49,757 research outputs found

    Breaking Barriers to Renewable Energy Production in the North American Arctic

    Get PDF
    As climate change continues to affect our lives, the communities at the northern extremes of our world have witnessed the changes most profoundly. In the Arctic, where climate change is melting permafrost and causing major shoreline erosion, remote communities in Alaska and northern Canada are particularly vulnerable. Furthermore, these communities have limited access to electrical grids and bear oppressive energy costs relying on diesel generators. While some communities have started to incorporate renewable energy into their hamlets and villages, progress has generally been limited with the notable exception of Canada’s Northwest Territories and some coastal communities in western Alaska. During its latest stint as chair of the Arctic Council, the United States outlined community renewable energy in the Arctic as one of its primary goals. This Note focuses on regulatory and practical policy solutions to make that goal possible. It draws on examples from industrialized countries, such as Canada and the United Kingdom, as well as examples from developing countries, such as India and Peru, to examine solutions for the technical, economic, regulatory, and community engagement problems that Arctic communities in Alaska face when setting up new energy projects. Additionally, this Note describes the current political structure of Alaskan villages under the Alaska Native Claims Settlement Act and argues that Alaska Native Corporations should play a role in developing clean, cheap energy sources for their shareholders. Finally, this Note argues that public-private partnerships, like the non-profit Arctic Energy Alliance in the Northwest Territories, shows that clean, renewable energy projects for rural Arctic villages are possible throughout the Arctic. This Note draws lessons from other communities throughout the world and attempts to apply them to the unique situations that remote northern Alaska communities face regarding access to clean, renewable energy

    Compendium of Applications Technology Satellite user experiments

    Get PDF
    The achievements of the user experiments performed with ATS satellites from 1967 to 1973 are summarized. Included are fixed and mobile point to point communications experiments involving voice, teletype and facsimile transmissions. Particular emphasis is given to the Alaska and Hawaii satellite communications experiments. The use of the ATS satellites for ranging and position fixing of ships and aircraft is also covered. The structure and operating characteristics of the various ATS satellite are briefly described

    Agricultural information dissemination using ICTs: a review and analysis of information dissemination models in China

    Get PDF
    Open Access funded by China Agricultural UniversityOver the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs). Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different information dissemination models and their applications. This paper aims to review and identify the ICT based information dissemination models in China and to share the knowledge and experience in applying emerging ICTs in disseminating agriculture information to farmers and farm communities to improve productivity and economic, social and environmental sustainability. The paper reviews and analyzes the development stages of China’s agricultural information dissemination systems and different mechanisms for agricultural information service development and operations. Seven ICT-based information dissemination models are identified and discussed. Success cases are presented. The findings provide a useful direction for researchers and practitioners in developing future ICT based information dissemination systems. It is hoped that this paper will also help other developing countries to learn from China’s experience and best practice in their endeavor of applying emerging ICTs in agriculture information dissemination and knowledge transfer

    Trusted Computing and Secure Virtualization in Cloud Computing

    Get PDF
    Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that the CS provider is able to protect their data and infrastructure from both external and internal attacks. Currently however, such trust can only rely on organizational processes declared by the CS provider and can not be remotely verified and validated by an external party. Enabling the CS client to verify the integrity of the host where the virtual machine instance will run, as well as to ensure that the virtual machine image has not been tampered with, are some steps towards building trust in the CS provider. Having the tools to perform such verifications prior to the launch of the VM instance allows the CS clients to decide in runtime whether certain data should be stored- or calculations should be made on the VM instance offered by the CS provider. This thesis combines three components -- trusted computing, virtualization technology and cloud computing platforms -- to address issues of trust and security in public cloud computing environments. Of the three components, virtualization technology has had the longest evolution and is a cornerstone for the realization of cloud computing. Trusted computing is a recent industry initiative that aims to implement the root of trust in a hardware component, the trusted platform module. The initiative has been formalized in a set of specifications and is currently at version 1.2. Cloud computing platforms pool virtualized computing, storage and network resources in order to serve a large number of customers customers that use a multi-tenant multiplexing model to offer on-demand self-service over broad network. Open source cloud computing platforms are, similar to trusted computing, a fairly recent technology in active development. The issue of trust in public cloud environments is addressed by examining the state of the art within cloud computing security and subsequently addressing the issues of establishing trust in the launch of a generic virtual machine in a public cloud environment. As a result, the thesis proposes a trusted launch protocol that allows CS clients to verify and ensure the integrity of the VM instance at launch time, as well as the integrity of the host where the VM instance is launched. The protocol relies on the use of Trusted Platform Module (TPM) for key generation and data protection. The TPM also plays an essential part in the integrity attestation of the VM instance host. Along with a theoretical, platform-agnostic protocol, the thesis also describes a detailed implementation design of the protocol using the OpenStack cloud computing platform. In order the verify the implementability of the proposed protocol, a prototype implementation has built using a distributed deployment of OpenStack. While the protocol covers only the trusted launch procedure using generic virtual machine images, it presents a step aimed to contribute towards the creation of a secure and trusted public cloud computing environment

