10 research outputs found

    Contributions to the Performance Analysis of Intervehicular Communications Systems and Schemes

    Get PDF
    RÉSUMÉ Le but des systèmes de communication intervéhicule (Inter-Vehicle Communication – IVC) est d'améliorer la sécurité de conduite en utilisant des capteurs et des techniques de communication sans fil pour être en mesure de communiquer mutuellement sans aucune intervention extérieure. Avec l'utilisation de ces systèmes, les communications véhicule à véhicule (V2V) peuvent être plus efficaces dans la prévention des accidents et la décongestion de la circulation que si chaque véhicule travaillait individuellement. Une des solutions proposées pour les systèmes IVC est l’utilisation des systèmes de communication coopérative, qui en principe, augmentent l'efficacité spectrale et énergétique, la couverture du réseau, et réduit la probabilité de défaillance. La diversité d'antenne (entrées multiples sorties multiples « Multiple-Input Multiple-Output » ou MIMO) peut également être une alternative pour les systèmes IVC pour améliorer la capacité du canal et la diversité (fiabilité), mais en échange d’une complexité accrue. Toutefois, l'application de telles solutions est difficile, car les communications sans fil entre les véhicules sont soumises à d’importants effets d'évanouissements des canaux appelés (canaux sujets aux évanouissements de n*Rayleigh, « n*Rayleigh fading channels»), ce qui conduit à la dégradation des performances. Par conséquent, dans cette thèse, nous proposons une analyse de la performance globale des systèmes de transmission coopératifs et MIMO sur des canaux sujets aux évanouissements de n*Rayleigh. Cette analyse permettra d’aider les chercheurs pour la conception et la mise en œuvre de systèmes de communication V2V avec une complexité moindre. En particulier, nous étudions d'abord la performance de la sélection du relais de coopération avec les systèmes IVC, on suppose que la transmission via « Amplify-and-Forward» (AF) ou bien «Decode-and-Forward» (DF) est assurée par N relais pour transférer le message de la source à la destination. La performance du système est analysée en termes de probabilité de défaillance, la probabilité d'erreur de symbole, et la capacité moyenne du canal. Les résultats numériques démontrent que la sélection de relais réalise une diversité de l'ordre de (d≈mN/n) pour les deux types de relais, où m est un paramètre évanouissement de Rayleigh en cascade. Nous étudions ensuite la performance des systèmes IVC à sauts multiples avec et sans relais régénératifs. Dans cette étude, nous dérivons des expressions approximatives pour la probabilité de défaillance et le niveau d’évanouissement lorsque la diversité en réception basée sur le ratio maximum de combinaison (MRC) est employée. En outre, nous analysons la répartition de puissance pour le système sous-jacent afin de minimiser la probabilité globale de défaillance. Nous montrons que la performance des systèmes régénératifs est meilleure que celle des systèmes non régénératifs lorsque l’ordre de cascade n est faible, tandis qu’ils ont des performances similaires lorsque n est élevé. Ensuite, nous considérons le problème de la détection de puissance des signaux inconnus aux n* canaux de Rayleigh. Dans ce travail, de nouvelles expressions approximatives sont dérivées de la probabilité de détection moyenne avec et sans diversité en réception MRC. En outre, la performance du système est analysée lorsque la détection de spectre coopérative (CSS) est considérée sous diverses contraintes de canaux (par exemple, les canaux de communication parfaits et imparfaits). Les résultats numériques ont montré que la fiabilité de détection diminue à mesure que l'ordre n augmente et s’améliore sensiblement lorsque CSS emploie le schéma MRC. Il est démontré que CSS avec le schéma MRC maintient la probabilité de fausse alarme minimale dans les canaux d’information imparfaite plutôt que d'augmenter le nombre d'utilisateurs en coopération. Enfin, nous présentons une nouvelle approche pour l'analyse des performances des systèmes IVC sur n*canaux de Rayleigh, en utilisant n_T antennes d'émission et n_R antennes de réception pour lutter contre l'effet d’évanouissement. Dans ce contexte, nous évaluons la performance des systèmes MIMO-V2V basés sur la sélection des antennes d'émission avec un ratio maximum de combinaison (TAS/MRC) et la sélection combinant (TAS/SC). Dans cette étude, nous dérivons des expressions analytiques plus précises pour la probabilité de défaillance, la probabilité d'erreur de symbole, et l’évanouissement sur n*canaux Rayleigh. Il est montré que les deux régimes ont le même ordre de diversité maximale équivalent à (d≈mn_T n_R /n) . En outre, TAS / MRC offre un gain de performance mieux que TAS/ SC lorsque le nombre d'antennes de réception est plus que celle des antennes d’émission, mais l’amélioration de la performance est limitée lorsque n augmente.