Knowledge Library


The knowledge that you need for familiarization is here.

Let us know if there is anything else we can get for you.

We will provide it free of charge.


articlesNews Blog

Our Focus

We invent, build, and deploy intelligent agent systems that create a competitive advantage for our customers.

We help the Department of Defense (DOD) use Artificial Intelligence to create differentiated systems from those of our adversaries.

We work with our customers to define custom strategies to use artificial intelligence in the most effectvive manner for the DOD. 

Click on the buttons below to go to a specific area of focus:


Artificial Intelligence Technology

is the foundation upon which we build our systems. 

Intelligent System Business Design

Profitability support business objectives and create value in process improvements, innovation, or new paradigm.

Security and Risk Management

are crucial to success in any deployment of products and services.

knowledge library

AI Technology


The articles and white papers provided below explain how we use AI Technology in the field to help keep our war fighters safe.

Scroll down and click on the pictures or corresponding links below.

Courtesy of Army Research Laboratory

By Norbou Buchler, Laura Marusich, Jonathan Z. Bakdash, Stacey Sokoloff, and Robert Hamm

The Warfighter Associate: Objective and Automated Metrics for Mission Command

The Warfighter Associate Agent (WAA)  improves an operators abilities to find the “best” solution to a problem based on currently available information The Agent supports the user if a different course of action is chosen. WAA is a knowledge-based system that is designed to work in conjunction with a human operator. WAA assesses the state of the world and the activities and objectives of the operator, it can, within the bounds of its authority, carry out activities on behalf of the user, make the user aware of events particularly relevant to his activities, and manage the information content of the user’s displays resulting in the best possible performance.

Click here to read the full paper.

(U) Improved Fusion Algorithm System

The objective of the Improved Fusion Algorithm System (IFAS) technology demonstration program is to develop advanced stochastic risk assessment technologies for information fusion in Associate Systems. The program is in Phase II of am OSD SBIR and has developed approaches for detecting and localizing OPFOR Tactics, Techniques and Procedures (TTPs) such as IED emplacement, VBIED emplacement, Ambush and Complex Attacks. IFAS fuses data from several sources including GMTI, GMTI MASINT, text reports and chat room conversations. IFAS demonstration systems have successfully yielded quantified risk assessment fusion that was both transparent and understandable for the operator.

Click here to read the full paper – June 2016

John Merrihew & Thomas Bevan, Ph.D. 

Adaptive Distributed Aviation Asset Optimization for Operational Effectiveness (Phase II)

The paper describes the use of an Intelligent Decision-aiding Agent (IDA) associate for management of distributed aviation assets during warfighter net-centric operations. VELOXITI, Inc. (formerly Applied Systems Intelligence, Inc.), is collaborating with government personnel to demonstrate and evaluate a Situational Awareness Fusion Enhancement (SAFE) Aid in a manin-the-loop experimentation environment as part of an Aviation Development Directorate – Applied Aviation Technology Directorate (ADD-AATD)

Click here to read the full article.

John Merihew, Larry Lafferty, Charles M. Shepard

VELOXITI has released a new whitepaper for review. This document focuses on a unified approach to uilding and managing Network Operating Environments within the context of tactical missions and other warfighting functions.

Melinda Gresham, Josip Pilipovic – US Army

Eric Drucker, Larry Lafferty – Veloxiti, Inc. 

S-6 Associate

Abstract—A data fusion software capability called the S-6 Associate is being developed at Aberdeen Proving Ground inside the Space and Terrestrial Communications Directorate at the Communications-Electronics Research, Development and Engineering Center. This intelligent cognitive software will assist the battalion (BN) S-6 and his staff manage complex tactical communications networks while increasing the networks’ agility, efficiency, and responsiveness, whether a unit is stationary or on the move. This intelligent tool leverages proven technology to help soldiers manage existing network resources more efficiently, including soldiers without in-depth network administration skills. Once fielded, the S-6 Associate will enable battalions to build a Network Common Operating Picture (N-COP) and perform NetOPS monitoring and management under conditions of rapid changes in tactical movement. In addition, it will cooperate with WIN-T NMS to ensure communications from division down to company/platoon level. N-COP will allow commanders to see how bandwidth is used for mission-critical information and how network failures affect the current mission. Click here to read the full whitepaper.

