52,255 research outputs found
Evaluation of the amperex 56 TVP photomultiplier
Characteristics were measured for the Amperex 56 TVP 42 mm-diameter photomultiplier. Some typical photomultiplier characteristics-such as gain, dark current, transit and rise times-are compared with data provided. Photomultiplier characteristics generally not available such as the single photoelectron time spread, the relative collection efficiency, the relative anode pulse amplitude as a function of the voltage between the photocathode and focusing electrode, and the position of the photocathode sensing area were measured and are discussed for two 56 TVP's. The single photoelectron time spread, the relative collection efficiency, and the transit time difference as a function of the voltage between photocathode and focusing electrode were also measured and are discussed, particularly with respect to the optimization of photomultiplier operating conditions for timing applications
Low-frequency microwave radiometer for N-ROSS
The all weather, global determination of sea surface temperature (SST) has been identified as a requirement needed to support naval operations. The target SST accuracy is + or - 1.0 K with a surface resolution of 10 km. Investigations of the phenomenology and technology of remote passive microwave sensing of the ocean environment over the past decade have demonstrated that this objective is presently attainable. Preliminary specification and trade off studies were conducted to define the frequency, polarization, scan geometry, antenna size, and other esstential parameters of the low frequency microwave radiometer (LFMR). It will be a dual polarized, dual frequency system at 5.2 and 10.4 GHz using a 4.9 meter deployable mesh surface antenna. It is to be flown on the Navy-Remote Ocean Sensing System (N-ROSS) satellite scheduled to be launched in late 1988
A wall interference assessment/correction system
The Hackett method (a Wall Pressure Signature Method) was selected to be adapted for the 12 ft Wind Tunnel WIAC system. This method uses limited measurements of the static pressure at the wall, in conjunction with the solid wall boundary condition, to determine the strength and distribution of singularities representing the test article. The singularities are used in term for estimating wall interference at the model location. Hackett's method will have to be formulated for application to the unique geometry of the 12 ft tunnel. The WIAC code will be validated by conducting numerically simulated experiments rather than actual wind tunnel experiments. The simulations will be used to generate both free air and confined wind tunnel flow fields for each of the test articles over a range of test configurations. Specifically the pressure signature at the test section wall will be computed for the confined case to provide the simulated 'measured' data. These data will serve as the input for the WIAC method. The performance of the WIAC method then may be evaluated by comparing the corrected parameters with those for the free air simulation
Brief Mindfulness Meditation Improves Mental State Attribution and Empathizing
Peer reviewedPublisher PD
Two-measured variable method for wall interference assessment/correction
An iterative method for wall interference assessment and/or correction is presented for transonic flow conditions in wind tunnels equipped with two component velocity measurements on a single interface. The iterative method does not require modeling of the test article and tunnel wall boundary conditions. Analytical proof for the convergence and stability of the iterative method is shown in the subsonic flow regime. The numerical solutions are given for both 2-D and axisymmetrical cases at transonic speeds with the application of global Mach number correction
A proposal for founding mistrustful quantum cryptography on coin tossing
A significant branch of classical cryptography deals with the problems which
arise when mistrustful parties need to generate, process or exchange
information. As Kilian showed a while ago, mistrustful classical cryptography
can be founded on a single protocol, oblivious transfer, from which general
secure multi-party computations can be built.
The scope of mistrustful quantum cryptography is limited by no-go theorems,
which rule out, inter alia, unconditionally secure quantum protocols for
oblivious transfer or general secure two-party computations. These theorems
apply even to protocols which take relativistic signalling constraints into
account. The best that can be hoped for, in general, are quantum protocols
computationally secure against quantum attack. I describe here a method for
building a classically certified bit commitment, and hence every other
mistrustful cryptographic task, from a secure coin tossing protocol. No
security proof is attempted, but I sketch reasons why these protocols might
resist quantum computational attack.Comment: Title altered in deference to Physical Review's fear of question
marks. Published version; references update
A Fourier approach to cloud motion estimation
A Fourier technique is described for estimating cloud motion from pairs of pictures using the phase of the cross spectral density. The method allows motion estimates to be made for individual spatial frequencies, which are related to cloud pattern dimensions. Results obtained are presented and compared with the results of a Fourier domain cross correlation scheme. Using both artificial and real cloud data show that the technique is relatively sensitive to the presence of mixtures of motions, changes in cloud shape, and edge effects
- …