Refine Your Search

Topic

Search Results

Training / Education

DO-326A and ED-202A An Introduction to the New and Mandatory Aviation Cyber-Security Essentials

This course will introduce participants to industry best practices for real-world aviation cyber-security risk-assessment, development & assurance. Participants will learn the information necessary to help minimize DO-326/ED-202-set compliance risks and costs, while also optimizing cyber-security levels for the development, deployment and in-service phases Topics such as aircraft security aspects of safety, systems-approach to security, security planning, the airworthiness security process, and security effectiveness assurance will be covered.
Standard

AIRBORNE RECORDER FILE FORMAT

1992-01-01
ARINC657
This document defines the characteristics necessary to standardize the airborne recorder download file format in order to facilitate data import, transcription, and exchange. A standardized data format will reduce the variety of readout equipment required for airborne recorder data transcription. This document defines the detailed architecture of the Recorder Standard Output (RSO) file. The architecture is a tagged file structure within which many different files and their formats can be supported. The structure is necessary to support newer recording requirements for flight data, data link, audio, and image recording. This structure is intended for use with all civil recorders and should support use with military recorders.
Journal Article

Threat Identification and Defense Control Selection for Embedded Systems

2020-08-18
Abstract Threat identification and security analysis have become mandatory steps in the engineering design process of high-assurance systems, where successful cyberattacks can lead to hazardous property damage or loss of lives. This article describes a novel approach to perform security analysis on embedded systems modeled at the architectural level. The tool, called Security Threat Evaluation and Mitigation (STEM), associates threats from the Common Attack Pattern Enumeration and Classification (CAPEC) library with components and connections and suggests potential defense patterns from the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security standard. This article also provides an illustrative example based on a drone package delivery system modeled in AADL.
Journal Article

Future of Autonomous High-Mobility Military Systems

2020-10-19
Abstract Autonomy has the potential to make the most radical impact by significantly reducing the number of soldiers in harm’s way and changing the military paradigm. Benefits of autonomy to improve the Army’s mission capabilities and the rapid evolution of military systems exerts pressure to develop these systems quickly. Since the associated technological development is highly fast paced and stochastic, approaches that develop systems for stochastic future scenarios are required. In this article we present a vision for the autonomous high-mobility military systems for that future. We discuss the ramifications of autonomy in five areas: (1) fleet organization, (2) physical attributes of high-mobility military systems, (3) individual behaviors of autonomous assets, (4) interactions between humans and autonomous systems, and (5) operation and teaming strategies. We present the future vision, implications, requirements, and technological challenges for each of the five areas.
Journal Article

Algorithm Development for Avoiding Both Moving and Stationary Obstacles in an Unstructured High-Speed Autonomous Vehicular Application Using a Nonlinear Model Predictive Controller

2020-10-19
Abstract The advancement in vision sensors and embedded technology created the opportunity in autonomous vehicles to look ahead in the future to avoid potential obstacles and steep regions to reach the target location as soon as possible and yet maintain vehicle safety from rollover. The present work focuses on developing a nonlinear model predictive controller (NMPC) for a high-speed off-road autonomous vehicle, which avoids undesirable conditions including stationary obstacles, moving obstacles, and steep regions while maintaining the vehicle safety from rollover. The NMPC controller is developed using CasADi tools in the MATLAB environment. The CasADi tool provides a platform to formulate the NMPC problem using symbolic expressions, which is an easy and efficient way of solving the optimization problem. In the present work, the vehicle lateral dynamics are modeled using the Pacejka nonlinear tire model.
Journal Article

Design of a 1.2 kW Interleaved Synchronous Buck Converter for Retrofit Applications in Aviation Systems

2020-10-19
Abstract Presently, 270 V direct current (DC) systems replace older 28 V DC voltage systems in both the civil and military aviation industry due to the requirement for more electrical power needs on board. Therefore, the existing avionics require retrofitting. The conversion from 270 V to 28 V appears to be quite promising for both old and new systems. This study aims to design an interleaved synchronous modular buck converter topology as a candidate for these requirements. Calculations for the converter design are conducted considering aviation standards. Switching with pulse-width modulation (PWM) is used to control the power converter. A double-loop feedback control system based on voltage and current feedback is designed. Therefore, the buck converter circuit with 1145 W power output is proposed, which supplies a 28 V and 41 A DC output from a 270 V DC input. The concept is verified using simulations and hardware-in-the-loop (HIL) experimental results.
Technical Paper

