نتایج جستجو برای: telemetry
تعداد نتایج: 5058 فیلتر نتایج به سال:
This paper proposes a novel anomaly detection system for spacecrafts based on data mining techniques. It constructs a nonlinear probabilistic model w.r.t. behavior of a spacecraft by applying the relevance vector regression and autoregression to massive telemetry data, and then monitors the on-line telemetry data using the model and detects anomalies. A major advantage over conventional anomaly...
Automation of spacecraft operations can provide a substantial reduction in ground support and program costs. Here, we develop an autonomous spacecraft telemetry processing system consisting of an off-line architecture for the generation and analysis of learned patterns in the telemetry stream and an on-line mechanism for automated event and alert notification. Our system draws on the embedded k...
Emerging airborne telemetry networks are going beyond traditional point-to-point communication. The iNET telemetry architecture uses a TDMA MAC with relay nodes that enable multi-hop communication. We analyze the performance of the iNET TDMA MAC protocol with respect to various parameters such as number of nodes, flight range, number of relays, and number of hops via mathematical modeling. We a...
Cardiac telemetry is widely used in hospitals, but it is expensive and labor-intensive. Therefore, it should be used only in those most likely to benefit. The authors review the available evidence and offer their recommendations.
A simple and inexpensive flight payload system for experimental high altitude balloon flights is described. The payload includes a simple 2m FM/CW telemetry beacon transmitter, an automated ID'er/controller which can provide up to 16 different CW telemetry status messages and also control an inexpensive digital camera for collecting still images at predetermined intervals during the balloon fli...
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید