This document lists 30 research topics that received MURI (Multidisciplinary University Research Initiative) funding. Each topic includes the lead research institution, participating institutions, and the principal investigator. The topics cover a wide range of scientific areas including optics, autonomous systems, biofuels, polymers, computer vision, and more. The projects involve collaboration between universities, with some including international partners, to conduct fundamental research.
The document provides a national security space strategy for the United States. It outlines that space is becoming increasingly congested, contested, and competitive as more countries develop space capabilities. The strategy aims to promote responsible use of space, provide improved US space capabilities, partner with other responsible entities, prevent aggression against US space infrastructure, and prepare for degraded space operations. It will implement these strategic approaches through coordinated planning across government agencies to maintain US advantages in space.
The Department of Defense cares about endangered species for two main reasons: 1) to comply with the Endangered Species Act and avoid critical habitat designations that could restrict military training, and 2) to meet the requirements of the Sikes Act which mandates that DoD assess natural resources, complete management plans, and coordinate with wildlife agencies to manage habitat for species. The DoD natural resources mission is to enable military training while providing habitat, achieving both national defense and conservation goals through extensive stewardship efforts across military lands.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) developing an exceptional cyber workforce through training and innovation. The strategy aims to help the DoD organize for, defend, and leverage opportunities in cyberspace while managing threats from state and non-state actors.
This document provides an overview of social media and guidelines for its appropriate use by service members. It discusses how social media can be harnessed for command information and media outreach but notes that OPSEC and UCMJ still apply online. Specific tips are provided, such as staying within one's area of expertise, being mindful of what is said about the chain of command, and educating family on privacy settings. Popular social media platforms like Facebook, Twitter, YouTube and Flickr are also described.
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
The document outlines the US government's plan to strengthen support for military families. The first priority is to enhance the overall well-being and psychological health of military families. Initiatives include increasing behavioral health services through prevention and community integration, improving awareness of psychological fitness, protecting families from financial exploitation, eliminating homelessness, ensuring substance abuse treatment, and making courts more responsive to military families' needs.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) leveraging innovation through cyber workforce development. The strategy aims to organize, train, and equip DoD to operate effectively in cyberspace while addressing growing cyber threats from state and non-state actors.
This document discusses invasive species and their impacts. It acknowledges that invasive species pose significant challenges for the Department of Defense (DoD) by threatening military training lands and activities. The document provides background on invasive species and their costs, outlines key issues for military installation commanders to consider regarding invasive species, and summarizes Executive Order 13112 which created the National Invasive Species Council and reinforces DoD's role in addressing invasive species.
The U.S. Department of State's Bureau of Educational and Cultural Affairs provides safety tips for using social networks, email, and the internet. The tips include never sharing private contact information publicly, carefully managing privacy settings, considering how content may be perceived before posting, being wary of third party applications accessing profile information, reporting any site abuses, and exercising caution with unsolicited emails or requests for private information. Basic computer security practices like scanning removable media and attachments are also recommended.
The document provides a national security space strategy for the United States. It outlines that space is becoming increasingly congested, contested, and competitive as more countries develop space capabilities. The strategy aims to promote responsible use of space, provide improved US space capabilities, partner with other responsible entities, prevent aggression against US space infrastructure, and prepare for degraded space operations. It will implement these strategic approaches through coordinated planning across government agencies to maintain US advantages in space.
The Department of Defense cares about endangered species for two main reasons: 1) to comply with the Endangered Species Act and avoid critical habitat designations that could restrict military training, and 2) to meet the requirements of the Sikes Act which mandates that DoD assess natural resources, complete management plans, and coordinate with wildlife agencies to manage habitat for species. The DoD natural resources mission is to enable military training while providing habitat, achieving both national defense and conservation goals through extensive stewardship efforts across military lands.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) developing an exceptional cyber workforce through training and innovation. The strategy aims to help the DoD organize for, defend, and leverage opportunities in cyberspace while managing threats from state and non-state actors.
This document provides an overview of social media and guidelines for its appropriate use by service members. It discusses how social media can be harnessed for command information and media outreach but notes that OPSEC and UCMJ still apply online. Specific tips are provided, such as staying within one's area of expertise, being mindful of what is said about the chain of command, and educating family on privacy settings. Popular social media platforms like Facebook, Twitter, YouTube and Flickr are also described.
