Inductive Monitoring System Graphical User Interface (IMS GUI) for Processing, Analyzing, and Cleaning Datasets

The Inductive Monitoring System (IMS) software uses data mining techniques to automatically characterize nominal system operation by analyzing archived system data. These nominal characterizations are then used to perform near-realtime system health monitoring or analyze archived system data to detect anomalies in system behavior as compared with previous nominal behavior. To operate most effectively for system monitoring, the archived system data used to build the system models for IMS should contain only nominal operations data. Most available data sets contain contaminated data, data transients, or other data that does not represent nominal operations. Finding and removing these undesirable off-nominal data points manually is an error-prone and time-consuming task. Along with a variety of data extraction and program controls, the IMS graphical user interface (IMS GUI) allows the user to visually examine results of IMS monitoring analyses, and graphically select segments of data and outlier data points using a mouse or similar input device. The GUI will then automatically process the candidate dataset to remove undesired data points, leaving a clean dataset containing nominal data to use for building IMS system monitoring models.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Human machine interface (HMI), Displays, Displays, Vehicle health management, Data management, Reliability, Reliability
Read More >>

Computer Models Could Help Design Physical Therapy Regimens

After a stroke, patients typically have trouble walking, and few are able to regain the gait they had before suffering a stroke. Researchers funded by the National Institute of Biomedical Imaging and Bioengineering (NIBIB) in Bethesda, MD have developed a computational walking model that could help guide patients to their best possible recovery after a stroke.

Posted in: Briefs, Software, Computer simulation, Mathematical models, Kinematics, Medical equipment and supplies, Biomechanics
Read More >>

DO-178C Best Practices For Engineers & Managers

Practice: We’ve all engaged in it: piano, math, golf, flying… Usually practice involves a modicum of coaching, self-help and repetition. In avionics development, however, there is little time for practice; instead, everything counts. And the result has little margin for error: Schedules, budgets and particularly safety are all on the line. How then can “practice” be reconciled with “avionics development”? The best answer is to understand the breadth of worldwide development and glean the best knowledge and solutions from the aviation ecosystem. Welcome to DO-178C Best Practices.

Posted in: White Papers, Aerospace, Aviation, Software
Read More >>

Maxwell Time Decomposition Method Accelerates Simulation of Transient Electromagnetic Fields with Intel® Xeon® Processor E5-2697 v4

ANSYS teamed with INTEL to benchmark a new ANSYS Maxwell technology that delivers dramatic speed improvement for transient electromagnetic field simulations. Simulations that previously required weeks of computation time are now completed in a matter of hours. The key software technology is a new algorithm within Maxwell that allows engineers to solve time steps simultaneously as opposed to sequentially.

Posted in: White Papers, Software
Read More >>

Addressing Security Vulnerabilities at the Source

Many embedded developers underestimate how vulnerable embedded devices are to cyber-attacks. When security issues do occur, organizations often respond by addressing the symptoms of poor security rather than the root causes.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

How IoT is Making Security Imperative for All Embedded Software

Many IoT products lack proper security due to outdated software development practices. Hackers and criminals are acutely aware that many of the security procedures and applications in use today were designed to defend against attacks in the PC era – not current IoT threat vectors. Security isn't a product "add-on" or feature; it must be built in. Learn about the unique challenges of securing embedded applications and how to deploy processes and tools to deliver more secure products faster.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

Developing Secure Embedded Software: Quality Doesn't Equal Security

Most organization put considerable focus on software quality, but software security is different. Embedded development presents the challenge of coding in a language that’s inherently insecure; and quality assurance does little to ensure security.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

Many embedded systems and "connected” IoT products lack proper security due to outdated software development practices. Organizations now know they need to incorporate security into the software SDLC, yet many lack security expertise and are struggling with how to implement best practices.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

A Guide to the MISRA Coding Standard: What you need to know

This white paper will provide your development organization with the critical information needed to adopt MISRA the standard and to quickly update code review practices and documentation efforts.

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

Using Static Analysis to Overcome the Challenges of Reusing Code for Embedded Software

This paper explains why software reuse is a growing problem within development organizations, why the way embedded software is developed needs to change and what organizations can do to improve reliability, safety, and security while reducing development time. Gain a better understanding of:

Posted in: White Papers, Aeronautics, Electronics & Computers, Semiconductors & ICs, Electronics & Computers, Software
Read More >>

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.