Illegal mining activities Identification5th Geospatial Intelligence Challenge (GI5) |
![]() Challenge DescriptionSentinel-2 data are used to identify minerals from illegal mining activities (e.g. hydrothermal alteration associated with gold prospect locations). Illegal mining detection is also important to understand other illicit related activities (e.g. pollutants discharge). |
ResultsThe results below are divided into Software Repositories, Online Services and Data Products Repositories.
Software RepositoriesThere are two categories of software repositories generated for the Challenge:
Follow the links below to proceed to one or the other, and find an "Ellip Workflows (ewf)" software application implementing a data processing function.
|
Data Processing as-a-ServiceThere are two categories of "Data Processing as-a-Service" application packages created for the Data Challenge:
Follow the links below to proceed to one or the other, via a dedicated Geobrowser application providing web access to one or the other of the Data Processing services.
|
Data Product RepositoriesThere is a dedicated client App publicly available for the visualization of the data products resulting from EO data processing challenges. The results can consist of:
|