Feeds

LOHAN's Punch and Judy show: The big fat round-up

All the action from 'Baconur' - Blighty's renamed space flight centre

  • alert
  • submit to reddit

Build a business case: developing custom apps

Judy

The Judy payload was intended to test the Vulture 2's space-grade Polyimide Thermofoil flexible rocket motor heater, which will prevent the Cesaroni 54mm 3G casing from catching a nasty cold:

The heater wrapped around the Cesaroni motor case

Initial ground testing confirmed the heater would do the job, but our concern was that it might melt down at high altitude due to the absence of air.

Accordingly, we got our hands on a 12V aquarium thermostat to prevent possible runaway temperatures, especially once the heater was sealed inside some monster heatshrink:

The complete rocket motor heater set-up

Of course, the only way to find out for sure was to get the thing up in the air, for which we present the Judy payload box:

The Judy payload box and contents

  1. Cesaroni 54mm motor casing
  2. GPS unit
  3. Mount for "Electronics-Depot HD1080P" camera
  4. Motor heater thermostat
  5. Doomsday cut-down batteries
  6. Motor heater LiPo
  7. RockBLOCK/Arduino doomsday boards
  8. Motor temperature logger
  9. Back-up tracker

The temperature logger is an off-the-shelf unit, connected to a NTC thermocouple taped to the inside of the motor case.

Our Fourtec temperature logger

Here's an earlier snap, taken as we prepared the payload, including the budget Chinese camera, making its first flight into the chilly blue yonder:

Another view of the Judy payload

The Frogmonaut has been a LOHAN test flight regular since the heroic Playmonaut English Channel tragedy, and we invite readers to raise a pint to both miniature team members.

The Judy mission also carried the RockBLOCK-Ardunio sandwich component of the LOHAN doomsday rig...

Top and bottom views of the RockBLOCK-Arduino sandwich

...which commands an emergency cut-down from Dave Akerman's Big Red Abort Switch To Release Aerial Payload (BRASTRAP) box:

Dave Akerman's emergency cut-down box

The system works by sending a text message from BRASTRAP via a wireless net connection, the RockBLOCK servers and the Iridium satellite network to the onboard sandwich, which in turn trigers an explosive cut-down via MOSFET.

We decided that since it wasn't critical for Judy to reach balloon burst altitude, we might as well give the system a real-world test following a satisfactory try-out on the ground last year. That's why the payload video camera is pointing upwards, to record the doomsday moment.

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Asteroid's DINO KILLING SPREE just bad luck – boffins
Sauricide WASN'T inevitable, reckon scientists
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Famous 'Dish' radio telescope to be emptied in budget crisis: CSIRO
Radio astronomy suffering to protect Square Kilometre Array
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.