54 research outputs found

    Marshall Space Flight Center Research and Technology Report 2019

    Get PDF
    Today, our calling to explore is greater than ever before, and here at Marshall Space Flight Centerwe make human deep space exploration possible. A key goal for Artemis is demonstrating and perfecting capabilities on the Moon for technologies needed for humans to get to Mars. This years report features 10 of the Agencys 16 Technology Areas, and I am proud of Marshalls role in creating solutions for so many of these daunting technical challenges. Many of these projects will lead to sustainable in-space architecture for human space exploration that will allow us to travel to the Moon, on to Mars, and beyond. Others are developing new scientific instruments capable of providing an unprecedented glimpse into our universe. NASA has led the charge in space exploration for more than six decades, and through the Artemis program we will help build on our work in low Earth orbit and pave the way to the Moon and Mars. At Marshall, we leverage the skills and interest of the international community to conduct scientific research, develop and demonstrate technology, and train international crews to operate further from Earth for longer periods of time than ever before first at the lunar surface, then on to our next giant leap, human exploration of Mars. While each project in this report seeks to advance new technology and challenge conventions, it is important to recognize the diversity of activities and people supporting our mission. This report not only showcases the Centers capabilities and our partnerships, it also highlights the progress our people have achieved in the past year. These scientists, researchers and innovators are why Marshall and NASA will continue to be a leader in innovation, exploration, and discovery for years to come

    Situation-aware Edge Computing

    Get PDF
    Future wireless networks must cope with an increasing amount of data that needs to be transmitted to or from mobile devices. Furthermore, novel applications, e.g., augmented reality games or autonomous driving, require low latency and high bandwidth at the same time. To address these challenges, the paradigm of edge computing has been proposed. It brings computing closer to the users and takes advantage of the capabilities of telecommunication infrastructures, e.g., cellular base stations or wireless access points, but also of end user devices such as smartphones, wearables, and embedded systems. However, edge computing introduces its own challenges, e.g., economic and business-related questions or device mobility. Being aware of the current situation, i.e., the domain-specific interpretation of environmental information, makes it possible to develop approaches targeting these challenges. In this thesis, the novel concept of situation-aware edge computing is presented. It is divided into three areas: situation-aware infrastructure edge computing, situation-aware device edge computing, and situation-aware embedded edge computing. Therefore, the concepts of situation and situation-awareness are introduced. Furthermore, challenges are identified for each area, and corresponding solutions are presented. In the area of situation-aware infrastructure edge computing, economic and business-related challenges are addressed, since companies offering services and infrastructure edge computing facilities have to find agreements regarding the prices for allowing others to use them. In the area of situation-aware device edge computing, the main challenge is to find suitable nodes that can execute a service and to predict a node’s connection in the near future. Finally, to enable situation-aware embedded edge computing, two novel programming and data analysis approaches are presented that allow programmers to develop situation-aware applications. To show the feasibility, applicability, and importance of situation-aware edge computing, two case studies are presented. The first case study shows how situation-aware edge computing can provide services for emergency response applications, while the second case study presents an approach where network transitions can be implemented in a situation-aware manner

    Connectivity, throughput, and end-to-end latency in infrastructureless wireless Networks with beamforming-enabled devices

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 181-188).Infrastructureless wireless networks are an important class of wireless networks best fitted to operational situations with temporary, localized demand for communication ability. These networks are composed of wireless communication devices that autonomously form a network without the need for pre-deployed infrastructure such as wireless base-stations and access points. Significant research and development has been devoted to mobile ad hoc wireless networks (MANETs) in the past decade, a particular infrastructureless wireless network architecture. While MANETs are capable of autonomous network formation and multihop routing, the practical adoption of this technology has been limited since these networks are not designed to support more than about thirty users or to provide the quality of service (QoS) assurance required by many of the envisioned driving applications for infrastructureless wireless networks. In particular, communication during disaster relief efforts or tactical military operations requires guaranteed network service capabilities for mission-critical, time-sensitive data and applications. MANETs may be frequently disconnected due to device mobility and mismatches between routing and transport layer protocols, making them unsuitable for these scenarios. Network connectivity is fundamentally important to a network designed to provide QoS guarantees to the end-user. Without network connectivity, at least one pair of devices in the network experiences zero sustainable data rate and infinite end-to-end message delay, a catastrophic condition during a search and rescue mission or in a battlefield. We consider the use of wireless devices equipped with beamforming-enabled antennas to expand deployment regimes in which there is a high probability of instantaneous connectivity and desirable network scalability. Exploiting the increased communication reach of directional antennas and electronic beam steering techniques in fixed rate systems, we characterize the probability of instantaneous connectivity for a finite number of nodes operating in a bounded region and identify required conditions to achieve an acceptably high probability of connectivity. Our analysis shows significant improvements to highly-connected regimes of operation with added antenna directivity. Following the characterization of instantaneous network connectivity, we analyze the achievable network throughput and scalability of both fixed and variable rate beamforming-enabled power-limited networks operating in a bounded region. Our study of the scaling behavior of the network is concerned with three QoS metrics of central importance for a system designed to provide service assurance to the end-user: achievable throughput, end-to-end delay (which we quantify as the number of end-to-end hops), and network energy consumption. We find that the infrastructureless wireless network can achieve scalable performance that is independent of end-user device density with high probability, as well as identify the existence of a system characteristic hopping distance for routing schemes that attain this scaling-optimal behavior. Our results also reveal achievable QoS performance gains from the inclusion of antenna directivity. Following these insights, we develop a scalable, heuristic geographic routing algorithm using device localization information and the characteristic hopping distance guideline that achieves sub-optimal but high network throughput in simulation.by Matthew F. Carey.S.M

    The Securitisation of Climate Change in the Australian political-military sector with a comparison to the United States

    Full text link
    This thesis comparatively examines the process of climate securitisation within the Australian and United States (US) political-military sectors between 2003 – 2013. Drawing on established securitisation frameworks (―Copenhagen‖ and ―Paris‖ Schools), the thesis used a combination of software-assisted techniques and manual qualitative content analysis to systematically analyse more than 3,500 speech-acts and strategic policies. Analysis focused on how the political-military sectors contextually and temporally framed climate change and identified which areas of the political-military bureaucracies were active in their climate response. The research found that the Australian Defence Force (ADF) was not a climate-securitising actor and that its response to climate change was mediated by the heightened politicisation of climate change. Unlike the US, the ADF failed to adopt substantive climate responses and this led to a minimalist climate strategy. The thesis argues that, in Australia, this constituted a strategic blind spot and identified the difficulties of an avowedly apolitical institution responding to a politically partisan security issue. This situation contrasted somewhat with the US, where a similarly divided body politic nevertheless united to legislate for the US military to analyse and prepare for the national security impacts of climate change. Given a degree of bi-partisan political authority to act, the US military undertook sweeping reviews that resulted in climate change becoming more mainstreamed than occurred in the ADF. By 2013, the US military had published a series of prominent climate change documents that represented the cornerstones of a more enduring strategic response. Beyond politics, the US military had other reasons to act beyond the expectations of the ADF. These included: increasing its force-posture in a climate changed Arctic; securing its global network of bases and infrastructure from climate change; and as an opportunity to consolidate its position as the pre-eminent global military power in an era of rapid environmental, socio-political and technological change. Through understanding the process of climate securitisation in the Defence sector, this thesis extends existing securitisation theory, proposes a new methodology for analysing speech-acts and provides a benchmark from which researchers, policy makers and strategic planners might develop more detailed and comprehensive climate responses
    • …
    corecore