Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
This technical seminar report discusses spy satellites. It provides an overview of spy satellites including their evolution from early balloons and aircraft to modern optical and radar imaging satellites. It describes the key types of spy satellites such as optical imaging, nuclear detection, and radar imaging satellites. The report also outlines the basic architecture of spy satellites including their payload, control section, and recovery vehicle. It discusses technologies used in blocks of US KH-11 spy satellites and applications such as change detection, mapping, and military uses. Finally, it notes future directions including more powerful private and government satellites.
Reconnaissance satellite or Spy Satellite Shakir Memon
Reconnaissance satellites provide intelligence information about other countries' military activities from space. There are several types, including imagery satellites, signals intelligence satellites, early warning satellites, and satellites that detect nuclear explosions. Reconnaissance satellites played an important role in conflicts like the Vietnam and Iraq wars by providing positions of enemy troops and equipment. While useful for military purposes, they also raise privacy and security concerns due to their surveillance capabilities. The KH-11 satellite launched by the US in 1976 was a milestone as the first American satellite to use digital imaging to take high resolution photographs from orbit.
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
The European Space Agency spent a decade and 7 billion dollars developing the Ariane 5 rocket to provide reliable commercial satellite launches. However, the maiden flight in 1996 failed 39 seconds after liftoff due to a software error. Specifically, a variable was converted between data formats without range checking, causing incorrect engine control signals that broke the rocket apart. An investigation found the error was due to reused software code from Ariane 4 that was not properly tested for Ariane 5 systems. Lessons from the failure emphasized more rigorous testing of assumptions and improvements to code reviews.
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
The Ariane 5 rocket failed on its maiden flight in 1996 due to a software error. During launch, an attempt to convert a 64-bit number to a 16-bit integer caused an overflow that was not properly handled, shutting down the guidance system. This caused the engines to swivel to an extreme position, breaking up the rocket. The software that failed had been reused from Ariane 4 without properly testing for exceptions on Ariane 5. The failure revealed flaws in the validation process that allowed an elementary single-point failure to destroy the entire system.
The document provides an overview of the technology stream for GCE Advanced Level students in Sri Lanka. It was introduced in 2013 to create science scholars suited for the current job market and provide students with technical skills. The technology stream has subjects in engineering technology, bio systems technology, and science for technology. Students can choose between subjects like civil, mechanical, and electrical engineering as well as food processing and agriculture. The question paper structure and degree programs offered at various Sri Lankan universities for students who complete the technology stream are also outlined.
This technical seminar report discusses spy satellites. It provides an overview of spy satellites including their evolution from early balloons and aircraft to modern optical and radar imaging satellites. It describes the key types of spy satellites such as optical imaging, nuclear detection, and radar imaging satellites. The report also outlines the basic architecture of spy satellites including their payload, control section, and recovery vehicle. It discusses technologies used in blocks of US KH-11 spy satellites and applications such as change detection, mapping, and military uses. Finally, it notes future directions including more powerful private and government satellites.
Reconnaissance satellite or Spy Satellite Shakir Memon
Reconnaissance satellites provide intelligence information about other countries' military activities from space. There are several types, including imagery satellites, signals intelligence satellites, early warning satellites, and satellites that detect nuclear explosions. Reconnaissance satellites played an important role in conflicts like the Vietnam and Iraq wars by providing positions of enemy troops and equipment. While useful for military purposes, they also raise privacy and security concerns due to their surveillance capabilities. The KH-11 satellite launched by the US in 1976 was a milestone as the first American satellite to use digital imaging to take high resolution photographs from orbit.
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
The European Space Agency spent a decade and 7 billion dollars developing the Ariane 5 rocket to provide reliable commercial satellite launches. However, the maiden flight in 1996 failed 39 seconds after liftoff due to a software error. Specifically, a variable was converted between data formats without range checking, causing incorrect engine control signals that broke the rocket apart. An investigation found the error was due to reused software code from Ariane 4 that was not properly tested for Ariane 5 systems. Lessons from the failure emphasized more rigorous testing of assumptions and improvements to code reviews.
