810 research outputs found
Impact of tether cutting on onboard navigation during the Tethered Satellite Mission-1
The first Tethered Satellite System mission (TSS-1) is manifested for Shuttle Flight STS-44 in January of 1991. The TSS mission presents a new challenge to engineers, requiring advanced guidance, navigation and control concepts. Current NASA flight rules require that the navigational state of the Orbiter at deorbit burn be known to an accuracy of 20 nautical miles. Response of the Shuttle crew to this contingency may involve cutting the tether prior to a complete retrieval. The degradation of the navigational state accuracy as modelled by Shuttle navigation system is examined. Responses to the loss of communication scenario are proposed for two cases. The first case examines navigational performance during a nominal attitude profile. The second case is identical to the first, with the inclusion of modelled tether electrodynamical forces. Comparisons of trajectories propagated from the onboard navigational state vector and a reference ephemeris state vector were performed, with the tether cut simulated at various points during the mission. Additionally, updates to the onboard navigational state via ground uplinks were provided prior to the assumed loss of communication. Through these comparisons, the onboard navigation state error was determined. Alternative responses result from efforts to minimize this error during the various phases of TSS-1 deployment. These results demonstrated existing NASA flight rules could be violated by cutting the tether, and suggests reponses to a loss of communications contingency to maintain a more accurate navigational state
Simple proof of confidentiality for private quantum channels in noisy environments
Complete security proofs for quantum communication protocols can be
notoriously involved, which convolutes their verification, and obfuscates the
key physical insights the security finally relies on. In such cases, for the
majority of the community, the utility of such proofs may be restricted. Here
we provide a simple proof of confidentiality for parallel quantum channels
established via entanglement distillation based on hashing, in the presence of
noise, and a malicious eavesdropper who is restricted only by the laws of
quantum mechanics. The direct contribution lies in improving the linear
confidentiality levels of recurrence-type entanglement distillation protocols
to exponential levels for hashing protocols. The proof directly exploits the
security relevant physical properties: measurement-based quantum computation
with resource states and the separation of Bell-pairs from an eavesdropper. The
proof also holds for situations where Eve has full control over the input
states, and obtains all information about the operations and noise applied by
the parties. The resulting state after hashing is private, i.e., disentangled
from the eavesdropper. Moreover, the noise regimes for entanglement
distillation and confidentiality do not coincide: Confidentiality can be
guaranteed even in situation where entanglement distillation fails. We extend
our results to multiparty situations which are of special interest for secure
quantum networks.Comment: 5 + 11 pages, 0 + 4 figures, A. Pirker and M. Zwerger contributed
equally to this work, replaced with accepted versio
Long-range big quantum-data transmission
We introduce an alternative type of quantum repeater for long-range quantum
communication with improved scaling with the distance. We show that by
employing hashing, a deterministic entanglement distillation protocol with
one-way communication, one obtains a scalable scheme that allows one to reach
arbitrary distances, with constant overhead in resources per repeater station,
and ultrahigh rates. In practical terms, we show that also with moderate
resources of a few hundred qubits at each repeater station, one can reach
intercontinental distances. At the same time, a measurement-based
implementation allows one to tolerate high loss, but also operational and
memory errors of the order of several percent per qubit. This opens the way for
long-distance communication of big quantum data.Comment: revised manuscript including new result
Recommended from our members
Generation of multi-modal dialogue for a net environment
In this paper an architecture and special purpose markup language for simulated affective face-to-face communication is presented. In systems based on this architecture, users will be able to watch embodied conversational agents interact with each other in virtual locations on the internet. The markup language, or Rich Representation Language (RRL), has been designed to provide an integrated representation of speech, gesture, posture and facial animation
Fluid-structure interaction with flexible multibody dynamics and smoothed particle hydrodynamics
In this work, we present a versatile and efficient computational approach to fluid-structure interaction based on the coupling of flexible multibody systems with fluids analyzed by means of the meshfree particle-based method smoothed particle hydrodynamics. Regarding numerical examples, rigid or flexible cells, and fibers in microchannel flows are investigated. As a main feature of this paper, our results are validated with reference simulations obtained from fundamentally different approaches
Modeling Burned Areas in Indonesia: The FLAM Approach
Large-scale wildfires affect millions of hectares of land in Indonesia annually and produce severe smoke haze pollution and carbon emissions, with negative impacts on climate change, health, the economy and biodiversity. In this study, we apply a mechanistic fire model to estimate burned area in Indonesia for the first time. We use the Wildfire Climate Impacts and Adaptation Model (FLAM) that operates with a daily time step on the grid cell of 0.25 arc degrees, the same spatio-temporal resolution as in the Global Fire Emissions Database v4 (GFED). GFED data accumulated from 2000–2009 are used for calibrating spatially-explicit suppression efficiency in FLAM. Very low suppression levels are found in peatland of Kalimantan and Sumatra, where individual fires can burn for very long periods of time despite extensive rains and fire-fighting attempts. For 2010–2016, we validate FLAM estimated burned area temporally and spatially using annual GFED observations. From the validation for burned areas aggregated over Indonesia, we obtain Pearson’s correlation coefficient separately for wildfires and peat fires, which equals 0.988 in both cases. Spatial correlation analysis shows that in areas where around 70% is burned, the correlation coefficients are above 0.6, and in those where 30% is burned, above 0.9
- …