Software

Articles: Information Technology
Half-Cycle Crack Growth

Half-Cycle Crack Growth software offers a reliable method for calculating theoretical fatigue crack growths that could lead to catastrophic structural component failures. The program builds upon and integrates Armstrong’s...

Articles: Information Technology
NASA Visualization Explorer

NASA Visualization Explorer (NASA Viz) is an intuitive, interactive iOS application (app) that delivers science stories with multimedia content linking high-quality explorable images, descriptive text, visualizations,...

Briefs: Information Technology
Simple Safe Site Selection (S4) Algorithm

This hazard avoidance algorithm uses a single flash lidar range image to select a safe landing site for NASA missions. The advantage of flash lidar is that the entire range image is captured...

Articles: Software
Fast Classification Method for Multivariate Mixtures of Spectroscopic Responses

In many fields of spectroscopy, classification of the measured multivariate response is not always a straightforward process. Accurate classification is limited by...

Briefs: Information Technology
Feature Database

The primary function of the Feature Database (FDB) is to contain information about all the ground features seen so far in a sequence of aerial images. This information is organized so that features can be efficiently located and...

Briefs: Information Technology
Peak-Seeking Control Method

Peak-seeking algorithms optimize physical processes in real time and are widely used throughout a variety of industries. However, measuring associated parameters in changing conditions, and responding to them...

Briefs: Software
Enterprise Middleware Solution

An enterprise middleware solution allows disparate information technology (IT) systems to be integrated into one seamless, efficient system. As software and database platforms continue to develop at an accelerated...

Briefs: Software
Processing Time History Data for Display and Analysis

A suite of software tools was developed that enables powerful and efficient processing of time history data. These tools can be used together or independently, offering a variety of...

Briefs: Software
Prototype Genomics-Based Keyed-Hash Message Authentication Code Protocol

Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A DNA-inspired...

Briefs: Sensors/Data Acquisition
Detecting High Stress in Oral Interviews and Text Documents

When a person is interviewed, some of the answers may be inaccurate, or even deceptive, because the person may have either incomplete information, is telling only part of the truth, or...

Briefs: Information Technology
Titan Lake and Shore Sampler

A lake and shore sampling and sample distribution system was developed for a Titan lake environment (93.7 K, in liquid hydrocarbons). The Titan Lake and Shore Sampler (TLASS) would enable the chemical analysis of...

Briefs: Sensors/Data Acquisition
VLBI Antenna Calibration by GPS

The determination of local geodetic parameters for VLBI (very-long-baseline interferometry) antennas is traditionally done by conventional surveying techniques. These techniques are laborious and error-prone. The...

Briefs: Information Technology
Predicting Heart Age Using Electrocardiography

Knowledge of a patient’s cardiac age, or “heart age,” could prove useful to both patients and physicians for encouraging lifestyle changes that are potentially beneficial for cardiovascular...

Briefs: Information Technology
Integrated and Automated Software Test Environment for JPL Software Defined Radio

Software has been developed that provides an integrated and automated test environment for the Space Telecommunications Radio System (STRS). This software package is...

Briefs: Information Technology
Integrated Genomic and Proteomic Information Security Protocol

The motivation for this research is the fact that, for a variety of reasons, networks and their existing authentication and confidentiality infrastructure are becoming more vulnerable...

Technology Leaders

Tech Briefs TV