252 research outputs found

    Intelligent fault management for the Space Station active thermal control system

    Get PDF
    The Thermal Advanced Automation Project (TAAP) approach and architecture is described for automating the Space Station Freedom (SSF) Active Thermal Control System (ATCS). The baseline functionally and advanced automation techniques for Fault Detection, Isolation, and Recovery (FDIR) will be compared and contrasted. Advanced automation techniques such as rule-based systems and model-based reasoning should be utilized to efficiently control, monitor, and diagnose this extremely complex physical system. TAAP is developing advanced FDIR software for use on the SSF thermal control system. The goal of TAAP is to join Knowledge-Based System (KBS) technology, using a combination of rules and model-based reasoning, with conventional monitoring and control software in order to maximize autonomy of the ATCS. TAAP's predecessor was NASA's Thermal Expert System (TEXSYS) project which was the first large real-time expert system to use both extensive rules and model-based reasoning to control and perform FDIR on a large, complex physical system. TEXSYS showed that a method is needed for safely and inexpensively testing all possible faults of the ATCS, particularly those potentially damaging to the hardware, in order to develop a fully capable FDIR system. TAAP therefore includes the development of a high-fidelity simulation of the thermal control system. The simulation provides realistic, dynamic ATCS behavior and fault insertion capability for software testing without hardware related risks or expense. In addition, thermal engineers will gain greater confidence in the KBS FDIR software than was possible prior to this kind of simulation testing. The TAAP KBS will initially be a ground-based extension of the baseline ATCS monitoring and control software and could be migrated on-board as additional computation resources are made available

    A Treatment of Signalized Intersections with High V/c Ratio Under Advanced Traffic Control Systems

    Full text link
    Advanced Traffic Control Systems (ATCS) have been recognized as one of the most direct methods for relieving urban traffic congestion. However, the application of the systems in developing countries is unique because road intersections in their cities are usually very congested with high v/c ratio. The aim of this study is to evaluate the treatments of signalized in-tersections with high v/c ratio under ATCS. Moreover, is to recommend how to improve traffic performance in an existing severe transportation problem. Road network in Bandung-Indonesia was used as a case study. AIMSUN (Advanced Interactive Microscopic Simulation for Urban and Un-urban Network) micro-simulator was conducted to evaluate the treat-ment during peak and off peak periods. The results indicate that by chang-ing two-way into one-way road will cause an increase in traffic flows by 7%-58%, and a decrease in queue length by 87%-100%. In general, all performance measures in related streams were bette

