Browse Topic: Computer software and hardware

Items (6,222)
Original equipment manufacturers, Tier 1 suppliers, and the rest of the value chain, including the semiconductor industry, are reshaping their product portfolios, development processes, and business models to support this transformation to software-defined vehicles (SDVs). The focus on software is rippling out through the automotive sector, forcing the industry to rethink organization, leadership, processes, and future roadmaps. The Software-defined Vehicle: Its Current Trajectory and Execution Challenges assesses the state of SDVs and explores the potential hurdles to execution and examines the work being done in the industry. The goal is to evaluate whether the implementation of SDVs will encounter the same fate as electrification or autonomous technologies, which after some level of disillusionment, are expected to pick up momentum in a more mature way. Click here to access the full SAE EDGETM Research Report portfolio
Goswami, Partha
ABSTRACT This paper reports on a prototype project to develop and mature a common, open, comprehensive, collaboratively developed, Government-owned, autonomy software architecture for ground robotic and autonomous systems (RAS). The prototype architecture, codenamed “SCION” promises the flexibility needed by the both the Government and industry research, development, testing, and engineering (RDT&E) communities to leverage reusable software and more rapidly innovate new capabilities; while ensuring the discipline and enabling the modularity required to develop RDT&E software structured to meet the software safety, cybersecurity, upgradeability, and other needs of RAS programs of record. Accordingly, program offices can adopt an acquisition strategy that requires compatibility with the de facto, military RAS standard, SCION architecture, while providing OEMs with baseline, SCION-compatible, GFE software (e.g. a future version of RTK). Such a strategy encourages optimal innovation
Thomasmeyer, WilliamJohn, Jon St.Martin, DaveMattes, Rich
ABSTRACT Currently there is no method to ensure that the software loaded on a vehicle has been compromised at the software level. Common practice is to use physical port security to secure all network and data bus connection points with physical devices requiring tool, keys, or damage to tamper evident devices to prevent, inhibit, or discourage unauthorized connection; turn off access to the ports in the BIOS and password protect the BIOS. As well as give non-admin access to user accounts and password protect the operating systems. All these countermeasures help to prevent access but there is no way to tell if the software was compromised if not detected by these methods. Blockchain technology ensures that the software has not been compromised by comparing a hash generated at start up and comparing it to the distributed ledger. This technology helps to bring Warfighter technology into the future
Fortney, George G
ABSTRACT The U.S. Army must adapt and upgrade ground platforms at the speed of technology advancement to maintain competitive advantages over adversaries. The Program Executive Office (PEO) Ground Combat Systems (GCS) Common Infrastructure Architecture (GCIA) is a new ground systems approach to enable persistent modernization of future platforms. For legacy platforms, Project Lead Capability Transition and Product Integration (PL CTPI) is developing plans to incrementally incorporate standards and portions of GCIA where feasible and affordable on legacy platforms. The GCIA will enable rapid integration of ground system capabilities, increasing the Army’s ability to counter emergent threats on the battlefield. Citation: PEO GCS / PL CTPI, “Architecting for Persistent Modernization,” In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 16-18, 2022
CTPI, PEO GCS / PL
ABSTRACT Selecting component software for next generation vehicular and payload electronics is an increasingly difficult challenge. There are many culprits, including increased complexity at the silicon level that can ultimately enable the software defined “tank” of the future. This paper will address software criteria and development processes required to deploy a standards-based, net-enabled military ground vetronics capability and provide demonstrable foundational technology
Warther, John
ABSTRACT This paper explores the construction of a Trusted Execution Environment (TEE) which doesn’t rely on TrustZone or specific processing modes in order to achieve a high-performance operating environment with multiple layers of hardware enforced confidentiality and integrity. The composed TEE uses hardware intellectual property (IP) blocks, existing hardware-level protections, a hypervisor, Linux security module (LSM), and Linux kernel capabilities including a file system in order to provide the performance and multiple layers of confidentiality and integrity. Additionally, the TEE composition explores both open source and commercial solutions for achieving the same result. Citation: J. Kline, “High Performance Trusted Execution Environment”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 13-15, 2019
Kline, Jonathan
