Spelling suggestions: "subject:"telemetry most aprocessing"" "subject:"telemetry most eprocessing""
1 |
Automated Binding of Attributes to Telemetry DataKalibjian, J. R., Voss, T. J., Yio, J. J., Hedeline, B. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada / An automated method is described for binding attributes to extracted data from a
telemetry stream. These attributes can be used by post processing utilities to facilitate
efficient analysis. A practical implementation of such a scheme is described.
|
2 |
Automated Application of Calibration Factors on Telemetered DataKalibjian, J. R., Voss, T. J., Yio, J. J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada / A long standing problem in telemetry post processing is the application of correct
calibration factors to telemetered data generated on a system which has had a history
of hardware changes. These calibration problems become most exacerbated when old
test data is being examined and there is uncertainty as to hardware configuration at the
time of the test. In this paper a mechanism for introducing a high degree of reliability
in the application of calibration factors is described in an implementation done for
Brilliant Pebbles Flight Experiment Three (FE-3).
|
3 |
Recovery of Telemetered Data by Vertical Merging AlgorithmsHoag, Joseph E., Kalibjian, Jeffrey R., Shih, Dwight, Toy, Edward J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 17-20, 1994 / Town & Country Hotel and Conference Center, San Diego, California / A long standing problem in telemetry applications is the recovery of data which has
been damaged during downlink. Data recovery can be significantly improved by
telemetering information in a packet format which employs redundant mechanisms for
data encapsulation. A simple statistical algorithm (known as a "merge" algorithm) can
be run on the captured data to derive a "least damaged" data set.
|
4 |
The Impact Of Wireless Security Protocols on Post Processed Telemetry Data TransferKalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California / Commercial wireless protocol use (e.g. Wireless Access Protocol, Bluetooth, etc.) is
becoming widespread as the demand to access computing devices in remote locations
grows. Although not widely prevalent today, wireless access of post processed telemetry
data will become a common activity. Essential to the use of such a capability is the
security of the wireless links involved in the data transfer. Each wireless protocol has an
associated security paradigm. Some protocols have stronger security schemes than others
and this should influence protocol selection for particular telemetry data transfer
applications.
|
5 |
AN UPDATE ON NETWORK-BASED SECURITY TECHNOLOGIES APPLICABLE TO TELEMETRY POST-PROCESSING AND ANALYSIS ACTIVITIESKalibjian, Jeff 10 1900 (has links)
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada / Networked based technologies (i.e. TCP/IP) have come to play an important role in the evolution
of telemetry post processing services. A paramount issue when using networking to access/move
telemetry data is security. In past years papers have focused on individual security technologies
and how they could be used to secure telemetry data. This paper will review currently available
network based security technologies, update readers on enhancements, and discuss their
appropriate uses in the various phases of telemetry post-processing and analysis activities.
|
Page generated in 0.1067 seconds