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
The document outlines the US government's plan to strengthen support for military families. The first priority is to enhance the overall well-being and psychological health of military families. Initiatives include increasing behavioral health services through prevention and community integration, improving awareness of psychological fitness, protecting families from financial exploitation, eliminating homelessness, ensuring substance abuse treatment, and making courts more responsive to military families' needs.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) leveraging innovation through cyber workforce development. The strategy aims to organize, train, and equip DoD to operate effectively in cyberspace while addressing growing cyber threats from state and non-state actors.
This document discusses invasive species and their impacts. It acknowledges that invasive species pose significant challenges for the Department of Defense (DoD) by threatening military training lands and activities. The document provides background on invasive species and their costs, outlines key issues for military installation commanders to consider regarding invasive species, and summarizes Executive Order 13112 which created the National Invasive Species Council and reinforces DoD's role in addressing invasive species.
The U.S. Department of State's Bureau of Educational and Cultural Affairs provides safety tips for using social networks, email, and the internet. The tips include never sharing private contact information publicly, carefully managing privacy settings, considering how content may be perceived before posting, being wary of third party applications accessing profile information, reporting any site abuses, and exercising caution with unsolicited emails or requests for private information. Basic computer security practices like scanning removable media and attachments are also recommended.
The document is a briefing from the Department of State's Bureau of Diplomatic Security about social networking cyber security awareness. It discusses what social networking is, security concerns with social networking, examples of security issues in the news, and provides guidance on how to protect the Department and oneself while using social networking. The briefing covers topics like maintaining privacy settings, securing accounts, avoiding phishing attacks, and being aware of what is posted online.
Here are the key steps to using Twitter summarized in 3 sentences:
To tweet, enter text in the text box on your homepage and click "Tweet"; to delete a tweet, scroll over it and click "delete." Retweeting allows you to share another user's tweet by typing "RT" and their username. Direct messages allow private communication with other users by starting a message with "D" and their username.
1) Twitter is a free social media platform that allows users to post short messages called tweets. Tweets can be up to 140 characters in length.
2) Users follow other accounts and see their tweets in their timeline. When a user posts a tweet, it goes out to their followers.
3) To create an account, a user provides a username, display name, email, profile photo and other optional information like location in their profile settings.
The document provides tips for using YouTube's video editor to combine, trim, and add soundtracks to multiple uploaded videos. It describes how to drag and drop clips into the editing bar, trim videos using scissors icons, and add audio tracks from YouTube's library. Statistics on views, demographics, and video popularity can be found using the Insight tool. The document also includes recommendations for video formats, resolutions, frame rates, and codecs for optimal uploading and playback on YouTube. General tips suggest having relevant content, producing your own videos, adding subtitles, and updating videos weekly.
Customizing your YouTube channel involves adjusting settings, themes, modules, and featured content. You can add a name, tags, and background image. Modules allow selecting what sections to display like comments and subscribers. Featured content includes choosing a featured video and whether to display videos in player or grid view. Comments for both channels and videos can be set to require moderator approval.
The document discusses how different military organizations use YouTube. The 129th Rescue Wing uploads videos of combat exercises with international partners. The 3rd Brigade Special Troops Battalion uploaded a slideshow of promotions. The 26th Marine Expeditionary Unit subscribes to other Marine videos to create contacts and foster community. The Navy JAG office uses their channel to showcase self-produced videos depicting real life as a JAG.
This document discusses how social technologies can enable open innovation in government in three key ways:
1) Crowdsourcing, by allowing governments to distribute problems to the public to drive innovation from diverse sources. Examples given are IdeaScale and UserVoice tools.
2) Intra-government collaboration, by enhancing speed, scope and reliability of information sharing between agencies through wikis, collaborative tools and immersive virtual environments.
3) Citizen science, by engaging the public to help analyze and apply government data through applications, mashups and analytical tools built from open data on sites like Data.gov. Social technologies will play a critical role in maximizing the value of open government data.
This document provides instructions for creating an official YouTube channel and uploading videos. It outlines how to create a YouTube account, set up a channel profile and privacy settings, create playlists, upload and describe videos, and add videos to playlists. The goal is to help users effectively organize and share videos on YouTube.
The document provides tips and examples for how military services can creatively use Facebook pages. It describes how the 24th Marine Expeditionary Unit posts photos from humanitarian missions and how the 28th Bomb Wing Commander answers base questions. Other examples include the 1st Infantry Division advertising events, a Naval Medical Center announcing a contest, and a Marine Forces Reserve advertising bonuses. It then provides best practices such as grouping related content, keeping discussions centered around posted content, and cross-promoting across websites and social media platforms.
