531 research outputs found

    U.S. Humanitarian Demining Research and Development Program (HD R&D)

    Get PDF
    The anti-tank mine threat on access roads in eastern Angola is the greatest impediment to infrastructural rehabilitation, economic recovery and social development in that area. The authors discuss the method and equipment used by DanChurchAid to verify and clear roads in Moxico and Lunda Sul provinces

    A Guide to Road Clearance

    Get PDF
    Clearing roads prior to the deployment of peacekeeping units, or in support of humanitarian, reconstruction or development work, is a prerequisite to a safe and successful operation. However, road clearance is expensive and time-consuming. Equipment costs are high, especially in remote areas such as in Afghanistan, Angola and Sudan, where many roads remain contaminated by mines. Confronted by these challenges, mine action operators are working to develop safer, more efficient and cost-effective road clearance systems. This Guide contributes to that process by providing recent examples, data and methodologies from the field. Methodologies and approaches used as examples in this guide were observed during field visits during 2006 and 2007. These should be considered to be snapshots: some procedures and equipment may have changed since then. For the purpose of the guide we have generalised various methods and examples. However, in the field every scenario is unique and should be carefully assessed and interpreted within its own particular context

    EVALUATION OF A COMPUTER VISION TRAFFIC SURVEILLANCE SYSTEM

    Get PDF
    This thesis presents an evaluation of the accuracy of a novel computer vision traffic sensor - developed by the Clemson University Electrical and Civil Engineering Departments - capable of collecting a variety of traffic parameters. More specific, the thesis examines how the camera height and distance from the travel way affects the accuracy. The details of the quantitative and qualitative evaluations used to validate the system are provided. The parameters chosen to evaluate were volume, vehicle classification, and speed. Experimental results of cameras mounted at heights of 20 and 30 feet and a lateral distance of 10 and 20 feet show accuracy as high as 98 percent for volume and 99 percent for vehicle classification. Results also showed discrepancies in speeds as low as 0.031 miles per hour. Some issues which affected the accuracy were shadows, occlusions, and double counting caused by coding detection errors

    Secure ADS-B: Towards Airborne Communications Security in the Federal Aviation Administration\u27s Next Generation Air Transportation System

    Get PDF
    The U.S. Congress has mandated that all aircraft operating within the National Airspace System, military or civilian, be equipped with ADS-B transponders by the year 2020. The ADS-B aircraft tracking system, part of the Federal Aviation Administration\u27s NextGen overhaul of the Air Transportation System, replaces Radar-based surveillance with a more accurate satellite-based surveillance system. However, the unencrypted nature of ADS-B communication poses an operational security risk to military and law enforcement aircraft conducting sensitive missions. The non-standard format of its message and the legacy communication channels used by its transponders make the ADS-B system unsuitable for traditional encryption mechanisms. FPE, a recent development in cryptography, provides the ability to encrypt arbitrarily formatted data without padding or truncation. Indeed, three new algorithms recommended by the NIST, may be suitable for encryption of ADS-B messages. This research assesses the security and hardware performance characteristics of the FF1, FF2, and FF3 algorithms, in terms of entropy of ciphertext, operational latency and resource utilization when implemented on a Field-Programmable Gate Array. While all of the algorithms inherit the security characteristics of the underlying AES block cipher, they exhibit differences in their performance profiles. Findings demonstrate that a Bump-in-the-Wire FPE cryptographic engine is a suitable solution for retrofitting encryption to ADS-B communication

    The Journal of ERW and Mine Action Issue 10.1 (2006)

    Get PDF
    Feature: Explosive Remnants of War | Focus: Africa | Profiles | Making it Personal | Notes from the Field | Research and Developmen

    NASA/ASEE Summer Faculty Fellowship Program. 1994 research reports

    Get PDF
    This document is a collection of technical reports on research conducted by the participants in the 1994 NASA/ASEE Summer Faculty Fellowship Program at Kennedy Space Center (KSC). This was the tenth year that a NASA/ASEE program has been conducted at KSC. The 1994 program was administered by the University of Central Florida in cooperation with KSC. The program was operated under the auspices of the American Society for Engineering Education (ASEE) with sponsorship and funding from the Office of Educational Affairs, NASA Headquarters, Washington, D.C. The KSC Program was one of nine such Aeronautics and Space Research Programs funded by NASA Headquarters in 1994. The NASA/ASEE program is intended to be a two-year program to allow in-depth research by the University faculty member. The editors of this document were responsible for selecting appropriately qualified faculty to address some of the many problems of current interest to NASA/KSC