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
The Ariane 5 rocket failed on its maiden flight in 1996 due to a software error. During launch, an attempt to convert a 64-bit number to a 16-bit integer caused an overflow that was not properly handled, shutting down the guidance system. This caused the engines to swivel to an extreme position, breaking up the rocket. The software that failed had been reused from Ariane 4 without properly testing for exceptions on Ariane 5. The failure revealed flaws in the validation process that allowed an elementary single-point failure to destroy the entire system.
The document provides an overview of the technology stream for GCE Advanced Level students in Sri Lanka. It was introduced in 2013 to create science scholars suited for the current job market and provide students with technical skills. The technology stream has subjects in engineering technology, bio systems technology, and science for technology. Students can choose between subjects like civil, mechanical, and electrical engineering as well as food processing and agriculture. The question paper structure and degree programs offered at various Sri Lankan universities for students who complete the technology stream are also outlined.
This document describes a hotel management system project for ChefGuruHotel. It includes:
- A list of group members developing the system.
- An outline of the contents to be covered in the document, including introduction, current processes, problem statement, objectives, scope, diagrams and requirements.
- The aims of the system are to provide a user-friendly online system for managing the hotel, updating information for users, improving customer service and reducing costs compared to the manual system.
- The scope specifies that only administrators and cashiers can access the system from hotel premises to manage reservations, payments and other functions.
The document is a business plan for DigiMart, an established computer solutions retailer. DigiMart aims to be a leading retailer of branded and customizable computers and related products. They offer high-end hardware from top brands at reasonable prices to enable customers' dreams of custom PCs. DigiMart understands customers' passion for technology and strives to provide the best products and personalized service. Their goal is to continue earning customers' trust by meeting their computer needs.
The document discusses replacing Sri Lanka's traditional election system with a fingerprint voting system to address issues like lack of security, fake votes, and time-consuming vote counting and delivery. The proposed system would reduce time spent counting votes, eliminate fake votes through fingerprint verification, and allow voters to cast ballots at any polling station. It would provide stronger security and higher confidence than the current system.
This document discusses information security as it relates to e-commerce applications. It covers several technical security attack methods that e-commerce applications can be vulnerable to, including financial frauds, spam, phishing, bots, DDoS attacks, brute force attacks, SQL injections, XSS, and Trojan horses. It also discusses vulnerability assessments, penetration testing stages and methods, and ISO/IEC 27001:2013 as an international standard for managing information security risks.
What is software maintenance?
● Types of software maintenance
● Software maintenance process
● What is software evolution?
● Importance of software evolution
● Software evolution process
What is software maintenance?
● Types of software maintenance
● Software maintenance process
● What is software evolution?
● Importance of software evolution
● Software evolution process
This document provides information about various computer networking concepts and components. It discusses networking faceplates, cables, connectors, routers, switches, wireless access points and controllers. It also covers networking protocols like IP addressing and topics like file downloading, uploading and network troubleshooting. The document is meant as a guide for a practical computer networking lab session.
The document describes an incremental process model for software development. It is divided into sections that define the incremental process model, when it is used, pros, and cons. The incremental process model involves dividing the entire project into smaller increments, with each increment going through requirements analysis, design, coding, and testing. This allows working software to be developed quickly and added to over time until the full system is complete. The approach is useful when requirements are well understood but some details may change, or when early delivery to market is needed. Benefits include faster delivery and flexibility, while drawbacks include needing good upfront planning and potential higher total costs than traditional models.
The Patriot missile system is a mobile air defense system designed to defend against aircraft, cruise missiles, and short-range ballistic missiles. It consists of radar units, engagement control stations, missile launchers, and communications support across multiple batteries. During the Gulf War, a Patriot battery in Dhahran, Saudi Arabia failed to intercept an incoming Iraqi Scud missile due to a software error that caused an inaccurate calculation of the system's clock time, allowing the Scud to hit a U.S. Army barracks and kill 28 soldiers.
The computer used to control the Patriot missile is based on a 1970s design and uses 24-bit arithmetic. The Patriot system tracks its target by measuring the time it takes for radar pulses to bounce back from them. Time is recorded by the system clock in tenths of a second, but is stored as an integer. To enable tracking calculations the time is converted to a 24-bit floating point number. Rounding errors in the time conversions cause shifts in the system's ``range gate", which is used to track the target.
