Special Coverage

Transducer-Actuator Systems for On-Machine Measurements and Automatic Part Alignment
Wide-Area Surveillance Using HD LWIR Uncooled Sensors
Heavy Lift Wing in Ground (WIG) Cargo Flying Boat
Technique Provides Security for Multi-Robot Systems
Bringing New Vision to Laser Material Processing Systems
NASA Tests Lasers’ Ability to Transmit Data from Space
Converting from Hydraulic Cylinders to Electric Actuators
Automating Optimization and Design Tasks Across Disciplines
Vibration Tables Shake Up Aerospace and Car Testing
Supercomputer Cooling System Uses Refrigerant to Replace Water

Software Improves Medication Adherence for Heart Stent Patients

MyIDEA (My Interventional Drug-Eluting Stent Education App) software was developed by researchers at the University of Illinois at Chicago (UIC) who study data-simplification to improve clinical outcomes. The tablet computer application helps heart patients with drug-eluting stents take their medications correctly.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Cardiovascular system, Medical equipment and supplies, Education, Education and training, Pharmaceuticals
Read More >>

Launch Trajectory Acquisition System (LTAS) Simulator

The objective of the LTAS Simulator application is to transmit one or more streams of simulated LTAS data frames in User Datagram Protocol (UDP) packets to the network. Each LTAS data frame is filled with simulated data values, with each data field determined using several methods: 1) constant value from the user’s input via a graphical user interface (GUI), 2) internal generated counter from a start value, 3) internally generated random value using uniform probability that is set by the user, and 4) internally generated modified value using uniform probability that is set by the user.

Posted in: Briefs, Software, Trajectory control, Computer simulation, Spacecraft guidance, Spacecraft guidance, Human machine interface (HMI), Displays, Displays
Read More >>

Inductive Monitoring System Graphical User Interface (IMS GUI) for Processing, Analyzing, and Cleaning Datasets

The Inductive Monitoring System (IMS) software uses data mining techniques to automatically characterize nominal system operation by analyzing archived system data. These nominal characterizations are then used to perform near-realtime system health monitoring or analyze archived system data to detect anomalies in system behavior as compared with previous nominal behavior. To operate most effectively for system monitoring, the archived system data used to build the system models for IMS should contain only nominal operations data. Most available data sets contain contaminated data, data transients, or other data that does not represent nominal operations. Finding and removing these undesirable off-nominal data points manually is an error-prone and time-consuming task. Along with a variety of data extraction and program controls, the IMS graphical user interface (IMS GUI) allows the user to visually examine results of IMS monitoring analyses, and graphically select segments of data and outlier data points using a mouse or similar input device. The GUI will then automatically process the candidate dataset to remove undesired data points, leaving a clean dataset containing nominal data to use for building IMS system monitoring models.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Human machine interface (HMI), Displays, Displays, Vehicle health management, Data management, Reliability, Reliability
Read More >>

Computer Models Could Help Design Physical Therapy Regimens

After a stroke, patients typically have trouble walking, and few are able to regain the gait they had before suffering a stroke. Researchers funded by the National Institute of Biomedical Imaging and Bioengineering (NIBIB) in Bethesda, MD have developed a computational walking model that could help guide patients to their best possible recovery after a stroke.

Posted in: Briefs, Software, Computer simulation, Mathematical models, Kinematics, Medical equipment and supplies, Biomechanics
Read More >>

DO-178C Best Practices For Engineers & Managers

Practice: We’ve all engaged in it: piano, math, golf, flying… Usually practice involves a modicum of coaching, self-help and repetition. In avionics development, however, there is little time for practice; instead, everything counts. And the result has little margin for error: Schedules, budgets and particularly safety are all on the line. How then can “practice” be reconciled with “avionics development”? The best answer is to understand the breadth of worldwide development and glean the best knowledge and solutions from the aviation ecosystem. Welcome to DO-178C Best Practices.

Posted in: White Papers, Aerospace, Aviation, Software
Read More >>

Maxwell Time Decomposition Method Accelerates Simulation of Transient Electromagnetic Fields with Intel® Xeon® Processor E5-2697 v4

ANSYS teamed with INTEL to benchmark a new ANSYS Maxwell technology that delivers dramatic speed improvement for transient electromagnetic field simulations. Simulations that previously required weeks of computation time are now completed in a matter of hours. The key software technology is a new algorithm within Maxwell that allows engineers to solve time steps simultaneously as opposed to sequentially.

Posted in: White Papers, Software
Read More >>

Addressing Security Vulnerabilities at the Source

A Guide to Using Static Source Code Analysis to Develop More Secure Embedded Software

Many embedded developers underestimate how vulnerable embedded devices are to cyber-attacks. When security issues do occur, organizations often respond by addressing the symptoms of poor security rather than the root causes.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

How IoT is Making Security Imperative for All Embedded Software

Why embedded software development needs to change and what organizations can do to improve software security while reducing development time

Many IoT products lack proper security due to outdated software development practices. Hackers and criminals are acutely aware that many of the security procedures and applications in use today were designed to defend against attacks in the PC era – not current IoT threat vectors. Security isn't a product "add-on" or feature; it must be built in. Learn about the unique challenges of securing embedded applications and how to deploy processes and tools to deliver more secure products faster.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

Developing Secure Embedded Software: Quality Doesn't Equal Security

Most organization put considerable focus on software quality, but software security is different. Embedded development presents the challenge of coding in a language that’s inherently insecure; and quality assurance does little to ensure security.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

An introduction to applying CWE coding guidelines and achieving CERT security compliance using static analysis tools

Many embedded systems and "connected” IoT products lack proper security due to outdated software development practices. Organizations now know they need to incorporate security into the software SDLC, yet many lack security expertise and are struggling with how to implement best practices.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.