Abstract: Increased dieback and mortality of dark needle conifer (DNC) stands (composed of fir (Abies sibirica),Siberian…
Author: New NASA STI
Isokinetic TWC Evaporator Probe: Development of the IKP2 and Performance Testing for the HAIC-HIWC Darwin 2014 and Cayenne-2015 Field Campaigns
Abstract: A new Isokinetic Total Water Content Evaporator (IKP2) was downsized from a prototype instrument, specifically…
Comparison of OMI NO2 Observations and Their Seasonal and Weekly Cycles with Ground-Based Measurements in Helsinki
Abstract: We present the comparison of satellite-based OMI (Ozone Monitoring Instrument) NO2 products with ground-based observations…
Uncertainty Analysis of the NASA Glenn 8×6 Supersonic Wind Tunnel
Abstract: This paper presents methods and results of a detailed measurement uncertainty analysis that was performed…
Signal Strength-Based Global Navigation Satellite System Performance Assessment in the Space Service Volume
Abstract: NASA is participating in the International Committee on Global Navigation Satellite Systems (GNSS) (ICG)'s efforts…
Volumetrically-Derived Global Navigation Satellite System Performance Assessment from the Earths Surface through the Terrestrial Service Volume and the Space Service Volume
Abstract: NASA is participating in the International Committee on Global Navigation Satellite Systems (GNSS) (ICG)'s efforts…
Cooling Rate Study of Nickel-Rich Material During Thermal Treatment and Quench
Abstract: To investigate quench cracking that results from water quenching after heat treatment of binary and…
Applicability and Limitations of Reliability Allocation Methods
Abstract: Reliability allocation process may be described as the process of assigning reliability requirements to individual…
Isokinetic TWC Evaporator Probe: Calculations and Systemic Uncertainty Analysis
Abstract: A new Isokinetic Total Water Content Evaporator (IKP2) was downsized from a prototype instrument, specifically…
Security Policy for a Generic Space Exploration Communication Network Architecture
Abstract: This document is one of three. It describes various security mechanisms and a security policy…