Refine Your Search

Topic

Search Results

Standard

AIRBORNE RECORDER FILE FORMAT

1992-01-01
CURRENT
ARINC657
This document defines the characteristics necessary to standardize the airborne recorder download file format in order to facilitate data import, transcription, and exchange. A standardized data format will reduce the variety of readout equipment required for airborne recorder data transcription. This document defines the detailed architecture of the Recorder Standard Output (RSO) file. The architecture is a tagged file structure within which many different files and their formats can be supported. The structure is necessary to support newer recording requirements for flight data, data link, audio, and image recording. This structure is intended for use with all civil recorders and should support use with military recorders.
Journal Article

Threat Identification and Defense Control Selection for Embedded Systems

2020-08-18
Abstract Threat identification and security analysis have become mandatory steps in the engineering design process of high-assurance systems, where successful cyberattacks can lead to hazardous property damage or loss of lives. This article describes a novel approach to perform security analysis on embedded systems modeled at the architectural level. The tool, called Security Threat Evaluation and Mitigation (STEM), associates threats from the Common Attack Pattern Enumeration and Classification (CAPEC) library with components and connections and suggests potential defense patterns from the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security standard. This article also provides an illustrative example based on a drone package delivery system modeled in AADL.
Journal Article

Algorithm Development for Avoiding Both Moving and Stationary Obstacles in an Unstructured High-Speed Autonomous Vehicular Application Using a Nonlinear Model Predictive Controller

2020-10-19
Abstract The advancement in vision sensors and embedded technology created the opportunity in autonomous vehicles to look ahead in the future to avoid potential obstacles and steep regions to reach the target location as soon as possible and yet maintain vehicle safety from rollover. The present work focuses on developing a nonlinear model predictive controller (NMPC) for a high-speed off-road autonomous vehicle, which avoids undesirable conditions including stationary obstacles, moving obstacles, and steep regions while maintaining the vehicle safety from rollover. The NMPC controller is developed using CasADi tools in the MATLAB environment. The CasADi tool provides a platform to formulate the NMPC problem using symbolic expressions, which is an easy and efficient way of solving the optimization problem. In the present work, the vehicle lateral dynamics are modeled using the Pacejka nonlinear tire model.
Journal Article

Design of a 1.2 kW Interleaved Synchronous Buck Converter for Retrofit Applications in Aviation Systems

2020-10-19
Abstract Presently, 270 V direct current (DC) systems replace older 28 V DC voltage systems in both the civil and military aviation industry due to the requirement for more electrical power needs on board. Therefore, the existing avionics require retrofitting. The conversion from 270 V to 28 V appears to be quite promising for both old and new systems. This study aims to design an interleaved synchronous modular buck converter topology as a candidate for these requirements. Calculations for the converter design are conducted considering aviation standards. Switching with pulse-width modulation (PWM) is used to control the power converter. A double-loop feedback control system based on voltage and current feedback is designed. Therefore, the buck converter circuit with 1145 W power output is proposed, which supplies a 28 V and 41 A DC output from a 270 V DC input. The concept is verified using simulations and hardware-in-the-loop (HIL) experimental results.
Technical Paper

Experimental Stress/Strain Analysis of a Standardized Sensor Platform for a C-130 Aircraft

2005-10-03
2005-01-3426
Project Oculus is an in-flight deployable mechanical arm/pod system that will accommodate 500 pounds of sensor payload, developed for a C-130 military aircraft. The system is designed for use in counter narco-terrorism and surveillance applications by the Department of Defense and the National Guard [1]. A prototype of the system has been built and is in the testing/analysis phase. The purpose of this study was to analyze the actual stresses and strains in the critical areas found using previous Finite Element (FE) simulations and to ensure that acceptable safety requirements have been met. The system components tested will be redesigned, tested, and reconstructed in the case of unacceptable safety factors or if more reliable methods can be implemented. The system was built to be deployed and retracted in flight, to avoid causing any problems in take off and landing.
Research Report

Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights

2022-07-28
EPR2022016
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality.
Journal Article

Predictive Modeling of Aircraft Dynamics Using Neural Networks

2022-05-25
Abstract Fighter pilots must study models of aircraft dynamics before learning complex maneuvers and tactics. Similarly, autonomous fighter aircraft applications may benefit from a model-based learning approach. Instead of using a preexisting physics model of a given aircraft, a machine learning system can learn a predictive model of the aircraft physics from training data. Furthermore, it can model interactions between multiple friendly aircraft, enemy aircraft, and the environment. Such a system can also learn to represent state variables that are not directly observable, as well as dynamics that are not hard coded. Existing model-based methods use a deep neural network that takes observable state information and agent actions as input and provides predictions of future observations as output. The proposed method builds upon this approach by adding a residual feedforward skip connection from some of the inputs to all of the outputs of the deep neural network.
Standard

Coolant Hose - Normal Service Type Convoluted, Wire Support Hose (Supplement to SAE J20 for Government Use Replacing Part of MS51008)

2018-03-04
CURRENT
J20/2_201803
This SAE Standard provides ordering information for any SAE 20R5 hose type (such as “EC, HT, LT” or combination thereof.) This is a wire-reinforced hose for coolant circulating systems of automotive type engines. This hose consists of a convoluted section with plain ends. The hose shall contain a wire helix or helices in the convoluted section. It is a supplement for Government use but may be used by others.
Research Report

Impact of Quantum Computing in Aerospace

2022-06-14
EPR2022014
As the complexity of systems expands with increasing emphasis for digital transformation, the aerospace industry is generating big data to meet customer requirements. The ability to that data to solve challenging problems is limited by many factors, including the capabilities of current classical computing systems. Impact of Quantum Computing in Aerospace discusses how quantum computing systems offer (possibly quadratic to exponentially) greater computational power over classical computers. The power of quantum computing is tremendous and has many potential impacts on the aerospace industry; however, there are also many unsettled topics surrounding the future of the technology. Click here to access the full SAE EDGETM Research Report portfolio.
Research Report

