22,624 research outputs found

    Development of an in-field tree imaging system : a thesis presented in partial fulfilment of the requirements for the degree of Master of Technology at Massey University

    Get PDF
    Quality inventory information is essential for optimal resource utilisation in the forestry industry. In-field tree imaging is a method which has been proposed to improve the preharvest inventor assessment of standing trees. It involves the application of digital imaging technology to this task. The method described generates a three dimensional model of each tree through the capture of two orthogonal images from ground level. The images are captured and analysed using the "TreeScan" in-field tree imaging system. This thesis describes the design, development, and evaluation of the TreeScan system. The thesis can also be used as a technical reference for the system and as such contains appropriate technical and design detail. The TreeScan system consists of a portable computer, a custom designed high resolution scanner with integral microcontroller, a calibration rod, and custom designed processing software. Images of trees are captured using the scanner which contains a CCD line scan camera and a precision scanning mechanism. Captured images are analysed on the portable computer using customised image processing software to estimate real world tree dimensions and shape. The TreeScan system provides quantitative estimates of five tree parameters; height, sweep, stem diameter, branch diameter, and feature separation such as internodal distance. In addition to these estimates a three dimensional model is generated which can be further processed to determine the optimal stem breakdown into logs

    COST Action IC 1402 ArVI: Runtime Verification Beyond Monitoring -- Activity Report of Working Group 1

    Full text link
    This report presents the activities of the first working group of the COST Action ArVI, Runtime Verification beyond Monitoring. The report aims to provide an overview of some of the major core aspects involved in Runtime Verification. Runtime Verification is the field of research dedicated to the analysis of system executions. It is often seen as a discipline that studies how a system run satisfies or violates correctness properties. The report exposes a taxonomy of Runtime Verification (RV) presenting the terminology involved with the main concepts of the field. The report also develops the concept of instrumentation, the various ways to instrument systems, and the fundamental role of instrumentation in designing an RV framework. We also discuss how RV interplays with other verification techniques such as model-checking, deductive verification, model learning, testing, and runtime assertion checking. Finally, we propose challenges in monitoring quantitative and statistical data beyond detecting property violation

    Chip and Skim: cloning EMV cards with the pre-play attack

    Full text link
    EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this number. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically (in the sense of extracting the key material and loading it into another card). Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. Pre-play attacks may also be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and implementation mistakes that enabled the flaw to evade detection until now: shortcomings of the EMV specification, of the EMV kernel certification process, of implementation testing, formal analysis, or monitoring customer complaints. Finally we discuss countermeasures
    • …
    corecore