Watson for the Warfighter: Decision Support Software for the Battle Command Staff

Abstract— This paper discusses an application of Associate Technology, presently the Warfighter Associate (WA), to improve the warfighter’s abilities in developing situation awareness, collaboration, and decision making, resulting in increased staff performance, as part of the Tactical Human Integration of Networked Knowledge (THINK) initiative. Associates are agentbased decision aids that assist human operators in complex tasks requiring a high cognitive workload.

Click here to read the full whitepaper.

The S-6 Associate software developed by CERDEC S&TCD aims to simplify building and monitoring the tactical network, diagnosing and addressing problems and ensuring each Soldier remains connected during critical moments. 

Photo Credit: Spc. Nathan Goodall

Signal Soldier “Associate” Provides Real-Time Network Diagnostics

VELOXITI’s further work with CERDEC on intelligent associates is highlighed in an article here on the U.S. Army site.

ABERDEEN PROVING GROUND, Md. (Sept. 19, 2013) — As the number of electronic devices on the battlefield grows, so does the challenge of managing the network that links them together. Army researchers continue to work to create a better way to build and monitor the tactical network, diagnose and address problems, and ensure each Soldier remains connected during critical moments. 

Engineers from the U.S. Army Research, Development and Engineering Command’s communications-electronics center, or CERDEC, are developing software called S-6 Associate that will consolidate existing information, simplify network monitoring and better equip the network operations staff officer, commonly known as the S-6. 

AI would be used for tasks like analyzing drone footage.

Courtesy of Quartz – 

By Dave Gershgorn & Justin Rohrlich 

These companies are pitching AI to the US military

Of the 42 businesses interested in attending the event, six are owned by veterans, according to the contracting documents. John Merrihew, VP government solutions at AI contractor Veloxiti, says his military experience puts him in a different category of tech company than Silicon Valley.

“I’m an Army retiree after 24 years and a half-dozen combat tours, so I have an obligation to [provide this technology],” Merrihew told Quartz. “I’m not a guy out on the west coast who’s made a lot of money like Google. All of my engineers have security clearances, so we’re pretty bought in on trying to help the military in this area.”

Click here to read the full article.

knowledge library

Intelligent System Business Design


The articles provided below explain the use of Intelligent Agents.

Scroll down and click on the pictures below to read the full article.

SPE 124926

Real Time Diagnostics of Gas Lift Systems Using Intelligent Agents: A Case Study
G. Stephenson, SPE, Occidental Petroleum Corporation; R. Molotkov, SPE, Weatherford; N. De Guzman, SPE
and L. Lafferty, SPE, Intelligent Agents Corporation

SPE 150285

Decision Support and Workflow Automation for the Development and Management of Hydrocarbon Assets Using Multi-Agent Systems
Amr S. El-Bakry, SPE, Michael C. Romer, SPE, ExxonMobil Production Company; Peng Xu, Anantha Sundaram, and Adam K. Usadi, ExxonMobil Research and Engineering; H. Lane Morehead, SPE, ExxonMobil Upstream Research; Mark L. Crawford, SPE, Bryce A. Holloway, and Charles A. Knight, ExxonMobil Information Technology

knowledge library

Security & Risk


Scroll down and click on the pictures or corresponding links below.

Unrestricted Warfare

Written by two Colonels in the Chinese Military-PLA- in 1998 and describes how China can defeat a technologically superior opponent through a variety of means rather than through direct military confrontation.

Mandiant APT1 Report

The Chinese government has sponsored long term campaigns of cyber espionage – Advanced Persistent – campaigns against US Industries and that it continues to carry out these attacks from organizations based in China.

SANs 20

The Council is committed to the ongoing development, support, and adoption of the Critical Controls; to elevating the competencies of the cybersecurity workforce; and to the development of policies that lead to measurable improvements in our ability to operate safely, securely and reliably in cyberspace.

Privacy & Content Disclaimer

This site includes links to information created by other public and private organizations. These links are provided for the user’s convenience. Veloxiti does not control or guarantee the accuracy, relevance, timeliness, or completeness of this information. The inclusion of these links is not intended to reflect their importance, nor is it intended to endorse views expressed, or products or services offered. No personal information is collected unless you choose to provide that information to us via our Contact Us page. We do not give, share, sell, or transfer any personal information to a third party.