power will require new computer architecture paradigms. New architectures will bring new and novel capabilities. We seek information on new architectures and the unique capabilities they will bring to information processing and communication and (2) New architectures and exascale performance will require new addressing schemes. We seek efforts on contextual and conceptual addressing. The effort should show revolutionary advances. We would establish Figures of Merit relevant to biocomputing. We are interested in comparing the scalability of proposed compute modes. One suggested Figure of Merit would be to compare the achievable quality factor of a proposed biological system with the achievable quality factor in a silicon system of comparable scale. Some biological systems are self-correcting during or immediately after the assembly process. We ask for input on other relevant evaluation points such as Problem Class, Results Latency, Cycle Rate, Operating Environment, and I/O mode; (b) New models of computation - Models will be needed for each new computation paradigm. We seek information on modeling efforts. We are interested in the inclusion of error detection and correction, reconfigurability and fault tolerance. New computing paradigms will require mid-level languages to perform transducing functions. This will preclude the development of entire suites of high level applications for each computing paradigm. We seek requirements for the transducing language and its interfaces. The pace of development for any new computing paradigm will always be compared to CMOS. In order to attain a similar rate of development, we would begin identifying requirements for inclusions in a top to bottom design tool suite. This effort will identify bio-unique requirements and interfaces needed for an effective design tool suite; and (c) Intelligent computing ? We seek to identify fundamental factors affecting development of general computing and intelligent computing using biological computing paradigms. Paradigms have been demonstrated which perform NP hard problems. We seek to map biological functions onto other compute functions. We are looking for bio-unique characteristics, which allow increased cognizance. Topic 4.4 Quantum Information Processing The field of quantum information processing is multidisciplinary and very challenging, incorporating aspects from physics, electrical engineering, computer engineering and mathematics. Quantum information processing promises a revolutionary computing capability with impacts on secure distributed simulation, massively parallel computation, protecting information, rapid image processing, rapid optimization of logistics and much more. But to reach this capability, challenging issues need to be overcome, including general purpose quantum algorithms. Our objective is to harness the paradigm shift offered by quantum information science to solve classically hard and computationally challenging problems impacting the Air Force. Besides achieving general purpose quantum algorithms and the solution of computations beyond the reach of classical computers with tractable quantum algorithms, two large problems of interest to the Air Force are the computationally challenging areas of image processing and dynamic planning/logistics. Our areas of interest are simulating the quantum computing environment, developing new, tractable quantum algorithms from problems that are now beyond the computational reach of classical computation and applying quantum information science to image processing, target recognition, and planning. CTC Area 5: Cyber Operations Topic 5.1 Information Assurance Research: Researchers will conduct research in the areas of Indications and Warning (I&W) for Information Assurance, damage assessment, containment and recovery. Topics include but are not limited to studies, analyses and demonstrations pertaining to: (a) Collection of attack indicators for distributed computer and network systems automated collection of attack indicators; (b) Real-Time fusion of indicators across geographically distributed systems that can act as a front-line of protection for information systems; (c) Development of pathology labs for the analysis of malicious code, viruses, Trojan Horses and new types of software-based threats; (d) Development of fail-stop programs which can recognize an information attack, halt their activity and then safely restart themselves; (e) Dynamic reconfiguration after information attack; (f) New notions of data consistency, staged recovery based on prioritization, freeing up resources and adaptive system response; (g) Formal methods as applied to malicious code; (h) Develop methods for detection and analysis/decoding of hidden data and steganography; (i) Develop remote analysis capability for network forensics; and (j) Development of new and novel active response techniques. Topic 5.2 Adapting Fault Tolerance for Cyber Defense: Successful cyber defense is possible by transforming techniques from fault-tolerant computing. The key notion is to transform not transfer. Recent evidence has shown that merely transferring fault tolerance techniques to achieve cyber defense is fraught with vulnerabilities that an attacker can exploit. Mainly, our transformational approach is that when a fault-tolerant computing technique is placed in a cyber defense scenario the technique must itself be protected from attack or hidden from an attacker