33 resultados para Orbits
em Universidad Politécnica de Madrid
Resumo:
Numerical explorations show how the known periodic solutions of the Hill problem are modified in the case of the attitude-orbit coupling that may occur for large satellite structures. We focus on the case in which the elongation is the dominant satellite’s characteristic and find that a rotating structure may remain with its largest dimension in a plane parallel to the plane of the primaries. In this case, the effect produced by the non-negligible physical length is dynamically equivalent to the perturbation produced by an oblate central body on a mass-point satellite. Based on this, it is demonstrated that the attitude-orbital coupling of a long enough body may change the dynamical characteristics of a periodic orbit about the collinear Lagrangian points.
Resumo:
Numerical explorations show how the known periodic solutions of the Hill problem are modified in the case of the attitude-orbit coupling that may occur for large satellite structures. We focus on the case in which the elongation is the dominant satellite?s characteristic and find that a rotating structure may remain with its largest dimension in a plane parallel to the plane of the primaries. In this case, the effect produced by the non-negligible physical dimension is dynamically equivalent to the perturbation produced by an oblate central body on a masspoint satellite. Based on this, it is demonstrated that the attitude-orbital coupling of a long enough body may change the dynamical characteristics of a periodic orbit about the collinear Lagrangian points.
Resumo:
We derive a semi-analytic formulation that permits to study the long-term dynamics of fast-rotating inert tethers around planetary satellites. Since space tethers are extensive bodies they generate non-keplerian gravitational forces which depend solely on their mass geometry and attitude, that can be exploited for controlling science orbits. We conclude that rotating tethers modify the geometry of frozen orbits, allowing for lower eccentricity frozen orbits for a wide range of orbital inclination, where the length of the tether becomes a new parameter that the mission analyst may use to shape frozen orbits to tighter operational constraints.
Resumo:
Wave radiation by a conductor carrying a steady current in both a polar, highly eccentric, low perijove orbit, as in NASA's planned Juno mission, and an equatorial low Jovian orbit (LJO) mission below the intense radiation belts, is considered. Both missions will need electric power generation for scientific instruments and communication systems. Tethers generate power more efficiently than solar panels or radioisotope power systems (RPS). The radiation impedance is required to determine the current in the overall tether circuit. In a cold plasma model, radiation occurs mainly in the Alfven and fast magnetosonic modes, exhibiting a large refraction index. The radiation impedance of insulated tethers is determined for both modes and either mission. Unlike the Earth ionospheric case, the low-density, highly magnetized Jovian plasma makes the electron gyrofrequency much larger than the plasma frequency; this substantially modifies the power spectrum for either mode by increasing the Alfven velocity. Finally, an estimation of the radiation impedance of bare tethers is considered. In LJO, a spacecraft orbiting in a slow downward spiral under the radiation belts would allow determining magnetic field structure and atmospheric composition for understanding the formation, evolution, and structure of Jupiter. Additionally, if the cathodic contactor is switched off, a tether floats electrically, allowing e-beam emission that generate auroras. On/off switching produces bias/current pulses and signal emission, which might be used for Jovian plasma diagnostics.
Resumo:
For long enough tethers, the coupling of the attitude and orbital dynamics may show non-negligible effects in the orbital motion of a tethered satellite about a central body. In the case of fast rotating tethers the attitude remains constant, on average, up to second order effects. Besides, for a tether rotating in a plane parallel to the equatorial plane of the central body, the attitude?orbit coupling effect is formally equal to the perturbation of the Keplerian motion produced by the oblateness of the central body and, therefore, may have a stabilizing effect in the orbital dynamics. In the case of a tethered satellite in a low lunar orbit, it is demonstrated that feasible tether lengths can help in modifying the actual map of lunar frozen orbits
Resumo:
EDROMO is a special perturbation method for the propagation of elliptical orbits in the perturbed two-body problem. The state vector consists of a time-element and seven spatial elements, and the independent variable is a generalized eccentric anomaly introduced through a Sundman time transformation. The key role in the derivation of the method is played by an intermediate reference frame which enjoys the property of remaining fixed in space as long as perturbations are absent. Three elements of EDROMO characterize the dynamics in the orbital frame and its orientation with respect to the intermediate frame, and the Euler parameters associated to the intermediate frame represent the other four spatial elements. The performance of EDromo has been analyzed by considering some typical problems in astrodynamics. In almost all our tests the method is the best among other popular formulations based on elements.
