Completed Problems
Stanford University – Spring 2018
Social Media for Recruiting, D.C. Air National Guard
Vehicle Immobilization, ERDC
Commander's Knowledge Management, USF Korea
Power, Air Force Research Lab
Non-Instrusive Load Monitoring, Department of Energy
BYOD in the DoD, NAVSUP
Indoor Transport of Missile Systems, Air Force Nuclear Weapons Center
Protecting Energy-Related Data, A.F. Office of Energy Assurance (OEA)
OBC Imagery, 9th ISR Wing
Building Survivability During Military Operations, ERDC
Finding Life Beyond Earth, NASA
Protocol Analysis, National Security Agency
e-Acquisitions, Defense Acquisitions University
Simplifying Recommendations, Army Research Lab
University of Southern California – Spring 2018
Emergency Patient Redistribution, 18AF
Minerva's Owl, ARCYBER
Resilient Installations, ERDC
Hacking Radicalization, State Department
Preventing and Predicting Cyber Threats, A.F. Office of Energy Assurance (OEA)
University of Southern Mississippi – Spring 2018
Pilot Scheduling, AMW
Hydration, Air Force Research Lab
Rapidly Deployable Protection, ERDC
Gamification, ERDC
Long-Range Camera, Army Research Lab
Obscuring Electromagnetic Signatures, Asymmetric Warfare Group
James Madison University – Spring 2018
Tracking Fliers and Carry-Ons, Department of Homeland Security
Standoff Battery Drain, JIDO
Fast Flight Records, 60 AMW
Unwanted Attached Device Detect, JIDO
Preventing Forced Labor, State Department
Device Recall Tracking, USAMMA
Automating Astrobiology Discovery, NASA
Rochester Institute of Technology – Spring 2018
Detecting Bombs in Laptops, Department of Homeland Security
Protecting Air Traffic Management Systems, NASA
VA/AR Repairs, 60 AMC
Occupancy Pattern Recognition, Department of Energy
Leveraging Neuroscience, Army Research Lab
Failing Infrastructure on DoD Installations, A.F. Office of Energy Assurance (OEA)
Remote Stopping of VBIED, JIDO
Johns Hopkins University – Spring 2018
Personal Signature Reduction, Air Force Research Lab
Publicly Available Information for Speedy Deployment, NATO
Energy Storage Integration, A.F. Office of Energy Assurance (OEA)
Cyber Indications of Strategic Warning, Defense Intelligence Agency
Employing Counter Drones, D.C. National Guard
University of Colorado, Boulder – Spring 2018
Over the Horizon Scouting, 3rd Fleet
SubT Awareness, Asymmetric Warfare Group
Drone Detection, SOFWERX
Protecting IoT Devices, National Security Agency
OBAC Data Fusion, Space and Missile Command
University of Pittsburgh – Spring 2018
Detecting WMD, USF-Korea
Community Resilience, OEA
Enabling Information Sharing despite Geographical Distance, Army Research Lab
DC Consortium (Georgetown, GW, George Mason, Howard) – Spring 2018
Data-Mining Social media, MCWL
Prevent Security Force Abuses, State Department
University of Southern Mississippi – Summer 2017
Dragon Army– Engagement through Gaming, Army Cyber Command
Marine Corps Logistics Mobile Applications, HQMC
Future Marine Corps Autonomous Cargo Systems, US Marine Corps
Associating IP Addresses with Malicious Activity, National Security Administration
Stanford University – Spring 2017
Data for Effective Navy Seal Training, Navy Special Warfare Center
Knowledge Management for Analysts, Central Intelligence Agency (CIA)
Lifelong Independence Solutions for Veterans with Complex Injuries,
Veterans Administration (VA)Detection and Monitoring of Illicit Maritime Activities, US Southern Command (SOUTHCOM)
Robotic Telesurgery, Army Medical Research and Material Command
Developing Cybersecurty Standards for Strategic Seaports,
US Transportation Command (TRANSCOM)Semi-Autonomous Stand-Off Detection, Joint Improvised Threat Defeat Agency (JIDO)
Georgetown University – Spring 2017
Augmented Reality for Facial Recognition, Joint Improvised Threat Defeat Agency (JIDO)
Understanding Social Media / Information Warfare, Asymmetric Warfare Group (AWG)
Detecting Aerial Based Threats, Asymmetric Warfare Group (AWG)
Tactical One-Way Cross Domain Solution (CDS), Special Operations Command (SOCOM)
James Madison University – Spring 2017
Humanitarian Assistance / Disaster Relief Mobile & Web Based Applications,
Cybersecurity National Action Plan (CNAP) Acting Force OrganizationUAS Hard Kill Challenge, Joint Improvised Threat Defeat Organization (JIDO)
Digital Overlay, Asymmetric Warfare Group (AWG)
Deep Clearance Situational Awareness, 75th Ranger Regiment
Social Media for the Connected "Customer Development" Culture at USSOCOM,Special Operations Command (SOCOM)
Drone Defense System– Detect, Identify, Track, & Counter,
Air Force Nuclear Weapons Center
University of Pittsburgh – Spring 2017
Big Crypto for Little Things, National Security Agency (NSA)
Light Tactical All-terrain Vehicle (LTATV) Crew Augmentation,
Special Operations Command (SOCOM)Modern Day Minutemen, Army Cyber Command
Technology Threat Prediction– DELPHI, Joint Improvised Threat Defeat Organization (JIDO)
Boise State University – Spring 2017
Human ID with Radio Frequency Emitters, Special Operations Command (SOCOM)