This document provides guidance on designing a Facebook fan page, including:
1. Adding basic information like a logo, customizing the wall and tabs, and setting the URL.
2. Adding applications and features like events, RSS feeds, polls, and a boxes tab with Static FBML to customize the page.
3. Using Insights to learn more about your fans and monitor your page's performance.
1) Getting started with a Facebook page involves creating a personal Facebook profile to use as an administrator for the page, applying strict privacy settings to the personal profile, and then creating the official page for the organization.
2) The guide recommends adding other administrators to help manage the page and sharing the page with others before publishing it live.
3) Facebook pages can be made available in other languages to potentially engage more users depending on the local audience.
This document provides tips for military children to stay safe online. It advises only chatting with known friends and family, avoiding sharing private information, and getting parental permission for activities like webcam chats. Specific dos and don'ts are outlined for chatting, instant messages, profiles, emails and more. The goal is to help kids understand potential dangers and how to avoid unsafe situations so they can enjoy the internet while staying protected.
This document discusses the importance of operational security (OPSEC) for children with loved ones who are deployed. It explains that OPSEC involves keeping certain information secret, such as details about a loved one's location, mission, departure/return dates. Children are advised not to disclose such details to strangers or in public online spaces. Maintaining OPSEC helps keep deployed loved ones safe from potential threats seeking information.
OPSEC is operational security that denies useful information to enemies. While specific rules cannot cover every situation, any piece of information could aid enemies by helping them build profiles of organizations. Spouses and families play an important role in protecting information and should be careful about what they share online or in public to avoid inadvertently revealing details like future unit activities or vulnerabilities that could endanger service members.
1) The document describes moving the President of the United States from his ranch in Texas to Baghdad for Thanksgiving in secret.
2) Only a few key officials like the Vice President, Chief of Staff, and National Security Adviser were told the day before, while the First Lady was told hours before departure.
3) Deception tactics were used like telling the press the President was staying in Texas, flying without lights under cover of darkness, and using a phony identification code to replicate a civilian transport plane.
The document discusses vulnerabilities and indicators related to operational security (OPSEC). It defines indicators as detectable activities that can reveal sensitive information or vulnerabilities. Adversaries look for patterns and signatures to build profiles of organizations. Common vulnerabilities include unsecured discussions, lack of security policies, and stereotyped operations. Examples of vulnerabilities are from various areas like operations, physical environment, personnel, and more. The document outlines specific communication, computer, and administrative vulnerabilities and encourages awareness of indicators in family, personnel, public affairs and other areas.
This document provides guidance on operations security (OPSEC) best practices for social media use. It warns that too much personal information shared online could aid adversaries by revealing details about service members, their families, units, and ship/base locations. Specific examples are given of information that should not be shared, such as deployment status, schedules, contact details, and technical or tactical military information. The document encourages educating social media followers on OPSEC and monitoring for potential violations. Overall, its message is to be cautious with personal details and only share information that is already publicly known.
The federal IT workforce spans five generations and 103,322 workers in 2008. The largest segment is baby boomers aged 45-63, comprising 60% of the workforce. As boomers retire over the next decade, there will be opportunities for advancement but also needs for recruitment, training, and succession planning. The 2210 IT specialist series grew 24% from 1997-2008 to 68,626 workers in 2008, with most agencies increasing staff levels. 75% of 2210 workers were under the general schedule in 2007, with a median grade of GS-12. New hires and agency transfers typically fill annual vacancies in this workforce.
The document outlines the Chairman of the Joint Chiefs of Staff's social media strategy for 2010. It analyzes the current social media presence and identifies goals to better engage audiences, align social media with events/priorities, drive online discussions, and expand the audience. The strategy proposes objectives like staff answering questions online, incorporating social media into planning, using sites to shape discussions before events, and setting growth targets for each platform.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
The document is a briefing from the Department of State's Bureau of Diplomatic Security about social networking cyber security awareness. It discusses what social networking is, security concerns with social networking, examples of security issues in the news, and provides guidance on how to protect the Department and oneself while using social networking. The briefing covers topics like maintaining privacy settings, securing accounts, avoiding phishing attacks, and being aware of what is posted online.
