Software Suite for Identifying Suspicious Individuals

It can be very useful to know about activities among individuals; for example, which individuals are associated with other individuals? When two or more individuals get together, is there an intended purpose? Who are the leaders or important individuals of a group? What is the organizational structure of the group? It can prove useful to have the capability to actually model the above types of interactions and associations. To an extent, this type of social research has been addressed by employing the disciplines of data mining and community generation.

Posted in: Briefs, Software, Big data, Computer software / hardware, Computer software and hardware, Security systems, Big data, Computer software / hardware, Computer software and hardware, Security systems, Identification
Read More >>

Optimized Route Finding for Air and Ground Vehicles

This software provides near-real-time potential, and offers collision and adverse weather avoidance.

The Automated Impacts Routing (AIR) software is advanced route finding technology for air and ground vehicles. The software provides users the ability to find optimized paths through airspace or ground space, taking into consideration multiple and dynamic adverse conditions that can determine mission success or failure.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Flight guidance systems, Global positioning systems, Global positioning systems (GPS), Computer software / hardware, Computer software and hardware, Flight guidance systems, Global positioning systems, Global positioning systems (GPS), Collision avoidance systems
Read More >>

Automated Transfer Function Generator

When designing or analyzing electrical systems, it is important to understand the relationship between input and output. Power conversion occurs in a “black box,” and transfer functions can be used to provide a better understanding of the processes occurring in this black box. Although they provide a useful analysis tool, transfer functions are not often utilized because they require complicated, time-consuming derivation that ignores nonlinear behavior common in real-world systems.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Electrical systems, Computer software / hardware, Computer software and hardware, Electrical systems
Read More >>

Python Interface to Dual-Pol Radar Algorithms (DualPol)

This object-oriented Python module facilitates precipitation retrievals (e.g., hydrometeor type, precipitation rate, precipitation mass, particle size distribution) from polarimetric radar data. It leverages existing open-source radar software packages to perform all-in-one retrievals that are then easily visualized or saved using existing software.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Radar, Computer software / hardware, Computer software and hardware, Radar, Research and development
Read More >>

Sound Lab (SLAB) Version 5

Interest in the simulation of acoustic environments has prompted a number of technology development efforts over the years for applications such as auralization of concert halls and listening rooms, spatial information displays in aviation, virtual reality, and better sound effects for video games. Each of these applications implies different task requirements that require different approaches in the development of rendering software and hardware.

Posted in: Briefs, Software, Optimization, Architecture, Computer software / hardware, Computer software and hardware, Architecture, Computer software / hardware, Computer software and hardware, Systems engineering, Acoustics, Sound quality, Acoustics, Sound quality
Read More >>

CornerStone Knowledge Acquisition and Synthesis Framework

In general, and especially in the “big data” era, there is often a failure to collect sufficient data about the data (metadata). This lack of metadata drastically reduces the potential use of the data, and the attempt to rectify this situation after the fact is often difficult, if not impossible. The necessary metadata must first be located, and then organized and associated with the data. Often those who know about the metadata are no longer available. The proposed alternative is to prepare the data for long-term preservation based on currently accepted best-practices for long-term digital archives. This means that both the data and the metadata are simultaneously collected and prepared for the archive. This methodology provides the best chance that the necessary metadata will be available for future analysis, and ensures use of the data being collected and preserved.

Posted in: Briefs, Software
Read More >>

Middle-Out Graph Analytics

This software visually lays out trends and patterns for ease of analysis, and can be used on desktop or handheld devices.

Graph analytics is a way of facilitating guided graph exploration through visual and interactive means. Unlike many graph visualization research efforts that focus predominantly on layout algorithms and rendering techniques, graph analytics research strives to provide an engaging interactive journey that bridges the gap from data to information to knowledge. Graph visualization still plays an important role in building this analytical journey, as do database querying, graph mining, interactive interrogation, human judgment, and senses.

Posted in: Briefs, Software
Read More >>

NetEgg: Automated Code Generation for Software-Defined Networks

This software enables fast and easy network configuration.

Software-Defined Networking (SDN) usually requires network administrators to be skilled in programming languages such as C++, Python, or Ruby. Many IT operators tasked with installing routers or other network components may lack the skills to program SDN equipment. Due to a shortage of trained staff, implementing SDN across an entire enterprise can become very time-consuming and costly.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Human factors, Education, Education and training, Automation, Productivity
Read More >>

Robust Method for Data Protection and Change Detection

Methods exist for processing an original data sequence in order to generate information about the data for the purposes of integrity measurement, ownership demonstration, and authentication. The first category is digital watermarking, the second is data hashing, and the third is error detection coding. In the present context, watermarking is often used for ownership demonstration and authentication purposes; data hashing is often used for integrity measurement purposes; and as with data hashing, error detection coding is used to measure data integrity. However, the latter is normally done as part of data transmission protocol, and therefore addresses transmission errors rather than tampering.

Posted in: Briefs, Software, Finite element analysis, Computer software / hardware, Computer software and hardware, Cyber security, Computer software / hardware, Computer software and hardware, Cyber security, Data management, Identification
Read More >>

Developing Safety-Critical System & Software Requirements

Requirements: The foundation of every safety-critical system. But as systems complexity expands and product development schedules compress, the foundation must support them. Guest presenter Vance Hilderman, CEO of safety-critical systems and software engineering consultancy AFuzion, explains how to build, maintain and reuse a rock-solid requirements foundation.

Posted in: On-Demand Webinars, Software
Read More >>

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.