Author: John Emory Jones
Publisher:
ISBN:
Category : Doppler radar
Languages : en
Pages : 478
Book Description
This report describes a radio investigation of traveling ionospheric disturbances carried out near Boulder, Colorado, over a 1-year period from June 1967 to June 1968. The three-dimensional motions of F2 layer disturbances were measured by the high frequency Doppler technique with spaced transmitters and at several probing frequencies. Horizontal motions were determined by cross-correlating three signals on frequencies near 5 MHz, whose reflection points were approximately at the corners of a horizontal equilateral triangle with 40-km sides. Vertical motions were determined from cross-correlation of signals on frequencies of 3.3, 4.0, and 5.1 MHz, whose reflection points were aligned vertically.
Observation of Traveling Ionospheric Disturbances by the Doppler Technique with Spaced Transmitters
Author: John Emory Jones
Publisher:
ISBN:
Category : Doppler radar
Languages : en
Pages : 478
Book Description
This report describes a radio investigation of traveling ionospheric disturbances carried out near Boulder, Colorado, over a 1-year period from June 1967 to June 1968. The three-dimensional motions of F2 layer disturbances were measured by the high frequency Doppler technique with spaced transmitters and at several probing frequencies. Horizontal motions were determined by cross-correlating three signals on frequencies near 5 MHz, whose reflection points were approximately at the corners of a horizontal equilateral triangle with 40-km sides. Vertical motions were determined from cross-correlation of signals on frequencies of 3.3, 4.0, and 5.1 MHz, whose reflection points were aligned vertically.
Publisher:
ISBN:
Category : Doppler radar
Languages : en
Pages : 478
Book Description
This report describes a radio investigation of traveling ionospheric disturbances carried out near Boulder, Colorado, over a 1-year period from June 1967 to June 1968. The three-dimensional motions of F2 layer disturbances were measured by the high frequency Doppler technique with spaced transmitters and at several probing frequencies. Horizontal motions were determined by cross-correlating three signals on frequencies near 5 MHz, whose reflection points were approximately at the corners of a horizontal equilateral triangle with 40-km sides. Vertical motions were determined from cross-correlation of signals on frequencies of 3.3, 4.0, and 5.1 MHz, whose reflection points were aligned vertically.
Java Cryptography
Author: Jonathan Knudsen
Publisher: "O'Reilly Media, Inc."
ISBN: 1449390617
Category : Computers
Languages : en
Pages : 366
Book Description
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.
Publisher: "O'Reilly Media, Inc."
ISBN: 1449390617
Category : Computers
Languages : en
Pages : 366
Book Description
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.
SDL.
Author:
Publisher:
ISBN:
Category : Solar flares
Languages : en
Pages : 764
Book Description
Publisher:
ISBN:
Category : Solar flares
Languages : en
Pages : 764
Book Description
Technical Report
Author: National Institutes of Health (U.S.). Division of Computer Research and Technology
Publisher:
ISBN:
Category : Computer programming
Languages : en
Pages : 44
Book Description
Publisher:
ISBN:
Category : Computer programming
Languages : en
Pages : 44
Book Description
A Computer Program (HEVSIM) for Heavy Duty Vehicle Fuel Economy and Performance Simulation. Volume III: Appendices A Through F. Final Report
Author: Richard E. Buck
Publisher:
ISBN:
Category :
Languages : en
Pages : 330
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 330
Book Description
Hiking the Sierra Nevada
Author: Barry Parr
Publisher: Rowman & Littlefield
ISBN: 1493062190
Category : Sports & Recreation
Languages : en
Pages : 469
Book Description
Thoroughly updated and revised, this four-season guide features over 100 of the best hikes from every quarter of the Sierra Nevada range, geared to differing levels of skill and experience. From foothill to desert, deep canyon to alpine mountaintop, author Barry Parr has compiled a list of fantastic hikes that illustrate the entirety of the range. This is one of the most comprehensive hiking guides to the Gold Country.
Publisher: Rowman & Littlefield
ISBN: 1493062190
Category : Sports & Recreation
Languages : en
Pages : 469
Book Description
Thoroughly updated and revised, this four-season guide features over 100 of the best hikes from every quarter of the Sierra Nevada range, geared to differing levels of skill and experience. From foothill to desert, deep canyon to alpine mountaintop, author Barry Parr has compiled a list of fantastic hikes that illustrate the entirety of the range. This is one of the most comprehensive hiking guides to the Gold Country.
Proceedings
Author:
Publisher:
ISBN:
Category : Computer engineering
Languages : en
Pages : 218
Book Description
Publisher:
ISBN:
Category : Computer engineering
Languages : en
Pages : 218
Book Description
Computer Systems
Author: J. Stanley Warford
Publisher: Jones & Bartlett Learning
ISBN: 9780763732394
Category : Computers
Languages : en
Pages : 740
Book Description
Computer Science
Publisher: Jones & Bartlett Learning
ISBN: 9780763732394
Category : Computers
Languages : en
Pages : 740
Book Description
Computer Science
A Computer Program (HEVSIM) for Heavy Duty Vehicle Fuel Economy and Performance Simulation
Author: Richard E. Buck
Publisher:
ISBN:
Category : Buses
Languages : en
Pages : 330
Book Description
Publisher:
ISBN:
Category : Buses
Languages : en
Pages : 330
Book Description
Novel Three-state Quantum Dot Gate Field Effect Transistor
Author: Supriya Karmakar
Publisher: Springer Science & Business Media
ISBN: 8132216350
Category : Technology & Engineering
Languages : en
Pages : 147
Book Description
The book presents the fabrication and circuit modeling of quantum dot gate field effect transistor (QDGFET) and quantum dot gate NMOS inverter (QDNMOS inverter). It also introduces the development of a circuit model of QDGFET based on Berkley Short Channel IGFET model (BSIM). Different ternary logic circuits based on QDGFET are also investigated in this book. Advanced circuit such as three-bit and six bit analog-to-digital converter (ADC) and digital-to-analog converter (DAC) were also simulated.
Publisher: Springer Science & Business Media
ISBN: 8132216350
Category : Technology & Engineering
Languages : en
Pages : 147
Book Description
The book presents the fabrication and circuit modeling of quantum dot gate field effect transistor (QDGFET) and quantum dot gate NMOS inverter (QDNMOS inverter). It also introduces the development of a circuit model of QDGFET based on Berkley Short Channel IGFET model (BSIM). Different ternary logic circuits based on QDGFET are also investigated in this book. Advanced circuit such as three-bit and six bit analog-to-digital converter (ADC) and digital-to-analog converter (DAC) were also simulated.