----------Abstract The purpose of intervehicular communication (IVC) systems is to enhance driving safety, in which vehicles use sensors and wireless communication techniques to talk to each other without any roadside intervention. Using these systems, vehicle-to-vehicle (V2V) communications can be more effective in avoiding accidents and traffic congestion than if each vehicle works individually. A potential solution can be implemented in this research area using cooperative communications systems which, in principle, increase spectral and power efficiency, network coverage, and reduce the outage probability. Antenna diversity (i.e., multiple-input multiple output (MIMO) systems) can also be an alternative solution for IVC systems to enhance channel capacity and diversity (reliability) but in exchange of an increased complexity. However, applying such solutions is challenging since wireless communications among vehicles is subject to harsh fading channels called ‘n*Rayleigh fading channels’, which leads to performance degradation. Therefore, in this thesis we provide a comprehensive performance analysis of cooperative transmission and MIMO systems over n*Rayleigh fading channels that help researchers for the design and implementation of V2V communication systems with lower complexity. Specifically, we first investigate the performance of cooperative IVC systems with relay selection over n*Rayleigh fading channels, assuming that both the decode-and-forward and the amplify-and-forward relaying protocols are achieved by N relays to transfer the source message to the destination. System performance is analyzed in terms of outage probability, symbol error probability, and average channel capacity. The numerical results have shown that the best relay selection approach achieves the diversity order of (d≈mN/n) where m is a cascaded Rayleigh fading parameter. Second, we investigate the performance of multihop-IVC systems with regenerative and non-regenerative relays. In this study, we derive approximate closed-form expressions for the outage probability and amount of fading when the maximum ratio combining (MRC) diversity reception is employed. Further, we analyze the power allocation for the underlying scheme in order to minimize the overall outage probability. We show that the performance of regenerative systems is better than that of non-regenerative systems when the cascading order n is low and they have similar performance when n is high. Third, we consider the problem of energy detection of unknown signals over n*Rayleigh fading channels. In this work, novel approximate expressions are derived for the average probability of detection with and without MRC diversity reception. Moreover, the system performance is analyzed when cooperative spectrum sensing (CSS) is considered under various channel constraints (e.g, perfect and imperfect reporting channels). The numerical results show that the detection reliability decreases as the cascading order n increases and substantially improves when CSS employs MRC schemes. It is demonstrated that CSS with MRC scheme keeps the probability of false alarm minimal under imperfect reporting channels rather than increasing the number of cooperative users. Finally, we present a new approach for the performance analysis of IVC systems over n*Rayleigh fading channels, using n_T transmit and n_R receive antennas to combat fading influence. In this context, we evaluate the performance of MIMO-V2V systems based on the transmit antenna selection with maximum ratio combining (TAS/MRC) and selection combining (TAS/SC) schemes. In this study, we derive tight analytical expressions for the outage probability, the symbol error probability, and the amount of fading over n*Rayleigh fading channels. It is shown that both schemes have the same maximum diversity order equivalent to (d≈mn_T n_R /n). In addition, TAS/MRC offers a better performance gain than TAS/SC scheme when the number of receive antennas is more than that of transmit antennas, but the performance improvement is limited as n increases