    Survey and Analysis of Production Distributed Computing Infrastructures

    Full text link
    This report has two objectives. First, we describe a set of the production distributed infrastructures currently available, so that the reader has a basic understanding of them. This includes explaining why each infrastructure was created and made available and how it has succeeded and failed. The set is not complete, but we believe it is representative. Second, we describe the infrastructures in terms of their use, which is a combination of how they were designed to be used and how users have found ways to use them. Applications are often designed and created with specific infrastructures in mind, with both an appreciation of the existing capabilities provided by those infrastructures and an anticipation of their future capabilities. Here, the infrastructures we discuss were often designed and created with specific applications in mind, or at least specific types of applications. The reader should understand how the interplay between the infrastructure providers and the users leads to such usages, which we call usage modalities. These usage modalities are really abstractions that exist between the infrastructures and the applications; they influence the infrastructures by representing the applications, and they influence the ap- plications by representing the infrastructures

    Mechanisms for Outsourcing Computation via a Decentralized Market

    Full text link
    As the number of personal computing and IoT devices grows rapidly, so does the amount of computational power that is available at the edge. Since many of these devices are often idle, there is a vast amount of computational power that is currently untapped, and which could be used for outsourcing computation. Existing solutions for harnessing this power, such as volunteer computing (e.g., BOINC), are centralized platforms in which a single organization or company can control participation and pricing. By contrast, an open market of computational resources, where resource owners and resource users trade directly with each other, could lead to greater participation and more competitive pricing. To provide an open market, we introduce MODiCuM, a decentralized system for outsourcing computation. MODiCuM deters participants from misbehaving-which is a key problem in decentralized systems-by resolving disputes via dedicated mediators and by imposing enforceable fines. However, unlike other decentralized outsourcing solutions, MODiCuM minimizes computational overhead since it does not require global trust in mediation results. We provide analytical results proving that MODiCuM can deter misbehavior, and we evaluate the overhead of MODiCuM using experimental results based on an implementation of our platform

    2019 PRESIDENTIAL ADDRESS: Radical Honors: Pedagogical Troublemaking as a Model for Institutional Change

    Get PDF
    This presidential speech to attendees of the 2019 NCHC annual conference in New Orleans resituates honors education as a site of deeply radical practices and provides a call to action to honors educators both to own the transgressiveness of our pedagogical approaches and to extend that troublemaking project to processes beyond the classroom, processes like honors recruitment and admissions, faculty appointments, co-curricular programming, and assessment, among others. Given the academy’s traditional resistance to change, an opportunity exists for those in the honors community to step forward and radically alter the structures and practices of higher education, all in the service of students and their learning

    Understanding citizen science and environmental monitoring: final report on behalf of UK Environmental Observation Framework

    Get PDF
    Citizen science can broadly be defined as the involvement of volunteers in science. Over the past decade there has been a rapid increase in the number of citizen science initiatives. The breadth of environmental-based citizen science is immense. Citizen scientists have surveyed for and monitored a broad range of taxa, and also contributed data on weather and habitats reflecting an increase in engagement with a diverse range of observational science. Citizen science has taken many varied approaches from citizen-led (co-created) projects with local community groups to, more commonly, scientist-led mass participation initiatives that are open to all sectors of society. Citizen science provides an indispensable means of combining environmental research with environmental education and wildlife recording. Here we provide a synthesis of extant citizen science projects using a novel cross-cutting approach to objectively assess understanding of citizen science and environmental monitoring including: 1. Brief overview of knowledge on the motivations of volunteers. 2. Semi-systematic review of environmental citizen science projects in order to understand the variety of extant citizen science projects. 3. Collation of detailed case studies on a selection of projects to complement the semi-systematic review. 4. Structured interviews with users of citizen science and environmental monitoring data focussing on policy, in order to more fully understand how citizen science can fit into policy needs. 5. Review of technology in citizen science and an exploration of future opportunities

    Campus Environment 2008: A National Report Card on Sustainability in Higher Education

    Get PDF
    Presents survey findings on national and regional trends among colleges in environmental leadership in management, academic courses in sustainability, and conservation efforts in operations. Profiles exemplary programs and notes areas for improvement
    corecore