    Using Ontologies to Detect Anomalies in the Sky

    Get PDF
    Ce mémoire de maîtrise présente une solution pour améliorer la sécurité des systèmes de contrôle de trafic aérien. Cette solution prend la forme d’un détecteur d’anomalies qui va déceler les manipulations malicieuses de données. Par les mêmes mécanismes, ce détecteur peut aussi détecter les situations d’urgences et les violations des lois du trafic aérien. Les systèmes de contrôle de trafic aérien sont composés de plusieurs capteurs qui envoient des données aux stations de travail des contrôleurs aérien sur un réseau IP en utilisant un protocole de partage de données en temps réel nommé Data Distribution Service. Des données malicieuses comme de fausses positions d’avions peuvent être insérées dans le trafic du réseau en compromettant une machine connectée à celui-ci ou en émettant des signaux contenant les données falsifiées qui seront captées et transmises sur le réseau par les capteurs. Actuellement, une fois que ces données sont sur le réseau, les systèmes ne disposent pas de mécanismes pour différencier les données malicieuses des vraies données et les traiteront de la même façon. La présence de données falsifiées sur le réseau peut causer de la confusion qui peut mener à des situations dangereuses incluant une sécurité aérienne réduite. Nous avons évalué l’impact des différentes attaques sur les systèmes de contrôle de trafic aérien en construisant un modèle de menaces tout en considérant les procédures d’urgence déjà en place dans le monde de l’aviation. Nous avons conclu qu’il y a plusieurs façons selon lesquelles un adversaire peut injecter des données malicieuses dans les systèmes. Il peut le faire soit en injectant les données directement dans le réseau ou en utilisant une radio logicielle pour émettre des données malicieuses sur les fréquences utilisées par les capteurs qu’ils les transmettent eux-mêmes sur le réseau. Ces données peuvent induire les contrôleurs de trafic aérien en erreur et leur faire prendre une décision dangereuse. Ce modèle de menaces a servi dans l’ébauche des méthodes de détection.----------ABSTRACT : This Master’s thesis introduces an anomaly detection solution to increase the security of Air Traffic Control Systems against malicious data manipulation threats. At the same time, this detection system can detect emergencies and air traffic rules violations. Air Traffic Control Systems are made of multiple sensors sending data to air traffic controller workstations over an IP network using a publish-subscribe protocol, Data Distribution Service. Malicious data can be inserted into this network by either compromising a machine on the network, or by tricking the sensors into emitting falsified data. Once into the network, the system currently cannot distinguish malicious data from real one and will treat it as such, potentially causing dangerous situations and general confusion that could lead to air traffic safety being compromised. We quantify the impact different attacks have on the system by building a threat model while considering existing safety procedures already in place in the aviation world. We found that there are multiple ways an attacker can inject malicious data into the system either directly by injecting false data into the network or indirectly by sending spoofed broadcasts that will be picked up by the ground equipment and in turn injected into the network. These data manipulations can induce an air traffic controller into making a wrong decision. This threat model also gives us direction on how to detect potential threats. To counter these threats, we design a detection solution using ontologies to store data and a query engine to interact with it. By using ontologies, we can add semantics to the data and facilitate the creation of detection queries in the SPARQL query language. It uses a translation table to convert Data Distribution Service data structures into ontological concepts. The detection engine runs on dedicated machines and sends alerts to the concerned computers if a query detects an anomaly. The ontological model was built using the assumptions we made about the data pieces circulating on the Air Traffic Control System’s network. Designing an ontology that is specific enough to be useful for detection, but also generic enough to easily add new detection capabilities proved to be a challenge. We found that we often needed to add new concepts to the ontology when we designed new queries

    Adaptive Traffic Control System: Design and Simulation

    Get PDF
    Traditional traffic control infrastructures have not changed much in the last several decades, while the volume of traffic has increased disproportionably to infrastructure improvement. A solution to mobility cannot be addressed by simply improving the technology of a single vehicle any further. A solution is to enable people to reach their destinations safely and in optimal time, given the topology of road networks. This thesis offers such a solution based on an adaptive traffic control algorithm which takes the road network topology and dynamically varying traffic streams as input, and guarantees dependable and optimal mobility for vehicles. The algorithm calculates dependable passages for vehicles to cross road intersections, and enables point-to-point travel by minimizing travel time and maximizing fuel consumption. The adaptive algorithm is embedded in the Arbiter, managed by an Intersection Manager at every road intersection. A distributed traffic management architecture, consisting of a hierarchy of road managers, is proposed in the thesis. Extensions to the adaptive algorithm and the architecture are given. The extended algorithm will efficiently function under exceptional situations, such as bad weather, road repairs, and emergency vehicle mobility. The extended architecture is expected to have autonomic computing properties, such as self-healing, self-recovery, and self-protection, and Cyber-physical system properties, such as tightly-coupled feed-back loops with all entities in its environment. A simulator has been implemented, and simulated results reveal that the adaptive algorithm is far superior in performance to fixed-time control systems

    Quality of service over ATM networks

    Get PDF
    PhDAbstract not availabl

    Advanced flight deck/crew station simulator functional requirements

    Get PDF
    This report documents a study of flight deck/crew system research facility requirements for investigating issues involved with developing systems, and procedures for interfacing transport aircraft with air traffic control systems planned for 1985 to 2000. Crew system needs of NASA, the U.S. Air Force, and industry were investigated and reported. A matrix of these is included, as are recommended functional requirements and design criteria for simulation facilities in which to conduct this research. Methods of exploiting the commonality and similarity in facilities are identified, and plans for exploiting this in order to reduce implementation costs and allow efficient transfer of experiments from one facility to another are presented
    • …
    corecore