or both. We have been extending fault-tolerant computing to enforce the system properties of safety and liveness. When these properties are exhibited at many levels of system abstraction-to the point where they are realized by the system user-then it forms what we refer to as assured computing. Middleware is viewed as a means for an assured computing system to adapt to different fault occurrences. At some level of an assured computing systems, a human is deliberately placed in-the-loop for, among other purposes, post-attack recovery. Impairments to assured computing can then arise from human imperfection. Faults that are non-random and directed represent those induced by an attacker and challenge the transformation of fault tolerance to cyber defense; yet faults (i.e., mistakes) created by legitimate users may be indistinguishable from attacks over short time scales. Topic 5.3 Intrusion Detection Models in Large-Scale Network Systems: The rapid growth of the networks brings challenges to intrusion detection. Anomaly intrusion detection (AID) and misuse intrusion detection (MID) models are two well-known models for intrusion detection. An AID model is implemented by analyzing user behavior and the statistics of a process in a normal situation. On the other hand, signs of intrusion are detected with a database of known intrusion techniques in a MID model. A major problem with current intrusion detection systems is that large quantities of data are needed in order to extract meaningful data from the huge audit information in large-scale systems. We are interested in such technologies as data access, retrieval, extraction, pattern discovery, signatures, statistical processing, database, compression to develop effective and efficient intrusion detection models in distributed systems. CTC Area 6: Command and Control Topic 6.1 Effects Based Operations (EBO)/Commanders Predictive Environments: Effects Based Operations encompass a process for obtaining a desired strategic outcome on the enemy by focusing on specific effects and their causes throughout planning, execution and assessment. AFRL has initiated efforts to develop tools to support the warfighter in implementing EBO. Basic research is needed to further the state-of-the-art in technology to support this important area. Some of the research areas of interest include adversary intent modeling, course of action war gaming, enemy defeat modeling, temporal representation of the persistence and delays associated with effects, real-time simulation interaction, cross center of gravity analysis and modeling, prediction of direct and indirect effects, and evidence accrual to determine indicators of effects. Topic 6.2 Real-Time Decision Support for COA/ECOA Analysis: Research and develop High Performance Computer (HPC) based Force Structure Simulation (Wargaming) technology for predictive Course-of-Actions (COA) assessment. Utilize parallel processing resources rather than Monte Carlo techniques to establish real-time predictive simulations. The topic intends to address merging Command and Control planning systems and real-time predictive simulation technology as an assessment tool. Research areas of interest within this topic include: (a) Real-time Course-of-Actions prediction and analysis capability supporting operation planning processes; (b) EBO behavioral models for integration into a force structure simulation. Model development will focus on the ability the analysis the effects and interactions as part of a COA assessment; (c) Enemy Course-of-Action (ECOA) development via simulation models capable of producing intelligent adversary behavior; (d) Develop Course-of-Action measures of performance and measures of effectiveness (MOPs/MOEs) that can be collected and analyzed for COA assessment; (e) Data analysis research to fuse in near real time simulation results produced within a predictive framework and accumulated over a large number of COA simulations; (f) Techniques to provide intelligent data filtering and interpretation of the results for operational planners and strategist; (g) Advanced parallel processing technology applied to Force Structure Simulation; (h) Techniques for selective creation of probabilistic futures based on statistical variants; and (i) Real-time scenario generation techniques for COA assessment. Topic 6.3 Modeling and Simulating Integrated Command and Control Systems: Military command and control systems are complex, systems of systems that combine numerous applications programs and cross multiple networks, computing systems, and databases. As the Air Force moves toward integrating command and control functions into an integrated command and control system, modeling and simulation offers one approach for exploring new and existing system architectures and system performance. Additionally, modeling and simulation can form the basis for developing methods for exercising and experimenting with integrated command and control systems. Research areas of interest within this topic include: (a) Methods for developing enterprise models of integrated command and control systems that may include new and legacy components; (b) Development of integrated command and control system models, such as Unified Modeling Language (UML) models, to identify information exchange requirements and characterize general system performance; (c) Development of integrated command and control system measures of performance