Charles River Analytics to Help MDA Develop Behavior Modeling Tech

Charles River Analytics has received a two-year contract to develop tools that will work to help Missile Defense Agency analysts model human behavior for simulation efforts.

The company said Thursday it will build and integrate human behavior modeling tools into the Modeling Operator Reasoning and Performance for Human-in-Control Simulation platform using the Hap architecture.

Charles River has used Hap to create behaviors that model cyber adversaries; intelligent tutoring algorithms; and behaviors moderated by physiological factors.

“The missile defense community relies on using models and simulations for a variety of applications such as testing, training, exercises, wargaming, and future concept analysis,” said Brad Rosenberg, vice president of decision management systems at Charles River.

Rosenberg added the company aims to address the challenge of modeling human behavior in such systems through the MORPHIC project.

Other platforms Charles River has developed for the MDA include the RAMPART game-based training system, SIMON simulation optimization engine and SNOMAN sensor network optimization software.

Check Also

John Cooney

Former ITA Official John Cooney to Lead SkyWater’s Government Engagements

John Cooney, a former official at the Department of Commerce's International Trade Administration, has joined semiconductor foundry services provider SkyWater Technology as director of U.S. government relations.

Ellen Lord

DoD Launches Pilot Programs for Software Procurement; Ellen Lord Quoted

The Department of Defense (DoD) has made continued efforts to transform software procurement across the military,  FedScoop reported Thursday. Ellen Lord, undersecretary of defense for acquisition and sustainment and four-time Wash100 Award recipient, has developed pilot programs to test the acquisition.


Analyst1 to Help DoD’s Innovation Org Develop Cyber Threat Intell Platform

Analyst1 has been selected help the Defense Innovation Unit transform cybersecurity operations through the development of an enterprise-grade technology that will work to automatically process threat intelligence data.