Software

AMRDEC Technologies to Improve Air and Missile Defense

From Left to Right: Keith Godwin, Sam Curtis, Tony Rainoldi (Photo Credit: Joseph Mendiola)

Engineers at the U.S. Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) are working on a trio of technologies to explore improving existing air and missile defense designs at lower costs and in less development time. Each of the technologies was developed out of a demand from the warfighter. Investment in current missile weapons is high so the Army prefers to improve what is in use instead of fielding new items. Also, soldiers have more trust in machinery they have used and experienced.

Posted in: News, Aerospace, Defense, Software, Test & Measurement
Read More >>

Language Learning Robot Could Advance Autonomous Vehicles

A Purdue University researcher and his team are developing technology to give robots the ability to learn language. A team led by Jeffrey Mark Siskind, associate professor in Purdue’s School of Electrical and Computer Engineering, has developed three algorithms that allow a wheeled robot to learn the meanings of words from example sentences that describe example paths taken by the robot, to use the words to generate a sentence to describe a path of movement, and to comprehend the sentence in order to produce a new path of movement.

Posted in: News, Defense, Robotics, Simulation Software, Software
Read More >>

Simulation Software Improves Pilot Training

Simulation of a helicopter landing on a ship. (Chair of Helicopter Technology/TUM)

Providing pilots with the best possible preparation for extreme situations is the goal of new simulation software. The program that combines flow mechanics and flight dynamics in real time. The numerical model is extremely flexible and does not depend on stored flow data. External conditions such as topography, global wind speeds, and aircraft type are input. During the simulation, the algorithms use that data to continuously compute the interacting flow field at the virtual aircraft’s current location.

Posted in: News, Aerospace, Simulation Software
Read More >>

Computer Model More Accurately Predicts Flight Delays

Sina Khanmohammadi, a PhD candidate in systems science, leads a Binghamton University study that has developed a more accurate way of predicting airline flight delays. (Jonathan Cohen)

Researchers at Binghamton University have devised a new computer model that can more accurately predict delays faster than anything currently in use. The multilevel input layer artificial neural network handles categorical variables with a simple structure to help airlines easily see the relationships between input variables (such as weather) and outputs (flight delays).

Posted in: News, Aerospace, Mathematical/Scientific Software
Read More >>

New Web-Based Software Enables Quick Drone Design

Doug Hunsaker (right) has created a free, online 3D software for the design of safe and efficient small autonomous vehicles.

A Utah State University aerospace engineer is offering the public a free software tool that could revolutionize the drone industry. Doug Hunsaker, an assistant professor of mechanical and aerospace engineering at USU, is offering a 3D online software program that generates aerodynamic information about a user’s aircraft design.

Posted in: News, Aerospace, Defense, Computer-Aided Design (CAD)
Read More >>

Aircraft Arrival Technology Will Reduce Flight Delays

Retired airline pilots test procedures that will be used during upcoming flight tests of FIM. The simulator is set up like a Boeing 757 jet. (NASA Langley/David C. Bowman)

Flight Deck Interval Management (FIM) promises to safely increase the number of airplanes that can land on the same runway at busy airports by more precisely managing the time, or interval, between each aircraft arrival.

Posted in: News, Aerospace, Defense, Simulation Software, Software
Read More >>

Secret Sharing Schemes and Advanced Encryption Standard

Using a simplified methodology to probe weaknesses in Shamir’s Secret Sharing Scheme.

There are many secret sharing schemes and variations available to hide and reconstruct the given secret. Shamir’s Secret Sharing Scheme, making use of linear Lagrange interpolation on the dealer-generated polynomial, was used to reconstruct the secret from the stipulated threshold number of participants’ shares. Such a scheme had been widely analyzed by mathematicians and computer scientists for potential weaknesses in the reconstruction of the secret by an external eavesdropper.

Posted in: Briefs, DTB, TSP, Defense, Software, Architecture, Computer privacy, Cryptography, Cyber security
Read More >>

SIPHER: Scalable Implementation of Primitives for Homomorphic Encryption

Improving the efficiency and scalability of Fully Homomorphic Encryption (FHE).

Prior to the Proceed program, the main challenges preventing practical demonstrations and use of Fully Homomorphic Encryption (FHE) were efficiency and scalability. At the start of the Program, the state-of-the-art FHE implementations were both inefficient and not scalable. Work in Scalable Implementation of Primitives for Homomorphic EncRyption (SIPHER) has brought FHE into the realm of practice, bringing several orders of magnitude runtime improvement, and resulting in FHE implementations that can be executed on single and multicore computers (including iPhones). Furthermore, implementation of an FHE hardware accelerator on a Virtex 7 Field Programmable Gate Array (FPGA) can speed up core FHE functions by over three orders of magnitude.

Posted in: Briefs, TSP, Defense, Software, Architecture, Cryptography, Integrated circuits
Read More >>

Using Mathematics to Make Computing on Encrypted Data Secure and Practical

Developing new algorithms to improve data security.

In order to make computing on encrypted data more practical to use and more secure from attack, it is necessary to discover, develop, and understand the mathematics on which it is based and the mathematics that can be used to attack it.

Posted in: Briefs, TSP, Defense, Software, Mathematical models, Cryptography, Cyber security
Read More >>