Program areas at Aamu-Rise Foundation
Customer: millennium corporationtitle: tsmo-tcots projectscope: provide technical and analytical expertise to support the modernization of cyber development, operations, infrastructure, and training for the tcot mission. Provide research, analysis, methodology, documentation, measurement, monitoring, reviews, training and demonstrations of proof of concepts and prototype technologies.
Customer: torchtitle: sensor technology development for in situ stabilizer measurement in minimum-smoke rocket motors iiscope: the contractor shall provide technical support to the devcom avmc in propulsion system health assessment and analysis, component and subsystem-level test & evaluation, propulsion system-level test & evaluation, and vehicle-level test & evaluation. The contractor shall support the devcom avmc in developing new analytical methods to accurately determine amounts of fuel stabilizers contained in double-base, missile propellants and by investigating the use of machine learning and artificial intelligence (ai) to rapidly analyze raman spectra.
Customer: ga techtitle: cyber ml study & defense-university affiliated research traineeship (dart) programscope: the research shall investigate, develop, and evaluate prototype machine learning models to (1) detect network attacks and (2) detect indicators of a network attack. The proposed research shall also generate a dataset to support the development of model (2) and evaluate the effectiveness of model (1) when the training set is small and/or imbalanced. Additionally, the research shall develop an action list to describe appropriate risk mitigation actions that should be taken with model (2) identifies an indicator of an attack. The program will provide the research pairing the opportunity to engage with a dod technical sponsor, conduct fundamental research focused on the technical sponsor's area of interest, learn dod contracting fundamentals from submitting proposals to successfully executing research that is cost, schedule and performance constrained, and understanding research security requirements.