نتایج جستجو برای: nsa method
تعداد نتایج: 1636362 فیلتر نتایج به سال:
[1] A retrospective study of the North-South asymmetry (NSA) during the solstices is made using the different geospace parameters in the North and South magnetic hemispheres. The NSA features are investigated using Total Electron Content, TEC, and Global Electron Content, GEC, produced from global ionospheric maps, GIM-TEC for 1999-2013, the Ionospheric Electron Content, IEC, measured by Topex-...
Software testing has long been thought to be a good technique improve the software quality and reliability. Path is most reliable key method for improving among all approaches. On other hand, test data big impact on activity’s ability detect errors or defects. To solving problem, one must locate entire search space relevant input encompass different paths in testable program. satisfy path cover...
450 NOTICES OF THE AMS VOLUME 47, NUMBER 4 C ryptography was once the domain of generals and small children, but the advent of the Information Age changed that. In the early 1970s the National Security Agency (NSA) and the National Bureau of Standards (NBS) realized that noncombatant adults needed to protect their sensitive, but unclassified, information. Though NSA is the usual government agen...
The resolution of far-field optical imaging is required to improve beyond the Abbe limit to the subdiffraction or even the nanoscale. In this work, inspired by scanning electronic microscopy (SEM) imaging, in which carbon (or Au) thin films are usually required to be coated on the sample surface before imaging to remove the charging effect while imaging by electrons. We propose a saturation-abs...
BACKGROUND Comminuted fractures of the proximal humerus are generally treated with the locking plate system, and clinical results are satisfactory. However, unstable support of the medial column results in varus malunion and screw perforation. We designed a novel medial anatomical locking plate (MLP) to directly support the medial column. Theoretically, the combined application of locking plate...
Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of Internet. Considering extensive QKD implementations trusted networks, workable upgrading tactic existing toward MDI needs to be explicit. Here, referring nonstandalone (NSA) network 5G, we propose an NSA-MDI scheme as evolutionary selec...
AIM To evaluate the visual function after bilateral implantation of aspheric diffractive multifocal Tecnis ZMA00, aspheric monofocal ZA9003 versus spherical monofocal Akreos Adapt intraocular lenses (IOLs). METHODS Tecnis ZMA00, Tecnis ZA9003 or Akreos Adapt IOLs were bilaterally implanted in 180 eyes from 90 patients. The following parameters were assessed 3 months postoperatively: monocular...
Skipjack is a block cipher designed by the NSA for use in US government phones, and commercial mobile and wireless products by AT&T. Among its initial implementations in hardware were the Clipper chip and Fortezza PC cards, which have since influenced the private communications market to be compatible with this technology. For instance, the Fortezza card comes in PCMCIA interface and is a very ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید