منابع مشابه
Self testing quantum apparatus
We study, in the context of quantum information and quantum communication, a configuration of devices that includes (1) a source of some unknown bipartite quantum state that is claimed to be the Bell state Φ and (2) two spatially separated but otherwise unknown measurement apparatus, one on each side, that are each claimed to execute an orthogonal measurement at an angle θ ∈ {−π/8, 0, π/8} that...
متن کاملDesign of Rover Wheel Testing Apparatus
A Rover’s wheel performance is one of the limiting factors in its ability to successfully traverse other planets. More research focusing on wheel materials, design, and optimized tread patterns needs to be conducted so that a rover can reach more of its potential. A wheel test bed is being fabricated to test new wheel designs and to collect data which will be used to map the relationship betwee...
متن کاملAn apparatus for pseudo-deterministic testing
Pseudo-random testing is popularly used, particularly in Built-In Self Test (BIST) applications. To achieve a desired fault coverage, pseudo-random patterns are often supplemented with few deterministic patterns. When positions of deterministic patterns in the pseudo-random sequence are known a priori, pseudo-random sub-sequences can be chosen such that they cover these deterministic patterns. ...
متن کاملA new apparatus for visual field testing with binocular fixation.
A new instrument for visual field examination with binocular fixation is described. The binocular vision was dissociated with polarizing plates. Only the point of fixation was visible to both eyes while the testing chart (Amsler chart) was visible to one eye in the use of this apparatus. The examination was done with both the patient's eyes open. With the use of this apparatus, not only was the...
متن کاملTest Apparatus for Side-Channel Resistance Compliance Testing
A way to classify the security level of a cryptographic device is to estimate the effort an adversary has to invest in an attack to be successful. While there are metrics and mathematical models to determine the complexity of attacks on cryptographic algorithms and protocols, estimating the security level of an implementation is more complicated. This is because attacks on the implementation de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Textile Machinery Society of Japan
سال: 1982
ISSN: 0040-5043,1881-1159
DOI: 10.4188/jte1955.28.114