The computer used to control the Patriot missile is based on a 1970s design and uses 24-bit arithmetic. The Patriot system tracks its target by measuring the time it takes for radar pulses to bounce back from them. Time is recorded by the system clock in tenths of a second, but is stored as an integer. To enable tracking calculations the time is converted to a 24-bit floating point number. Rounding errors in the time conversions cause shifts in the system's ``range gate", which is used to track the target.
The Denver Airport Baggage Handling System was originally supposed to open in 1993 but opened 16 months late and $200 million over budget due to underestimating its complexity and poor management. It is owned by the Colorado government and is the largest employer in the state. Its purpose is to detect bag jams, regulate volume, balance loads, count bags, and redirect bags. Its failure added $560 million to the airport's costs due to risks not being managed, leadership changes, and architectural issues compounding the problems.
The Denver Airport baggage handling system was owned by United Airlines and built at a cost of $230 million to automate baggage handling through the entire airport. However, the complex system proved more difficult than expected and faced many problems, forcing the airport to shut down for 16 months. The failure of the system resulted in over $340 million in costs due to delays and interest, in addition to ongoing maintenance costs that were higher than the previous manual system.
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
The computer used to control the Patriot missile is based on a 1970s design and uses 24-bit arithmetic. The Patriot system tracks its target by measuring the time it takes for radar pulses to bounce back from them. Time is recorded by the system clock in tenths of a second, but is stored as an integer. To enable tracking calculations the time is converted to a 24-bit floating point number. Rounding errors in the time conversions cause shifts in the system's ``range gate", which is used to track the target.
importance of learning english as university undergraduateMadushan Sandaruwan
importance of learning english as university undergraduate
Why we need English
Why we need English as university students
Why we need English Academically
Why we need English Socially
Problems faced by university undergraduate without English
How to overcome them
Conclusion
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
This document describes a hotel management system project for ChefGuruHotel. It includes:
- A list of group members developing the system.
- An outline of the contents to be covered in the document, including introduction, current processes, problem statement, objectives, scope, diagrams and requirements.
- The aims of the system are to provide a user-friendly online system for managing the hotel, updating information for users, improving customer service and reducing costs compared to the manual system.
- The scope specifies that only administrators and cashiers can access the system from hotel premises to manage reservations, payments and other functions.
The document is a business plan for DigiMart, an established computer solutions retailer. DigiMart aims to be a leading retailer of branded and customizable computers and related products. They offer high-end hardware from top brands at reasonable prices to enable customers' dreams of custom PCs. DigiMart understands customers' passion for technology and strives to provide the best products and personalized service. Their goal is to continue earning customers' trust by meeting their computer needs.
The document discusses replacing Sri Lanka's traditional election system with a fingerprint voting system to address issues like lack of security, fake votes, and time-consuming vote counting and delivery. The proposed system would reduce time spent counting votes, eliminate fake votes through fingerprint verification, and allow voters to cast ballots at any polling station. It would provide stronger security and higher confidence than the current system.
This document discusses information security as it relates to e-commerce applications. It covers several technical security attack methods that e-commerce applications can be vulnerable to, including financial frauds, spam, phishing, bots, DDoS attacks, brute force attacks, SQL injections, XSS, and Trojan horses. It also discusses vulnerability assessments, penetration testing stages and methods, and ISO/IEC 27001:2013 as an international standard for managing information security risks.
What is software maintenance?
● Types of software maintenance
● Software maintenance process
● What is software evolution?
● Importance of software evolution
● Software evolution process
What is software maintenance?
● Types of software maintenance
● Software maintenance process
● What is software evolution?
● Importance of software evolution
● Software evolution process
This document provides information about various computer networking concepts and components. It discusses networking faceplates, cables, connectors, routers, switches, wireless access points and controllers. It also covers networking protocols like IP addressing and topics like file downloading, uploading and network troubleshooting. The document is meant as a guide for a practical computer networking lab session.
The document describes an incremental process model for software development. It is divided into sections that define the incremental process model, when it is used, pros, and cons. The incremental process model involves dividing the entire project into smaller increments, with each increment going through requirements analysis, design, coding, and testing. This allows working software to be developed quickly and added to over time until the full system is complete. The approach is useful when requirements are well understood but some details may change, or when early delivery to market is needed. Benefits include faster delivery and flexibility, while drawbacks include needing good upfront planning and potential higher total costs than traditional models.