and measures of effectiveness (MOPs/MOEs) that can be obtained via simulation; and (d) Methods for rapidly developing simulation scenarios for exercising command and control system models. CTC Area 7: Connectivity Topic 7.1 Connectivity Challenges for JBI: The JBI will provide for the global management, discovery, and sharing of information objects only if the required communications and networking services support it, and do so securely. The challenges and requirements that JBI places on the Global Grid include: connectivity to mobile users; operation over disadvantaged links; supporting Quality of Service (QoS) guarantees for information delivery and information processing; supporting applications with real-time/near-real-time/in-time requirements; scalability of services; Multi-Level Security (MLS) and Multiple Security Levels (MSL) models; and information exchange in dynamic Joint/Coalition environments. At the same time, the information assurance aspects of confidentiality, authentication, integrity, nonrepudiation, access control, and availability must be satisfied. Topic 7.2 Market-Based Resource Allocation in the Information Grid: The Air Force's goals to achieve global awareness, dynamic planning/execution, and global information exchange involve the technologies to provide information to the warrior anywhere, anytime, and for any mission. This far-reaching enterprise will necessarily span multiple networks and computing domains of both the commercial and military varieties. As a result, many users with different goals and priorities vie for the communication and computing resources of the information grid. Managing this vast system to assure dependable operation that maintains users' quality of service levels has led researchers to propose computational markets as a means for controlling the allocation of system resources. Economics has always been a factor in engineering. Because it is also the study of resource allocation problems, economics is sought to provide the answer to managing large-scale information systems. By introducing software agents and pricing mechanisms, the computational economy could produce these same phenomena as a real one: admit arbitrary scale, permit a wide heterogeneity of resources, decentralized asynchronous operation, and tolerance of localized failures. Topic 7.3 Cross Layer Design and Optimization: Cross Layer Design and Optimization is an emerging communications paradigm, where information is exchanged between the layers while jointly optimizing performance. This effort will focus on the development of theoretical/analytical tools to provide a greater understanding of this paradigm. Topic 7.4 IFGC, Quantum Communication: Quantum Information Science research involves theoretical and experimental works from diverse fields such as physics, electrical and computer science and engineering, and from pure and applied mathematics. Objectives include investigations into establishing quantum limited communications with enhanced security, theoretical and experimental physical demonstrations of quantum information transport under extant or new paradigms and protocols. Supporting free space quantum communications, we are interested in expertise in wave propagation through turbulent media, image/signal processing and adaptive optics. Keywords applicable to these studies are: quantum cryptography, quantum entanglement, quantum dense coding, and quantum teleportation. Topics of special interest: Laser beam propagation through turbulent media, image processing in turbulent media. Controlled sources of single photons; sources of entangled photons and beams of multiply-entangled photons; single photon detectors; quantum repeaters; phase and polarization controllers with associated dispersion compensators. Free space and fiber propagation budgets, including steering and switching mechanisms. Topic 7.5 Airborne Networking and Communications Links: This research effort focuses on the examination of enabling techniques supporting potential and future Airborne Networking and Communications Link capabilities as well as the exploration of research challenges therein. Special consideration will be given to topics that address the potential impact of cross-layer optimization among physical, data link, and networking layers, including, but not limited to: (a) physical and MAC layer design considerations for efficient networking of airborne, terrestrial, and space platforms; (b) methods by which nodes will communicate across dynamic heterogeneous sub-networks with rapidly changing topologies and signaling environments, e.g., friendly/hostile links/nodes entering/leaving the grid; (c) techniques to optimize the use of limited physical resources under rigorous Quality of Service (QoS) and data prioritization constraints; (d) mechanisms to handle the security and information assurance problems associated with using new high-bandwidth, high-quality, communications links; and (e) antenna designs and advanced coding for improved performance on airborne platforms. The technical point of contact for these set aside areas is Mr. Henry Simmons, AFRL/IFSA, 315-330-3957, email Henry.Simmons@rl.af.mil. It is recommended that white papers from HBCU/MIs for these set aside areas be provided by 15 August 2007 and sent electronically to: Henry.Simmons@rl.af.mil.
- Record
- SN01305384-W 20070601/070530220651 (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |