968 resultados para Space Telescope Science Institute (U.S.)
Resumo:
This report documents showcases my learning experiences and design of Green Falcon Solar Powered UAV. Only responsible aspects will be discussed inside this report. Using solar power that is captured by solar panels it can fly all day and also store power for night flying. Its major advantage lies in the fact that it is simple and versatile, which makes it applicable to a large range of UAVs of different wingspans. Green Falcon UAV is designed as a supporting tool for scientists to get a deeper understanding of gases exchange amongst ground plane and atmosphere
Development of multi-rotor localised surveillance using multi-spectral sensors for plant biosecurity
Resumo:
This report describes a proof of concept for multi-rotor localised surveillance using a multi-spectral sensor for plant biosecurity applications. A literature review was conducted on previous applications using airborne multispectral imaging for plant biosecurity purposes. A ready built platform was purchased and modified in order to fit and provide suitable clearance for a Tetracam Mini-MCA multispectral camera. The appropriate risk management documents were developed allowing the platform and the multi-spectral camera to be tested extensively. However, due to technical difficulties with the platform the Mini- MCA was not mounted to the platform. Once a suitable platform is developed, future extensions can be conducted into the suitability of the Mini-MCA for airborne surveillance of Australian crops.
Resumo:
A number of hurdles must be overcome in order to integrate unmanned aircraft into civilian airspace for routine operations. The ability of the aircraft to land safely in an emergency is essential to reduce the risk to people, infrastructure and aircraft. To date, few field-demonstrated systems have been presented that show online re-planning and repeatability from failure to touchdown. This paper presents the development of the Guidance, Navigation and Control (GNC) component of an Automated Emergency Landing System (AELS) intended to address this gap, suited to a variety of fixed-wing aircraft. Field-tested on both a fixed-wing UAV and Cessna 172R during repeated emergency landing experiments, a trochoid-based path planner computes feasible trajectories and a simplified control system executes the required manoeuvres to guide the aircraft towards touchdown on a predefined landing site. This is achieved in zero-thrust conditions with engine forced to idle to simulate failure. During an autonomous landing, the controller uses airspeed, inertial and GPS data to track motion and maintains essential flight parameters to guarantee flyability, while the planner monitors glide ratio and re-plans to ensure approach at correct altitude. Simulations show reliability of the system in a variety of wind conditions and its repeated ability to land within the boundary of a predefined landing site. Results from field-tests for the two aircraft demonstrate the effectiveness of the proposed GNC system in live operation. Results show that the system is capable of guiding the aircraft to close proximity of a predefined keyhole in nearly 100% of cases.
Resumo:
The undesirable effects of roll motion of ships (rocking about the longitudinal axis) became noticeable in the mid-nineteenth century when significant changes were introduced to the design of ships as a result of sails being replaced by steam engines and the arrangement being changed from broad to narrow hulls. The combination of these changes led to lower transverse stability (lower restoring moment for a given angle of roll) with the consequence of larger roll motion. The increase in roll motion and its effect on cargo and human performance lead to the development several control devices that aimed at reducing and controlling roll motion. The control devices most commonly used today are fin stabilizers, rudder, anti-roll tanks, and gyrostabilizers. The use of different types of actuators for control of ship roll motion has been amply demonstrated for over 100 years. Performance, however, can still fall short of expectations because of difficulties associated with control system design, which have proven to be far from trivial due to fundamental performance limitations and large variations of the spectral characteristics of wave-induced roll motion. This short article provides an overview of the fundamentals of control design for ship roll motion reduction. The overview is limited to the most common control devices.
Resumo:
Australian farmers have used precision agriculture technology for many years with the use of ground – based and satellite systems. However, these systems require the use of vehicles in order to analyse a wide area which can be time consuming and cost ineffective. Also, satellite imagery may not be accurate for analysis. Low cost of Unmanned Aerial Vehicles (UAV) present an effective method of analysing large plots of agricultural fields. As the UAV can travel over long distances and fly over multiple plots, it allows for more data to be captured by a sampling device such as a multispectral camera and analysed thereafter. This would allow farmers to analyse the health of their crops and thus focus their efforts on certain areas which may need attention. This project evaluates a multispectral camera for use on a UAV for agricultural applications.
Resumo:
This paper analyses the performance of particular wave-energy converter that uses the gyroscopic effects of a large rotating fly-wheel in combination with a controlled power-take-off device. Controlled gyroscopic forces have been used successfully in the past to reduce the motion of marine structures. With appropriately designed power-take-off elements, gyroscopic forces can be controlled to optimise the extracted energy from the motion of marine structures.
Resumo:
This paper presents the validation of a manoeuvring model for a novel 127m-vehicle-passenger trimaran via full scale trials. The adopted structure of the model is based on a model previously proposed in the literature with some simplifications. The structure of the model is discussed. Then initial parameter estimates are computed, and the final set of parameters are obtained via adjustments based on engineering judgement and application of a genetic algorithm so as to match the data of the trials. The validity of the model is also assessed with data from a trial different from the one use for the parameter adjustment. The model shows good agreement with the trial data.
Resumo:
This paper presents a detailed simulation model of a Naval coastal patrol vessel. The vessel described is a 50m long, fast monohull coastal patrol vessel. The paper describes the complete model and its implementation in Matlab-Simulink. In order to promote the use of this model, the Simulink files are openly available through a website.
Resumo:
This article presents some remarks on models currently used in low speed manoeuvring and dynamic positioning problems. It discusses the relationship between the classical hydrodynamic equations for manoeuvring and seakeeping, and offers insight into the models used for simulation and control system design.
Resumo:
Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.
Resumo:
Most elderly Finnish residents prefer to age in place, but some relocate because of push factors that create stress in their current homes and pull factors that attract them to a new dwelling. This survey examines the important pull factors that attract seniors to senior houses. Grocery nearby is the strongest pull factor followed by hospital or medical center and public transportation. A factor analysis reveals that attributes can be grouped into three factors: onsite services that allow the residents to maintain an active lifestyle with some luxury, everyday services and facilities that would enable aging in place, and physical activity facilities. Residents have chosen the type of senior housing that supports their lifestyle. Meanwhile, socioeconomic characteristics do not explain the differences in the types of features that attract residents.
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.
Resumo:
This paper presents an approach for dynamic state estimation of aggregated generators by introducing a new correction factor for equivalent inter-area power flows. The spread of generators from the center of inertia of each area is summarized by the correction term α on the equivalent power flow between the areas and is applied to the identification and estimation process. A nonlinear time varying Kalman filter is applied to estimate the equivalent angles and velocities of coherent areas by reducing the effect of local modes on the estimated states. The approach is simulated on two test systems and the results show the effect of the correction factor and the performance of the state estimation by estimating the inter-area dynamics of the system.