Robust Method for Data Protection and Change Detection

Methods exist for processing an original data sequence in order to generate information about the data for the purposes of integrity measurement, ownership demonstration, and authentication. The first category is digital watermarking, the second is data hashing, and the third is error detection coding. In the present context, watermarking is often used for ownership demonstration and authentication purposes; data hashing is often used for integrity measurement purposes; and as with data hashing, error detection coding is used to measure data integrity. However, the latter is normally done as part of data transmission protocol, and therefore addresses transmission errors rather than tampering.

Posted in: Briefs, Software, Finite element analysis, Computer software / hardware, Computer software and hardware, Cyber security, Computer software / hardware, Computer software and hardware, Cyber security, Data management, Identification

High-Speed Network Protocol for Faster, More Reliable Emergency Response

Anew network protocol — the Multi Node Label Routing (MNLR) protocol — was developed to improve the information flow between emergency responders at the scene of an incident and decision-makers at the office of emergency management.

Posted in: Briefs, Software, Communication protocols, Communication protocols, Disaster and emergency management, Emergency management, Hazards and emergency management, Hazards and emergency operations

Custom Administration Reporting (gTracker)

A reporting tool was needed that could indicate the accuracy of search results by tracking the number of clicks required by users to find their desired search results. The application should also capture the number of times other links and like filtering components are clicked. The report should have the ability to display a specific date range. The application is configured to allow multiple interfaces to utilize the service, and can provide statistics per interface or across all interfaces for a consolidated view of search user behavior metrics.

Posted in: Briefs, Software, Big data, Data acquisition and handling, Internet, Big data, Data acquisition and handling, Internet


Android is the primary software platform for mobile, networked devices such as tablets and smartphones. These devices are increasingly used for safety-critical functions that require verification of correct and robust behavior of applications. Such software written for the Android operating system is hard to test because applications are inherently concurrent, applications are usually being driven by asynchronous user input and network events, the application model is not amenable to unit testing, and the availability of sources for many commercial applications is missing. Safety-critical applications require verification by means of systematic exploration of all possible software behaviors. Conventional testing does not guarantee sufficient coverage, especially for concurrent applications.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Cyber security, Internet of things, Safety critical systems, Computer software / hardware, Computer software and hardware, Cyber security, Internet of things, Safety critical systems, Test procedures

Enterprise Business Information System (EBIS) Data Warehouse Quality Inspector

A typical data warehouse may contain thousands of tables. Validating the data quality of all data warehouse content is an unmanageable and unmaintainable task if handled in an ad-hoc fashion. This software seeks to ensure that a data warehouse accurately reflects the contents of the business systems that feed it, in turn guaranteeing accuracy of business reports. Data anomalies can occur due to breaks in processes, unexpected changes to business rules, upgrades, unanticipated data relationships, or inadequate testing. Inspecting the data after each batch load for anomalous conditions allows IT to respond quickly to such issues, and to deliver a higher-quality product to end users.

Posted in: Briefs, Software, Computer software / hardware, Computer software and hardware, Computer software / hardware, Computer software and hardware, Data management, Logistics

Network Geolocation Technology

This system is difficult to spoof, and does not generate false positives.

A network geolocation technology (NGT) can be used to determine the physical location of a networked Internet user, as well as accurately determine if an Internet user is in fact in the metropolitan service area that the user claims as his/her location. NGT is based on the laws of physics, and operates independent of an IP address lookup or any other pre-existing user network address profiles.

Posted in: Briefs, Software

Multi-Dimensional Information Visualization Software

This program provides insight into data collected from networks and network simulations.

DiVisa is a multi-dimensional information visualization tool that en ables researchers to understand the behavior of network data.

Posted in: Briefs, Software

PLOT3D 4.1

PLOT3D is an interactive graphics program designed to help scientists visualize computational fluid dynamics (CFD) grids and solutions. Today, supercomputers and CFD algorithms can provide scientists with simulations of such highly complex phenomena that obtaining an understanding of the simulations has become a major problem. Tools that help the scientist visualize the simulations can be of tremendous aid.

Posted in: Briefs, Software, Computational fluid dynamics, Mathematical models, Imaging, Imaging and visualization, Imaging, Imaging and visualization

Launch Trajectory Acquisition System (LTAS) Source Slaving Selector (LS3)

The LTAS Source Slaving Selector application was developed to transmit LTAS data in User Datagram Protocol (UDP) packets using the LTAS data from one of multiple incoming UDP streams. Users select the data stream via a graphical user interface (GUI), which also displays a variety of data values from the LTAS frames. Prior art that performs a similar objective includes the Selectable Internet Protocol Slaving (SIPS) system, which can perform the objective, but can also create problems when transmitting slaving LTAS data by filling some data fields with zeroes. This is especially true for the velocity data fields. In addition, SIPS' GUI does not include X' and Y' angles, which are a form of local coordinates. The SIPS software was built using an older version of the integrated development environment (IDE) and compiler.

Posted in: Briefs, Software, Trajectory control, Architecture, Computer software / hardware, Computer software and hardware, Architecture, Computer software / hardware, Computer software and hardware, Spacecraft

Acoustic Propagation and Emulation Toolset (APET)

This software suite assesses the effects of terrain, weather, and computational method on acoustic propagation and audibility.

Currently, APET includes a modified version of the Rotorcraft Noise Model (RNM, version 7). It also includes the newly developed Spectral Attenuation Method (SAM), which contains the Ray Tracing Program (RTP) and two versions of a Green's Function Parabolic Equation (GFPE) code. The third component of APET is an audibility prediction scheme initially called ICHIN (I Can Hear It Now), and further developed by Wyle as AUDIB.

Posted in: Briefs, Software, Computer simulation, Acoustics, Noise, Acoustics, Noise

The U.S. Government does not endorse any commercial product, process, or activity identified on this web site.