    Physical-Layer Security in Cognitive Radio Networks

    Get PDF
    The fifth-generation (5G) communications and beyond are expected to serve a huge number of devices and services. However, due to the fixed spectrum allocation policies, the need for cognitive radio networks (CRNs) has increased accordingly. CRNs have been proposed as a promising approach to address the problem of under-utilization and scarcity of the spectrum. In CRNs, secondary users (SUs) access the licensed spectrum of the primary users (PUs) using underlay, overlay, or interweave paradigms. SUs can access the spectrum band simultaneously with the PUs in underlay access mode provided that the SUs’ transmission power does not cause interference to the PUs’ communication. In this case, SUs should keep monitoring the interference level that the PU receiver can tolerate and adjust the transmission power accordingly. However, varying the transmission power may lead to some threats to the privacy of the information transfer of CRNs. Therefore, securing data transmission in an underlay CRN is a challenge that should be addressed. Physical-layer security (PLS) has recently emerged as a reliable method to protect the confidentiality of the SUs’ transmission against attacks, especially for the underlay model with no need for sharing security keys. Indeed, PLS has the advantage of safeguarding the data transmission without the necessity of adding enormous additional resources, specifically when there are massively connected devices. Apart from the energy consumed by the various functions carried out by SUs, enhancing security consumes additional energy. Therefore, energy harvesting (EH) is adopted in our work to achieve both; energy efficiency and spectral efficiency. EH is a significant breakthrough for green communication, allowing the network nodes to reap energy from multiple sources to lengthen battery life. The energy from various sources, such as solar, wind, vibration, and radio frequency (RF) signals, can be obtained through the process of EH. This accumulated energy can be stored to be used for various processes, such as improving the users’ privacy and prolonging the energy-constrained devices’ battery life. In this thesis, for the purpose of realistic modelling of signal transmission, we explicitly assume scenarios involving moving vehicles or nodes in networks that are densely surrounded by obstacles. Hence, we begin our investigations by studying the link performance under the impact of cascaded κ−μ fading channels. Moreover, using the approach of PLS, we address the privacy of several three-node wiretap system models, in which there are two legitimate devices communicating under the threat of eavesdroppers. We begin by a three-node wiretap system model operating over cascaded κ − μ fading channels and under worst-case assumptions. Moreover, assuming cascaded κ − μ distributions for all the links, we investigate the impact of these cascade levels, as well as the impact of multiple antennas employed at the eavesdropper on security. Additionally, the PLS is examined for two distinct eavesdropping scenarios: colluding and non-colluding eavesdroppers. Throughout the thesis, PLS is mainly evaluated through the secrecy outage probability (SOP), the probability of non-zero secrecy capacity (Pnzcr ), and the intercept probability (Pint). Considering an underlay CRN operating over cascaded Rayleigh fading channel, with the presence of an eavesdropper, we explore the PLS for SUs in the network. This study is then extended to investigate the PLS of SUs in an underlay single-input-multiple-output (SIMO) CRN over cascaded κ-μ general fading channels with the presence of a multi-antenna eavesdropper. The impact of the constraint over the transmission power of the SU transmitter due to the underlay access mode is investigated. In addition, the effects of multiple antennas and cascade levels over security are well-explored. In the second part of our thesis, we propose an underlay CRN, in which an SU transmitter communicates with an SU destination over cascaded κ-μ channels. The confidentiality of the shared information between SUs is threatened by an eavesdropper. Our major objective is to achieve a secured network, while at the same time improving the energy and spectrum efficiencies with practical modeling for signals’ propagation. Hence, we presume that the SU destination harvests energy from the SU transmitter. The harvested energy is used to produce jamming signals to be transmitted to mislead the eavesdropper. In this scenario, a comparison is made between an energy-harvesting eavesdropper and a non-energy harvesting one. Additionally, we present another scenario in which cooperative jamming is utilized as one of the means to boost security. In this system model, the users are assumed to communicate over cascaded Rayleigh channels. Moreover, two scenarios for the tapping capabilities of the eavesdroppers are presented; colluding and non-colluding eavesdroppers. This study is then extended for the case of non-colluding eavesdroppers, operating over cascaded κ-μ channels. Finally, we investigate the reliability of the SUs and PUs while accessing the licensed bands using the overlay mode, while enhancing the energy efficiency via EH techniques. Hence, we assume that multiple SUs are randomly distributed, in which one of the SUs is selected to harvest energy from the PUs’ messages. Then, utilizing the gathered energy, this SU combines its own messages with the amplified PUs messages and forwards them to the destinations. Furthermore, we develop two optimization problems with the potential of maximizing the secondary users’ rate and the sum rate of both networks

