ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 363-U1483A; 363-U1483B; 363-U1483C; AGE; Australian Monsoon; Bromine; Bromine, chi-square; Bromine, standard deviation; Depth, composite revised; DEPTH, sediment/rock; DRILL; Drilling/drill rig; DSDP/ODP/IODP sample designation; Event label; Exp363; Integrated Ocean Drilling Program / International Ocean Discovery Program; IODP; IODP Depth Scale Terminology; IODP Expedition 363; Joides Resolution; log-Zirconium/Rubidium ratio; Middle Pleistocene Transition; Rubidium; Rubidium, chi-square; Rubidium, standard deviation; Sample code/label; X-ray fluorescence core scanner (XRF), Avaatech; Zirconium; Zirconium, chi-square; Zirconium, standard deviation  (1)
  • Key distribution  (1)
Collection
Keywords
Publisher
Years
  • 1
    Publication Date: 2024-06-12
    Description: We performed high-resolution X-ray fluorescence (XRF) core scanning with the 2nd Generation Avaatech XRF Core Scanner at the Institute of Geosciences, Christian-Albrechts-University, Kiel (Germany). The archive halves were equilibrated to room temperature before scanning and a thin layer of sediment was removed from the top to obtain a fresh, even surface for scanning. We scanned at 2 cm intervals along the shipboard splice with approximately 1–2 m overlaps at splice tie points. Scanning was performed with 10 kV (750 µA, 10s acquisition time, no filter) and 30 kV (2000 µA, 20s acquisition time, Pd-thick filter) on the archive halves, which were covered with a 4 µm thick Chemplex Prolene Thin-Film foil to prevent contamination of the XRF detector. We used a crosscore slit size of 1.2 cm and a downcore slit size of 1 cm. The data reported here were acquired by a XR-100CR detector from Amptek and an Oxford Instruments 50W XTF5011 X-Ray tube with rhodium (Rh) target material. Raw X-ray spectra were converted into area counts using the iterative least-square software package WIN_AXIL from Canberra Eurisys and a core-specific model. The elements Al, Si, S, K, Ca, Ti, Mn, and Fe were analyzed with the 10-kV setting and the elements Br, Rb, and Zr with the 30-kV setting. Measured area counts per second of the spectral peaks of each element were transferred to logarithmic elemental ratios, which provide the most easily interpretable signals of relative changes in chemical composition.
    Keywords: 363-U1483A; 363-U1483B; 363-U1483C; AGE; Australian Monsoon; Bromine; Bromine, chi-square; Bromine, standard deviation; Depth, composite revised; DEPTH, sediment/rock; DRILL; Drilling/drill rig; DSDP/ODP/IODP sample designation; Event label; Exp363; Integrated Ocean Drilling Program / International Ocean Discovery Program; IODP; IODP Depth Scale Terminology; IODP Expedition 363; Joides Resolution; log-Zirconium/Rubidium ratio; Middle Pleistocene Transition; Rubidium; Rubidium, chi-square; Rubidium, standard deviation; Sample code/label; X-ray fluorescence core scanner (XRF), Avaatech; Zirconium; Zirconium, chi-square; Zirconium, standard deviation
    Type: Dataset
    Format: text/tab-separated-values, 92006 data points
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Electronic Resource
    Electronic Resource
    Springer
    Distributed computing 9 (1995), S. 131-145 
    ISSN: 1432-0452
    Keywords: Key words: Authentication ; Key distribution ; Protocol metrics ; Lower bound ; Optimal protocol
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Summary.  Research in authentication protocols has focused largely on developing and analyzing protocols that are secure against certain types of attacks. There is little and only scattered discussion on protocol efficiency. This paper presents results on the lower bounds on the numbers of messages, rounds, and encryptions required for network authentication. For each proven lower bound, an authentication protocol achieving the bound is also given, thus proving that the bound is a tight bound if the given optimal protocol is secure. Moreover, we give impossibility results of obtaining protocols that are simultaneously optimal with respect to the numbers of messages and rounds.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...