Process Control for Defect Mitigation in Laser Powder Bed Fusion Additive Manufacturing

2023-05-15
EPR2023011
Success in metal additive manufacturing (AM) relies on the optimization of a large set of process parameters to achieve materials whose properties and performance meet design and safety requirements. Despite continuous improvements in the process over the years, the quality of AM parts remains a major concern for manufacturers. Today, researchers are starting to move from discrete geometry-dependent build parameters to continuously variable or dynamically changing parameters that are geometry- and scan-path aware. This approach has become known as “feedforward control.” Process Control for Defect Mitigation in Laser Powder Bed Fusion Additive Manufacturing discusses the origins of feedforward control, its early implementations in AM, the current state of the art, and a path forward to its broader adoption. Click here to access the full SAE EDGETM Research Report portfolio.
Journal Article

Using AADL to Assess Architectural Concerns for Cyber Security

2023-03-07
2023-01-0998
We describe how we apply the SAE AS 5506 Architecture and Analysis Design Language (AADL) [4] to reason about contextual and architectural concerns for cyber security. A system’s cyber security certification requires verification that the system’s cyber security mechanisms are correct, non-bypassable, and tamper-resistant. We can verify correctness by examining the mechanism itself, but verifying the other qualities requires us to examine the context in which that mechanism resides. Understanding that context and validating the system’s evolving design against that context is an objective for the Architecture Centric Virtual Integration Process (ACVIP), an AADL-based approach to model and detect system design defects before they become too costly to fix. We describe our work to apply AADL to assess non-bypassability and tamper-resistance. The results of our research - tool plugins for cyber security architectural validation - support system developers today in their ACVIP activities.
Journal Article

A Novel Cloud-Based Additive Manufacturing Technique for Semiconductor Chip Casings

2022-08-02
Abstract The demand for contactless, rapid manufacturing has increased over the years, especially during the COVID-19 pandemic. Additive manufacturing (AM), a type of rapid manufacturing, is a computer-based system that precisely manufactures products. It proves to be a faster, cheaper, and more efficient production system when integrated with cloud-based manufacturing (CBM). Similarly, the need for semiconductors has grown exponentially over the last five years. Several companies could not keep up with the increasing demand for many reasons. One of the main reasons is the lack of a workforce due to the COVID-19 protocols. This article proposes a novel technique to manufacture semiconductor chips in a fast-paced manner. An algorithm is integrated with cloud, machine vision, sensors, and email access to monitor with live feedback and correct the manufacturing in case of an anomaly.
Journal Article

Conceptualizing an Urban Operations Vehicle within a Comprehensive Research and Development Program

2023-09-07
Abstract In the last decades we have witnessed an increasing number of military operations in urban environments. Complex urban operations require high standards of training, equipment, and personnel. Emergency forces on the ground will need specialized vehicles to support them in all parts and levels of this extremely demanding environment including the subterranean and interior of infrastructure. The development of vehicles for this environment has lagged but offers a high payoff. This article describes the method for developing a concept for an urban operations vehicle by characterization of the urban environment, deduction of key issues, evaluation of related prototyping, science fiction story-typing of the requirements for such a vehicle, and comparison with field-proven and scalable solutions. Embedding these thoughts into a comprehensive research and development program provides lines of development, setting the stage for further research.
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2016-01-14
HISTORICAL
J3061_201601
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. The best practices are intended to be flexible, pragmatic, and adaptable in their further application to the vehicle industry as well as to other cyber-physical vehicle systems (e.g., commercial and military vehicles, trucks, busses). Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems.
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2021-12-15
CURRENT
J3061_202112
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. The best practices are intended to be flexible, pragmatic, and adaptable in their further application to the vehicle industry as well as to other cyber-physical vehicle systems (e.g., commercial and military vehicles, trucks, busses). Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems.
Magazine

Tech Briefs: June 2018

2018-06-01
Beyond VMEbus - A New Concept Taming the Thermal Behavior of Solid-State Military Lasers Solving the Challenge of Thermal Design in Aerospace Electronics Improving Component Life in Abrasive, Corrosive Aerospace Environments New Pulse Analysis Techniques for Radar and EW Validation of Ubiquitous 2D Radar Converting Existing Copper Wire Firing System to a Fiber-Optically Controlled Firing System for Electromagnetic Pulsed Power Experiments Technological improvements make pulsed-power experiments with gunpowder- or air-driven guns safer. Low-Cost Ground Sensor Network for Intrusion Detection COTS-based system could provide increased level of security with less manpower. In-Network Processing on Low-Cost IoT Nodes for Maritime Surveillance Commercially available system of distributed wireless sensors could increase the Navy's intelligence collection footprint.
Magazine

Tech Briefs: October 2018

2018-10-01
Detecting Drones with Doppler-Based Radar Digital Transformation for a Connected Enterprise Using Electromagnetic Brakes to Keep Thrust Reversers in Place Thermostatic Solutions for Temperature Control Applications Bringing RF into the Embedded World: It's Time Compact Power Amplifier Solution for Electronic Warfare Burner Rig Testing of A500® C/SiC Test method simulates, in a laboratory environment, the service conditions ceramic-matrix composite material would experience in turbine engine exhaust applications. Space Debris Orbit and Attitude Prediction for Enhanced and Efficient Space Situational Awareness Developing accurate models to predict the behavior of manmade debris in space could be the key to preventing collisions with satellites. Maintaining Enterprise Resiliency Via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS) Implementing new technologies to create a more resilient, secure cloud computing environment.
X