• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • Tagged with
  • 5
  • 5
  • 5
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Automated Binding of Attributes to Telemetry Data

Kalibjian, J. R., Voss, T. J., Yio, J. J., Hedeline, B. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada / An automated method is described for binding attributes to extracted data from a telemetry stream. These attributes can be used by post processing utilities to facilitate efficient analysis. A practical implementation of such a scheme is described.
2

Automated Application of Calibration Factors on Telemetered Data

Kalibjian, J. R., Voss, T. J., Yio, J. J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada / A long standing problem in telemetry post processing is the application of correct calibration factors to telemetered data generated on a system which has had a history of hardware changes. These calibration problems become most exacerbated when old test data is being examined and there is uncertainty as to hardware configuration at the time of the test. In this paper a mechanism for introducing a high degree of reliability in the application of calibration factors is described in an implementation done for Brilliant Pebbles Flight Experiment Three (FE-3).
3

Recovery of Telemetered Data by Vertical Merging Algorithms

Hoag, Joseph E., Kalibjian, Jeffrey R., Shih, Dwight, Toy, Edward J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 17-20, 1994 / Town & Country Hotel and Conference Center, San Diego, California / A long standing problem in telemetry applications is the recovery of data which has been damaged during downlink. Data recovery can be significantly improved by telemetering information in a packet format which employs redundant mechanisms for data encapsulation. A simple statistical algorithm (known as a "merge" algorithm) can be run on the captured data to derive a "least damaged" data set.
4

The Impact Of Wireless Security Protocols on Post Processed Telemetry Data Transfer

Kalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California / Commercial wireless protocol use (e.g. Wireless Access Protocol, Bluetooth, etc.) is becoming widespread as the demand to access computing devices in remote locations grows. Although not widely prevalent today, wireless access of post processed telemetry data will become a common activity. Essential to the use of such a capability is the security of the wireless links involved in the data transfer. Each wireless protocol has an associated security paradigm. Some protocols have stronger security schemes than others and this should influence protocol selection for particular telemetry data transfer applications.
5

AN UPDATE ON NETWORK-BASED SECURITY TECHNOLOGIES APPLICABLE TO TELEMETRY POST-PROCESSING AND ANALYSIS ACTIVITIES

Kalibjian, Jeff 10 1900 (has links)
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada / Networked based technologies (i.e. TCP/IP) have come to play an important role in the evolution of telemetry post processing services. A paramount issue when using networking to access/move telemetry data is security. In past years papers have focused on individual security technologies and how they could be used to secure telemetry data. This paper will review currently available network based security technologies, update readers on enhancements, and discuss their appropriate uses in the various phases of telemetry post-processing and analysis activities.

Page generated in 0.1314 seconds