Eye Tracking Technology Improves Imposter Detection Training

A screen shot of the Eye-dentify user interface.

Customs and Border Protection (CBP) screens nearly one million people every day and secures and manages 328 ports of entry all over the country, including in remote areas. Verifying the identity of every single person entering the United States is a vital step in halting human trafficking, drug trafficking, and other smuggling attempts at the border. In addition, security screening prevents criminals and terrorists from entering the country. Imposter detection crosscuts the entire Homeland Security Enterprise, as well as state, local, and tribal law enforcement and even front-line soldiers in our military. All of these frontline operators execute this task as part of their respective missions and they must be able to accurately and efficiently verify identification of individuals to thwart imposters.

Posted in: News, Data Acquisition, Defense, Machine Vision, Visualization Software, Data Acquisition, Detectors, Sensors, Electronics & Computers, Software

DO-254 Benefits Versus Costs

DO-254, the design assurance guideline for airborne electronic hardware, is considered by many to be a simple cut/paste of DO-178, its avionics software sibling. Surely, as with wine and beer, both are fermented liquids which become increasingly expensive with increased complexity. While similarities abound, so do their many differences. And truly, DO-254 is the benefactor, or bane, of avionics projects the world over. But is DO-254 really unduly expensive? Does it add value? Will it improve safety and reliability? Does it have benefits? What are the true costs versus benefits? These important questions are answered herein.

Posted in: White Papers, White Papers, Aerospace, Software

AMRDEC Technologies to Improve Air and Missile Defense

From Left to Right: Keith Godwin, Sam Curtis, Tony Rainoldi (Photo Credit: Joseph Mendiola)

Engineers at the U.S. Army Aviation and Missile Research, Development and Engineering Center (AMRDEC) are working on a trio of technologies to explore improving existing air and missile defense designs at lower costs and in less development time. Each of the technologies was developed out of a demand from the warfighter. Investment in current missile weapons is high so the Army prefers to improve what is in use instead of fielding new items. Also, soldiers have more trust in machinery they have used and experienced.

Posted in: News, Aerospace, Defense, Software, Test & Measurement

Language Learning Robot Could Advance Autonomous Vehicles

A Purdue University researcher and his team are developing technology to give robots the ability to learn language. A team led by Jeffrey Mark Siskind, associate professor in Purdue’s School of Electrical and Computer Engineering, has developed three algorithms that allow a wheeled robot to learn the meanings of words from example sentences that describe example paths taken by the robot, to use the words to generate a sentence to describe a path of movement, and to comprehend the sentence in order to produce a new path of movement.

Posted in: News, Defense, Robotics, Simulation Software, Software

Simulation Software Improves Pilot Training

Simulation of a helicopter landing on a ship. (Chair of Helicopter Technology/TUM)

Providing pilots with the best possible preparation for extreme situations is the goal of new simulation software. The program that combines flow mechanics and flight dynamics in real time. The numerical model is extremely flexible and does not depend on stored flow data. External conditions such as topography, global wind speeds, and aircraft type are input. During the simulation, the algorithms use that data to continuously compute the interacting flow field at the virtual aircraft’s current location.

Posted in: News, Aerospace, Simulation Software

Computer Model More Accurately Predicts Flight Delays

Sina Khanmohammadi, a PhD candidate in systems science, leads a Binghamton University study that has developed a more accurate way of predicting airline flight delays. (Jonathan Cohen)

Researchers at Binghamton University have devised a new computer model that can more accurately predict delays faster than anything currently in use. The multilevel input layer artificial neural network handles categorical variables with a simple structure to help airlines easily see the relationships between input variables (such as weather) and outputs (flight delays).

Posted in: News, Aerospace, Mathematical/Scientific Software

New Web-Based Software Enables Quick Drone Design

Doug Hunsaker (right) has created a free, online 3D software for the design of safe and efficient small autonomous vehicles.

A Utah State University aerospace engineer is offering the public a free software tool that could revolutionize the drone industry. Doug Hunsaker, an assistant professor of mechanical and aerospace engineering at USU, is offering a 3D online software program that generates aerodynamic information about a user’s aircraft design.

Posted in: News, Aerospace, Defense, Computer-Aided Design (CAD)

Aircraft Arrival Technology Will Reduce Flight Delays

Retired airline pilots test procedures that will be used during upcoming flight tests of FIM. The simulator is set up like a Boeing 757 jet. (NASA Langley/David C. Bowman)

Flight Deck Interval Management (FIM) promises to safely increase the number of airplanes that can land on the same runway at busy airports by more precisely managing the time, or interval, between each aircraft arrival.

Posted in: News, Aerospace, Defense, Simulation Software, Software

Secret Sharing Schemes and Advanced Encryption Standard

Using a simplified methodology to probe weaknesses in Shamir’s Secret Sharing Scheme.

There are many secret sharing schemes and variations available to hide and reconstruct the given secret. Shamir’s Secret Sharing Scheme, making use of linear Lagrange interpolation on the dealer-generated polynomial, was used to reconstruct the secret from the stipulated threshold number of participants’ shares. Such a scheme had been widely analyzed by mathematicians and computer scientists for potential weaknesses in the reconstruction of the secret by an external eavesdropper.

Posted in: Briefs, DTB, TSP, Defense, Software, Architecture, Computer privacy, Cryptography, Cyber security

SIPHER: Scalable Implementation of Primitives for Homomorphic Encryption

Improving the efficiency and scalability of Fully Homomorphic Encryption (FHE).

Prior to the Proceed program, the main challenges preventing practical demonstrations and use of Fully Homomorphic Encryption (FHE) were efficiency and scalability. At the start of the Program, the state-of-the-art FHE implementations were both inefficient and not scalable. Work in Scalable Implementation of Primitives for Homomorphic EncRyption (SIPHER) has brought FHE into the realm of practice, bringing several orders of magnitude runtime improvement, and resulting in FHE implementations that can be executed on single and multicore computers (including iPhones). Furthermore, implementation of an FHE hardware accelerator on a Virtex 7 Field Programmable Gate Array (FPGA) can speed up core FHE functions by over three orders of magnitude.

Posted in: Briefs, TSP, Defense, Software, Architecture, Cryptography, Integrated circuits