Experimental Stress/Strain Analysis of a Standardized Sensor Platform for a C-130 Aircraft

2005-10-03
2005-01-3426
Project Oculus is an in-flight deployable mechanical arm/pod system that will accommodate 500 pounds of sensor payload, developed for a C-130 military aircraft. The system is designed for use in counter narco-terrorism and surveillance applications by the Department of Defense and the National Guard [1]. A prototype of the system has been built and is in the testing/analysis phase. The purpose of this study was to analyze the actual stresses and strains in the critical areas found using previous Finite Element (FE) simulations and to ensure that acceptable safety requirements have been met. The system components tested will be redesigned, tested, and reconstructed in the case of unacceptable safety factors or if more reliable methods can be implemented. The system was built to be deployed and retracted in flight, to avoid causing any problems in take off and landing.
Technical Paper

Computing Remaining Fatigue Life Under Incrementally Updated Loading Histories

2018-04-03
2018-01-0623
After manufacture, every military vehicle experiences a unique history of dynamic loads, depending on loads carried, missions completed, etc. Damage accumulates in vehicle structures and components accordingly, leading eventually to failures that can be difficult to anticipate, and to unpredictable consequences for mission objectives. The advent of simulation-based fatigue life prediction tools opens a path to Digital Twin based solutions for tracking damage, and for gaining control over vehicle reliability. An incremental damage updating feature has now been implemented in the Endurica CL fatigue solver with the aim of supporting such applications for elastomer components. The incremental updating feature is demonstrated via the example of a simple transmission mount component. The damage state of the mount is computed as it progresses towards failure under a series of typical loading histories.
Research Report

Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights

2022-07-28
EPR2022016
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality.
Journal Article

Predictive Modeling of Aircraft Dynamics Using Neural Networks

2022-05-25
Abstract Fighter pilots must study models of aircraft dynamics before learning complex maneuvers and tactics. Similarly, autonomous fighter aircraft applications may benefit from a model-based learning approach. Instead of using a preexisting physics model of a given aircraft, a machine learning system can learn a predictive model of the aircraft physics from training data. Furthermore, it can model interactions between multiple friendly aircraft, enemy aircraft, and the environment. Such a system can also learn to represent state variables that are not directly observable, as well as dynamics that are not hard coded. Existing model-based methods use a deep neural network that takes observable state information and agent actions as input and provides predictions of future observations as output. The proposed method builds upon this approach by adding a residual feedforward skip connection from some of the inputs to all of the outputs of the deep neural network.
Research Report

Unsettled Technology Opportunities for Vehicle Health Management and the Role for Health-Ready Components

2020-03-17
EPR2020003
Game-changing opportunities abound for the application of vehicle health management (VHM) across multiple transportation-related sectors, but key unresolved issues continue to impede progress. VHM technology is based upon the broader field of advanced analytics. Much of traditional analytics efforts to date have been largely descriptive in nature and offer somewhat limited value for large-scale enterprises. Analytics technology becomes increasingly valuable when it offers predictive results or, even better, prescriptive results, which can be used to identify specific courses of action. It is this focus on action which takes analytics to a higher level of impact, and which imbues it with the potential to materially impact the success of the enterprise. Artificial intelligence (AI), specifically machine learning technology, shows future promise in the VHM space, but it is not currently adequate by itself for high-accuracy analytics.
Research Report

Impact of Quantum Computing in Aerospace

2022-06-14
EPR2022014
As the complexity of systems expands with increasing emphasis for digital transformation, the aerospace industry is generating big data to meet customer requirements. The ability to that data to solve challenging problems is limited by many factors, including the capabilities of current classical computing systems. Impact of Quantum Computing in Aerospace discusses how quantum computing systems offer (possibly quadratic to exponentially) greater computational power over classical computers. The power of quantum computing is tremendous and has many potential impacts on the aerospace industry; however, there are also many unsettled topics surrounding the future of the technology. Click here to access the full SAE EDGETM Research Report portfolio.
Journal Article

