A set of images generated by multiple passes over the same area can be coherently integrated by this technology developed by LLNL researchers. The primary difficulty with coherently combining different passes is registering the images obtained from each pass, particularly if a pass only partially covers a given area.
Keywords
- Show all (45)
- Sensors (15)
- Data Science (5)
- Imaging Systems (3)
- Computing (2)
- National Security Forensics (2)
- Simulation (2)
- Analysis (1)
- High Explosives (1)
- Information Technology (1)
- Quantum Science (1)
- Spectrometers (1)
- (-) Cybersecurity (4)
- (-) Ground Penetrating Radar (4)
- (-) Defense Technologies (3)
Technology Portfolios
CSP-POST provides the capability to inspect all incoming and outgoing emails while providing after-the-fact forensic capabilities. Using commercially available lightweight and serverless technologies, CSP-POST easily collects all email and parses it into easily searchable metadata, enriched and ready for analysis. The web-based application is deployed in a repeatable, testable, and auditable…
LLNL has invented a new system that uses public key cryptography to differentiate between human-generated text and AI-generated text. This invention can be used to validate that text is likely to be human generated for the purposes of sorting or gatekeeping on the internet, can detect cheating on essay assignments, and can be used as an automatic captcha that does away with the hassle of…
LLNL researchers have developed a lightweight drone-based GPR array that when flown over a surface with laid and/or buried objects could image the field of view and be able to detect targets and discriminate them from clutter. The imaging method employs a modified multi-static architecture to provide the highest signal to noise with the lowest system weight, making it ideal for airborne or…
This technology uses three different frequency bands to create intensity maps of returned signals. Signals have traditionally been displayed as raw return data. The intensity of the return is represented by level of brightness. Assignment of a scalar value for intensity is used to determine the brightness of the image. In this technology, each frequency is given a designated primary color…
The suppressor has a series of chambers for the propellant to flow through, but unlike all traditional suppressors, the chambers are open, not closed. The propellant is not trapped. It keeps moving. We manage its unimpeded flow through the suppressor. This is the key underlying technology of our suppressor design that enables all the improvements over the 100-year old traditional designs.
Livermore Lab researchers have developed a tunable shaped charge which comprises a cylindrical liner commonly a metal such as copper or molybdenum but almost any solid material can be used and a surround layer of explosive in which the detonation front is constrained to propagate at an angle with respect to the charge axis. The key to the concept is the ability to deposit a surrounding…
Livermore Lab researchers have developed a method that combines additive manufacturing (AM) with an infill step to render a final component which is energetic. In this case, AM is first used to print a part of the system, and this material can either be inert or energetic on its own. A second material is subsequently added to the structure via a second technique such as casting, melt…
LLNL has developed a new method for securely processing protected data on HPC systems with minimal impact on the existing HPC operations and execution environment. It can be used with no alterations to traditional HPC operations and can be managed locally. It is fully compatible with traditional (unencrypted) processing and can run other jobs, unencrypted or not, on the cluster simultaneously…
LLNL has developed a wide band (WB) ground penetrating radar (GPR) technology to detect and image buried objects under a moving vehicle. Efficient and high performance processing algorithms reconstruct images of buried or hidden objects in two or three dimensions under a scanning array. The technology includes a mobile high-performance computing system allowing GPR array sensor data to be…
LLNL's NeMS system enables network mapping operations by using two LLNL-developed software systems: LLNL's NeMS tool and the Everest visualization system. Each software system can be also used separately for their specific applications. When the two systems are used together as an iterative analysis platform, LLNL's NeMS system provides network security managers and information technology…