    SCALABLE MULTI-HOP DATA DISSEMINATION IN VEHICULAR AD HOC NETWORKS

    Get PDF
    Vehicular Ad hoc Networks (VANETs) aim at improving road safety and travel comfort, by providing self-organizing environments to disseminate traffic data, without requiring fixed infrastructure or centralized administration. Since traffic data is of public interest and usually benefit a group of users rather than a specific individual, it is more appropriate to rely on broadcasting for data dissemination in VANETs. However, broadcasting under dense networks suffers from high percentage of data redundancy that wastes the limited radio channel bandwidth. Moreover, packet collisions may lead to the broadcast storm problem when large number of vehicles in the same vicinity rebroadcast nearly simultaneously. The broadcast storm problem is still challenging in the context of VANET, due to the rapid changes in the network topology, which are difficult to predict and manage. Existing solutions either do not scale well under high density scenarios, or require extra communication overhead to estimate traffic density, so as to manage data dissemination accordingly. In this dissertation, we specifically aim at providing an efficient solution for the broadcast storm problem in VANETs, in order to support different types of applications. A novel approach is developed to provide scalable broadcast without extra communication overhead, by relying on traffic regime estimation using speed data. We theoretically validate the utilization of speed instead of the density to estimate traffic flow. The results of simulating our approach under different density scenarios show its efficiency in providing scalable multi-hop data dissemination for VANETs

    Wireless networks physical layer security : modeling and performance characterization

    Get PDF
    Intrigued by the rapid growth and expand of wireless devices, data security is increasingly playing a significant role in our daily transactions and interactions with different entities. Possible examples, including e-healthcare information and online shopping, are becoming vulnerable due to the intrinsic nature of wireless transmission medium and the widespread open access of wireless links. Traditionally, the communication security is mainly regarded as the tasks at the upper layers of layered protocol stack, security techniques, including personal access control, password protection, and end-to-end encryption, have been widely studied in the open literature. More recently, plenty of research interests have been drawn to the physical layer forms of secrecy. As a new but appealing paradigm at physical layer, physical layer security is based on two pioneering works: (i) Shannon’s information-theoretic formulation and (ii) Wyner’s wiretap formulation. On account of the fundamental of physical layer security and the different nature of various wireless network, this dissertation is supposed to further fill the lacking of the existing research outcomes. To be specific, the contributions of this dissertation can be summarized as three-fold:(i) exploration of secrecy metrics to more general fading channels; (ii) characterization a new fading channel model and its reliability and security analysis in digital communication systems; and (iii) investigation of physical layer security over the random multiple-input multiple-output (MIMO) α −μ fading channels. Taking into account the classic Alice-Bob-Eve wiretap model, the first contribution can be divided into four aspects: (i) we have investigated the secrecy performance over single-input single-output (SISO) α −μ fading channels. The probability of non-zero (PNZ) secrecy capacity and the lower bound of secrecy outage probability (SOP) are derived for the special case when the main channel and wiretap channel undergo the same non-linearity fading parameter, i.e., α. Later on, for the purpose of filling the gap of lacking closed-form expression of SOP in the open literature and extending the obtained results in chapter 2 to the single-input multiple-output (SIMO) α − μ wiretap fading channels, utilizing the fact that the received signal-tonoise ratios (SNRs) at the legitimate receiver and eavesdropper can be approximated as new α −μ distributed random variables (RVs), the SOP metric is therefore derived, and given in terms of the bivariate Fox’s H-function; (ii) the secrecy performance over the Fisher-Snedecor F wiretap fading channels is initially considered. The SOP, PNZ, and ASC are finalized in terms of Meijer’s G-function; (iii) in order to generalize the obtained results over α −μ and Fisher-Snedecor F wiretap fading channels, a more flexible and general fading channel, i.e., Fox’s H-function fading model, are taken into consideration. Both the exact and asymptotic analysis of SOP, PNZ, and average secrecy capacity (ASC), are developed with closed-form expressions; and (iv) finally, motivated by the fact that the mixture gamma (MG) distribution is an appealing tool, which can be used to model the received instantaneous SNRs over wireless fading channels, the secrecy metrics over wiretap fading channels are derived based on the MG approach. Due to the limited transmission power and communication range, cooperative relays or multi-hop wireless networks are usually regarded as two promising means to address these concerns. Inspired by the obtained results in Chapters 2 and 3, the second main contribution is to propose a novel but simple fading channel model, namely, the cascaded α −μ. This new distribution is advantageous since it encompasses the existing cascaded Rayleigh, cascaded Nakagami-m, and cascaded Weibull with ease. Based on this, both the reliability and secrecy performance of a digital system over cascaded α −μ fading channels are further evaluated. Closed-form expressions of reliability metrics (including amount of fading (AF), outage probability, average channel capacity, and average symbol error probability (ABEP).) and secrecy metrics (including SOP, PNZ, and ASC) are respectively provided. Besides, their asymptotic behaviors are also performed and compared with the exact results. Considering the impacts of users’ densities, spatial distribution, and the path-loss exponent on secrecy issue, the third aspect of this thesis is detailed in Chapter 8 as the secrecy investigation of stochastic MIMO system over α −μ wiretap fading channels. Both the stochastic geometry and conventional space-time transmission (STT) scheme are used in the system configuration. The secrecy issue is mathematically evaluated by three metrics, i.e., connection outage, the probability of non-zero secrecy capacity and the ergodic secrecy capacity. Those three metrics are later on derived regarding two ordering scheme, and further compared with Monte-Carlo simulations

