7,029 research outputs found
Preliminary assessment of power-generating tethers in space and of propulsion for their orbit maintenance
The concept of generating power in space by means of a conducting tether deployed from a spacecraft was studied. Using hydrogen and oxygen as the rocket propellant to overcome the drag of such a power-generating tether would yield more benefit than if used in a fuel cell. The mass consumption would be 25 percent less than the reactant consumption of fuel cells. Residual hydrogen and oxygen in the external tank and in the orbiter could be used very effectively for this purpose. Many other materials (such as waste from life support) could be used as the propellant. Electrical propulsion using tether generated power can compensate for the drag of a power-generating tether, half the power going to the useful load and the rest for electric propulsion. In addition, the spacecraft's orbital energy is a large energy reservoir that permits load leveling and a ratio of peak to average power equal to 2. Critical technologies to be explored before a power-generating tether can be used in space are delineated
A Mid-Infrared Galaxy Atlas (MIGA)
A mid-infrared atlas of part of the Galactic plane () has been constructed using HIRES processed infrared
data to provide a mid-infrared data set for the Canadian Galactic Plane Survey
(CGPS). The addition of this data set to the CGPS will enable the study of the
emission from the smallest components of interstellar dust at an angular
resolution comparable to that of the radio, millimetre, and far-infrared data
in the CGPS. The Mid-Infrared Galaxy Atlas (MIGA) is a mid-infrared (12 m
and 25 m) counterpart to the far-infrared IRAS Galaxy Atlas (IGA), and
consists of resolution enhanced ( resolution) HIRES images along
with ancillary maps. This paper describes the processing and characteristics of
the atlas, the cross-beam simulation technique used to obtain high-resolution
ratio maps, and future plans to extend both the IGA and MIGA.Comment: 38 pages (including 15 tables), 13 figures (8 dithered GIF and 5
EPS). Submitted to Astrophysical Journal Supplement Series. A preprint with
higher resolution figures is available at
http://www.cita.utoronto.ca/~kerton/publications.htm
On trust and privacy in context-aware systems
Recent advances in networking, handheld computing and sensors technologies have led to the emergence of context-aware systems. The vast amounts of personal information collected by such systems has led to growing concerns about the privacy of their users. Users concerned about their private information are likely to refuse participation in such systems. Therefore, it is quite clear that for any context-aware system to be acceptable by the users, mechanisms for controlling access to personal information are a necessity. According to Alan Westin "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information is communicated to others"1. Within this context we can classify users as either information owners or information receivers. It is also acknowledged that information owners are willing to disclose personal information if this disclosure is potentially beneficial. So, the acceptance of any context-aware system depends on the provision of mechanisms for fine-grained control of the disclosure of personal information incorporating an explicit notion of benefit
Privacy, security, and trust issues in smart environments
Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning
Dynamic trust models for ubiquitous computing environments
A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two entities during an interaction in a ubiquitous environment
The SECURE collaboration model
The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems
MODELING FARM AND OFF-FARM ECONOMIC LINKAGES TO ANALYZE THE IMPACTS OF AN AREA-WIDE INSECT MANAGEMENT PROGRAM ON A REGIONAL ECONOMY
This study evaluated the impacts of the boll weevil eradication program at the farm level and on the west Tennessee region. Budgets, an acreage response model, and an input-output model were used to evaluate direct and indirect program impacts. The program generates small but positive economic benefits for the region.Crop Production/Industries,
Recommended from our members
Building thermal performance, extreme heat, and climate change
The leading source of weather-related deaths in the United States is heat, and future projections show that the frequency, duration, and intensity of heat events will increase in the Southwest. Presently, there is a dearth of knowledge about how infrastructure may perform during heat waves or could contribute to social vulnerability. To understand how buildings perform in heat and potentially stress people, indoor air temperature changes when air conditioning is inaccessible are modeled for building archetypes in Los Angeles, California, and Phoenix, Arizona, when air conditioning is inaccessible is estimated. An energy simulation model is used to estimate how quickly indoor air temperature changes when building archetypes are exposed to extreme heat. Building age and geometry (which together determine the building envelope material composition) are found to be the strongest indicators of thermal envelope performance. Older neighborhoods in Los Angeles and Phoenix (often more centrally located in the metropolitan areas) are found to contain the buildings whose interiors warm the fastest, raising particular concern because these regions are also forecast to experience temperature increases. To combat infrastructure vulnerability and provide heat refuge for residents, incentives should be adopted to strategically retrofit buildings where both socially vulnerable populations reside and increasing temperatures are forecast
- âŚ