Fragment Tracking Gives Insights Into What Happens In Explosions

A bang and a swirl of dust from detonating 9 pounds of plastic explosive in the desert signaled the beginning of tests that — thanks to advances in high-speed cameras, imaging techniques and computer modeling — will help Sandia National Laboratories researchers study fragmenting explosives in ways that weren’t possible before.

Posted in: News, Defense, Cameras, Imaging, Visualization Software

Composites Self-Heal at Very Low Temperatures

Scientists developed a method of allowing materials, commonly used in aircraft, to self-heal cracks at temperatures well below freezing. A healing efficiency of more than 100% at temperatures of -60 °C was obtained in a glass fiber-reinforced laminate, but the technique could be applied across a majority of self-healing composites.

Posted in: News, Defense, Composites, Materials

Navigation System Uses Existing Cell Signals – Not GPS

Researchers developed a highly reliable and accurate navigation system that exploits existing environmental signals such as cellular and Wi-Fi, rather than the Global Positioning System (GPS). The technology can be used as a standalone alternative to GPS, or complement current GPS-based systems to enable highly reliable, consistent, and tamper-proof navigation in autonomous vehicles such as unmanned drones.

Posted in: News, Aerospace, Communications, Wireless, Defense

NASA’s Folding Wing Reduces Drag and Increases Efficiency

NASA’s Spanwise Adaptive Wing (SAW) concept permits the outboard portions of the wings to move to the optimal position during operation. This could increase efficiency by reducing drag, and increasing lift and performance. The ability to achieve an optimal wing position for different aspects of flight may also produce enough yaw control to allow for rudder reduction on subsonic and supersonic aircraft.

Posted in: News, Aerospace, Aviation, Defense

Secret Sharing Schemes and Advanced Encryption Standard

There are many secret sharing schemes and variations available to hide and reconstruct the given secret. Shamir’s Secret Sharing Scheme, making use of linear Lagrange interpolation on the dealer-generated polynomial, was used to reconstruct the secret from the stipulated threshold number of participants’ shares. Such a scheme had been widely analyzed by mathematicians and computer scientists for potential weaknesses in the reconstruction of the secret by an external eavesdropper.

Posted in: Briefs, Defense, Software, Architecture, Computer privacy, Cryptography, Cyber security

SIPHER: Scalable Implementation of Primitives for Homomorphic Encryption

Prior to the Proceed program, the main challenges preventing practical demonstrations and use of Fully Homomorphic Encryption (FHE) were efficiency and scalability. At the start of the Program, the state-of-the-art FHE implementations were both inefficient and not scalable. Work in Scalable Implementation of Primitives for Homomorphic EncRyption (SIPHER) has brought FHE into the realm of practice, bringing several orders of magnitude runtime improvement, and resulting in FHE implementations that can be executed on single and multicore computers (including iPhones). Furthermore, implementation of an FHE hardware accelerator on a Virtex 7 Field Programmable Gate Array (FPGA) can speed up core FHE functions by over three orders of magnitude.

Posted in: Briefs, Defense, Software, Architecture, Cryptography, Integrated circuits

Using Mathematics to Make Computing on Encrypted Data Secure and Practical

In order to make computing on encrypted data more practical to use and more secure from attack, it is necessary to discover, develop, and understand the mathematics on which it is based and the mathematics that can be used to attack it.

Posted in: Briefs, Defense, Software, Mathematical models, Cryptography, Cyber security

Achieving Performance Advantages in Unmanned Systems

Unmanned Vehicle Systems (UVS) are reaching new levels of functionality and performance, and it’s not just for air vehicles either. Ground and underwater UVS programs are all taking advantage of the higher-performance computing platforms that are using highly integrated, multicore processors; faster and larger DDR and flash memory; as well as integrated I/O. Additionally, remote I/O subsystems are being implemented to distribute the processing power closer to the sensors and use packetized message passing — with multiple levels of security (MLS) — back to a smaller central vehicle and mission management computer.

Posted in: Articles, Aerospace, Defense, Downsizing, Computer software / hardware, Sensors and actuators, Autonomous vehicles, Marine vehicles and equipment, Unmanned aerial vehicles

COTS Embedded Systems and Link Budgets

The days of proprietary embedded computing systems in military systems are numbered. Proprietary systems, with the attendant vendor lock-in, tend to be platform specific, increasing the development and long-term maintenance costs. New platform: new design. The military has realized that this is an untenable approach.

Posted in: Articles, Aerospace, Defense, Embedded software, Customization, Maintenance, Repair and Service Operations, Military aircraft, Military vehicles and equipment

Fiber Optic Multi-Sensing Platforms

Eventually, technology advances to the point where solutions that have been “good enough” for decades are no longer “good enough” for the innovations of today. The philosophy of “good enough” is widely applied when developing a new product or solution. Businesses have to make decisions about what new technology features will receive the most attention to keep projects within scope and completed on time.

Posted in: Articles, Aerospace, Defense, Fiber optics, Sensors and actuators, Performance upgrades, Cost analysis