Here are the key steps to using Twitter summarized in 3 sentences:
To tweet, enter text in the text box on your homepage and click "Tweet"; to delete a tweet, scroll over it and click "delete." Retweeting allows you to share another user's tweet by typing "RT" and their username. Direct messages allow private communication with other users by starting a message with "D" and their username.
1) Twitter is a free social media platform that allows users to post short messages called tweets. Tweets can be up to 140 characters in length.
2) Users follow other accounts and see their tweets in their timeline. When a user posts a tweet, it goes out to their followers.
3) To create an account, a user provides a username, display name, email, profile photo and other optional information like location in their profile settings.
The document provides tips for using YouTube's video editor to combine, trim, and add soundtracks to multiple uploaded videos. It describes how to drag and drop clips into the editing bar, trim videos using scissors icons, and add audio tracks from YouTube's library. Statistics on views, demographics, and video popularity can be found using the Insight tool. The document also includes recommendations for video formats, resolutions, frame rates, and codecs for optimal uploading and playback on YouTube. General tips suggest having relevant content, producing your own videos, adding subtitles, and updating videos weekly.
Customizing your YouTube channel involves adjusting settings, themes, modules, and featured content. You can add a name, tags, and background image. Modules allow selecting what sections to display like comments and subscribers. Featured content includes choosing a featured video and whether to display videos in player or grid view. Comments for both channels and videos can be set to require moderator approval.
The document discusses how different military organizations use YouTube. The 129th Rescue Wing uploads videos of combat exercises with international partners. The 3rd Brigade Special Troops Battalion uploaded a slideshow of promotions. The 26th Marine Expeditionary Unit subscribes to other Marine videos to create contacts and foster community. The Navy JAG office uses their channel to showcase self-produced videos depicting real life as a JAG.
This document discusses how social technologies can enable open innovation in government in three key ways:
1) Crowdsourcing, by allowing governments to distribute problems to the public to drive innovation from diverse sources. Examples given are IdeaScale and UserVoice tools.
2) Intra-government collaboration, by enhancing speed, scope and reliability of information sharing between agencies through wikis, collaborative tools and immersive virtual environments.
3) Citizen science, by engaging the public to help analyze and apply government data through applications, mashups and analytical tools built from open data on sites like Data.gov. Social technologies will play a critical role in maximizing the value of open government data.
This document provides instructions for creating an official YouTube channel and uploading videos. It outlines how to create a YouTube account, set up a channel profile and privacy settings, create playlists, upload and describe videos, and add videos to playlists. The goal is to help users effectively organize and share videos on YouTube.
The document provides tips and examples for how military services can creatively use Facebook pages. It describes how the 24th Marine Expeditionary Unit posts photos from humanitarian missions and how the 28th Bomb Wing Commander answers base questions. Other examples include the 1st Infantry Division advertising events, a Naval Medical Center announcing a contest, and a Marine Forces Reserve advertising bonuses. It then provides best practices such as grouping related content, keeping discussions centered around posted content, and cross-promoting across websites and social media platforms.
This document provides guidance on designing a Facebook fan page, including:
1. Adding basic information like a logo, customizing the wall and tabs, and setting the URL.
2. Adding applications and features like events, RSS feeds, polls, and a boxes tab with Static FBML to customize the page.
3. Using Insights to learn more about your fans and monitor your page's performance.
1) Getting started with a Facebook page involves creating a personal Facebook profile to use as an administrator for the page, applying strict privacy settings to the personal profile, and then creating the official page for the organization.
2) The guide recommends adding other administrators to help manage the page and sharing the page with others before publishing it live.
3) Facebook pages can be made available in other languages to potentially engage more users depending on the local audience.
This document provides tips for military children to stay safe online. It advises only chatting with known friends and family, avoiding sharing private information, and getting parental permission for activities like webcam chats. Specific dos and don'ts are outlined for chatting, instant messages, profiles, emails and more. The goal is to help kids understand potential dangers and how to avoid unsafe situations so they can enjoy the internet while staying protected.
This document discusses the importance of operational security (OPSEC) for children with loved ones who are deployed. It explains that OPSEC involves keeping certain information secret, such as details about a loved one's location, mission, departure/return dates. Children are advised not to disclose such details to strangers or in public online spaces. Maintaining OPSEC helps keep deployed loved ones safe from potential threats seeking information.