    Fully automated urban traffic system

    Get PDF
    The replacement of the driver with an automatic system which could perform the functions of guiding and routing a vehicle with a human's capability of responding to changing traffic demands was discussed. The problem was divided into four technological areas; guidance, routing, computing, and communications. It was determined that the latter three areas being developed independent of any need for fully automated urban traffic. A guidance system that would meet system requirements was not being developed but was technically feasible

    Distributed detection of anomalous internet sessions

    Get PDF
    Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to browsers and banking sites. The use of highly dangerous malware has become the most significant threat and traditional signature-detection methods are nowadays easily circumvented due to the amount of new samples and the use of sophisticated evasion techniques. Antivirus vendors and malware experts are pushed to seek for new methodologies to improve the identification and understanding of malicious applications behavior and their targets. Financial institutions are now playing an important role by deploying their own detection tools against malware that specifically affect their customers. However, most detection approaches tend to base on sequence of bytes in order to create new signatures. This thesis approach is based on new sources of information: the web logs generated from each banking session, the normal browser execution and customers mobile phone behavior. The thesis can be divided in four parts: The first part involves the introduction of the thesis along with the presentation of the problems and the methodology used to perform the experimentation. The second part describes our contributions to the research, which are based in two areas: *Server side: Weblogs analysis. We first focus on the real time detection of anomalies through the analysis of web logs and the challenges introduced due to the amount of information generated daily. We propose different techniques to detect multiple threats by deploying per user and global models in a graph based environment that will allow increase performance of a set of highly related data. *Customer side: Browser analysis. We deal with the detection of malicious behaviors from the other side of a banking session: the browser. Malware samples must interact with the browser in order to retrieve or add information. Such relation interferes with the normal behavior of the browser. We propose to develop models capable of detecting unusual patterns of function calls in order to detect if a given sample is targeting an specific financial entity. In the third part, we propose to adapt our approaches to mobile phones and Critical Infrastructures environments. The latest online banking attack techniques circumvent protection schemes such password verification systems send via SMS. Man in the Mobile attacks are capable of compromising mobile devices and gaining access to SMS traffic. Once the Transaction Authentication Number is obtained, criminals are free to make fraudulent transfers. We propose to model the behavior of the applications related messaging services to automatically detect suspicious actions. Real time detection of unwanted SMS forwarding can improve the effectiveness of second channel authentication and build on detection techniques applied to browsers and Web servers. Finally, we describe possible adaptations of our techniques to another area outside the scope of online banking: critical infrastructures, an environment with similar features since the applications involved can also be profiled. Just as financial entities, critical infrastructures are experiencing an increase in the number of cyber attacks, but the sophistication of the malware samples utilized forces to new detection approaches. The aim of the last proposal is to demonstrate the validity of out approach in different scenarios. Conclusions. Finally, we conclude with a summary of our findings and the directions for future work

    Parametric models for a database of realistic threats to GNSS receivers

    Get PDF
    Threats to GNSS receivers are becoming increasingly complex and easier to implement due to technological advancement. So, these attacks have become now a serious problem for any user, not only, for example, for military or safety-of-life purposes anymore. In this context, TAM has been created to collect data about these attacks and possible mitigations. This thesis describes how tested threat scenarios to GNSS signals have been parameterized to be inserted in the TAM database.openEmbargo tempraneo per motivi di segretezza e/o di proprietà dei risultati e informazioni di enti esterni o aziende private che hanno partecipato alla realizzazione del lavoro di ricerca relativo alla tes

    Report of the Shuttle Processing Review Team

    Get PDF
    The intent of this report is to summarize the assessment of the shuttle processing operations at the Kennedy Space Center (KSC) as requested by the NASA Administrator. He requested a team reaffirmation that safety is the number one priority and review operations to ensure confidence in the shuttle processing procedures at KSC
    • …
    corecore