Sound Lab (SLAB) Version 5

Interest in the simulation of acoustic environments has prompted a number of technology development efforts over the years for applications such as auralization of concert halls and listening rooms, spatial information displays in aviation, virtual reality, and better sound effects for video games. Each of these applications implies different task requirements that require different approaches in the development of rendering software and hardware.

Posted in: Briefs, Software, Optimization, Architecture, Computer software / hardware, Computer software and hardware, Architecture, Computer software / hardware, Computer software and hardware, Systems engineering, Acoustics, Sound quality, Acoustics, Sound quality
Read More >>

CornerStone Knowledge Acquisition and Synthesis Framework

In general, and especially in the “big data” era, there is often a failure to collect sufficient data about the data (metadata). This lack of metadata drastically reduces the potential use of the data, and the attempt to rectify this situation after the fact is often difficult, if not impossible. The necessary metadata must first be located, and then organized and associated with the data. Often those who know about the metadata are no longer available. The proposed alternative is to prepare the data for long-term preservation based on currently accepted best-practices for long-term digital archives. This means that both the data and the metadata are simultaneously collected and prepared for the archive. This methodology provides the best chance that the necessary metadata will be available for future analysis, and ensures use of the data being collected and preserved.

Posted in: Briefs, Software
Read More >>

Middle-Out Graph Analytics

Graph analytics is a way of facilitating guided graph exploration through visual and interactive means. Unlike many graph visualization research efforts that focus predominantly on layout algorithms and rendering techniques, graph analytics research strives to provide an engaging interactive journey that bridges the gap from data to information to knowledge. Graph visualization still plays an important role in building this analytical journey, as do database querying, graph mining, interactive interrogation, human judgment, and senses.

Posted in: Briefs, Software
Read More >>

NetEgg: Automated Code Generation for Software-Defined Networks

Software-Defined Networking (SDN) usually requires network administrators to be skilled in programming languages such as C++, Python, or Ruby. Many IT operators tasked with installing routers or other network components may lack the skills to program SDN equipment. Due to a shortage of trained staff, implementing SDN across an entire enterprise can become very time-consuming and costly.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Human factors, Education, Education and training, Automation, Productivity
Read More >>

Robust Method for Data Protection and Change Detection

Methods exist for processing an original data sequence in order to generate information about the data for the purposes of integrity measurement, ownership demonstration, and authentication. The first category is digital watermarking, the second is data hashing, and the third is error detection coding. In the present context, watermarking is often used for ownership demonstration and authentication purposes; data hashing is often used for integrity measurement purposes; and as with data hashing, error detection coding is used to measure data integrity. However, the latter is normally done as part of data transmission protocol, and therefore addresses transmission errors rather than tampering.

Posted in: Briefs, Software, Finite element analysis, Computer software / hardware, Computer software and hardware, Cyber security, Computer software / hardware, Computer software and hardware, Cyber security, Data management, Identification
Read More >>

Developing Safety-Critical System & Software Requirements

Requirements: The foundation of every safety-critical system. But as systems complexity expands and product development schedules compress, the foundation must support them. Guest presenter Vance Hilderman, CEO of safety-critical systems and software engineering consultancy AFuzion, explains how to build, maintain and reuse a rock-solid requirements foundation.

Posted in: On-Demand Webinars, Software
Read More >>

Uncertainty Quantification and Management in Digital Engineering

This Webinar illustrates applications of Uncertainty Quantification (UQ) techniques that will be necessary for full implementation of model-based digital engineering. The role of UQ techniques and software, such as SmartUQ, in end-to-end system models, reduced order modeling and probabilistic analysis, the creation of an authoritative digital surrogate “truth source”, and the creation of uncertainty budgets will be discussed.

Posted in: On-Demand Webinars, Software
Read More >>

New Software Spots Eye Contact

Did you see? New software developed at Saarland University turns any camera into an eye-contact detector. Why is it so valuable to identify eye contact? We spoke with the inventor about new kinds of applications enabled by the technology.

Posted in: News, Cameras, Imaging, Software
Read More >>

High-Speed Network Protocol for Faster, More Reliable Emergency Response

Anew network protocol — the Multi Node Label Routing (MNLR) protocol — was developed to improve the information flow between emergency responders at the scene of an incident and decision-makers at the office of emergency management.

Posted in: Briefs, Software, Communication protocols, Communication protocols, Disaster and emergency management, Emergency management, Hazards and emergency management, Hazards and emergency operations
Read More >>

Custom Administration Reporting (gTracker)

A reporting tool was needed that could indicate the accuracy of search results by tracking the number of clicks required by users to find their desired search results. The application should also capture the number of times other links and like filtering components are clicked. The report should have the ability to display a specific date range. The application is configured to allow multiple interfaces to utilize the service, and can provide statistics per interface or across all interfaces for a consolidated view of search user behavior metrics.

Posted in: Briefs, Software, Big data, Data acquisition and handling, Internet, Big data, Data acquisition and handling, Internet
Read More >>

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.