OPSEC is operational security that denies useful information to enemies. While specific rules cannot cover every situation, any piece of information could aid enemies by helping them build profiles of organizations. Spouses and families play an important role in protecting information and should be careful about what they share online or in public to avoid inadvertently revealing details like future unit activities or vulnerabilities that could endanger service members.
1) The document describes moving the President of the United States from his ranch in Texas to Baghdad for Thanksgiving in secret.
2) Only a few key officials like the Vice President, Chief of Staff, and National Security Adviser were told the day before, while the First Lady was told hours before departure.
3) Deception tactics were used like telling the press the President was staying in Texas, flying without lights under cover of darkness, and using a phony identification code to replicate a civilian transport plane.
The document discusses vulnerabilities and indicators related to operational security (OPSEC). It defines indicators as detectable activities that can reveal sensitive information or vulnerabilities. Adversaries look for patterns and signatures to build profiles of organizations. Common vulnerabilities include unsecured discussions, lack of security policies, and stereotyped operations. Examples of vulnerabilities are from various areas like operations, physical environment, personnel, and more. The document outlines specific communication, computer, and administrative vulnerabilities and encourages awareness of indicators in family, personnel, public affairs and other areas.
This document provides guidance on operations security (OPSEC) best practices for social media use. It warns that too much personal information shared online could aid adversaries by revealing details about service members, their families, units, and ship/base locations. Specific examples are given of information that should not be shared, such as deployment status, schedules, contact details, and technical or tactical military information. The document encourages educating social media followers on OPSEC and monitoring for potential violations. Overall, its message is to be cautious with personal details and only share information that is already publicly known.
The federal IT workforce spans five generations and 103,322 workers in 2008. The largest segment is baby boomers aged 45-63, comprising 60% of the workforce. As boomers retire over the next decade, there will be opportunities for advancement but also needs for recruitment, training, and succession planning. The 2210 IT specialist series grew 24% from 1997-2008 to 68,626 workers in 2008, with most agencies increasing staff levels. 75% of 2210 workers were under the general schedule in 2007, with a median grade of GS-12. New hires and agency transfers typically fill annual vacancies in this workforce.
The document outlines the Chairman of the Joint Chiefs of Staff's social media strategy for 2010. It analyzes the current social media presence and identifies goals to better engage audiences, align social media with events/priorities, drive online discussions, and expand the audience. The strategy proposes objectives like staff answering questions online, incorporating social media into planning, using sites to shape discussions before events, and setting growth targets for each platform.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PROJECTS
1. FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PROJECTS
Page 1 of 7
MURI Topic 1: Optical Metamaterials
ONR Large-Area 3D Optical University of Pennsylvania Nader Engheta PA
Metamaterials with Tunability and Harvard University MA
Low Loss Northeastern University MA
Purdue University IN
University of Texas, Austin TX
MURI Topic 2: Adaptive Cognitive Maps for Autonomous Systems
ONR Grid Cells and Cognitive Maps for Boston University Michael Hasselmo MA
Autonomous Systems Massachusetts Institute of Technology MA
University of Texas, Austin TX
University of London2
MURI Topic 3: Non-linear Mediums Converting Frequencies of Propagating E/M and Pressure Waves
ONR Sound and Electromagnetic North Carolina State University Michael Steer NC
Interacting Waves Colorado School of Mines CO
Georgia Institute of Technology GA
Purdue University IN
MURI Topic 4: Biofuels: Microbial Communities, Biogeochemistry and Surface Interactions
ONR Fundamental Research on the University of Oklahoma Joseph Suflita OK
Biological Stability of Future Naval Oklahoma State University OK
Fuels and Implications for the Montana State University MT
Biocorrosion of Metallic Surfaces Colorado School of Mines CO
MURI Topic 5: Design, Synthesis, and Characterization of Electro-Active Polymers for Dielectric Energy Storage
1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.
2. ONR Rational Design of Advanced University of Connecticut Rampi Ramprasad CT
Polymeric Capacitor Films Rensselaer Polytechnic Institute NY
Pennsylvania State University PA
Columbia University NY
University of Akron OH
MURI Topic 6: Reasoning for Image Understanding in Uncertain Environments
ONR Rich Representations with Carnegie Mellon University Martial Hebert PA
Exposed Semantics for Deep University of Maryland, College Park MD
Visual Reasonings University of Illinois, Urbana-Champaign IL
University of Pennsylvania PA
ONR Knowledge Representation, University of California, Los Angeles Song-Chun Zhu CA
Reasoning and Learning for University of California, Irvine CA
Understanding Scenes and Events University of California, Berkeley CA
California Institute of Technology CA
Stanford University CA
Brown University RI
Massachusetts Institute of Technology MA
MURI Topic 7: Fundamental Study of High – and Low-K Dielectrics for III-V Electronic Devices
ONR Dielectric Enhancements for University of California, Santa Barbara Umesh K. Mishra CA
Innovative Electronics Arizona State University AZ
Harvard University MA
Massachusetts Institute of Technology MA
Ohio State University OH
Stanford University CA
Yale University CT
1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.