Resumo:
In this work, a new law for magnetic control of satellites in near-polar orbits is presented. This law has been developed for the UMPSat-2 microsatellite, which has been designed and manufactured by Universidad Politécnica de Madrid, Madrid. The control law is a modification of the B-dot strategy that enables the satellite to control the rotation rate. Besides, the satellite?s equilibrium state is characterized by having the rotation axis perpendicular to the orbit?s plane. The control law described in the present work only needs magnetometers and magnetorquers, as sensors and actuators, respectively, to carry out a successful attitude control on the spacecraft. A description of the analysis is included. Performance and applicability of the proposed method have been demonstrated by control dynamics together with Monte Carlo techniques and by implementing the control law in the UPMSat-2 mission simulator. Results show good performance in terms of acquisition and stability of the satellite rotation rate and orientation with respect to its orbit?s plane.
Resumo:
In this Comment we explain the discrepancies mentioned by the authors between their results and ours about the in?uence of the gravitational quadrupole moment in the perturbative calculation of corrections to the precession of the periastron of quasielliptical Keplerian equatorial orbits around a point mass. The discrepancy appears to be a consequence of two different calculations of the angular momentum of the orbits.
Resumo:
An analytical solution of the two body problem perturbed by a constant tangential acceleration is derived with the aid of perturbation theory. The solution, which is valid for circular and elliptic orbits with generic eccentricity, describes the instantaneous time variation of all orbital elements. A comparison with high-accuracy numerical results shows that the analytical method can be effectively applied to multiple-revolution low-thrust orbit transfer around planets and in interplanetary space with negligible error.
Resumo:
The extraordinary increase of new information technologies, the development of Internet, the electronic commerce, the e-government, mobile telephony and future cloud computing and storage, have provided great benefits in all areas of society. Besides these, there are new challenges for the protection of information, such as the loss of confidentiality and integrity of electronic documents. Cryptography plays a key role by providing the necessary tools to ensure the safety of these new media. It is imperative to intensify the research in this area, to meet the growing demand for new secure cryptographic techniques. The theory of chaotic nonlinear dynamical systems and the theory of cryptography give rise to the chaotic cryptography, which is the field of study of this thesis. The link between cryptography and chaotic systems is still subject of intense study. The combination of apparently stochastic behavior, the properties of sensitivity to initial conditions and parameters, ergodicity, mixing, and the fact that periodic points are dense, suggests that chaotic orbits resemble random sequences. This fact, and the ability to synchronize multiple chaotic systems, initially described by Pecora and Carroll, has generated an avalanche of research papers that relate cryptography and chaos. The chaotic cryptography addresses two fundamental design paradigms. In the first paradigm, chaotic cryptosystems are designed using continuous time, mainly based on chaotic synchronization techniques; they are implemented with analog circuits or by computer simulation. In the second paradigm, chaotic cryptosystems are constructed using discrete time and generally do not depend on chaos synchronization techniques. The contributions in this thesis involve three aspects about chaotic cryptography. The first one is a theoretical analysis of the geometric properties of some of the most employed chaotic attractors for the design of chaotic cryptosystems. The second one is the cryptanalysis of continuos chaotic cryptosystems and finally concludes with three new designs of cryptographically secure chaotic pseudorandom generators. The main accomplishments contained in this thesis are: v Development of a method for determining the parameters of some double scroll chaotic systems, including Lorenz system and Chua’s circuit. First, some geometrical characteristics of chaotic system have been used to reduce the search space of parameters. Next, a scheme based on the synchronization of chaotic systems was built. The geometric properties have been employed as matching criterion, to determine the values of the parameters with the desired accuracy. The method is not affected by a moderate amount of noise in the waveform. The proposed method has been applied to find security flaws in the continuous chaotic encryption systems. Based on previous results, the chaotic ciphers proposed by Wang and Bu and those proposed by Xu and Li are cryptanalyzed. We propose some solutions to improve the cryptosystems, although very limited because these systems are not suitable for use in cryptography. Development of a method for determining the parameters of the Lorenz system, when it is used in the design of two-channel cryptosystem. The method uses the geometric properties of the Lorenz system. The search space of parameters has been reduced. Next, the parameters have been accurately determined from the ciphertext. The method has been applied to cryptanalysis of an encryption scheme proposed by Jiang. In 2005, Gunay et al. proposed a chaotic encryption system based on a cellular neural network implementation of Chua’s circuit. This scheme has been cryptanalyzed. Some gaps in security design have been identified. Based on the theoretical results of digital chaotic systems and cryptanalysis of several chaotic ciphers recently proposed, a family of pseudorandom generators has been designed using finite precision. The design is based on the coupling of several piecewise linear chaotic