Special Coverage

Soft Robot “Walks” on Any Terrain
Defense Advanced Research Projects Agency
Using Microwaves to Produce High-Quality Graphene
Transducer-Actuator Systems for On-Machine Measurements and Automatic Part Alignment
Wide-Area Surveillance Using HD LWIR Uncooled Sensors
Heavy Lift Wing in Ground (WIG) Cargo Flying Boat
Technique Provides Security for Multi-Robot Systems
Bringing New Vision to Laser Material Processing Systems
NASA Tests Lasers’ Ability to Transmit Data from Space
Converting from Hydraulic Cylinders to Electric Actuators
Automating Optimization and Design Tasks Across Disciplines

Python Interface to Dual-Pol Radar Algorithms (DualPol)

This object-oriented Python module facilitates precipitation retrievals (e.g., hydrometeor type, precipitation rate, precipitation mass, particle size distribution) from polarimetric radar data. It leverages existing open-source radar software packages to perform all-in-one retrievals that are then easily visualized or saved using existing software.

Posted in: Briefs, Software

Sound Lab (SLAB) Version 5

Interest in the simulation of acoustic environments has prompted a number of technology development efforts over the years for applications such as auralization of concert halls and listening rooms, spatial information displays in aviation, virtual reality, and better sound effects for video games. Each of these applications implies different task requirements that require different approaches in the development of rendering software and hardware.

Posted in: Briefs, Software

CornerStone Knowledge Acquisition and Synthesis Framework

In general, and especially in the “big data” era, there is often a failure to collect sufficient data about the data (metadata). This lack of metadata drastically reduces the potential use of the data, and the attempt to rectify this situation after the fact is often difficult, if not impossible. The necessary metadata must first be located, and then organized and associated with the data. Often those who know about the metadata are no longer available. The proposed alternative is to prepare the data for long-term preservation based on currently accepted best-practices for long-term digital archives. This means that both the data and the metadata are simultaneously collected and prepared for the archive. This methodology provides the best chance that the necessary metadata will be available for future analysis, and ensures use of the data being collected and preserved.

Posted in: Briefs, Software

Middle-Out Graph Analytics

This software visually lays out trends and patterns for ease of analysis, and can be used on desktop or handheld devices.

Graph analytics is a way of facilitating guided graph exploration through visual and interactive means. Unlike many graph visualization research efforts that focus predominantly on layout algorithms and rendering techniques, graph analytics research strives to provide an engaging interactive journey that bridges the gap from data to information to knowledge. Graph visualization still plays an important role in building this analytical journey, as do database querying, graph mining, interactive interrogation, human judgment, and senses.

Posted in: Briefs, Software

NetEgg: Automated Code Generation for Software-Defined Networks

This software enables fast and easy network configuration.

Software-Defined Networking (SDN) usually requires network administrators to be skilled in programming languages such as C++, Python, or Ruby. Many IT operators tasked with installing routers or other network components may lack the skills to program SDN equipment. Due to a shortage of trained staff, implementing SDN across an entire enterprise can become very time-consuming and costly.

Posted in: Briefs, Software

Robust Method for Data Protection and Change Detection

Methods exist for processing an original data sequence in order to generate information about the data for the purposes of integrity measurement, ownership demonstration, and authentication. The first category is digital watermarking, the second is data hashing, and the third is error detection coding. In the present context, watermarking is often used for ownership demonstration and authentication purposes; data hashing is often used for integrity measurement purposes; and as with data hashing, error detection coding is used to measure data integrity. However, the latter is normally done as part of data transmission protocol, and therefore addresses transmission errors rather than tampering.

Posted in: Briefs, Software

Developing Safety-Critical System & Software Requirements

Requirements: The foundation of every safety-critical system. But as systems complexity expands and product development schedules compress, the foundation must support them. Guest presenter Vance Hilderman, CEO of safety-critical systems and software engineering consultancy AFuzion, explains how to build, maintain and reuse a rock-solid requirements foundation.

Posted in: On-Demand Webinars, Software

Uncertainty Quantification and Management in Digital Engineering

This Webinar illustrates applications of Uncertainty Quantification (UQ) techniques that will be necessary for full implementation of model-based digital engineering. The role of UQ techniques and software, such as SmartUQ, in end-to-end system models, reduced order modeling and probabilistic analysis, the creation of an authoritative digital surrogate “truth source”, and the creation of uncertainty budgets will be discussed.

Posted in: On-Demand Webinars, Upcoming Webinars, Software

New Software Spots Eye Contact

Did you see? New software developed at Saarland University turns any camera into an eye-contact detector. Why is it so valuable to identify eye contact? We spoke with the inventor about new kinds of applications enabled by the technology.

Posted in: News, Cameras, Imaging, Software

High-Speed Network Protocol for Faster, More Reliable Emergency Response

Anew network protocol — the Multi Node Label Routing (MNLR) protocol — was developed to improve the information flow between emergency responders at the scene of an incident and decision-makers at the office of emergency management.

Posted in: Briefs, Software, Communication protocols, Communication protocols, Disaster and emergency management, Emergency management, Hazards and emergency management, Hazards and emergency operations

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.