ABSTRACT This paper describes a software infrastructure made up of tools and libraries designed to assist developers in implementing computational dynamics applications running on heterogeneous and distributed computing environments. Together, these tools and libraries compose a so called Heterogeneous Computing Template (HCT). The underlying theme of the solution approach embraced by HCT is that of partitioning the domain of interest into a number of sub-domains that are each managed by a separate core/accelerator (CPU/GPU) pair. The five components at the core of HCT, which ultimately enable the distributed/heterogeneous computing approach to large-scale dynamical system simulation, are as follows: (a) a method for the geometric domain decomposition; (b) methods for proximity computation or collision detection; (c) support for moving data within the heterogeneous hardware ecosystem to mirror the migration of simulation elements from subdomain to subdomain; (d) parallel numerical
Negrut, DanHeyn, TobySeidl, AndrewMelanz, DanGorsich, DavidLamb, David
ABSTRACT The importance of hardening robotic and autonomous systems (RAS) considered for field deployment against cyber threats has been recognized by organizations across the Department of Defense (DoD). Among these needs is the ability to securely provide these modern military vehicles with software updates containing critical new functionality and security improvements. A secure update process and system for military RAS has been implemented building on a framework designed for the automotive industry. Demonstrations of the capabilities and mitigations against possible attacks on the update process will be performed on a RAS MRZR in a mock field environment. Citation: S. Pereira, C. Mott, D. Mikulski, “Secure Update Process For Robotic And Autonomous Systems,” In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 15-17, 2023
Pereira, SabrinaMott, CameronMikulski, Dariusz
ABSTRACT The U.S. Army has realized the need to change its procurement strategy to demand shorter equipment fielding times, delivering capabilities with clear military value that can be improved in low risk increments. This paper addresses the need for a C4ISR infrastructure based on open standards that can be sourced from multiple vendors and host the full spectrum of applications. The Distributed Computing Environment (DCE) -- is a computing and network infrastructure scalable from handheld and dismounted form factors through redundant, distributed clusters supporting multiple secure enclaves, and qualified for the most stringent of ground combat environments. The DCE captures the benefits of commercial-off-the-shelf (COTS) capitalization surrounding the x86 architecture, and implements open standards including OpenVPX, POSIX, Gigabit Ethernet, the Object Management Group Data Distribution Service, and the Service Availability Forum. Packaged COTS subsystems implement the hardware as
Press, BarrySealander, Jacob
ABSTRACT Electronic Stability Control (ESC) is a wheeled vehicle safety system through which active yaw and roll control are realized. ESC is quickly making its way onto tactical wheeled vehicles (TWV) and a source to independently analyze the performance of such systems is becoming increasingly necessary. This paper outlines the efforts of the Army Materiel Systems Analysis Activity (AMSAA) and the Army Research Laboratory (ARL) in the development of a modeling tool capable of replicating typical ESC control systems and algorithms. Created within the MATLAB®/Simulink® environment, the fully-adaptable and reconfigurable tool features corrective yaw control via differential braking and throttle management, along with a detailed braking sub-model capable of capturing brake actuation dynamics. A multi-degree of freedom TruckSim® vehicle model is utilized in conjunction with the tool to accurately model the complexity state and replicate the onboard sensor signals typically available to an
Mazza, MarcusRhoads, MatthewSong, PeilinWay, ChristopherBrown, RossReiter, Mark
ABSTRACT Software systems, like physical systems, require explicit architectural descriptions to increase system level comprehension. Developing networked robotic systems of diverse physical assets is a continuing challenge to developers. Problems often multiply when adding new hardware/software artifacts or when reconfiguring existing systems. This work describes a method to create reconfigurable software for Army robotic systems via model-based, graphical domain-specific languages and reusable components. The paradigm makes use of feature models, the basis for product line software that describes and constrains variable aspects of the robotic system’s hardware and associated software. Domain-specific languages use terms understandable to domain engineers and technicians. Users of the modeling environment are able to stay at a high level of abstraction and need not concern themselves with the details of the composed and generated code
Smuda, WilliamSkalny, MatthewMagowan, Leif
ABSTRACT Optical distortion measurements for transparent armor (TA) solutions are critical to ensure occupants can see what is happening outside a vehicle. Unfortunately, optically transparent materials often have poorer mechanical properties than their opaque counterparts which usually results in much thicker layups to provide the same level of protection. Current standards still call for the use of a double exposure method to manually compare the distortion of grid lines. This report presents provides a similar method of analysis with less user input using items typically available in many mechanics labs: machine vision cameras and digital image correlation software. Citation: J. M. Gorman, “An Easier Approach to Measuring Optical Distortion in Transparent Armor”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 11-13, 2020. The views presented are those of the author and do not necessarily represent the views of DoD or
Gorman, James M.
