Your Selections

Data management
Show Only

Collections

File Formats

Content Types

Dates

Sectors

Topics

Authors

Publishers

Affiliations

Committees

Events

Magazine

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Message Sets for Advanced Traveler Information System (ATIS)

V2X Core Technical Committee
  • Ground Vehicle Standard
  • J2354_201906
  • Current
Published 2019-06-11 by SAE International in United States
This SAE Standard describes standardized medium-independent messages needed by information service providers for Advanced Traveler Information Systems (ATIS). The messages contained herein address all stages of travel (informational, pre-trip and en route), all types of travelers (drivers, passengers, personal devices, computers, other servers), all categories of information, and all platforms for delivery of information (in-vehicle, portable devices, kiosks, etc.).
This content contains downloadable datasets
Annotation ability available

Singlet-Based Magnet for Enhanced Data Storage

  • Magazine Article
  • TBMG-34404
Published 2019-05-01 by Tech Briefs Media Group in United States

Anew type of magnet — called a singlet-based magnet — was discovered that differs from conventional magnets in which small magnetic constituents align with one another to create a strong magnetic field. By contrast, the singlet-based magnet has fields that pop in and out of existence, resulting in an unstable force, but one that potentially has more flexibility than conventional counterparts.

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Trust-Based Control and Scheduling for UGV Platoon under Cyber Attacks

Clemson University-Fangjian Li, John R. Wagner, Yue Wang
U.S. Army TARDEC-Dariusz Mikulski
Published 2019-04-02 by SAE International in United States
Unmanned ground vehicles (UGVs) may encounter difficulties accommodating environmental uncertainties and system degradations during harsh conditions. However, human experience and onboard intelligence can may help mitigate such cases. Unfortunately, human operators have cognition limits when directly supervising multiple UGVs. Ideally, an automated decision aid can be designed that empowers the human operator to supervise the UGVs. In this paper, we consider a connected UGV platoon under cyber attacks that may disrupt safety and degrade performance. An observer-based resilient control strategy is designed to mitigate the effects of vehicle-to-vehicle (V2V) cyber attacks. In addition, each UGV generates both internal and external evaluations based on the platoons performance metrics. A cloud-based trust-based information management system collects these evaluations to detect abnormal UGV platoon behaviors. To deal with inaccurate information due to a V2C cyber attack, a RoboTrust algorithm is designed to analyze vehicle trustworthiness and eliminate information with low credit. Finally, a human operator scheduling algorithm is proposed when the number of abnormal UGVs exceeds the limit of what human operators can handle concurrently. Representative simulation results…
This content contains downloadable datasets
Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Model-Based Software Development: Functional Safety Compliance via Built-In Tool Intelligence

SimuQuest Inc.-Raymond C. Turin
Published 2019-04-02 by SAE International in United States
Today’s automobiles are among the most sophisticated machines on the planet. Much of the functionality of modern automobiles emanates from embedded software features that control electronic, mechanical or pneumatic devices. Over the past few decades the number of software features and the associated code has grown exponentially and the respective embedded software systems have reached a level of complexity which is increasingly difficult to manage. As a consequence, recalls due to software defects have become a major concern and today constitute about 50% of the overall warranty cost [1]. Since the operation of automobiles has severe public safety implications, the development of embedded automotive software has become subject to stringent functional safety standards (ISO 26262) and compliance with these standards has become a major hurdle in the development of automotive software.This paper outlines a tool-based solution that satisfies an important subset of functional safety standards via built-in intelligence. The solution marks a major step towards an agile, safety compliant development process that does not impose restrictions regarding product innovation. The core concept of this tool-based…
Annotation ability available

How FMC Developments Support Legacy and Next-Gen Data Needs

  • Magazine Article
  • TBMG-34121
Published 2019-04-01 by Tech Briefs Media Group in United States

While FMC (FPGA Mezzanine Card) celebrated its 10th anniversary this year, it continues to provide a variety of benefits to the embedded system developer. These include sustained implementation and deployment in new technologies. Additionally, the release of FMC+ provides improved design capabilities. However, with data rates always on the rise and shrinking form factors, the question arises: Why does FMC continue to be so popular and what has sustained it over the years?

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

How FMC Developments Support Legacy and Next-Gen Data Needs

Aerospace & Defense Technology: April 2019

  • Magazine Article
  • 19AERP04_04
Published 2019-04-01 by SAE International in United States

While FMC (FPGA Mezzanine Card) celebrated its 10th anniversary this year, it continues to provide a variety of benefits to the embedded system developer. These include sustained implementation and deployment in new technologies. Additionally, the release of FMC+ provides improved design capabilities. However, with data rates always on the rise and shrinking form factors, the question arises: Why does FMC continue to be so popular and what has sustained it over the years?

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Risk Analysis of Blockchain Application for Aerospace Records Management

Honeywell Aerospace-Vinay Kasimsetty, Susan Barlow
Honeywell International Inc.-Sujay Rao
Published 2019-03-19 by SAE International in United States
Blockchain as a technology has been successfully deployed in the financial industry. As the technology continues to mature, there are opportunities to use this to solve operational challenges in Aerospace. One of the common use cases is replacing paper records as a proof of compliance with a blockchain enabled distributed ledger.Commonly available open source blockchain frameworks have security ingrained in the components. However, replacing paper records with a blockchain based distributed ledger will require investigation of potential risks involved in the end to end usage of this technology for records management.The objective of this paper is to elucidate potential risks in an aviation record management workflow environment enabled by blockchain and suggest requirements to mitigate the risks.In addition requirements for Blockchain based systems will be proposed, which will guarantee minimum functional requirements like Protection of confidential informationIntegrity of the information in a recordSafeguards against unauthorized accessThe potential gaps are understood using an illustrative end to end blockchain based process along with their conceptual high level intermediate steps. For example: Authenticated trusted digital identities of the…
Annotation ability available

Proactive Cybersecurity Saves Healthcare Organizations from Data Breaches

  • Magazine Article
  • TBMG-33993
Published 2019-03-01 by Tech Briefs Media Group in United States

Over the past few years, healthcare organizations have increasingly become one of the leading targets for cyber criminals with data breaches exposing personal patient data, medical records, and financial information, resulting in millions of dollars of added cost to these institutions. As the healthcare organizations become savvier with their cybersecurity, the criminals just get more creative.

“Light-Written” Photonic Memory Devices

  • Magazine Article
  • TBMG-33911
Published 2019-03-01 by Tech Briefs Media Group in United States

Light is the most energy-efficient way to move information; however, light shows one big limitation: it is difficult to store. Data centers, for example, rely primarily on magnetic hard drives in which information is transferred at an energy cost that is increasing. A hybrid technology was developed that shows advantages of both light and magnetic hard drives.

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Standard Practice for Human Systems Integration

G-45 Human Systems Integration
  • Aerospace Standard
  • SAE6906
  • Current
Published 2019-02-08 by SAE International in United States
This Human Systems Integration (HSI) Standard Practice identifies the Department of Defense (DoD) approach to conducting HSI programs as part of procurement activities. This Standard covers HSI processes throughout design, development, test, production, use, and disposal. Depending on contract phase and/or complexity of the program, tailoring should be applied. The scope of this standard includes prime and subcontractor HSI activities; it does not include Government HSI activities, which are covered in the DoD HSI Handbook. HSI programs should use the latest version of standards and handbooks listed below, unless a particular revision is specifically cited in the contract.
This content contains downloadable datasets
Annotation ability available