maps. Based on the above results a new family of chaotic pseudorandom generators named Trident has been designed. These generators have been specially designed to meet the needs of real-time encryption of mobile technology. According to the above results, this thesis proposes another family of pseudorandom generators called Trifork. These generators are based on a combination of perturbed Lagged Fibonacci generators. This family of generators is cryptographically secure and suitable for use in real-time encryption. Detailed analysis shows that the proposed pseudorandom generator can provide fast encryption speed and a high level of security, at the same time. El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de Internet, el comercio electrónico, la administración electrónica, la telefonía móvil y la futura computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección de la información, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos electrónicos. La criptografía juega un papel fundamental aportando las herramientas necesarias para garantizar la seguridad de estos nuevos medios, pero es imperativo intensificar la investigación en este ámbito para dar respuesta a la demanda creciente de nuevas técnicas criptográficas seguras. La teoría de los sistemas dinámicos no lineales junto a la criptografía dan lugar a la ((criptografía caótica)), que es el campo de estudio de esta tesis. El vínculo entre la criptografía y los sistemas caóticos continúa siendo objeto de un intenso estudio. La combinación del comportamiento aparentemente estocástico, las propiedades de sensibilidad a las condiciones iniciales y a los parámetros, la ergodicidad, la mezcla, y que los puntos periódicos sean densos asemejan las órbitas caóticas a secuencias aleatorias, lo que supone su potencial utilización en el enmascaramiento de mensajes. Este hecho, junto a la posibilidad de sincronizar varios sistemas caóticos descrita inicialmente en los trabajos de Pecora y Carroll, ha generado una avalancha de trabajos de investigación donde se plantean muchas ideas sobre la forma de realizar sistemas de comunicaciones seguros, relacionando así la criptografía y el caos. La criptografía caótica aborda dos paradigmas de diseño fundamentales. En el primero, los criptosistemas caóticos se diseñan utilizando circuitos analógicos, principalmente basados en las técnicas de sincronización caótica; en el segundo, los criptosistemas caóticos se construyen en circuitos discretos u ordenadores, y generalmente no dependen de las técnicas de sincronización del caos. Nuestra contribución en esta tesis implica tres aspectos sobre el cifrado caótico. En primer lugar, se realiza un análisis teórico de las propiedades geométricas de algunos de los sistemas caóticos más empleados en el diseño de criptosistemas caóticos vii continuos; en segundo lugar, se realiza el criptoanálisis de cifrados caóticos continuos basados en el análisis anterior; y, finalmente, se realizan tres nuevas propuestas de diseño de generadores de secuencias pseudoaleatorias criptográficamente seguros y rápidos. La primera parte de esta memoria realiza un análisis crítico acerca de la seguridad de los criptosistemas caóticos, llegando a la conclusión de que la gran mayoría de los algoritmos de cifrado caóticos continuos —ya sean realizados físicamente o programados numéricamente— tienen serios inconvenientes para proteger la confidencialidad de la información ya que son inseguros e ineficientes. Asimismo una gran parte de los criptosistemas caóticos discretos propuestos se consideran inseguros y otros no han sido atacados por lo que se considera necesario más trabajo de criptoanálisis. Esta parte concluye señalando las principales debilidades encontradas en los criptosistemas analizados y algunas recomendaciones para su mejora. En la segunda parte se diseña un método de criptoanálisis que permite la identificaci ón de los parámetros, que en general forman parte de la clave, de algoritmos de cifrado basados en sistemas caóticos de Lorenz y similares, que utilizan los esquemas de sincronización excitador-respuesta. Este método se basa en algunas características geométricas del atractor de Lorenz. El método diseñado se ha empleado para criptoanalizar eficientemente tres algoritmos de cifrado. Finalmente se realiza el criptoanálisis de otros dos esquemas de cifrado propuestos recientemente. La tercera parte de la tesis abarca el diseño de generadores de secuencias pseudoaleatorias criptográficamente seguras, basadas en aplicaciones caóticas, realizando las pruebas estadísticas, que corroboran las propiedades de aleatoriedad. Estos generadores pueden ser utilizados en el desarrollo de sistemas de cifrado en flujo y para cubrir las necesidades del cifrado en tiempo real. Una cuestión importante en el diseño de sistemas de cifrado discreto caótico es la degradación dinámica debida a la precisión finita; sin embargo, la mayoría de los diseñadores de sistemas de cifrado discreto caótico no ha considerado seriamente este aspecto. En esta tesis se hace hincapié en la importancia de esta cuestión y se contribuye a su esclarecimiento con algunas consideraciones iniciales. Ya que las cuestiones teóricas sobre la dinámica de la degradación de los sistemas caóticos digitales no ha sido totalmente resuelta, en este trabajo utilizamos algunas soluciones prácticas para evitar esta dificultad teórica. Entre las técnicas posibles, se proponen y evalúan varias soluciones, como operaciones de rotación de bits y desplazamiento de bits, que combinadas con la variación dinámica de parámetros y con la perturbación cruzada, proporcionan un excelente remedio al problema de la degradación dinámica. Además de los problemas de seguridad sobre la degradación dinámica, muchos criptosistemas se rompen debido a su diseño descuidado, no a causa de los defectos esenciales de los sistemas caóticos digitales. Este hecho se ha tomado en cuenta en esta tesis y se ha logrado el diseño de generadores pseudoaleatorios caóticos criptogr áficamente seguros.