ABSTRACT The High Performance Computing Modernization Program (HPCMP) Computational Research and Engineering Acquisition Tools and Environments – Ground Vehicles (CREATE™-GV) Program is a software development effort to create government-owned scientific High Performance Computing (HPC) code for the next generation of mobility analysis tools. The HPCMP CREATE™-GV software consists of three main components: the Ground Vehicle Interface – a web-based interface for interacting with the HPCMP CREATE™-GV tools on the HPC; Mobility Analysis Tool (MAT) – computing tactical mobility performance of ground vehicles over broad areas of real-world terrain for mission-based performance metrics; and Mercury – a high-fidelity, multi-body physics analysis tool that runs a co-simulation of many components on the HPC, the results of which can then be fed into MAT or exported to trade space tools for further analysis. In this paper, we provide an overview of the HPCMP CREATE™-GV program and present
Skorupa, ThomasBoyle, Sara PaceMange, JeremyKedziorek, DanielLucas, CesarGoodin, ChristopherPriddy, Jody D.Walker, KevinPuhr, MichaelMazzola, Michael S.Brendle, Jacob
ABSTRACT Increased complexity of ground combat vehicles drives the need to support software applications from a broad variety of sources and seamlessly integrate them into a vehicle system. Traditionally, hosting GOTS and COTS applications required burdening a vehicle’s computing infrastructure with dedicated hardware tailored to specific processors and operating systems, heavily impacting the vehicles space, weight and power systems. Alternatively, porting the applications to the vehicles native computer systems is often cost prohibitive and error prone. Advancements in commercially developed software virtualization capabilities bring an entirely new approach for dealing with this challenge. Virtualization allows real-time and non-real-time applications running on different operating systems to operate seamlessly alongside each other on the same hardware. The benefits include reduced software porting costs and reduced qualification efforts. Additionally, elimination of specialized
McDowell, DanielNorcross, John
ABSTRACT TARDEC VEA will begin integrating their Vehicular Integration for the Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance / Electronic Warfare (C4ISR/EW) Interoperability (VICTORY) Enabled Company Transformation (VECTOR) software onto three unique military vehicles in FY2015. One of the main objectives of VECTOR is to evaluate the VICTORY standard. VECTOR will use the aforementioned military vehicles as a platform for integration with the VICTORY software library (libVictory). The feasibility of expediting component integration and enhancing vehicles in theatre will be assessed; VECTOR will attempt to leverage the capabilities of libVictory in order to do so. One of the key deliverables for VECTOR is the capability to port the software applications and middleware configuration items to an embedded low-cost ARM architecture. The VECTOR team selected a unique hybrid system that includes both a single board computer and an Ethernet switch
Russell, Mark
ABSTRACT The Vehicular Integration for C4ISR/EW Interoperability (VICTORY) Standard adopts many protocols that are traditionally used for developing enterprise application software deployed on general-purpose or server/workstation based computing platforms. This has led to discussions regarding the suitability of the VICTORY Standard for deployment to embedded and resource-constrained platforms. An independent software implementation of VICTORY core services was developed within the U.S Army Tank and Automotive Research, Development and Engineering Center (TARDEC) VICTORY System Integration Lab (SIL). These services were ported from a general-purpose computing platform to an embedded environment. Test procedures were developed and extensive performance tests were conducted to determine the feasibility of operating in this resource-constrained environment. This paper discusses the development procedures, implementation, test procedures, and performance results
Russell, Mark