3. MURI Topic 8: Provably-Safe Perception-Based Control of Autonomous UAS Operations around Complex, Unstructured Terrain
ONR Animal Inspired Robust Flight with University of Washington Kristi Morgansen WA
Outer and Inner Loop Strategies University of Maryland, College Park MD
Boston University MA
University of North Carolina, Chapel Hill NC
ONR Provably-Stable Vision-Based Massachusetts Institute of Technology Russ Tedrake MA
Control of High-Speed Flight Carnegie Mellon University PA
through Forests and Urban New York University NY
Environments Harvard University MA
Wageningan (Netherlands)2
MURI Topic 9: Dynamical Systems Theory in 4D Geophysical Fluid Dynamics
ONR Dynamical Systems Theory and Woods Hole Oceanographic Institution Larry Pratt MA
Lagrangian Data Assimilation in 4D Columbia University NY
Geophysical Fluid Dynamics University of California, Santa Barbara CA
Marquette University WV
University of North Carolina, Chapel Hill NC
University of California, San Diego CA
University of Miami FL
University of Delaware DE
MURI Topic 10: Hyperspectral, Radar and EO/IR Signatures in the Littorals
ONR Remote Sensing and Data- University of Washington Andrew Jessup WA
Assimilative Modeling in the Oregon State University OR
Littorals Woods Hole Oceanographic Institution MA
MURI Topic 11: Novel Catalytic Mechanisms for the Chemical Reduction of Carbon Dioxide to Energy-Dense Liquids
Novel Catalytic Mechanisms for University of California, San Diego Clifford Kubiak CA
AFOSR the Chemical Reduction of Carbon California Institute of Technology CA
Dioxide to Energy-Dense Liquids Stanford University CA
Princeton University NJ
1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.
4. MURI Topic 12: Third-order Nonlinear Optical Organics
AFOSR Center for Organic Materials for All Georgia Institute of Technology Seth Marder GA
Optical Switching University of Washington WA
University of Arizona AZ
University of Central Florida FL
MURI Topic 13: Fundamental Processes in High Temperature Gas-Surface Interactions
AFOSR Fundamental Processes in High- University of Minnesota Graham V. Candler MN
Temperature Hypersonic Flows Pennsylvania State University PA
Montana State University MT
University of Arizona AZ
University at Buffalo, the State University of New NY
York
MURI Topic 14: Propagation of Ultrashort Laser Pulses Through Transparent
AFOSR Mathematical Modeling and University of Arizona Jerome Maloney AZ
Experimental Validation of University of Colorado CO
Ultrafast Nonlinear Light-Matter Cornell University NY
Coupling Associated with Temple University DC
Filamentation in Transparent University of Central Florida FL
Media Colorado School of Mines CO
MURI Topic 15: Superconducting Semiconductors
Quantum Preservation, Simulation University of Pittsburgh Jeremy Levy PA
& Transfer in Oxide University of California, Santa Barbara CA
Nanostructures University of Wisconsin, Madison WI
AFOSR
Cornell University NY
Michigan State University MI
MURI Topic 16: Human-Machine Adversarial Networks
1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.
