Results 21 to 30 of about 102,528 (248)
A study on dynamic avalanche test of IGBT module
During the turn-off of IGBT modules, dynamic avalanche will occur when a large electric field is generated inside the chip. In this paper, an experimental scheme was designed and verified to analyze the effect of different factors on dynamic avalanche ...
YU Wei, ZHENG Yu, YUAN Tao, REN Yadong
doaj
Avalanche criticality in the martensitic transition of Cu67.64Zn16.71Al15.65 shape-memory alloy: a calorimetric and acoustic emission study [PDF]
The first-order diffusionless structural transition in Cu67.64Zn16.71Al15.65 is characterized by jerky propagation of phase fronts related to the appearance of avalanches.
Antoni Planes +15 more
core +2 more sources
Non-equilibrium hysteresis and spin relaxation in the mixed-anisotropy dipolar coupled spin-glass LiHo$_{0.5}$Er$_{0.5}$F$_{4}$ [PDF]
We present a study of the model spin-glass LiHo$_{0.5}$Er$_{0.5}$F$_4$ using simultaneous AC susceptibility, magnetization and magnetocaloric effect measurements along with small angle neutron scattering (SANS) at sub-Kelvin temperatures.
Babkevich, P. +7 more
core +3 more sources
Snow variability effect upon avalanching
Thickness, density, shearing strength, and temperature of snow on mountain slopes are considered as stochastic fields or processes. Parameters of these fields (processes) were estimated in several geographical regions. Errors of snow stability estimation are shown to be depending on the above parameters, quantity of point measurements, and the ...
P. A. Chernous +2 more
openaire +3 more sources
As the use of semiconductors and electronic control units (ECU) in automobiles has increased, electromagnetic susceptibility has become more essential for the reliability of ECUs.
Ly-Minh-Duy Le
doaj +1 more source
Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network [PDF]
This paper represents a developed cryptographic information protection algorithm based on a substitutionpermutation network. We describe the cryptographic transformations used in the developed algorithm.
Rustem G. Biyashev +5 more
doaj +1 more source
This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm.
Kapalova N., Haumen A.
doaj +1 more source
Detrainment and braking of snow avalanches interacting with forests [PDF]
Mountain forests provide natural protection against avalanches. They can both prevent avalanche formation in release zones and reduce avalanche mobility in runout areas.
L. Védrine +4 more
doaj +1 more source
Computational snow avalanche simulation in forested terrain [PDF]
Two-dimensional avalanche simulation software operating in three-dimensional terrain is widely used for hazard zoning and engineering to predict runout distances and impact pressures of snow avalanche events.
M. Teich +5 more
doaj +1 more source
Effect of impact ionization in the InGaAs absorber on excess noise of avalanche photodiodes [PDF]
The effects of impact ionization in the InGaAs absorption layer on the multiplication, excess noise and breakdown voltage are modeled for avalanche photodiodes (APDs), both with InP and with InAlAs multiplication regions.
David, J.P.R. +3 more
core +2 more sources

