18,390 research outputs found

    Safety verification of a fault tolerant reconfigurable autonomous goal-based robotic control system

    Get PDF
    Fault tolerance and safety verification of control systems are essential for the success of autonomous robotic systems. A control architecture called Mission Data System (MDS), developed at the Jet Propulsion Laboratory, takes a goal-based control approach. In this paper, a method for converting goal network control programs into linear hybrid systems is developed. The linear hybrid system can then be verified for safety in the presence of failures using existing symbolic model checkers. An example task is simulated in MDS and successfully verified using HyTech, a symbolic model checking software for linear hybrid systems

    Energy Management of the Multi-Mission Space Exploration Vehicle Using a Goal-Oriented Control System

    Get PDF
    Safe human exploration in space missions requires careful management of limited resources such as breathable air and stored electrical energy. Daily activities for astronauts must be carefully planned with respect to such resources, and usage must be monitored as activities proceed to ensure that they can be completed while maintaining safe resource margins. Such planning and monitoring can be complex because they depend on models of resource usage, the activities being planned, and uncertainties. This paper describes a system - and the technology behind it - for energy management of the NASA-Johnson Space Center's Multi-Mission Space Exploration Vehicles (SEV), that provides, in an onboard advisory mode, situational awareness to astronauts and real-time guidance to mission operators. This new capability was evaluated during this year's Desert RATS (Research and Technology Studies) planetary exploration analog test in Arizona. This software aided ground operators and crew members in modifying the day s activities based on the real-time execution of the plan and on energy data received from the rovers

    Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent

    Get PDF
    This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements

    The Number of Different Binary Functions Generated by NK-Kauffman Networks and the Emergence of Genetic Robustness

    Full text link
    We determine the average number ϑ(N,K) \vartheta (N, K) , of \textit{NK}-Kauffman networks that give rise to the same binary function. We show that, for N1 N \gg 1 , there exists a connectivity critical value Kc K_c such that ϑ(N,K)eϕN \vartheta(N,K) \approx e^{\phi N} (ϕ>0 \phi > 0 ) for K<Kc K < K_c and ϑ(N,K)1\vartheta(N,K) \approx 1 for K>Kc K > K_c . We find that Kc K_c is not a constant, but scales very slowly with N N , as Kclog2log2(2N/ln2) K_c \approx \log_2 \log_2 (2N / \ln 2) . The problem of genetic robustness emerges as a statistical property of the ensemble of \textit{NK}-Kauffman networks and impose tight constraints in the average number of epistatic interactions that the genotype-phenotype map can have.Comment: 4 figures 18 page

    Detection statistics in the micromaser

    Get PDF
    We present a general method for the derivation of various statistical quantities describing the detection of a beam of atoms emerging from a micromaser. The user of non-normalized conditioned density operators and a linear master equation for the dynamics between detection events is discussed as are the counting statistics, sequence statistics, and waiting time statistics. In particular, we derive expressions for the mean number of successive detections of atoms in one of any two orthogonal states of the two-level atom. We also derive expressions for the mean waiting times between detections. We show that the mean waiting times between de- tections of atoms in like states are equivalent to the mean waiting times calculated from the uncorrelated steady state detection rates, though like atoms are indeed correlated. The mean waiting times between detections of atoms in unlike states exhibit correlations. We evaluate the expressions for various detector efficiencies using numerical integration, reporting re- sults for the standard micromaser arrangement in which the cavity is pumped by excited atoms and the excitation levels of the emerging atoms are measured. In addition, the atomic inversion and the Fano-Mandel function for the detection of de-excited atoms is calculated for compari- son to the recent experimental results of Weidinger et al. [1], which reports the first observation of trapping states.Comment: 26 pages, 11 figure
    corecore