5. AFOSR Multi-Layers and Multi-Resolution University of Illinois, Urbana-Champaign Tamar Basar Il
Networks of Interacting Agents in Georgia Institute of Technology GA
Adversarial Environments Stanford University CA
University of California, Berkeley CA
University of Maryland, College Park MD
MURI Topic 17: Biologically-Engineering of Adherent / Spectroscopically Interrogated Microstructures
AFOSR Bio-enabled Particle Adherents for Georgia Institute of Technology C. Meredith GA
Interrogated Spectroscopy University of Arizona AZ
University of California, San Diego CA
Norfolk State University VA
MURI Topic 18: Control of Information Collection and Fusion
AFOSR Control Science for Next University of Pennsylvania Daniel Koditschek PA
Generation Sensing University of California, Berkeley CA
University of Minnesota MN
University of Melbourne (Australia)2
MURI Topic 19: Stable Metrics for Global Inference in Social Networks to Predict Collective Behavior
AFOSR Inferring Structure and Forecasting University of California, Los Angeles P. Jeffrey CA
Dynamics on Evolving Networks University of Arizona Brantingham AZ
University of Southern California CA
University of California, Santa Barbara CA
University of California, Irvine CA
Claremont Graduate University CA
MURI Topic 20: Solid State Cooling
AFOSR Cryogenic Peltier Cooling Ohio State University Joseph P. Heremans OH
Princeton University NJ
Massachusetts Institute of Technology MA
Michigan State University MI
Boston College MA
California Institute of Technology CA
1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.
6. Aarhus University (Denmark)2
Kharkov Stat Polytechnic U (Ukraine)2
Dresden (Germany)2
University of Science and Technology (Poland)2
MURI Topic 21: Neuronal Behavior in Primary Blast
ARO Blast Induced Thresholds for University of Pennsylvania David F. Meany PA
Neuronal Networks Columbia University NY
Duke University NC
MURI Topic 22: Identifying and Extracting the Mathematical Signatures of Prokaryotic Activity in DNA: Developing a Theoretical
Foundation for Predicting DNA Stability
ARO Prokaryotic Genomic Instability Indiana University Pat Foster IN
University of Southern California CA
MURI Topic 23: Tomography of Social Networks of Asymmetric Adversaries
ARO Measuring, Understanding, and Harvard University Patrick J. Wolfe MA
Responding to Covert Social Princeton University NJ
Networks Massachusetts Institute of Technology MA
University of Florida FL
Northeastern University MA
MURI Topic 24: Adaptive Perception and Autonomous Agility in Severe Environments
ARO Neuro-Inspired Adaptive Georgia Institute of Technology Panagiotis Tsiotras GA
Perception and Control for Agile Massachusetts Institute of Technology MA
Mobility of Autonomous Vehicles University of Southern California CA
in Uncertain and Hostile
Environments
MURI Topic 25: Structured Modeling for Low-Density Languages
ARO An Omnivorous Framework for Carnegie Mellon University Jaime Carbonell PA
Translation and Analysis of Low University of Southern California CA
Density Languages University of Texas, Austin TX
Massachusetts Institute of Technology MA
1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.
7. MURI Topic 26: Directed Self-Assembly of Reconfigurable Materials
ARO Reconfigurable Matter form University of Michigan Sharon Glotzer MI
Programmable Colloids University of Illinois, Urbana-Champaign IL
New York University NY
MURI Topic 27: “Atomtronics”: A generalized electronics
ARO Atomtronics: Material and Device University of Maryland, College Park Ian Spielman MD
Physics of Quantum Gases Harvard University MA
Bucknell University PA
Massachusetts Institute of Technology MA
MURI Topic 28: Bio-Electronic Templates for Interfacing to the Nanoscale
ARO Near and Far-Field Interfaces to University of California, Irvine Peter Burke CA
DNA-Guided Nanostructures from Texas A&M TX
RF to Lightwave: Exploiting the New York University-POLY NY
Spectrum University of Michigan MI
University of California, Irvine CA
New York University NY
University of Pennsylvania PA
Marshall University WV
Yale University CT
Wright State University OH
MURI Topic 29: Ion Transport in Complex Heterogeneous Organic Materials
ARO An Integrated Multi-Scale Colorado School of Mines Andrew Herring CO
Approach for Understanding Ion University of Chicago IL
Transport in Complex University of Massachusetts, Amherst MA
Heterogeneous Organic Materials University of California, Riverside CA
MURI Topic 30: Defect Reduction in Superlattice Materials
ARO Fundamental Study of Defects and University of Illinois, Urbana-Champaign Shun Lien Chuang IL
their Reduction in Type-II Arizona State University AZ
Superlattice Materials Georgia Institute of Technology GA
University of North Carolina, Charlotte NC
1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.
8. 1. Team member institutions are those included in the lead institution’s research proposal. They are subject to change at the discretion of the
lead institution (e.g., if the final negotiated amount of the award is less than the amount proposed).
2. A non-US team member institution is identified in the lead institution's proposal. No MURI funding will be provided to the non-US institution.