Feeds

AI software in ‘Right Stuff’ space challenge

NASA's CASPER plays Captain Kirk

  • alert
  • submit to reddit

Seven Steps to Software Security

The undeployed Three Corner satellite stack


NASA boffins have declared their intention to hand over control of three satellites to artificial intelligence software.

The project, planned for 2002, will see the Continuous Activity Scheduling, Planning Execution and Replanning (CASPER) software take full responsibility for the operation of the miniature satellites. These will be launched from the space shuttle as part of the Three Corner Sat mission.

According to Dr. Steve Chien of NASA's Jet Propulsion Laboratory: "The onboard software performs the decision-making function for the spacecraft. Like a brain that uses inputs from the eyes and ears to make decisions, this software uses data from spacecraft sensors, such as cameras, to make decisions on how to carry out the mission."

The aims of the Three Corner Sat experiment include stereo imaging. This is one area in which CASPER might prove its worth. Previously, all image data has been transmitted to mission control, regardless of quality, but the CASPER software will have "the ability to make real-time decisions based on the images it acquires and send back only those that it deems important. This will eliminate the need for scientists to preview thousands of low-priority images and let them focus on only the high-priority data transmitted back."

CASPER will have roughly three months to demonstrate its leadership potential. A successful outcome could ultimately lead to its use in autonomous planetary rovers and robot aircraft.

Should, however, the system prove temperamentally unsuited to the heady rush of total power, ground controllers will retake the mission helm. ®

Related links

The full NASA press release
More information on CASPER
The rundown on the Three Corner Sat mission

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.