ABSTRACT Northrop Grumman has developed Tactical Ground Vehicle High-Availability (HA) middleware conforming to open standards specified by the Service Availability Forum (SAF), a consortium of industry-leading communications and computing companies. The software hot-spare and standby capabilities realized by this technology operate across tightly and loosely coupled farms of processors, ensuring critical processes remain operational with zero or minimal interruption, as chosen by system architects. High availability software delivers key benefits to the warfighter. Systems experience less downtime, helping to maintain continuity of tactical operations. Both hardware and software failures are managed, reducing the impact on system aborts and essential function failures and therefore reducing the number of computing elements required to meet system level availability SWAP-CC (Size, Weight, Power, and Cost, Cooling). The wrappers Northrop Grumman has created for open source and
Nguyen, Tri
ABSTRACT Vehicle design today takes longer than it ever has in the past largely due to the abundance of requirements, standards, and new design techniques; this trend is not likely to change any time soon. This paper will explore how advancements in gaming engines can be leveraged to bring realistic visualization and virtual prototypes to the beginning of the design cycle, integrate subsystems earlier in the design, provide advanced simulation capabilities, and ensure that the final design not only meets the requirements but is fully vetted by stakeholders and meets the needs of the platform. The Unreal Engine and Bravo Framework can be used to bring this and more to vehicle designs to reduce design churn and bring better products to market faster. Citation: A. Diepen, O. Vazquez, A. Black, C. Gaff “Leveraging Simulation Tools to Accelerate Design,” In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 16-18, 2022
Diepen, AndyVazquez, OrlandoBlack, AndrewGaff, Chuck
ABSTRACT This paper will define a number of levels of abstracted cloud computing for vehicles. First, the transition from current architectures of dedicated hardware to basic dedicated virtualization of processes with hardware defined networks will be detailed using Commercial-of-the-Shelf (COTS) hardware and operating systems available now. Second, the transition to cloud-based processes with hardware defined networks will be detailed using the same hardware baseline. Third, the transition to software defined networks will be shown using the same hardware baseline. Once this new baseline of cloud based processing is detailed on existing hardware, the diffusion of the cloud onto an increased number of more SWaP-C optimized processing elements (specifically, ARM) will be shown. Each level of abstraction will be rated with a number of figures of merit and correlation to vehicle metrics / capabilities. A clear roadmap towards implementation will be shown, with defined phases to adapt and
Jedynak, David
ABSTRACT Model Based Systems Engineering (MBSE) has been a dominant methodology for defining and developing complex systems; however, it has not yet been paired with cutting-edge digital engineering transformation. MBSE is constrained to represent a whole system, but lacks other capabilities, such as dynamic simulation and optimization, as well as integration of hardware and software functions. This paper provides the key elements for developing a Smart MBSE (SMBSE) modeling approach that integrates Systems Engineering (SE) functionality with the full suite of other development tools utilized to create today’s complex products. SMBSE connects hardware and software with a set of customer needs, design requirements, program targets, simulations and optimization functionalities. The SMBSE modeling approach is still under development, with significant challenges for building bridges between conventional Systems Engineering methodology, with additional capabilities to reuse, automate
Ayala, AlejandroWeaver, JonathanFuentes, JeniferOchoa, Ruben
ABSTRACT Standard specifications give programs the flexibility of developing large systems from smaller pieces that can communicate between one another in a standard fashion. This benefit is lost, however, if there is no way to verify that vendors successfully adhere to the standard in question. The Vehicular Integration for Command, Control, Communications, and Computers (C4), Intelligence Surveillance and Reconnaissance (ISR) Electronic Warfare (EW) Interoperability (VICTORY) standards aim to create interoperability across various C4ISR/EW and platform systems installed on military ground vehicles while reducing size, weight, and power (SWaP) and enabling additional capabilities. The VICTORY Compliance Test Suite (CTS) provides a method to test hardware and software according to the standard specifications to ensure interoperability between VICTORY compliant components
