Refine Your Search

Topic

Author

Affiliation

Search Results

SAE MOBILUS Subscription

SAE Aerospace Technical Papers Collection

2016-11-30
The Aerospace Technical Paper Collection is a family of technical papers as either an annual subscription (current papers, archived papers, or both) or a perpetual collection (1906-1997). This collection is perfect for aerospace engineers, managers, or educators who need access to the most current content covering today's most relevent topics. Please contact one of our sales representatives to learn more and start your subscription today! SAE Sales Team customersales@sae.org 1-888-875-3976 (U.S. and Canada) 1-724-772-4086 (Outside the U.S.)
Standard

LOGICAL SOFTWARE PART PACKAGING FOR TRANSPORT

2020-11-16
CURRENT
ARINC641-1
The purpose of this standard is to provide a method for packaging aircraft software parts for distribution using contemporary media or by electronic distribution. This project intends to standardize and provide guidance for the storage of floppy based software, currently packaged in media set parts. This standard format can be then stored or distributed on a single physical media member (CD-ROM), or by electronic crate. The obsolescence of floppy disks drive an urgent need for this guidance.
Standard

Quality Management Systems - Nonconformance Documentation - Word Format

2007-09-26
AS9131AW
AS9131 - This standard defines the common nonconformance data definition and documentation that an internal or external supplier or sub-tier supplier must submit when informing a customer of a nonconformity. The requirements shall be are applicable for reporting a nonconforming product to the owner/operator (i.e., end item user), if specified by contract. Reporting of nonconformance data, either electronically or conventionally on paper, is subject to the terms and conditions of the contract. This also includes, where applicable, data access under export control regulations.
Standard

BITE GLOSSARY

1986-12-18
CURRENT
ARINC612
The purpose of this standard is to provide a source of definitions of terms and acronyms commonly used in the air transport maintenance community for test and evaluation with an emphasis on terms applicable to BITE.
Standard

AIRCRAFT SOFTWARE COMMON CONFIGURATION REPORTING

2019-08-13
CURRENT
ARINC843-1
This standard defines a common configuration report format that can be retrieved from an aircraft for use by ground tools and maintenance personnel. Reports will be generated in Extensible Markup Language (XML) format and structured as defined by this document. Several optional elements and attributes are defined to allow flexibility for a given report. This standard provides aircraft manufacturers, regulatory agencies, and airlines a format standard for aircraft configuration reporting, and facilitates automated comparison of configuration data reports (e.g., authorized versus as flying, etc.).
Standard

TIMELY RECOVERY OF FLIGHT DATA (TRFD)

2021-08-06
CURRENT
ARINC681
The difficulty in locating crash sites has prompted international efforts for alternatives to quickly recover flight data. This document describes the technical requirements and architectural options for the Timely Recovery of Flight Data (TRFD) in commercial aircraft. ICAO and individual Civil Aviation Authorities (CAAs) levy these requirements. The ICAO Standards and Recommended Practices (SARPs) and CAA regulations cover both aircraft-level and on-ground systems. This report also documents additional system-level requirements derived from the evaluation of ICAO, CAA, and relevant industry documents and potential TRFD system architectures. It describes two TRFD architectures in the context of a common architectural framework and identifies requirements. This report also discusses implementation recommendations from an airplane-level perspective.
Standard

EMBEDDED INTERCHANGE FORMAT FOR OBSTACLE DATABASES

2018-12-21
CURRENT
ARINC815
This document defines an open encoding format for obstacle databases. This format, when designed and implemented, will enable a quick, economic, and efficient use of Obstacle Databases (ObsDBs). However, since industry does not require applications to be standardized, data interpretation is not addressed in this document.
Standard

EMBEDDED INTERCHANGE FORMAT FOR TERRAIN DATABASES

2018-12-21
CURRENT
ARINC813
This document defines an open encoding format for terrain databases. This format, when designed and implemented, will enable a quick, economic, and efficient use of Terrain Databases (TerrDBs). However, since industry does not require applications to be standardized, data interpretation is not addressed in this document.
Video

Fault-Tree Generation for Embedded Software Implementing Dual-Path Checking

2011-11-17
Given the fast changing market demands, the growing complexity of features, the shorter time to market, and the design/development constraints, the need for efficient and effective verification and validation methods are becoming critical for vehicle manufacturers and suppliers. One such example is fault-tree analysis. While fault-tree analysis is an important hazard analysis/verification activity, the current process of translating design details (e.g., system level and software level) is manual. Current experience indicates that fault tree analysis involves both creative deductive thinking and more mechanical steps, which typically involve instantiating gates and events in fault trees following fixed patterns. Specifically for software fault tree analysis, a number of the development steps typically involve instantiating fixed patterns of gates and events based upon the structure of the code. In this work, we investigate a methodology to translate software programs to fault trees.
Video

Using SCADE System for the Design and Integration of Critical Systems

2012-03-14
This presentation shows the SCADE System product line for systems modeling and generation based on the SysML standard and the Eclipse Papyrus open source technology. SCADE System has been developed in the framework of Listerel, a joint laboratory of Esterel Technologies, provider of the SCADE�, and CEA LIST, project leader of the Eclipse component, Papyrus. From an architecture point of view, the Esterel SCADE tools are built on top of the SCADE platform which includes both SCADE Suite�, a model-based development environment dedicated to critical software, and SCADE System enabling model-based system engineering. SCADE System includes Papyrus, an open source component (under EPL license), integrated in the modeling platform of Eclipse. Using this integrated modeling platform, both system and software teams share the same environment for system development. Furthermore, other model-based tools can be added to the environment, due to the use of Eclipse.
Video

Eurocae WG-72 Activities

2012-03-16
The presentation provides an overview about the activities of Eurocae Working Group 72 (WG-72) starting with a brief synopsis of the context which suggested why such a committee should be established in 2006. It then goes into further detail about the drivers for the work of the committee, which call for the products to be delivered. It addresses some of the challenges with respect to its users. It points out that one of the lessons the committee learned was importance of the focus on the users, such that the products provide their maximum utility. Hence, the users should better be among the participants to achieve this objective. Other industries have dealt with the subject of Information System (or Cyber-Physical) Security long before this industry was forced to consider it. Consequently there are many industry standards and national or international norms, which may help to develop what is deemed needed for Civil Aviation.
Video

Advancing Aircraft Cyber Security - Potential New Architectures and Technologies

2012-03-16
Cyber security in the aviation industry, especially in relation to onboard aircraft systems, presents unique challenges in its implementation and management. The cyber threat model is constantly evolving and will continually present new and different challenges to the aircraft operator in responding to new cyber threats without either invoking a lengthy software update and re-certification process or limiting aircraft-to-ground communications to the threatened system or systems. This presentation discusses a number of system architectural options and developing technologies that could be considered to enhance the aircraft cyber protection and defensive capabilities of onboard systems as well as to minimize the effort associated with certification/re-certification. Some of these limit the aircraft?s vulnerabilities or in cyber terms, its ?threat surface?.
X