1,029 research outputs found
B-52B-008/DTV (Drop Test Vehicle) configuration 1 (with and without fins) flight test results - captive flight and drop test missions
The B-52B-008 drop test consisted of one takeoff roll to 60 KCAS, two captive flights to accomplish limited safety of flight flutter and structural demonstration testing, and seven drop test flights. Of the seven drop test missions, one flight was aborted due to the failure of the hook mechanism to release the drop test vehicle (DTV); but the other six flights successfully dropped the DTV
Surface chemistry of major rock types of Sonora Pass Test Site, California
Chemical study of selected rock samples tabulated as oxide percentage
JPL microwave experiment support
Geological parameter effects on remote microwave radiometer response
Ground data investigations Mt. Lassen, site 56-mission 76
Microwave radiometry and infrared photography for meteorological dat
Ground truth flight data missions 55 and 56. Site 56, Mt. Lassen, Site 19, Sonora Pass, Site 3, Mono Craters
Radiosonde measurement of temperature and moisture content in infrared spectrometer experimen
Electrodeposited inorganic separators for alkaline batteries
Coating electrodes of silver-cadmium cells with thermostable electrodeposits of calcium hydroxide or magnesium hydroxide reduces silver migration and increases cell life. Absence of organic matter enables assembled cells to be sterilized without oxidation of the material of the separators
A CCA2 Secure Variant of the McEliece Cryptosystem
The McEliece public-key encryption scheme has become an interesting
alternative to cryptosystems based on number-theoretical problems. Differently
from RSA and ElGa- mal, McEliece PKC is not known to be broken by a quantum
computer. Moreover, even tough McEliece PKC has a relatively big key size,
encryption and decryption operations are rather efficient. In spite of all the
recent results in coding theory based cryptosystems, to the date, there are no
constructions secure against chosen ciphertext attacks in the standard model -
the de facto security notion for public-key cryptosystems. In this work, we
show the first construction of a McEliece based public-key cryptosystem secure
against chosen ciphertext attacks in the standard model. Our construction is
inspired by a recently proposed technique by Rosen and Segev
Studies of the use of high-temperature nuclear heat from an HTGR for hydrogen production
The results of a study which surveyed various methods of hydrogen production using nuclear and fossil energy are presented. A description of these methods is provided, and efficiencies are calculated for each case. The process designs of systems that utilize the heat from a general atomic high temperature gas cooled reactor with a steam methane reformer and feed the reformer with substitute natural gas manufactured from coal, using reforming temperatures, are presented. The capital costs for these systems and the resultant hydrogen production price for these cases are discussed along with a research and development program
A Sample Glossary of Systems Analysis
Every activity -- and systems analysis is no exception tends to develop its own vocabulary. Indeed, systems analysis, because of its interdisciplinary nature, has been more prone than most not only to invent new words for new concepts but also -- and more often -- to borrow established terms from the disciplines it employs and to change their meaning, sometimes slightly, sometimes grossly, sometimes inconsistently. The result of this can be confusion, misunderstanding, and failure of communication. This glossary is an attempt at resolving part of the ambiguity.
The glossary, as it stands now, is tentative. It has been prepared for the preliminary version of the Handbook of Applied Systems Analysis, and the terms included are those used in the Handbook
- …