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Collaborative Sensing in Automotive Scenarios : Enhancement of the Vehicular Electronic Horizon through Collaboratively Sensed Knowledge

    Get PDF
    Modern vehicles are equipped with a variety of advanced driver assistance systems that increase driving comfort, economy and safety. Respective information sources for these systems are local sensors, like cameras, radar or lidar. However, the next generation of assistant systems will require information above the local sensing range. An extension of the local perception can be provided by the use of appro- priate communication mechanisms. Hence, other vehicles can serve as an informa- tion source by providing their local perception data, but also any other information source, such as cloud services. Required communication can take place directly be- tween vehicles via mobile ad-hoc communication or via a backend by the use of cellu- lar communication. The appropriate technology depends on the respective use case, that determines information content, granularity and tolerated latency. Based on liter- ature, we derived a categorization of use case dependent information demands, with respect to communication. The resulting three zones, namely safety zone, awareness zone and information zone, refer to the tolerated latency between the occurrence of an information and the point in time the information has to be processed at the receiver side. While communication mechanisms for the safety zone, i. e., the ego-vehicle’s di- rect surroundings with a remaining driving time of less than 2 − 5 seconds, have been focus in research and standardization in the past, respective mechanisms for larger distances have not been sufficiently considered. In this thesis, we examine in- formation distribution mechanisms in context of the previously mentioned use case categories. As the first key contribution, we consider the gathering of vehicular sensed data with regard to the information zone, i. e., more than 30 seconds remaining driving time to the point of the information origin. We developed a probabilistic data collection model that is able to reduce data traffic up to 85 % compared to opportunistic trans- mission and still sticks to certain quality metrics, e. g., a maximum detection latency. A central adaption of transmission probabilities to the density of transmitting vehi- cles is applicable for cellular use and copes with sparse traffic situations. Moreover, we have extended this approach by hybrid communication, i. e., the parallel use of cellular and mobile ad-hoc communication. This allows to further reduce cellular based data traffic, in particular in case of dense traffic. As the second key contribution, we examine the efficient distribution of the pre- viously gathered information. Information is structured and prioritized according to the most probable driving path, as so-called electronic horizon. The transmission towards the vehicles is performed in small data packets, according to the given pri- orities. The aim is to transmit only information relevant for road segments that will be used. Concerning this, we developed a mechanism for most probable travel path estimation and a data structure for efficient mapping of the electronic horizon. As the third key contribution, we examine the information exchange in the aware- ness zone, an area between the safety zone and the information zone with about 5 to 30 seconds remaining driving time to the point of the information origin. Derived from the respective use cases, this data is not directly safety relevant, but it is still about dynamic position information of neighboring vehicles. Due to the relatively long distance, direct vehicle to vehicle communication is not possible. Respective data has to be forwarded by intermediate vehicles. However, position beacons with- out data forwarding can already cause channel congestion in dense traffic situations. The use of cellular networks would require absolute total network coverage with permanent free channel resources. To enable forwarding of dynamic vehicle infor- mation anyhow, we developed at first a mechanism to reduce the channel load for position beacons. Next, we use the freed-up bandwidth to forward dynamic informa- tion about neighboring vehicle positions. With this mechanism, we are able to more than double the range of vehicular perception, with respect to moving objects. In extension to standardized communication mechanisms for the safety relevant direct proximity, our three mentioned contributions provide the means to complete the long range vehicular perception for future advanced driver assistance systems

