Emergency Survey Toolkit for Naval Operations
نویسندگان
چکیده
منابع مشابه
WAVEWATCH III: Transition to Naval Operations
The public (-«porting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, inclu...
متن کاملAutonomous underwater vehicles for scientific and naval operations
Recognizing the potential of autonomous underwater vehicles for scientific and military applications, in 1997 MIT and the NATO Undersea Research Centre initiated a Joint Research Project (GOATS), for the development of environmentally adaptive robotic technology applicable to mine counter measures (MCM) and rapid environmental assessment (REA) in coastal environments. The August 2001 GOATS Conf...
متن کاملA SURVEY OF 200 DCR OPERATIONS
In a prospective survey, 200 cases of operated chronic dacryocystitis were divided into three groups according to the kind of operation, and the respective results are as follows: Group I includes 100 cases in whom the lacrimal bone was removed (8mm x 8mm) and a 6mm diameter catheter was used (as a duct between the lacrimal sac and nasal cavity). The recurrence rate within one year was 24 ...
متن کاملAn Efficient Toolkit for Computing Private Set Operations
Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such protocols have an everincreasing number of practical applications, particularly when implementing privacy-preserving data mining schemes. Protocols for computing private set operations have been prevalent in multi-party co...
متن کاملAn E cient Toolkit for Computing Private Set Operations
Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such protocols have an everincreasing number of practical applications, particularly when implementing privacy-preserving data mining schemes. Protocols for computing private set operations have been prevalent in multi-party co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation
سال: 2015
ISSN: 2083-6473
DOI: 10.12716/1001.09.03.10