Norman, DavidKlein, JoshuaStrickland, AdrianMeiners, BrandonSaylor, Kase J.Broczkowski, Jason
ABSTRACT One of the best ways to achieve full hardware utilization while maintaining a strict level of security and safety in a single System on a Chip (SoC) is through the use of virtualization. In this paper, we will explain the capabilities of the Xilinx Zynq UltraScale+ MultiProcessor SoC (MPSoC) and how they relate to target technology areas such as ARM processors and multi-core technology. We will also explain the features of Xen that aid in improving the safety and security of a virtualized system. We will provide examples of how to utilize these features, identify benefits, and explain how they can be used to implement several technology features including: SWAP-C reductions via consolidations, modular software architectures, and integration of multiple real-time operating systems
VanVossen, Robert
ABSTRACT This paper outlines the results from an ongoing collaborative development effort to apply a new powertrain controller in a real combat vehicle application. Specifically, TARDEC and L3T CPS have partnered to demonstrate a production viable electronically controlled fuel injected (EFI) version of the AVDS 1790 diesel engine, used in the M88 HERCULES vehicle. Highlights of the development project focus on coordinated engineering activity involving the following key enablers. The neXtECU jointly developed by ETAS and TARDEC, custom engineered to become a common powertrain controller for use on the Army’s future family of combat vehicles Engine control software jointly developed by TARDEC and L3T to perform EFI fuel system controls and auxiliary powertrain functions using the neXtECU AVDS 8CR 1050 hp engine with L3T design modifications to incorporate a derivative of a commercially available EFI fuel system
Yancone, JohnPace, DanCates, JameyKruchko, Paul
ABSTRACT The Vehicular Integration for Command, Control, Communication, Computers, Intelligence, Surveillance and Reconnaissance / Electronic Warfare (C4ISR/EW) Interoperability (VICTORY) standards is an open architecture that defines how software and hardware are shared as common resources among services that make up a platform’s capabilities such as Ethernet switches and routers, end nodes, processing units, as well as functionality such as position and navigation systems, radios, health monitoring, and automotive. The VICTORY standard enables reducing the total Size, Weight, and Power (SWaP), and Costs (SWaP-C) on a platform. As part of the Information Assurance (IA) capabilities of the VICTORY standard, the VICTORY Access Control Framework (VACF) provides protection to these shared resources in the form of an Attribute-Based Access Control (ABAC) system. The VACF is composed of five VICTORY component types: Authentication, Attribute Store, Policy Store, Policy Decision, and Policy
Rodriguez, AndyElliott, LeonardKeane, DinaBroczkowski, JasonSkrletts, JohnMoerdyk, Mark
ABSTRACT FEV North America will discuss application of advanced automotive cybersecurity to smart vehicle projects, - software safety - software architecture and how it applies to similar features and capabilities across the fleet of DoD combat and tactical vehicles. The analogous system architectures of automotive and military vehicles with advanced architectures, distributed electronic control units, connectivity to networks, user interfaces and maintenance networks and interface points clearly open an opportunity for DoD to leverage the technology techniques, hardware, software, management and human resources to drive implementation costs down while implementing fleet modifications, infrastructure methodology and many of the features of the automotive cyber security spectrum. Two of the primary automotive and DoD subsystems most relevant to Cyber Security threat and protection are the automotive connected vehicles analogous to the DoD Command, Control, Communications, Computers
Chhawri, SumeetTarnutzer, StephanTasky, ThomasLane, Gerald R.