Framework for Initializing the Conceptual Design of Hypersonic Aircraft

2023-01-18
Abstract To assist in initializing the conceptual design of hypersonic aircraft, we outline a new, systematic framework based on historical aircraft data and primarily composed of design data and regression models. It is a rapid, low-fidelity analysis to provide a starting point for the conceptual design process by (1) assessing the performance capabilities of four types of high-speed aircraft, (2) providing initial estimates for weights and geometry with uncertainty, and (3) exploring how changes in these affect performance within design spaces. Using this framework, an initial set of reasonable aircraft configurations is obtained based on speed, altitude, and payload requirements, which can serve to accelerate the design process and avoid unforeseen problems later in the design cycle. An example is provided to demonstrate the application of the framework to launch the conceptual design of a new hypersonic aircraft with a given set of mission requirements.
Research Report

Process Control for Defect Mitigation in Laser Powder Bed Fusion Additive Manufacturing

2023-05-15
EPR2023011
Success in metal additive manufacturing (AM) relies on the optimization of a large set of process parameters to achieve materials whose properties and performance meet design and safety requirements. Despite continuous improvements in the process over the years, the quality of AM parts remains a major concern for manufacturers. Today, researchers are starting to move from discrete geometry-dependent build parameters to continuously variable or dynamically changing parameters that are geometry- and scan-path aware. This approach has become known as “feedforward control.” Process Control for Defect Mitigation in Laser Powder Bed Fusion Additive Manufacturing discusses the origins of feedforward control, its early implementations in AM, the current state of the art, and a path forward to its broader adoption. Click here to access the full SAE EDGETM Research Report portfolio.
Journal Article

Using AADL to Assess Architectural Concerns for Cyber Security

2023-03-07
2023-01-0998
We describe how we apply the SAE AS 5506 Architecture and Analysis Design Language (AADL) [4] to reason about contextual and architectural concerns for cyber security. A system’s cyber security certification requires verification that the system’s cyber security mechanisms are correct, non-bypassable, and tamper-resistant. We can verify correctness by examining the mechanism itself, but verifying the other qualities requires us to examine the context in which that mechanism resides. Understanding that context and validating the system’s evolving design against that context is an objective for the Architecture Centric Virtual Integration Process (ACVIP), an AADL-based approach to model and detect system design defects before they become too costly to fix. We describe our work to apply AADL to assess non-bypassability and tamper-resistance. The results of our research - tool plugins for cyber security architectural validation - support system developers today in their ACVIP activities.
Journal Article

A Novel Cloud-Based Additive Manufacturing Technique for Semiconductor Chip Casings

2022-08-02
Abstract The demand for contactless, rapid manufacturing has increased over the years, especially during the COVID-19 pandemic. Additive manufacturing (AM), a type of rapid manufacturing, is a computer-based system that precisely manufactures products. It proves to be a faster, cheaper, and more efficient production system when integrated with cloud-based manufacturing (CBM). Similarly, the need for semiconductors has grown exponentially over the last five years. Several companies could not keep up with the increasing demand for many reasons. One of the main reasons is the lack of a workforce due to the COVID-19 protocols. This article proposes a novel technique to manufacture semiconductor chips in a fast-paced manner. An algorithm is integrated with cloud, machine vision, sensors, and email access to monitor with live feedback and correct the manufacturing in case of an anomaly.
Journal Article

Conceptualizing an Urban Operations Vehicle within a Comprehensive Research and Development Program

2023-09-07
Abstract In the last decades we have witnessed an increasing number of military operations in urban environments. Complex urban operations require high standards of training, equipment, and personnel. Emergency forces on the ground will need specialized vehicles to support them in all parts and levels of this extremely demanding environment including the subterranean and interior of infrastructure. The development of vehicles for this environment has lagged but offers a high payoff. This article describes the method for developing a concept for an urban operations vehicle by characterization of the urban environment, deduction of key issues, evaluation of related prototyping, science fiction story-typing of the requirements for such a vehicle, and comparison with field-proven and scalable solutions. Embedding these thoughts into a comprehensive research and development program provides lines of development, setting the stage for further research.
X