Designing Materials with Reprogrammable Shape and Function

Researchers from Harvard University's John A. Paulson School of Engineering and Applied Sciences (SEAS) and the Wyss Institute of Biologically Inspired Engineering have developed a general framework for designing reconfigurable metamaterials — materials whose function is determined by structure, not composition.

Posted in: Briefs, Software, Research and development, Materials properties, Smart materials, Biomechanics

Designing and 3D Printing Customized Insoles for Diabetics

Insoles for diabetics have traditionally been handmade by makers of orthopedic shoes. In the future, these specialist shoemakers will be able to produce insoles more cost effectively using new software and 3D printers.

Posted in: Briefs, Software, Diseases, Prostheses and implants, Additive manufacturing, Productivity

Software Improves Medication Adherence for Heart Stent Patients

MyIDEA (My Interventional Drug-Eluting Stent Education App) software was developed by researchers at the University of Illinois at Chicago (UIC) who study data-simplification to improve clinical outcomes. The tablet computer application helps heart patients with drug-eluting stents take their medications correctly.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Cardiovascular system, Medical equipment and supplies, Education, Education and training, Pharmaceuticals

Launch Trajectory Acquisition System (LTAS) Simulator

The objective of the LTAS Simulator application is to transmit one or more streams of simulated LTAS data frames in User Datagram Protocol (UDP) packets to the network. Each LTAS data frame is filled with simulated data values, with each data field determined using several methods: 1) constant value from the user’s input via a graphical user interface (GUI), 2) internal generated counter from a start value, 3) internally generated random value using uniform probability that is set by the user, and 4) internally generated modified value using uniform probability that is set by the user.

Posted in: Briefs, Software, Trajectory control, Computer simulation, Spacecraft guidance, Spacecraft guidance, Human machine interface (HMI), Displays, Displays

Inductive Monitoring System Graphical User Interface (IMS GUI) for Processing, Analyzing, and Cleaning Datasets

The Inductive Monitoring System (IMS) software uses data mining techniques to automatically characterize nominal system operation by analyzing archived system data. These nominal characterizations are then used to perform near-realtime system health monitoring or analyze archived system data to detect anomalies in system behavior as compared with previous nominal behavior. To operate most effectively for system monitoring, the archived system data used to build the system models for IMS should contain only nominal operations data. Most available data sets contain contaminated data, data transients, or other data that does not represent nominal operations. Finding and removing these undesirable off-nominal data points manually is an error-prone and time-consuming task. Along with a variety of data extraction and program controls, the IMS graphical user interface (IMS GUI) allows the user to visually examine results of IMS monitoring analyses, and graphically select segments of data and outlier data points using a mouse or similar input device. The GUI will then automatically process the candidate dataset to remove undesired data points, leaving a clean dataset containing nominal data to use for building IMS system monitoring models.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Human machine interface (HMI), Displays, Displays, Vehicle health management, Data management, Reliability, Reliability

Computer Models Could Help Design Physical Therapy Regimens

After a stroke, patients typically have trouble walking, and few are able to regain the gait they had before suffering a stroke. Researchers funded by the National Institute of Biomedical Imaging and Bioengineering (NIBIB) in Bethesda, MD have developed a computational walking model that could help guide patients to their best possible recovery after a stroke.

Posted in: Briefs, Software, Computer simulation, Mathematical models, Kinematics, Medical equipment and supplies, Biomechanics

DO-178C Best Practices For Engineers & Managers

Practice: We’ve all engaged in it: piano, math, golf, flying… Usually practice involves a modicum of coaching, self-help and repetition. In avionics development, however, there is little time for practice; instead, everything counts. And the result has little margin for error: Schedules, budgets and particularly safety are all on the line. How then can “practice” be reconciled with “avionics development”? The best answer is to understand the breadth of worldwide development and glean the best knowledge and solutions from the aviation ecosystem. Welcome to DO-178C Best Practices.

Posted in: White Papers, Aerospace, Aviation, Software

Maxwell Time Decomposition Method Accelerates Simulation of Transient Electromagnetic Fields with Intel® Xeon® Processor E5-2697 v4

ANSYS teamed with INTEL to benchmark a new ANSYS Maxwell technology that delivers dramatic speed improvement for transient electromagnetic field simulations. Simulations that previously required weeks of computation time are now completed in a matter of hours. The key software technology is a new algorithm within Maxwell that allows engineers to solve time steps simultaneously as opposed to sequentially.

Posted in: White Papers, Software

Addressing Security Vulnerabilities at the Source

A Guide to Using Static Source Code Analysis to Develop More Secure Embedded Software

Many embedded developers underestimate how vulnerable embedded devices are to cyber-attacks. When security issues do occur, organizations often respond by addressing the symptoms of poor security rather than the root causes.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software

How IoT is Making Security Imperative for All Embedded Software

Why embedded software development needs to change and what organizations can do to improve software security while reducing development time

Many IoT products lack proper security due to outdated software development practices. Hackers and criminals are acutely aware that many of the security procedures and applications in use today were designed to defend against attacks in the PC era – not current IoT threat vectors. Security isn't a product "add-on" or feature; it must be built in. Learn about the unique challenges of securing embedded applications and how to deploy processes and tools to deliver more secure products faster.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.