Abstract:
A method for generating sensor data is presented. A number of wireless power signals is sent to a group of sensor units. A number of wireless data collection signals is sent to the group of sensor units after the number of wireless power signals have been sent to the group of sensor units. Sensor data in a number of wireless response signals is received from the group of sensor units.
Abstract:
Work cell and factory level automation require that an Automated Guided Vehicle (AGV) achieve demanding positional accuracy and repeatability relative to a cradle fixture or workstand within a work cell. The AGV makes distance measurements of objects within the work cell using laser scanner sensors. The distance measurements are filtered of objects that are not target features on the cradle fixture or workstand. Systematic or bias errors of the laser scanner sensor are removed from the filtered distance measurements, and a mathematical filter or estimator is applied to the filtered distance measurements using random errors of the laser scanner sensor to generate estimated distance measurements. A map of the target features is then constructed using the estimated distance measurements, wherein the map is used for path planning and navigation control of the AGV relative to the cradle fixture or workstand within the work cell.
Abstract:
Methods and systems for use in in analyzing cyber-security threats for an aircraft are described herein. One example method includes generating an interconnection graph for a plurality of interconnected aircraft systems. The interconnection graph includes a plurality of nodes and a plurality of links. The method also includes defining a cost function for a cyber-security threat to traverse each link and defining a requirements function for a cyber-security threat to exploit each node. The method further includes generating a set of threat traversal graphs for each cyber-security threat of a plurality of cyber-security threats.
Abstract:
Provided are methods, systems, and computer program products for inspecting composite items. Specifically, a method involves analyzing an image of or, more generally, data characterizing condition of a top layer, which is disposed over a bottom layer. The method also involves performing a structural integrity check based on any anomalies detected in the top layer during this analysis as well as based on any anomalies previously detected in the bottom layer. As such, this structural integrity check accounts for characteristics of multiple layers, in some embodiments, all layers applied up to point of this inspection. In addition to the detected anomalies, the structural integrity check may account for previously performed repairs. The structural integrity check may be performed on individual portions of a composite item while, for example, other portions continue receiving a new composite layer, which may be referred to as an inline inspection.
Abstract:
Provided are methods and systems for terrestrial data transmission between aircraft and external networks, such as airline networks and/or airport networks. While an aircraft is landed, various data domains may need to be transmitted between the aircraft and such networks using two or more communication channels available to the aircraft. These channels may include wired and/or wireless channels, such as broadband over power line channels, Ethernet channels, Wi-Fi channels, and cellular channels. The available communication channels are allocated to transmit particular data domains based on the security levels of these channels. For example, aircraft control domains may be transmitted using a more secure communication channel than passenger information domains and/or entertainment systems domains. In some embodiments, multiple communication channels may be used to transmit the same domain parsed into multiple transmission packets. The packets are recombined back into the data domain after the transmission.
Abstract:
Disclosed herein is a method for executing unprotected mode services in a protected mode computing environment includes initiating a protected mode service that is configured to execute in a protected mode. Further, the method includes verifying an integrity of one or more unprotected mode services configured to execute in an unprotected mode. The one or more unprotected mode services is registered with the protected mode service. The method also includes initiating an unprotected mode service of the one or more unprotected mode services in response to the integrity of the unprotected mode service being verified.
Abstract:
Systems and methods for real time control system management in networked environments are disclosed. In one embodiment, a computer-based system for real time embedded control system behavior monitoring and anomaly detection comprises a processor and logic instructions stored in a tangible computer-readable medium coupled to the processor which, when executed by the processor, configure the processor to generate a behavior training set for the embedded control system, wherein the behavior training set correlates inputs to the embedded control system with outputs from the embedded control system during a training process to define behavior fingerprints for the embedded control system monitor inputs to the embedded control system and outputs from the embedded control system in real time during operation of the embedded control system, and generate an alert when one or more of the inputs into the embedded control system or the outputs collected from the embedded control system in real time operation represent an anomaly.
Abstract:
Techniques for projecting images onto fabricated surfaces. One or more electronic files containing an engineering diagram that describes a three-dimensional shape of the fabricated surface are retrieved. Warp transformation information for transforming images to be projected onto the fabricated surface is calculated, based on the engineering diagram, positional information defining a three-dimensional position of a projection device, relative to the fabricated surface, and positional information of an intended viewer relative to the fabricated surface. The warp transformation information is applied to one or more images to generate one or more transformed images. Embodiments project, using the projection device, the one or more transformed images onto the fabricated surface.
Abstract:
Techniques for projecting images onto fabricated surfaces. One or more electronic files containing an engineering diagram that describes a three-dimensional shape of the fabricated surface are retrieved. Warp transformation information for transforming images to be projected onto the fabricated surface is calculated, based on the engineering diagram, positional information defining a three-dimensional position of a projection device, relative to the fabricated surface, and positional information of an intended viewer relative to the fabricated surface. The warp transformation information is applied to one or more images to generate one or more transformed images. Embodiments project, using the projection device, the one or more transformed images onto the fabricated surface.
Abstract:
In general, certain embodiments of the present disclosure provide methods and systems for automatic generation of filter rules based on functional network flows for e-Enabled aviation systems. According to various embodiments, a method is provided comprising capturing network packets corresponding to a functional network flow transmitted within a networked aviation system, and parsing the network packets in order to extract one or more network messages corresponding to the functional network flow. The network message is examined in order to identify and classify a plurality of attributes corresponding to the header and data fields of the network packets. A table corresponding to the network messages is automatically generated, which includes one or more filter rules. In some embodiments, the table may be used to determine which communications are authorized during a particular context of the networked aviation system. The method further comprises validating the one or more filter rules.