Software

Engineered Resilient Systems

Analyzing large data is the process of methodically and systematically making decisions to reduce incomprehensible datasets down to a manageable size that can be viewed and understood easily. These reductions are made by performing data analytics, producing metrics, identifying patterns, and/or producing any other criteria of comparison that can be mathematically modeled.

Posted in: Briefs, Aerospace, Data Acquisition, Computers, Software, Inspection Equipment, Instrumentation, Measuring Instruments, Monitoring, Test & Measurement
Read More >>

Integration of Adaptive Optics Into High-Energy Laser Modeling And Simulation

The U.S. Navy is constantly predicting future threats and contemplating new weapon technologies to counter them. One of those technologies is directed-energy (DE) weapons. Conventional weapons rely on the kinetic energy of projectiles. High-energy lasers (HELs), one type of directed-energy weapon, work in a fundamentally new way, using electromagnetic radiation to damage or destroy enemy assets.

Posted in: Briefs, Aerospace, Defense, Lasers & Laser Systems, Optics, Photonics, Simulation Software, Software
Read More >>

Hands-on Cybersecurity Studies: Multi-Perspective Analysis of the WannaCry Ransomware

Ransomware is malware that obstructs a user from accessing digital assets through various mechanisms. These assets are held hostage and inaccessible until the user pays a ransom. In most cases, this is accomplished using encryption where, once the malicious program executes, it will target and encrypt certain files and will release the decryption key at the time of payment. Some ransomware instances target only certain common user-generated files such as media and documents. In this case, system files and others required for the operating system to function correctly (user authentication, process execution, etc.) are unaffected. Others encrypt much more and seek to lock out entire systems.

Posted in: Briefs, Aerospace, Defense, Software
Read More >>

Real-Time Heuristics and Metaheuristics for Static and Dynamic Weapon Target Assignments

Projectile weapons have been a consistent threat of hostilities throughout history. Military advantage has always been aided by the capacity to inflict damage from a distance. In the 20th century, missile technology advanced to the point that an adversary had the potential to attack a protected asset from great distances. To neutralize this stand-off threat, the concept of air defense evolved. However, as the ability to reduce a missile threat increased, so, too, did the quantity and quality of missiles available, and research into the effective allocation of air defense resources emerged.

Posted in: Briefs, Aerospace, Defense, Simulation Software, Automotive, Transportation
Read More >>

Geospatial Accuracy of Small Unmanned Airborne System Data in the Coastal Environment

The purpose of this study was to assess the ability of commonly available COTS software to produce geometrically accurate orthometric mosaics and terrain models from low-altitude UAS imagery.

Posted in: Briefs, Aeronautics, Aerospace, Aviation, Data Acquisition, Design, Imaging, Automation, Data Acquisition, Sensors, Software
Read More >>

Localization and Mapping of Unknown Locations with Unmanned Ground Vehicles

The main goals of this research are to enhance a commercial off-the-shelf (COTS) software platform to support unmanned ground vehicles (UGVs) exploring the complex environment of tunnels, to test the platform within a simulation environment, and to validate the architecture through field- testing.

Posted in: Briefs, Aerospace, Defense, Batteries, Cameras, Lasers & Laser Systems, Photonics, Automation, Robotics, Data Acquisition, Sensors, Simulation Software, Software, Transportation
Read More >>

Simulation of Active Imaging Systems

Active imaging systems offer the promise of significantly improved tactical performance compared to passive military systems operating in adverse ground, air, and underwater/ maritime environments. These improvements would include, but are not limited to:

Posted in: Briefs, Aerospace, Data Acquisition, Defense, Imaging, Lasers & Laser Systems, Simulation Software
Read More >>

Characterization of Bore Temperatures and Stresses in Small Caliber Gun Barrels

Currently in the small arms community, with the push for lighter, stronger barrels with improved life, a more complete understanding of the bore's thermal and structural behavior is required in order to not only improve future barrel design but to more thoroughly and accurately assess barrels in the current inventory.

Posted in: Briefs, Aerospace, Data Acquisition, Defense, Data Acquisition, Detectors, Sensors, Simulation Software, Instrumentation, Measuring Instruments, Test & Measurement
Read More >>

Reusable Rapid Prototyped Blunt-Impact Simulator

Rapid prototyping (RP) is the term most commonly used to describe additive manufacturing technologies. An additive manufacturing technology is any manufacturing process that fabricates a part by adding one layer of material at a time, one on top of the other, to produce detailed 3-D geometries directly from 3-D computer-aided design (CAD) models.

Posted in: Briefs, Aerospace, Defense, Electronic Components, Electronics, Electronics & Computers, 3 D Printing & Additive Manufacturing, Manufacturing & Prototyping, Rapid Prototyping & Tooling, Simulation Software
Read More >>

Maintaining Enterprise Resiliency Via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)

This research investigates a new vision for increasing the resilience of computing clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud's infrastructure. The work is motivated by the fact that today's clouds are very static, uniform, and predictable, allowing attackers who identify a vulnerability in one of the services or infrastructure components to spread their effect to other, mission-critical services. The goal is to integrate into clouds a new level of unpredictability for both their services and data so as to both impede an adversary's ability to achieve an initial system compromise and, if a compromise occurs, to detect, disrupt, and/or otherwise impede their ability to exploit this success.

Posted in: Briefs, Aerospace, Data Acquisition, Defense, Computers, Electronic Components, Electronics & Computers, Software
Read More >>