ABSTRACT A cybersecurity exploit can be crafted to affect the vehicle diagnostic adapter system, which consists of the technician, vehicle diagnostic adapter, device drivers, and maintenance software all working together in a trusting relationship. In this paper, application layer encryption of the SAE J1939 diagnostic traffic between the vehicle diagnostic application and the in-vehicle secure gateway is developed to mitigate the vulnerabilities in potential attack paths. The proposed encryption strategy uses AES-128, which uses 16-byte cipher blocks. The secure connection is established by adjusting the bit rate to over twice the normal speed and packing a single J1939 message into two encrypted sequential CAN frames, The in-vehicle diagnostic gateway employs a hardware security module. A provisioning process is employed wherein the diagnostic application and the hardware security module both generate public-private key pairs. An elliptic curve Diffie-Hellman (ECDH) key exchange then
Daily, Jeremy S.Kulkarni, Prakash
ABSTRACT Virtualization is becoming an important technology for military embedded systems. The advantages to using virtualization start with its ability to facilitate porting to new hardware designs or integrating new software and applications onto existing platforms. Virtualization is a tool to reuse existing legacy software on new hardware and to combine new features alongside existing proven software. For embedded systems, especially critical components of military systems, virtualization techniques must have the ability to meet performance requirements when running application software in a virtual environment. Together, these needs define the key factors driving the development of hypervisor products for the embedded market: a desire to support and preserve legacy code, software that has been field-proven and tested over years of use; and a need to ensure that real-time performance is not compromised. Embedded-systems developers need to understand the power and limitations of
Korzenowski, Mike
ABSTRACT Leveraging an open standard may still not achieve the desired interoperability between systems. Addressing “lessons learned” from past implementations of open standards for various Department of Defense (DoD) acquisition programs is critical for future success. This paper discusses past issues which range from insufficient technical detail, when and how to apply a given specification, verification of an implementation’s compliance, to inconsistent and imprecise contractual language. This paper illustrates how the Vehicular Integration for C4ISR/EW Interoperability (VICTORY) initiative addresses these challenges to enable interoperability on Army ground vehicles, as well as facilitate rapid technology insertion and incorporation of new capabilities. VICTORY represents a leap ahead in solving interoperability challenges and defining open standards
Dirner, JasonMelber, AdamPankowski, John A.
ABSTRACT A methodology based on a combination of commercial software tools is developed for rendering complex acoustic scenes in real time. The methodology aims to bridge the gap between real time acoustic rendering algorithms which lack important physics for the exterior urban environment and more rigorous but computationally expensive geometric or wave-based acoustics software by incorporating pre-computed results into a real time framework. The methodology is developed by surveying the best in class commercial software, outlining a general means for accommodating results from each, and identifying areas where supplemental capability is required. This approach yields a real time solution with improved accuracy. Strengths and limitations in current commercial technologies are identified and summarized
Mattson, Steven GPolakowski, Stephen E.Pruetz, JeffSmith, RobJanicki, Phil
ABSTRACT The objective is to develop a human-multiple robot system that is optimized for teams of heterogeneous robots control. A new human-robot system permits to ease the execution of remote tasks. An operator can efficiently control the physical multi-robots using the high level command, Drag-to-Move method, on the virtual interface. The innovative virtual interface has been integrated with Augmented Reality that is able to track the location and sensory information from the video feed of ground and aerial robots in the virtual and real environment. The advanced feature of the virtual interface is guarded teleoperation that can be used to prevent operators from accidently driving multiple robots into walls and other objects
Lee, SamHunt, ShawnCao, AlexPandya, Abhilash
ABSTRACT Semiconductor manufacturers are creating new System on Chips that allow embedded system developers to design consolidated architectures to reduce size, weight, power, and cost. However, combining software functions onto a single computing resource creates safety and security concerns due to reduced fault containment and increased coupling between software components. Safety and security-conscious industries use various software separation solutions to isolate software functions logically in order to achieve a comparable level of decoupling and fault containment that distributed/federated systems enjoy as a by-product of their system architecture. This paper will assess the suitability of common separation solutions for use in embedded systems and explain our preference for Xen, an open source Type I hypervisor. This paper will also examine reasons for porting operating systems to run in virtual machines, also known as paravirtualization, and evaluate how certain properties of
Roach, Jarvis
