Special Coverage

Home

Prototype Genomics-Based Keyed-Hash Message Authentication Code Protocol

This is targeted for applications without an available public key infrastructure. Goddard Space Flight Center, Greenbelt, Maryland Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A DNA-inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile ad-hoc networks. It is targeted for applications without an available public key infrastructure. Ad-hoc does not mean the users are completely unknown to each other. They could be part of a military unit, police, emergency workers, mobile vendors, or any collection of users in a common geographical area that wish to communicate in a region lacking a PKI (Public Key Infrastructure).

Posted in: Briefs, TSP, Electronics & Computers

Read More >>

Station Spacewalk

Ames Research Center, Moffett Field, California The Station Spacewalk game enables players to virtually conduct NASA repair work on the International Space Station, including jobs critical to help power up the space station so it can continue to operate. Players are provided with a limited quantity of oxygen during which they must complete extravehicular activities (EVAs) and return to the airlock before the air supply runs out.

Posted in: Briefs, Electronics & Computers

Read More >>

NASA's Hot 100 Technologies: Information Technology & Software

Enhanced Project Management Tool This invention is a system for managing a project that includes multiple tasks and workers. Periodic monthly, task plan, schedule, and budget reports are generated and made available for display or further analysis. When the system receives a description of a skill set needed for a project, the skill set module is queried. The name and relevant skill(s) possessed by each worker is displayed in a visually perceptible format.

Posted in: Articles, Techs for License, Electronics & Computers

Read More >>

Industrial Computed Tomography Inspects Parts in 3D

This nondestructive testing method can quickly inspect parts in 3D while maintaining very high accuracy. Jesse Garant & Associates Inc., Windsor, Ontario, Canada Avery important stage in the manufacturing and production cycle of a part is designing and verifying a prototype. Very often in the medical, automotive, or aerospace industries, very expensive and valuable parts are cut open to locate internal failures or to retrieve internal measurements. Such parts are left destroyed and can no longer be functional after the testing process.

Posted in: Briefs, Electronics & Computers, Data Acquisition

Read More >>

System Health Monitoring Software Learns System Behavior from Data

The new techniques provide faster response and require less computer memory. Ames Research Center, Moffett Field, California The Inductive Monitoring System (IMS) software tool uses data mining techniques to automatically characterize nominal system operation by analyzing archived system data. These nominal characterizations are then used to perform near-real-time system health monitoring or to analyze archived system data to detect anomalies in system behavior as compared with previous nominal behavior.

Posted in: Briefs, Electronics & Computers, Data Acquisition

Read More >>

Detecting High Stress in Oral Interviews and Text Documents

Content of an interview or text is subjected to various levels of statistical analysis to determine if the person knows the truth and is communicating it. Ames Research Center, Moffett Field, California When a person is interviewed, some of the answers may be inaccurate, or even deceptive, because the person may have either incomplete information, is telling only part of the truth, or is fabricating a false answer, or a combination of all three. When the person is habitually making statements that are known to be false, or only partly true, emotional and/or intellectual conflicts often arise within them, and these conflicts may become manifest by inconsistencies in use of different parts of speech or in logical relationships between statements. These inconsistencies are more subtle than inconsistencies in factual statements, and identification of these inconsistencies is more difficult and less straightforward than identification of factual inconsistencies.

Posted in: Briefs, TSP, Electronics & Computers, Data Acquisition

Read More >>

Titan Lake and Shore Sampler

The device is suitable for cryogenic dispensing of fluids, and for cryocoolers. NASA’s Jet Propulsion Laboratory, Pasadena, California A lake and shore sampling and sample distribution system was developed for a Titan lake environment (93.7 K, in liquid hydrocarbons). The Titan Lake and Shore Sampler (TLASS) would enable the chemical analysis of hydrocarbon lake samples via a Dual Rectilinear Ion and Orbitrap Mass Spectrometer and Nuclear Magnetic Resonance (NMR) Spectrometry.

Posted in: Briefs, TSP, Electronics & Computers, Data Acquisition

Read More >>