نتایج جستجو برای: nsa method

تعداد نتایج: 1636362  

2014
T. L. Gulyaeva F. Arikan M. Hernandez-Pajares I. S. Veselovsky

[1] A retrospective study of the North-South asymmetry (NSA) during the solstices is made using the different geospace parameters in the North and South magnetic hemispheres. The NSA features are investigated using Total Electron Content, TEC, and Global Electron Content, GEC, produced from global ionospheric maps, GIM-TEC for 1999-2013, the Ionospheric Electron Content, IEC, measured by Topex-...

Journal: :Journal of ICT standardisation 2022

Software testing has long been thought to be a good technique improve the software quality and reliability. Path is most reliable key method for improving among all approaches. On other hand, test data big impact on activity’s ability detect errors or defects. To solving problem, one must locate entire search space relevant input encompass different paths in testable program. satisfy path cover...

2000
Susan Landau

450 NOTICES OF THE AMS VOLUME 47, NUMBER 4 C ryptography was once the domain of generals and small children, but the advent of the Information Age changed that. In the early 1970s the National Security Agency (NSA) and the National Bureau of Standards (NBS) realized that noncombatant adults needed to protect their sensitive, but unclassified, information. Though NSA is the usual government agen...

2016
Chenliang Ding Jingsong Wei

The resolution of far-field optical imaging is required to improve beyond the Abbe limit to the subdiffraction or even the nanoscale. In this work, inspired by scanning electronic microscopy (SEM) imaging, in which carbon (or Au) thin films are usually required to be coated on the sample surface before imaging to remove the charging effect while imaging by electrons. We propose a saturation-abs...

2017
Yu He Yaoshen Zhang Yan Wang Dongsheng Zhou Fu Wang

BACKGROUND Comminuted fractures of the proximal humerus are generally treated with the locking plate system, and clinical results are satisfactory. However, unstable support of the medial column results in varus malunion and screw perforation. We designed a novel medial anatomical locking plate (MLP) to directly support the medial column. Theoretically, the combined application of locking plate...

Journal: :Photonics Research 2021

Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of Internet. Considering extensive QKD implementations trusted networks, workable upgrading tactic existing toward MDI needs to be explicit. Here, referring nonstandalone (NSA) network 5G, we propose an NSA-MDI scheme as evolutionary selec...

Journal: :International journal of ophthalmology 2013
Pan-Pan Ye Xia Li Ke Yao

AIM To evaluate the visual function after bilateral implantation of aspheric diffractive multifocal Tecnis ZMA00, aspheric monofocal ZA9003 versus spherical monofocal Akreos Adapt intraocular lenses (IOLs). METHODS Tecnis ZMA00, Tecnis ZA9003 or Akreos Adapt IOLs were bilaterally implanted in 180 eyes from 90 patients. The following parameters were assessed 3 months postoperatively: monocular...

Journal: :Cryptologia 2009
Jongsung Kim Raphael C.-W. Phan

Skipjack is a block cipher designed by the NSA for use in US government phones, and commercial mobile and wireless products by AT&T. Among its initial implementations in hardware were the Clipper chip and Fortezza PC cards, which have since influenced the private communications market to be compatible with this technology. For instance, the Fortezza card comes in PCMCIA interface and is a very ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید