Thirty-five-gigahertz measurements of CO2crystals
نویسندگان
چکیده
منابع مشابه
The Thirty Gigahertz Instrument Receiver for the QUIJOTE Experiment: Preliminary Polarization Measurements and Systematic-Error Analysis
This paper presents preliminary polarization measurements and systematic-error characterization of the Thirty Gigahertz Instrument receiver developed for the QUIJOTE experiment. The instrument has been designed to measure the polarization of Cosmic Microwave Background radiation from the sky, obtaining the Q, U, and I Stokes parameters of the incoming signal simultaneously. Two kinds of linearl...
متن کاملFabry Disease: Thirty-Five Mutations
Background: Fabry disease, an X-linked inborn error of glycosphingolipid catabolism, results from mutations in the a-galactosidase A (a-Gal A) gene located at Xq22.1. To determine the nature and frequency of the molecular lesions causing the classical and milder variant Fabry phenotypes and for precise carrier detection, the a-Gal A lesions in 42 unrelated Fabry hemizygotes were determined. Mat...
متن کاملThirty Five Years of Computer Cartograms
The notion of a cartogram is reviewed. Then, based on a presentation from the 1960’s, a direct and simple introduction is given to the design of a computer algorithm for the construction of contiguous value-by-area cartograms. As an example a table of latitude/longitude to rectangular plane coordinates is included for a cartogram of the United States, along with Tissot’s measures for this map p...
متن کاملFluency in reading—Thirty-five years later
Paul Nation’s talents and interests extend well beyond vocabulary to include research on speaking, writing, classroom learning and teaching, reading, and fluency. In keeping with Nation’s interests in fluency, extensive reading, and reading instruction, I outline current perspectives on reading fluency and its role as a key component of reading comprehension abilities. This discussion will incl...
متن کاملPassword Security-- Thirty-Five Years Later
User passwords were first introduced to allow time sharing on large mainframes. Mainframes at the time were large systems within a controlled environment. Passwords were stored in plain text file with no perceived need to secure user passwords. The first documented password breach occurred when a user wanted to gain additional time on a mainframe than the allotted four hours limit. The user sim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Radio Science
سال: 2003
ISSN: 0048-6604
DOI: 10.1029/2001rs002478