ABSTRACT Robotic Wingman (RW) is an advanced unmanned systems concept integrated with current operational tactics to enhance the force effectiveness of combat vehicle platoon and substantially enhance the survivability of manned vehicles in combat operations. Two approaches to RW; reconfiguring common fleet and new/unique platoon vehicles. Each approach has its advantages in wingman operations. This paper will discuss the approaches, the required technologies and program implementations. RW combat effectiveness and advances in force survivability will be assessed and discussed in both approaches. Advanced technology including sensors, autonomy, communications and automated behaviors will enable the RW to look, move, and act like companion manned vehicle. For its optimum effectiveness, the RW wants to cause the enemy to engage it first. The automation of the manned fleet to implement and achieve unmanned system performance similar to manned operations and is required to fool the enemy
Lane, JerryAntenori, FrankDallas, Andrew
ABSTRACT Program offices and the test community all desire to be more efficient with respect to testing but currently lack the analytical tools to help them fit early subsystem level testing into a framework which allows them to perform assessments at the system level. TARDEC initiated a Small Business Innovative Research (SBIR) effort to develop and deploy a system reliability testing and optimization tool that will quantify the value of subsystem level tests in an overall test program and incorporate the results into system level evaluations. The concept software, named the Army Lifecycle Test Optimization (ALTO) tool, provides not only the optimization capability desired, but also other key features to quickly see the current status, metrics, schedule, and reliability plots for the current test plan. As the user makes changes to the test plan, either by running the optimization or adjusting inputs or factors, the impacts on each of these areas is computed and displayed
Luna, JoelSnider, SharonBrudnak, MarkLaRose, BryanMorgan, MelissaKosinski, DanScott, Mike
ABSTRACT This paper discusses the Diagnostics And System Health (DASH) embedded diagnostics software originally developed for use on the M109A7 / M992A3 Family of Vehicles (FoV). The history and background of work completed by the DEVCOM Armaments Center (AC) System Health & Interactive Future Technologies (SHIFT) Division in developing and managing the DASH program are described. The DASH software architecture and design details are also discussed in depth, with a focus on the more recent efforts to adapt DASH to use a generic core software application that can be integrated on a wide variety of current and future ground combat systems to more easily provide embedded diagnostics capability. Citation: A. Ludwig, D. Tagliente, “Enabling Custom Vehicle Diagnostics with a Common Application Platform”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 10-12, 2021
Ludwig, AndrewTagliente, Daniel
ABSTRACT Self-driving or autonomous vehicles consist of software and hardware subsystems that perform tasks like sensing, perception, path-planning, vehicle control, and actuation. An error in one of these subsystems may manifest itself in any subsystem to which it is connected. Errors in sensor data propagate through the entire software pipeline from perception to path planning to vehicle control. However, while a small number of previous studies have focused on the propagation of errors in pose estimation or image processing, there has been little prior work on systematic evaluation of the propagation of errors through the entire autonomous architecture. In this work, we present a simulation study of error propagation through an autonomous system and work toward developing appropriate metrics for quantifying the error at both the subsystem and system levels. Finally, we demonstrate how the framework for analyzing error propagation can be applied to analysis of an autonomous systems
Carruth, Daniel W.Goodin, ChristopherDabbiru, LalithaScherer, NicklausJayakumar, Paramsothy
ABSTRACT Use of Model-Based Design (MBD) processes for embedded controls software Development has been purported for nearly the last decade to result in cost, quality, and delivery improvements. Initially the business case for MBD was rather vague and qualitative in nature, but more data is now becoming available to support the premise for this development methodology. Many times the implementation of MBD in an organization is bundled with other software process improvements such as CMMI or industry safety standards compliance, so trying to unbundle the contributions from MBD has been problematic. This paper addresses the dominant factors for MBD cost savings and the business benefits that have been realized by companies in various industries engaged in MBD development. It also summarizes some key management best practices and success factors that have helped organizations achieve success in MBD deployment
Lannan, Ron
ABSTRACT The proliferation of information technology adds expanded capabilities and exposes new vulnerabilities through cyber warfare. To combat new threats software quality must go beyond CMMI maturity levels and embrace a software development lifecycle (SDLC) with measurable cybersecurity assurance. Standard cybersecurity artifacts throughout the SDLC should be expected and available for inspection. Integrated software applications can confidently and rapidly reduce their threat exposure by incorporating reusable data management components with a pedigree of cybersecurity SDLC assurance evidence
Dorny, JonathanIngenthron, SusanErian, JoeTarka, MattHansen, Kurt
Items per page:
1 – 50 of 6222