The Patriot missile system is a mobile air defense system designed to defend against aircraft, cruise missiles, and short-range ballistic missiles. It consists of radar units, engagement control stations, missile launchers, and communications support across multiple batteries. During the Gulf War, a Patriot battery in Dhahran, Saudi Arabia failed to intercept an incoming Iraqi Scud missile due to a software error that caused an inaccurate calculation of the system's clock time, allowing the Scud to hit a U.S. Army barracks and kill 28 soldiers.
The computer used to control the Patriot missile is based on a 1970s design and uses 24-bit arithmetic. The Patriot system tracks its target by measuring the time it takes for radar pulses to bounce back from them. Time is recorded by the system clock in tenths of a second, but is stored as an integer. To enable tracking calculations the time is converted to a 24-bit floating point number. Rounding errors in the time conversions cause shifts in the system's ``range gate", which is used to track the target.
The computer used to control the Patriot missile is based on a 1970s design and uses 24-bit arithmetic. The Patriot system tracks its target by measuring the time it takes for radar pulses to bounce back from them. Time is recorded by the system clock in tenths of a second, but is stored as an integer. To enable tracking calculations the time is converted to a 24-bit floating point number. Rounding errors in the time conversions cause shifts in the system's ``range gate", which is used to track the target.
The Denver Airport Baggage Handling System was originally supposed to open in 1993 but opened 16 months late and $200 million over budget due to underestimating its complexity and poor management. It is owned by the Colorado government and is the largest employer in the state. Its purpose is to detect bag jams, regulate volume, balance loads, count bags, and redirect bags. Its failure added $560 million to the airport's costs due to risks not being managed, leadership changes, and architectural issues compounding the problems.
The Denver Airport baggage handling system was owned by United Airlines and built at a cost of $230 million to automate baggage handling through the entire airport. However, the complex system proved more difficult than expected and faced many problems, forcing the airport to shut down for 16 months. The failure of the system resulted in over $340 million in costs due to delays and interest, in addition to ongoing maintenance costs that were higher than the previous manual system.
Ariane 5 is a European heavy-lift launch vehicle that is part of the Ariane rocket family, an expendable launch system designed by the French government space agency Centre national d'études spatiales (CNES).
The computer used to control the Patriot missile is based on a 1970s design and uses 24-bit arithmetic. The Patriot system tracks its target by measuring the time it takes for radar pulses to bounce back from them. Time is recorded by the system clock in tenths of a second, but is stored as an integer. To enable tracking calculations the time is converted to a 24-bit floating point number. Rounding errors in the time conversions cause shifts in the system's ``range gate", which is used to track the target.
importance of learning english as university undergraduateMadushan Sandaruwan
importance of learning english as university undergraduate
Why we need English
Why we need English as university students
Why we need English Academically
Why we need English Socially
Problems faced by university undergraduate without English
How to overcome them
Conclusion
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
2. Contents
• Introduction to system
• Who owns (Country/Organization etc)
• When it was developed
• What is the purpose?
• Explain disaster or failure
• Cost of failure
3. Introduction to System
A European rocket designed to launch
commercial payloads into earth orbit.
Ariane 5 can carry a heavier payload
than arian 4.
Now the standard launch vehicle for the
European space agency.
4. Who owns???
Ariane 5 rockets are manufactured under
the authority of the European Space
Agency (20 ESA member states) and the
French space agency Centre National
d'Etudes Spatiales.
5. What is the purpose?
It is used to deliver payloads into
geostationary transfer orbit (GTO)
or low Earth orbit (LEO).
6. When it was developed
June 4th 1996
Total failure of the Ariane 5
Launcher on its maiden flight
7. Explain disaster or failure
Incorrect control signals were sent to the
engines and these swiveled so that
unsustainable stresses were imposed on the
rocket.
The vehicle started to break up because of the
stresses imposed and self-destructed.
8.
9. Cost of failure
The disastrous launch cost approximately
$370m, led to a public inquiry, and through
the destruction of the rocket’s payload,
delayed scientific research into workings of
the Earth’s magnetosphere for almost 4
years.
The Ariane 5 launch is widely acknowledged
as one of the most expensive software
failures in history.
10. Group members
S.Mithuna - TG/2017/239
S.Tharmiya - TG/2017/260
M.M.F Minha - TG/2017/253
N.F Nasrin - TG/2017/273