نتایج جستجو برای: downdrafts employ non
تعداد نتایج: 1358859 فیلتر نتایج به سال:
We address the hypothesis that downdrafts driven by radiatively-cooling condensations in the solar transition region are able to produce significant redshifts in UV lines as frequently observed on the solar disk and, more recently, on other stars. In a first paper, significant redshifted line components at several km/s have been found from modeling the evolution of an isobaric perturbation twic...
Many aircraft accidents each year are caused by encounters with unseen airflow hazards near the ground such as vortices, downdrafts, wind shear, microbursts, or other turbulence. While such hazards frequently pose problems to fixed-wing airplanes, they are especially dangerous to helicopters, which often have to operate in confined spaces and under operationally stressful conditions. We are dev...
The convective nature of Stratocumulus topped boundary layers (STBL) involves the motion updrafts and downdrafts, driven by surface fluxes radiative cooling, respectively. balance between shear buoyant forcings at can determine organization cellular roll structures. We investigate effect varying top STBL using Large Eddy Simulations, taking DYCOMS II RF01 as a base case. focus on spatial identi...
Using observational data from coherent Doppler light detection and ranging (lidar) systems situated at the Hong Kong International Airport (HKIA), the authors extract Lagrangian coherent structures (LCS) intersecting the flight path of landing aircraft. They study the time evolution of LCS and compare them with onboard wind shear and altitude data collected during airplane approaches. Their res...
The articles on weather and asthma focused on outbreaks of asthma flare-ups during periods of thunderstorms, especially in the late spring and early summer. These studies, conducted in Australia and Great Britain, did seem to find a correlation between spring storms and increased problems with asthma. Researchers speculate the phenomenon may have two possible causes. The most likely is related ...
We demonstrate how adversaries with large computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید