28,281 research outputs found

    Can Power from Space Compete?

    Get PDF
    Satellite solar power (SSP) has been suggested as an alternative to terrestrial energy resources for electricity generation. In this study, we consider the market for electricity from the present to 2020, roughly the year when many experts expect SSP to be technically achievable. We identify several key challenges for SSP in competing with conventional electricity generation in developed and developing countries, discuss the role of market and economic analysis as technical development of SSP continues during the coming years, and suggest future research directions to improve understanding of the potential economic viability of SSP.

    Data collection system: Earth Resources Technology Satellite-1

    Get PDF
    Subjects covered at the meeting concerned results on the overall data collection system including sensors, interface hardware, power supplies, environmental enclosures, data transmission, processing and distribution, maintenance and integration in resources management systems

    Kansas environmental and resource study: A Great Plains model, tasks 1-6

    Get PDF
    There are no author identified significant results in this report. Environmental and resources investigations in Kansas utilizing ERTS-1 imagery are summarized for the following areas: (1) use of feature extraction techniqued for texture context information in ERTS imagery; (2) interpretation and automatic image enhancement; (3) water use, production, and disease detection and predictions for wheat; (4) ERTS-1 agricultural statistics; (5) monitoring fresh water resources; and (6) ground pattern analysis in the Great Plains

    Rapid methods of landslide hazard mapping : Fiji case study

    Get PDF
    A landslide hazard probability map can help planners (1) prepare for, and/or mitigate against, the effects of landsliding on communities and infrastructure, and (2) avoid or minimise the risks associated with new developments. The aims of the project were to establish, by means of studies in a few test areas, a generic method by which remote sensing and data analysis using a geographic information system (GIS) could provide a provisional landslide hazard zonation map. The provision of basic hazard information is an underpinning theme of the UN’s International Decade for Natural Disaster Reduction (IDNDR). It is an essential requirement for disaster preparedness and mitigation planning. This report forms part of BGS project 92/7 (R5554) ‘Rapid assessment of landslip hazards’ Carried out under the ODA/BGS Technology Development and Research Programme as part of the British Government’s provision of aid to developing countries. It provides a detailed technical account of work undertaken in a test area in Viti Levu in collaboration with Fiji Mineral Resources Department. The study represents a demonstration of a methodology that is applicable to many developing countries. The underlying principle is that relationships between past landsliding events, interpreted from remote sensing, and factors such as the geology, relief, soils etc provide the basis for modelling where future landslides are most likely to occur. This is achieved using a GIS by ‘weighting’ each class of each variable (e.g. each lithology ‘class’ of the variable ‘geology’) according to the proportion of landslides occurring within it compared to the regional average. Combinations of variables, produced by summing the weights in individual classes, provide ‘models’ of landslide probability. The approach is empirical but has the advantage of potentially being able to provide regional scale hazard maps over large areas quickly and cheaply; this is unlikely to be achieved using conventional ground-based geotechnical methods. In Fiji, landslides are usually triggered by intense rain storms commonly associated with tropical cyclones. However, the regional distribution of landslides has not been mapped nor is it known how far geology and landscape influence the location and severity of landsliding events. The report discusses the remote sensing and GIS methodology, and describes the results of the pilot study over an area of 713 km2 in south east Viti Levu. The landslide model uses geology, elevation, slope angle, slope aspect, soil type, and forest cover as inputs. The resulting provisional landslide hazard zonation map, divided into high, medium and low zones of landslide hazard probability, suggests that whilst rainfall is the immediate cause, others controls do exert a significant influence. It is recommended that consideration be given in Fiji to implementing the techniques as part of a national strategic plan for landslide hazard zonation mapping

    Chip and Skim: cloning EMV cards with the pre-play attack

    Full text link
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this number. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically (in the sense of extracting the key material and loading it into another card). Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. Pre-play attacks may also be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and implementation mistakes that enabled the flaw to evade detection until now: shortcomings of the EMV specification, of the EMV kernel certification process, of implementation testing, formal analysis, or monitoring customer complaints. Finally we discuss countermeasures
    • …
    corecore