1,029 research outputs found

    B-52B-008/DTV (Drop Test Vehicle) configuration 1 (with and without fins) flight test results - captive flight and drop test missions

    Get PDF
    The B-52B-008 drop test consisted of one takeoff roll to 60 KCAS, two captive flights to accomplish limited safety of flight flutter and structural demonstration testing, and seven drop test flights. Of the seven drop test missions, one flight was aborted due to the failure of the hook mechanism to release the drop test vehicle (DTV); but the other six flights successfully dropped the DTV

    Surface chemistry of major rock types of Sonora Pass Test Site, California

    Get PDF
    Chemical study of selected rock samples tabulated as oxide percentage

    JPL microwave experiment support

    Get PDF
    Geological parameter effects on remote microwave radiometer response

    Ground data investigations Mt. Lassen, site 56-mission 76

    Get PDF
    Microwave radiometry and infrared photography for meteorological dat

    Ground truth flight data missions 55 and 56. Site 56, Mt. Lassen, Site 19, Sonora Pass, Site 3, Mono Craters

    Get PDF
    Radiosonde measurement of temperature and moisture content in infrared spectrometer experimen

    Electrodeposited inorganic separators for alkaline batteries

    Get PDF
    Coating electrodes of silver-cadmium cells with thermostable electrodeposits of calcium hydroxide or magnesium hydroxide reduces silver migration and increases cell life. Absence of organic matter enables assembled cells to be sterilized without oxidation of the material of the separators

    A CCA2 Secure Variant of the McEliece Cryptosystem

    Get PDF
    The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Differently from RSA and ElGa- mal, McEliece PKC is not known to be broken by a quantum computer. Moreover, even tough McEliece PKC has a relatively big key size, encryption and decryption operations are rather efficient. In spite of all the recent results in coding theory based cryptosystems, to the date, there are no constructions secure against chosen ciphertext attacks in the standard model - the de facto security notion for public-key cryptosystems. In this work, we show the first construction of a McEliece based public-key cryptosystem secure against chosen ciphertext attacks in the standard model. Our construction is inspired by a recently proposed technique by Rosen and Segev

    Studies of the use of high-temperature nuclear heat from an HTGR for hydrogen production

    Get PDF
    The results of a study which surveyed various methods of hydrogen production using nuclear and fossil energy are presented. A description of these methods is provided, and efficiencies are calculated for each case. The process designs of systems that utilize the heat from a general atomic high temperature gas cooled reactor with a steam methane reformer and feed the reformer with substitute natural gas manufactured from coal, using reforming temperatures, are presented. The capital costs for these systems and the resultant hydrogen production price for these cases are discussed along with a research and development program

    A Sample Glossary of Systems Analysis

    Get PDF
    Every activity -- and systems analysis is no exception tends to develop its own vocabulary. Indeed, systems analysis, because of its interdisciplinary nature, has been more prone than most not only to invent new words for new concepts but also -- and more often -- to borrow established terms from the disciplines it employs and to change their meaning, sometimes slightly, sometimes grossly, sometimes inconsistently. The result of this can be confusion, misunderstanding, and failure of communication. This glossary is an attempt at resolving part of the ambiguity. The glossary, as it stands now, is tentative. It has been prepared for the preliminary version of the Handbook of Applied Systems Analysis, and the terms included are those used in the Handbook
    corecore