    Distributed Data Management in Vehicular Networks Using Mobile Agents

    Get PDF
    En los últimos años, las tecnologías de la información y las comunicaciones se han incorporado al mundo de la automoción gracias a sus avances, y han permitido la creación de dispositivos cada vez más pequeños y potentes. De esta forma, los vehículos pueden ahora incorporar por un precio asequible equipos informáticos y de comunicaciones.En este escenario, los vehículos que circulan por una determinada zona (como una ciudad o una autopista) pueden comunicarse entre ellos usando dispositivos inalámbricos que les permiten intercambiar información con otros vehículos cercanos, formando así una red vehicular ad hoc, o VANET (Vehicular Ad hoc Network). En este tipo de redes, las comunicaciones se establecen con conexiones punto a punto por medio de dispositivos tipo Wi-Fi, que permiten la comunicación con otros del mismo tipo dentro de su alcance, sin que sea necesaria la existencia previa de una infraestructura de comunicaciones como ocurre con las tecnologías de telefonía móvil (como 3G/4G), que además requieren de una suscripción y el pago de una tarifa para poder usarlas.Cada vehículo puede enviar información y recibirla de diversos orígenes, como el propio vehículo (por medio de los sensores que lleva incorporados), otros vehículos que se encuentran cerca, así como de la infraestructura de tráfico presente en las carreteras (como semáforos, señales, paneles electrónicos de información, cámaras de vigilancia, etc.). Todos estas fuentes pueden transmitir datos de diversa índole, como información de interés para los conductores (por ejemplo, atascos de tráfico o accidentes en la vía), o de cualquier otro tipo, mientras sea posible digitalizarla y enviarla a través de una red.Todos esos datos pueden ser almacenados localmente en los ordenadores que llevan los vehículos a medida que son recibidos, y sería muy interesante poder sacarles partido por medio de alguna aplicación que los explotara. Por ejemplo, podrían utilizarse los vehículos como plataformas móviles de sensores que obtengan datos de los lugares por los que viajan. Otro ejemplo de aplicación sería la de ayudar a encontrar plazas de aparcamiento libres en una zona de una ciudad, usando la información que suministrarían los vehículos que dejan una plaza libre.Con este fin, en esta tesis se ha desarrollado una propuesta de la gestión de datos basada en el uso de agentes móviles para poder hacer uso de la información presente en una VANET de forma eficiente y flexible. Esta no es una tarea trivial, ya que los datos se encuentran dispersos entre los vehículos que forman la red, y dichos vehículos están constantemente moviéndose y cambiando de posición. Esto hace que las conexiones de red establecidas entre ellos sean inestables y de corta duración, ya que están constantemente creándose y destruyéndose a medida que los vehículos entran y salen del alcance de sus comunicaciones debido a sus movimientos.En un escenario tan complicado, la aproximación que proponemos permite que los datos sean localizados, y que se puedan hacer consultas sobre ellos y transmitirlos de un sitio cualquiera de la VANET a otro, usando estrategias multi-salto que se adaptan a las siempre cambiantes posiciones de los vehículos. Esto es posible gracias a la utilización de agentes móviles para el procesamiento de datos, ya que cuentan con una serie de propiedades (como su movilidad, autonomía, adaptabilidad, o inteligencia), que hace que sean una elección muy apropiada para este tipo de entorno móvil y con un elevado grado de incertidumbre.La solución propuesta ha sido extensamente evaluada y probada por medio de simulaciones, que demuestran su buen rendimiento y fiabilidad en redes vehiculares con diferentes condiciones y en diversos escenarios.<br /

    MSFC Skylab program engineering and integration

    Get PDF
    A technical history and managerial critique of the MSFC role in the Skylab program is presented. The George C. Marshall Space Flight Center had primary hardware development responsibility for the Saturn Workshop Modules and many of the designated experiments in addition to the system integration responsibility for the entire Skylab Orbital Cluster. The report also includes recommendations and conclusions applicable to hardware design, test program philosophy and performance, and program management techniques with potential application to future programs

    Astronautics and Aeronautics, 1975. A chronology

    Get PDF
    The major NASA launches are presented including the sounding rocket launches. Also included are the satellites, space probes, and manned space flights for the year

    Actas de las VI Jornadas Nacionales (JNIC2021 LIVE)

    Get PDF
    Estas jornadas se han convertido en un foro de encuentro de los actores más relevantes en el ámbito de la ciberseguridad en España. En ellas, no sólo se presentan algunos de los trabajos científicos punteros en las diversas áreas de ciberseguridad, sino que se presta especial atención a la formación e innovación educativa en materia de ciberseguridad, y también a la conexión con la industria, a través de propuestas de transferencia de tecnología. Tanto es así que, este año se presentan en el Programa de Transferencia algunas modificaciones sobre su funcionamiento y desarrollo que han sido diseñadas con la intención de mejorarlo y hacerlo más valioso para toda la comunidad investigadora en ciberseguridad
    corecore