18,390 research outputs found
Recommended from our members
Approximate Mean Value Analysis of Deflection-Routed Shuffle-Loop Networks ; CU-CS-608-92
Safety verification of a fault tolerant reconfigurable autonomous goal-based robotic control system
Fault tolerance and safety verification of control
systems are essential for the success of autonomous robotic
systems. A control architecture called Mission Data System
(MDS), developed at the Jet Propulsion Laboratory, takes
a goal-based control approach. In this paper, a method for
converting goal network control programs into linear hybrid
systems is developed. The linear hybrid system can then be
verified for safety in the presence of failures using existing
symbolic model checkers. An example task is simulated in
MDS and successfully verified using HyTech, a symbolic model
checking software for linear hybrid systems
Gene therapy for B-cell lymphoma in a SCID mouse model using an immunoglobulin-regulated diphtheria toxin gene delivered by a novel adenovirus-polylysine conjugate
Energy Management of the Multi-Mission Space Exploration Vehicle Using a Goal-Oriented Control System
Safe human exploration in space missions requires careful management of limited resources such as breathable air and stored electrical energy. Daily activities for astronauts must be carefully planned with respect to such resources, and usage must be monitored as activities proceed to ensure that they can be completed while maintaining safe resource margins. Such planning and monitoring can be complex because they depend on models of resource usage, the activities being planned, and uncertainties. This paper describes a system - and the technology behind it - for energy management of the NASA-Johnson Space Center's Multi-Mission Space Exploration Vehicles (SEV), that provides, in an onboard advisory mode, situational awareness to astronauts and real-time guidance to mission operators. This new capability was evaluated during this year's Desert RATS (Research and Technology Studies) planetary exploration analog test in Arizona. This software aided ground operators and crew members in modifying the day s activities based on the real-time execution of the plan and on energy data received from the rovers
Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent
This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements
The Number of Different Binary Functions Generated by NK-Kauffman Networks and the Emergence of Genetic Robustness
We determine the average number , of \textit{NK}-Kauffman
networks that give rise to the same binary function. We show that, for , there exists a connectivity critical value such that () for and
for . We find that is not a
constant, but scales very slowly with , as . The problem of genetic robustness emerges as a statistical property
of the ensemble of \textit{NK}-Kauffman networks and impose tight constraints
in the average number of epistatic interactions that the genotype-phenotype map
can have.Comment: 4 figures 18 page
Detection statistics in the micromaser
We present a general method for the derivation of various statistical
quantities describing the detection of a beam of atoms emerging from a
micromaser. The user of non-normalized conditioned density operators and a
linear master equation for the dynamics between detection events is discussed
as are the counting statistics, sequence statistics, and waiting time
statistics. In particular, we derive expressions for the mean number of
successive detections of atoms in one of any two orthogonal states of the
two-level atom. We also derive expressions for the mean waiting times between
detections. We show that the mean waiting times between de- tections of atoms
in like states are equivalent to the mean waiting times calculated from the
uncorrelated steady state detection rates, though like atoms are indeed
correlated. The mean waiting times between detections of atoms in unlike states
exhibit correlations. We evaluate the expressions for various detector
efficiencies using numerical integration, reporting re- sults for the standard
micromaser arrangement in which the cavity is pumped by excited atoms and the
excitation levels of the emerging atoms are measured. In addition, the atomic
inversion and the Fano-Mandel function for the detection of de-excited atoms is
calculated for compari- son to the recent experimental results of Weidinger et
al. [1], which reports the first observation of trapping states.Comment: 26 pages, 11 figure
- …