Resumo:
A generic, sudden transition to chaos has been experimentally verified using electronic circuits. The particular system studied involves the near resonance of two coupled oscillators at 2:1 frequency ratio when the damping of the first oscillator becomes negative. We identified in the experiment all types of orbits described by theory. We also found that a theoretical, ID limit map fits closely a map of the experimental attractor which, however, could be strongly disturbed by noise. In particular, we found noisy periodic orbits, in good agreement with noise theory.
Resumo:
Use of electrodynamic bare tethers in exploring the Jovian system by tapping its rotational energy for power and propulsion is studied. The position of perijove and apojove in elliptical orbits, relative to the synchronous orbit at 2.24 times Jupiter’s radius, is exploited to conveniently make the induced Lorentz force to be drag or thrust, while generating power, and navigating the system. Capture and evolution to a low elliptical orbit near Jupiter, and capture into low circular orbits at moons Io and Europa are discussed.
Resumo:
A two-stage mission to place a spacecraft (SC) below the Jovian radiation belts, using a spinning bare tether with plasma contactors at both ends to provide propulsion and power,is proposed. Capture by Lorentz drag on the tether, at the periapsis of a barely hyperbolic equatorial orbit, is followed by a sequence of orbits at near-constant periapsis, drag finally bringing the SC down to a circular orbit below the halo ring. Although increasing both tether heating and bowing, retrograde motion can substantially reduce accumulated dose as compared with prograde motion, at equal tether-to-SC mass ratio. In the second stage,the tether is cut to a segment one order of magnitude smaller, with a single plasma contactor, making the SC to slowly spiral inward over severalmonths while generating large onboard power, which would allow multiple scientific applications, including in situ study of Jovian grains, auroral sounding of upper atmosphere, and space- and time-resolved observations of surface and subsurface.
Resumo:
ED bare theters are best systems to deorbit S/C at end of service. For near polar orbits, usual tethers kept vertical by the gravity gradient, yield too weak magnetic drag. Here we propose keeping tethers perpendicular to the orbital plane. they mus be rigid and short for structural reasons, requiring power supply like Ion thrusters. terher tube-booms that can be rolled up on a drum would lie on each side of the S/C. One boom, carying in idle Hollow Cathode, collects electrons; the opposite boom's HC ejects electrons.
Resumo:
An ED-tether mission to Jupiter is presented. A bare tether carrying cathodic devices at both ends but no power supply, and using no propellant, could move 'freely' among Jupiter's 4 great moons. The tour scheme would have current naturally driven throughout by the motional electric field, the Lorentz force switching direction with current around a 'drag' radius of 160,00 kms, where the speed of the jovian ionosphere equals the speed of a spacecraft in circular orbit. With plasma density and magnetic field decreasing rapidly with distance from Jupiter, drag/thrust would only be operated in the inner plasmasphere, current being near shut off conveniently in orbit by disconnecting cathodes or plugging in a very large resistance; the tether could serve as its own power supply by plugging in an electric load where convenient, with just some reduction in thrust or drag. The periapsis of the spacecraft in a heliocentric transfer orbit from Earth would lie inside the drag sphere; with tether deployed and current on around periapsis, magnetic drag allows Jupiter to capture the spacecraft into an elliptic orbit of high eccentricity. Current would be on at succesive perijove passes and off elsewhere, reducing the eccentricity by lowering the apoapsis progressively to allow visits of the giant moons. In a second phase, current is on around apoapsis outside the drag sphere, rising the periapsis until the full orbit lies outside that sphere. In a third phase, current is on at periapsis, increasing the eccentricity until a last push makes the orbit hyperbolic to escape Jupiter. Dynamical issues such as low gravity-gradient at Jupiter and tether orientation in elliptic orbits of high eccentricity are discussed.