symmetric power recovery

symmetric power recovery
вывод <из критического режима> при симметричной тяге двигателей

Авиасловарь. . 2004.

Игры ⚽ Поможем написать реферат

Смотреть что такое "symmetric power recovery" в других словарях:

  • Particle in a spherically symmetric potential — In quantum mechanics, the particle in a spherically symmetric potential describes the dynamics of a particle in a potential which has spherical symmetry. The Hamiltonian for such a system has the form:hat{H} = frac{hat{p}^2}{2m 0} + V(r)where m 0 …   Wikipedia

  • Windows 2000 — Part of the Microsoft Windows family Screenshot of Windows 2000 Professional …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Compressor stall — A compressor stall is a situation of abnormal airflow resulting from a stall of the aerofoils within the compressor of a jet engine. Stall is found in dynamic compressors, particularly axial compressors, as used in jet engines and turbochargers… …   Wikipedia

  • performing arts — arts or skills that require public performance, as acting, singing, or dancing. [1945 50] * * * ▪ 2009 Introduction Music Classical.       The last vestiges of the Cold War seemed to thaw for a moment on Feb. 26, 2008, when the unfamiliar strains …   Universalium

  • Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… …   Wikipedia

  • Spin (flight) — In aviation, a spin is an aggravated stall resulting in rotation about the center of gravity wherein the aircraft follows a downward corkscrew path. Spins can be entered unintentionally or intentionally, from any flight attitude and from… …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • MUSIC — This article is arranged according to the following outline: introduction written sources of direct and circumstantial evidence the material relics and iconography notated sources oral tradition archives and important collections of jewish music… …   Encyclopedia of Judaism

  • radiation — radiational, adj. /ray dee ay sheuhn/, n. 1. Physics. a. the process in which energy is emitted as particles or waves. b. the complete process in which energy is emitted by one body, transmitted through an intervening medium or space, and… …   Universalium

  • Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»