Abstract:
A flash memory process and device for encrypting and storing data in a non-volatile flash memory associated with a host system. The device includes a flash memory, an encryption engine, a key store, a SRAM to interface with the host system, and associated control circuitry. When powered on, the device first determines if a valid encryption key is held in the key store. If a valid key is held in the store, a program flag is set when encrypted data in the flash memory is ready to be decrypted by the engine and Random stored in the SRAM for use by the host system, or when data originating from the host system and stored in the SRAM is ready to be encrypted by the engine and programmed into the flash memory. The device can be embedded in any host system wherein data must be encrypted while at rest in a memory.
Abstract:
A method and apparatus of detecting laser in a laser warning receiver is disclosed. A panoramic lens assembly utilized in cameras is combined with a laser detection focal plane. Incident laser light is refracted in the panoramic lens and made to illuminate a multiplicity of individual sensor elements. By determining the corresponding intensity of the laser light on the sensors, the angle of arrival resolutions superior to the element angular resolutions can be achieved. The combination of a panoramic lens with a laser detection focal plane provides a low cost laser warning for wrap around ground based situational awareness.
Abstract:
A specific emitter identification (SEI) method and apparatus is capable of identifying and tracking objects within a geographical area of interest wherein the system and method has not been preprogrammed to look for particular signals. The system and method receives all of the emitted electromagnetic signals emitted from area of interest. The system and method next performs high order statistical analysis on the received signals and determines which signals emanate from possible targets of interest and which likely emanate from background clutter/noise by comparing the relative degrees of Gaussianness of the signals (for example using entropy measurements). The least Gaussian signals are deemed to likely be signals from potential targets of interest while those which are more Gaussian are deemed to be likely from background clutter or noise.
Abstract:
Techniques are provided for a switched output digital to analog converter employing an N-path cascode output switch. An example system may include a plurality of cascode transistors coupled in parallel to an output stage of a current mode digital to analog converter (DAC) circuit. The system may also include a plurality of control ports, each of the control ports coupled to a gate of one of the cascode transistors. The system may further include a plurality of output ports, each output port coupled to one of the cascode transistors. The cascode transistors are configured to switch the output stage of the DAC to the output port of the transistor in response to a routing control signal applied to the control port of the transistor. The cascode transistors are High Electron Mobility Transistors (HEMT) fabricated from Gallium Nitride.
Abstract:
A method for polishing photonic chips is described. A gauge is placed in a photonic chip adjacent to an edge to be polished. The gauge includes a set of bars of various lengths. The bar lengths can be progressively ordered from shortest to longest or vice versa. The photonic chip is then secured in a chip polishing jig to get ready for polishing. When the photonic chip is being polished, an operator can visually inspect the gauge by looking at the polishing edge to estimate a polishing depth in order to determine a stopping point for polishing. Once the stopping point has been reached, the polishing of the photonic chip can be stopped.
Abstract:
A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor. This disclosure adds metadata to every word in the system and adds a metadata processing unit that works in parallel with data flow to enforce an arbitrary set of policies, such that metadata is unbounded and software programmable to be applicable to a wide range of metadata processing policies. This instant disclosure is applicable to a wide range of uses including safety, security, and synchronization.
Abstract:
Methods and systems for filtered image data recovery using lookback include storing first, second, and third data captures received from the image sensor in a first memory component and a second memory component. The methods and systems also include identifying a second detection in the second data capture and a third detection in the third data capture by filtering the first, second, and third data captures. The second detection and the third detection each exceed a pixel intensity threshold. The methods and systems also include correlating the second detection and the third detection to identify at least one track. The methods and systems also include detecting a first detection in the first data capture stored in the second memory component, the first detection being a pixel intensity value that is less than the threshold or an initiation event having a pixel intensity value that is less than the threshold.
Abstract:
A system and method of aligning an accessory's aim point to an aim point of a device are disclosed. In one embodiment, an aim point that can be viewed through a weapon sight is projected from a device mounted on a weapon. Further, an accessory aim point is projected on the weapon sight by an accessory device that is mounted on the weapon in front of the weapon sight. Furthermore, the accessory aim point is pre-mission aligned to the aim point of the device by electronically adjusting a position of the accessory aim point to align with the aim point of the device on the weapon sight.
Abstract:
Systems and methods provide adaptability in a mobile ad hoc network (MANET), based on an existing protocol, such as adaptive hybrid domain routing (AHDR). The systems and methods are especially suited for fast changing topologies that may change after a reactive route discovery has been completed.
Abstract:
Methods, systems, and computer readable media for video image recovery from transient blockage or corruption artifacts include receiving first and second data captures from an image sensor having first and second pluralities of pixel intensity values corresponding to pixel locations of the first and second data captures. The methods, systems, and computer readable media also include identifying in the second data capture, one or more of the second pixel intensity values exceeding a contrast threshold to detect a transient blockage. The methods, systems, and computer readable media also include replacing the one or more of the second pixel intensity values exceeding the contrast threshold with one or more of the first pixel intensity values to generate a corrected data capture.