7,029 research outputs found

    Preliminary assessment of power-generating tethers in space and of propulsion for their orbit maintenance

    Get PDF
    The concept of generating power in space by means of a conducting tether deployed from a spacecraft was studied. Using hydrogen and oxygen as the rocket propellant to overcome the drag of such a power-generating tether would yield more benefit than if used in a fuel cell. The mass consumption would be 25 percent less than the reactant consumption of fuel cells. Residual hydrogen and oxygen in the external tank and in the orbiter could be used very effectively for this purpose. Many other materials (such as waste from life support) could be used as the propellant. Electrical propulsion using tether generated power can compensate for the drag of a power-generating tether, half the power going to the useful load and the rest for electric propulsion. In addition, the spacecraft's orbital energy is a large energy reservoir that permits load leveling and a ratio of peak to average power equal to 2. Critical technologies to be explored before a power-generating tether can be used in space are delineated

    A Mid-Infrared Galaxy Atlas (MIGA)

    Full text link
    A mid-infrared atlas of part of the Galactic plane (75∘<l<148∘,b=±6∘75^\circ < l < 148^\circ, b = \pm6^\circ) has been constructed using HIRES processed infrared data to provide a mid-infrared data set for the Canadian Galactic Plane Survey (CGPS). The addition of this data set to the CGPS will enable the study of the emission from the smallest components of interstellar dust at an angular resolution comparable to that of the radio, millimetre, and far-infrared data in the CGPS. The Mid-Infrared Galaxy Atlas (MIGA) is a mid-infrared (12 μ\mum and 25 μ\mum) counterpart to the far-infrared IRAS Galaxy Atlas (IGA), and consists of resolution enhanced (∼0.5′\sim 0.5' resolution) HIRES images along with ancillary maps. This paper describes the processing and characteristics of the atlas, the cross-beam simulation technique used to obtain high-resolution ratio maps, and future plans to extend both the IGA and MIGA.Comment: 38 pages (including 15 tables), 13 figures (8 dithered GIF and 5 EPS). Submitted to Astrophysical Journal Supplement Series. A preprint with higher resolution figures is available at http://www.cita.utoronto.ca/~kerton/publications.htm

    On trust and privacy in context-aware systems

    Get PDF
    Recent advances in networking, handheld computing and sensors technologies have led to the emergence of context-aware systems. The vast amounts of personal information collected by such systems has led to growing concerns about the privacy of their users. Users concerned about their private information are likely to refuse participation in such systems. Therefore, it is quite clear that for any context-aware system to be acceptable by the users, mechanisms for controlling access to personal information are a necessity. According to Alan Westin "privacy is the claim of individuals, groups, or institutions to determine for themselves when, how and to what extent information is communicated to others"1. Within this context we can classify users as either information owners or information receivers. It is also acknowledged that information owners are willing to disclose personal information if this disclosure is potentially beneficial. So, the acceptance of any context-aware system depends on the provision of mechanisms for fine-grained control of the disclosure of personal information incorporating an explicit notion of benefit

    Privacy, security, and trust issues in smart environments

    Get PDF
    Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning

    Dynamic trust models for ubiquitous computing environments

    Get PDF
    A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two entities during an interaction in a ubiquitous environment

    The SECURE collaboration model

    Get PDF
    The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems

    Constitutional Law—Right to Jury Trial Under Emergency Price Control Act

    Get PDF

    MODELING FARM AND OFF-FARM ECONOMIC LINKAGES TO ANALYZE THE IMPACTS OF AN AREA-WIDE INSECT MANAGEMENT PROGRAM ON A REGIONAL ECONOMY

    Get PDF
    This study evaluated the impacts of the boll weevil eradication program at the farm level and on the west Tennessee region. Budgets, an acreage response model, and an input-output model were used to evaluate direct and indirect program impacts. The program generates small but positive economic benefits for the region.Crop Production/Industries,
    • …
    corecore