AquiferAn aquifer is an underground layer of water-bearing, permeable rock, rock fractures, or unconsolidated materials (gravel, sand, or silt). Groundwater from aquifers can be extracted using a water well. Water from aquifers can be sustainably harvested through the use of qanats. Aquifers vary greatly in their characteristics. The study of water flow in aquifers and the characterization of aquifers is called hydrogeology.
Ogallala AquiferThe Ogallala Aquifer () is a shallow water table aquifer surrounded by sand, silt, clay, and gravel located beneath the Great Plains in the United States. As one of the world's largest aquifers, it underlies an area of approximately in portions of eight states (South Dakota, Nebraska, Wyoming, Colorado, Kansas, Oklahoma, New Mexico, and Texas). It was named in 1898 by geologist N. H. Darton from its type locality near the town of Ogallala, Nebraska.
Hot springA hot spring, hydrothermal spring, or geothermal spring is a spring produced by the emergence of geothermally heated groundwater onto the surface of the Earth. The groundwater is heated either by shallow bodies of magma (molten rock) or by circulation through faults to hot rock deep in the Earth's crust. In either case, the ultimate source of the heat is the radioactive decay of naturally occurring radioactive elements in the Earth's mantle, the layer beneath the crust. Hot spring water often contains large amounts of dissolved minerals.
Geothermal energyGeothermal energy is thermal energy in the Earth's crust. It combines energy from the formation of the planet and from radioactive decay. Geothermal energy has been exploited as a source of heat and/or electric power for millennia. Geothermal heating, using water from hot springs, for example, has been used for bathing since Paleolithic times and for space heating since Roman times. Geothermal power, (generation of electricity from geothermal energy), has been used since the 20th century.
Geothermal powerGeothermal power is electrical power generated from geothermal energy. Technologies in use include dry steam power stations, flash steam power stations and binary cycle power stations. Geothermal electricity generation is currently used in 26 countries, while geothermal heating is in use in 70 countries. As of 2019, worldwide geothermal power capacity amounts to 15.4 gigawatts (GW), of which 23.9 percent or 3.68 GW are installed in the United States.
Enhanced geothermal systemAn enhanced geothermal system (EGS) generates geothermal electricity without natural convective hydrothermal resources. Traditionally, geothermal power systems operated only where naturally occurring heat, water, and rock permeability are sufficient to allow energy extraction. However, most geothermal energy within reach of conventional techniques is in dry and impermeable rock. EGS technologies expand the availability of geothermal resources through stimulation methods, such as 'hydraulic stimulation'.
Geothermal heatingGeothermal heating is the direct use of geothermal energy for some heating applications. Humans have taken advantage of geothermal heat this way since the Paleolithic era. Approximately seventy countries made direct use of a total of 270 PJ of geothermal heating in 2004. As of 2007, 28 GW of geothermal heating capacity is installed around the world, satisfying 0.07% of global primary energy consumption. Thermal efficiency is high since no energy conversion is needed, but capacity factors tend to be low (around 20%) since the heat is mostly needed in the winter.
Hydraulic conductivityIn science and engineering, hydraulic conductivity (K, in SI units of meters per second), is a property of porous materials, soils and rocks, that describes the ease with which a fluid (usually water) can move through the pore space, or fractures network. It depends on the intrinsic permeability (k, unit: m^2) of the material, the degree of saturation, and on the density and viscosity of the fluid. Saturated hydraulic conductivity, Ksat, describes water movement through saturated media.
Groundwater rechargeGroundwater recharge or deep drainage or deep percolation is a hydrologic process, where water moves downward from surface water to groundwater. Recharge is the primary method through which water enters an aquifer. This process usually occurs in the vadose zone below plant roots and is often expressed as a flux to the water table surface. Groundwater recharge also encompasses water moving away from the water table farther into the saturated zone. Recharge occurs both naturally (through the water cycle) and through anthropogenic processes (i.
WellA well is an excavation or structure created in the ground by digging, driving, or drilling to access liquid resources, usually water. The oldest and most common kind of well is a water well, to access groundwater in underground aquifers. The well water is drawn up by a pump, or using containers, such as buckets or large water bags that are raised mechanically or by hand. Water can also be injected back into the aquifer through the well.
Water tableThe water table is the upper surface of the zone of saturation. The zone of saturation is where the pores and fractures of the ground are saturated with water. It can also be simply explained as the depth below which the ground is saturated. The water table is the surface where the water pressure head is equal to the atmospheric pressure (where gauge pressure = 0). It may be visualized as the "surface" of the subsurface materials that are saturated with groundwater in a given vicinity.
HydrogeologyHydrogeology (hydro- meaning water, and -geology meaning the study of the Earth) is the area of geology that deals with the distribution and movement of groundwater in the soil and rocks of the Earth's crust (commonly in aquifers). The terms groundwater hydrology, geohydrology, and hydrogeology are often used interchangeably. Hydrogeology is the study of the laws governing the movement of subterranean water, the mechanical, chemical, and thermal interaction of this water with the porous solid, and the transport of energy, chemical constituents, and particulate matter by flow (Domenico and Schwartz, 1998).
Vadose zoneThe vadose zone, also termed the unsaturated zone, is the part of Earth between the land surface and the top of the phreatic zone, the position at which the groundwater (the water in the soil's pores) is at atmospheric pressure ("vadose" is from the Latin word for "shallow"). Hence, the vadose zone extends from the top of the ground surface to the water table. Water in the vadose zone has a pressure head less than atmospheric pressure, and is retained by a combination of adhesion (funiculary groundwater), and capillary action (capillary groundwater).
Public key infrastructureA public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.
Spring (hydrology)A spring is a natural exit point at which groundwater emerges out of the aquifer and flows onto the top of the Earth's crust (pedosphere) to become surface water. It is a component of the hydrosphere, as well as a part of the water cycle. Springs have long been important for humans as a source of fresh water, especially in arid regions which have relatively little annual rainfall. Springs are driven out onto the surface by various natural forces, such as gravity and hydrostatic pressure.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Key exchangeKey exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Public key fingerprintIn public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are shorter than the keys they refer to, they can be used to simplify certain key management tasks. In Microsoft software, "thumbprint" is used instead of "fingerprint." A public key fingerprint is typically created through the following steps: A public key (and optionally some additional data) is encoded into a sequence of bytes.