UNCLASSIFIED 



Security Classification 



KEY WORDS 



Tides - Pacific Ocean 

 Internal Waves 



I. ORIGINATING ACTIVITY: Enter the name and address 

 of the contractor, subcontractor, grantee. Department of De- 

 fense activity or other organization (corporate author) issuing 

 the report. 



2a. REPORT SECURTY CLASSIFICATION: Enter the over- 

 all security classification of the report. Indicate whether 

 "Restricted Data" is included. Marking is to be in accord- 

 ance with appropriate security regulations. 



2b. GROUP: Automatic downgrading is specified in DoD Di- 

 rective 5200. 10 and Armed Forces Industrial Manual. Enter 

 the group number. Also, when applicable, show that optional 

 markings have been used for Group 3 and Group 4 as author- 

 ized. 



3. REPORT TITLE: Enter the complete report title in all 

 capital letters. Titles in all cases should be unclassified. 

 If a meaningful title cannot be selected without classifica- 

 tion, show title classification in all capitals in parenthesis 

 immediately following the title. 



4. DESCRIPTIVE NOTES; If appropriate, enter the type of 



INSTRUCTIONS 



imposed by : 



the i 

 ired. 



■ final. 

 ; specific reporting pe 



2(s) of authoKs) as shown on 

 e, first name, middle initial, 

 h of service. The name of 

 um requirement. 



5. AUTHOR(S): Enter the 

 or in the report. Enter last 

 If military, show rank and b 

 the principal author is an ahsolut 



6. REPORT DATE; Enter the d; 

 month, year; or month, year. If m 

 on the report, use date of publication. 



7a. TOTAL NUMBER OF PAGES: The total page count 

 should follow normal pagination procedures, i.e., enter the 

 number of pages containing information. 



76. NUMBER OF REFERENCES: Enter the total number of 

 references cited in the report. 



8a. CONTRACT OR GRANT NUMBER: If appropriate, enter 

 the applicable number of the contract or grant under which 

 the report was writterx. 



86, 8c, & 8d. PROJECT NUMBER: Enter the appropriate 

 military department identification, such as project number, 

 subproject number, system numbers, task number, etc. 

 9a. ORIGINATOR'S REPORT NUMBER(S): Enter the offi- 

 cial report number by which the document will be identified 

 and controlled by the originating activity. This number must 

 be unique to this report. 



96. OTHER REPORT NUMBER(S): If the report has been 

 assigned any other report numbers (either by the originator 

 or by the sponsor), also enter this number(s). 

 10. AVAILABILITY/LIMITATION NOTICES: Entei 



itat. 



I further dissen 



:ion of the report, other than thos 



■ity cla 



"Qualified request 

 report from DDC. " 



and diss 

 . not authorized 



ion, using standard statements 

 may obtain copies of this 



ation of thii 

 port by DDC : 

 U. S. Government agencies may obtain copies of 

 lis report directly from DDC, Other qualified DDC 

 sers shall request through 



"U. S. military agencies may obtain copies of this 

 report directly from DDC Other qualified users 

 shall request through 



n of this report is controlled. Qual- 

 shall request through 



If the report has been furnished to the Office of Technical 

 services, Department of Commerce, for sale to the public, indi- 

 cate this fact and enter the price, if knowr;- 

 11. SUPPLEMENTARY NOTES: Use for additional explana- 



[2. SPONSORING MILITARY ACTIVITY: Enter the name of 

 he departmental project office or laboratory sponsoring (pBy~ 

 ng for) the research and development. Include address. 



ABSTRACT: Enter an abstract giving a brief and factual 

 ■nary of the document indicative of the report, even though 

 ay also appear elsewhere in the body of the technical re- 



If additional space is required, a continuation sheet shal 

 ttached. 



13 



It IS highly desirable that the abstr; 

 jnclassified. Each paragraph of the 

 ndication of the military security cla 

 nation xn the paragraph, represented ; 



of classified reports 

 stract shall end with 

 ification of the in- 



(TS). (S), (C). or (U). 



abstract. How- 



14. KEY WORDS: Key words ar 

 or short phrases that characteriz 



selected so that no security clas 



technicallii 

 ?port. Key ' 



as equipment model desig 

 ' name, geographic locati 

 ill be followed by an indi 

 ssignment of links, roles 



ation is requin 

 ration of techn 



as key 

 cal con- 

 opuona 



UNCLASSIFIED 



Security Classification 



