摘要:
A method for optimizing a diagnostic reasoner model, for use in connection with a diagnostic system for testing a system under test of an aircraft, includes the steps of querying for a plurality of primary indicators, further querying for a plurality of supplemental indicators, and updating the diagnostic reasoner model based at least in part on the supplemental indicators. The primary indicators identify one or more potential faults in the system under test. Each supplemental indicator provides information either validating or invalidating a particular primary indicator or association of primary indicators.
摘要:
One embodiment is directed to an approach to solving a leader-follower problem in which a leader has a set of leader actions and a follower has a set of follower actions. The approach includes receiving an expression of the leader-follower problem as a normal form Stackelberg game. The approach further includes, for each possible follower action, solving a linear program (LP) problem to determine a respective optimal mixed leader strategy, wherein the LP problem optimizes a leader payoff for a given mixed leader strategy and a given fixed follower action over a feasible region that includes only mixed leader strategies that provoke that respective follower action. The approach further includes generating an output derived from the optimal mixed leader strategies, and outputting the output by changing a physical state associated with an interface.
摘要:
A scheduler for a finite capacity process provides a schedule based on an integrated assessment of both discrete and continuous constraints. Given a list of products to be provided, the scheduler generates a set of activities required to produce the products and identifies resources required and the discrete and continuous constraints related to such resources. Activities are resized, and timelines are established for the activities as a function of deadlines for the product delivery for which the activities are related. Resource balancing heuristics are used to redistribute resource utilization to prevent bottlenecks. Data structures are used to keep track of constraints. Both discrete and continuous constraints are defined. Separate solver engines for the discrete and continuous constraint problems modify the constraints. The data structures are used to share and propagate constraints between the two engines. Infeasibilities of meeting product delivery times are detected during the scheduling and backtracking and rescheduling of resources based on under and over utilization and availability of equivalent resources is performed.
摘要:
A method for avoiding singularities in the movement of a set of collinear CMGs in an array of CMGs in a spacecraft is provided. First, a command to adjust an orientation of the spacecraft is received. Then, the momentum needed from the set of collinear CMGs is determined. A dynamic control that determines a momentum path and avoids singularities by rotating the singularities out of the momentum path is used and a required gimbal movement for each of the CMGs in the set of collinear CMGs from the momentum path is calculated.
摘要:
A misfire monitor for detecting cylinder misfires in an internal combustion engine. The monitor has a light detector that senses infrared light signals emerging from combustion gases through a window inserted on an exhaust pipe or manifold. Characteristics of a detected light signal indicate whether there is a firing or a misfire in any cylinder. Other information about the engine is deduced with processing of the detected signals and misfire counts. The detection is real time and functions well at all normal engine speeds and operating conditions.
摘要:
Methods and systems for securely uploading files onto a vehicle such as an aircraft are provided. In one embodiment, a system for transmitting files to a remote vehicle comprises: a communication system onboard the remote vehicle; at least one processor onboard the remote vehicle coupled to the communication system; and at least one storage device comprising a database, the at least one storage device further comprising computer executable instructions which when executed by the at least one processor implement a data checking functionality process comprising: generating a security file at the remote vehicle from an uplinked file received by a communication system; verifying integrity of the uplinked file using the security file; when integrity of the uplinked file is confirmed, accepting the uplinked file; and when integrity of the uplinked file is not confirmed, rejecting the uplinked file.
摘要:
Methods and systems for securely uploading files onto a vehicle such as an aircraft are provided. In one embodiment, a system for transmitting files to a remote vehicle comprises: a communication system onboard the remote vehicle; at least one processor onboard the remote vehicle coupled to the communication system; and at least one storage device comprising a database, the at least one storage device further comprising computer executable instructions which when executed by the at least one processor implement a data checking functionality process comprising: generating a security file at the remote vehicle from an uplinked file received by a communication system; verifying integrity of the uplinked file using the security file; when integrity of the uplinked file is confirmed, accepting the uplinked file; and when integrity of the uplinked file is not confirmed, rejecting the uplinked file.
摘要:
Methods and apparatus are provided for securing the transfer of data over the internet from malicious interference. The apparatus comprises a computing device and a data storage device in operable communication with the computing device. The apparatus also includes a set of high assurance security instructions resident on the data storage device and executing within the computing device and at least one input/output interface. The method comprises receiving data via a first communication interface and storing the data in a memory device and initiating an unsecured data indication. The method also provides for receiving an authentication code via the first communication interface and decoding the authentication code and determining the authenticity of the data. If the authentication code fails to indicate authenticity then the data is deleted. If the authentication code indicates authenticity, then the data is transferred to a destination device via a second communication interface.
摘要:
A method of determining ranges for algorithmic variables for a processor that uses fixed point arithmetic is provided. The method comprises expressing overflow requirements of processor instructions as inequalities. The method also expresses precision requirements and expressiveness requirements as inequalities and merit functions. A global constraint and optimizer tool is used to find ranges for algorithmic variables based on the inequalities and the merit functions. The use of constraint equation solving and optimization finds optimal algorithmic ranges that provide overflow-free arithmetic as well as optimal expressiveness and precision.
摘要:
Methods and apparatus are provided for securing the transfer of data over the internet from malicious interference. The apparatus comprises a computing device and a data storage device in operable communication with the computing device. The apparatus also includes a set of high assurance security instructions resident on the data storage device and executing within the computing device and at least one input/output interface. The method comprises receiving data via a first communication interface and storing the data in a memory device and initiating an unsecured data indication. The method also provides for receiving an authentication code via the first communication interface and decoding the authentication code and determining the authenticity of the data. If the authentication code fails to indicate authenticity then the data is deleted. If the authentication code indicates authenticity, then the data is transferred to a destination device via a second communication interface.