Results 21 to 30 of about 48,460 (203)
Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes
A good linear diffusion layer is a prerequisite in the design of block ciphers. Usually it is obtained by combining matrices with optimal diffusion property over the Sbox alphabet.
Victor Cauchois +2 more
doaj +1 more source
Validity Evaluation of Transformer DGA Online Monitoring Data in Grid Edge Systems
Dissolved gas analysis (DGA) is an important method of predicting transformer faults, and the accuracy of DGA measurements is of great significance to the evaluation of the transformer state in grid edge systems.
Jun Jia +5 more
doaj +1 more source
Transformer oil insulation condition may be deteriorated due to electrical and thermal faults, which may lead to transformer failure and system outage. In this regard, the first part of this paper presents comprehensive maintenance for power transformers
Mohamed Badawi +7 more
doaj +1 more source
ObjectiveThis study aimed to retrospectively describe the unplanned retreatment of dental general anesthesia (DGA) in children with severe early childhood caries (S-ECC) and explore potential factors that may influence the outcome of DGA treatment ...
Jin-yi Li +14 more
doaj +1 more source
Recognizing dualizing complexes [PDF]
Let A be a noetherian local commutative ring and let M be a suitable complex of A-modules. This paper proves that M is a dualizing complex for A if and only if the trivial extension A \ltimes M is a Gorenstein Differential Graded Algebra.
Jorgensen, Peter
core +1 more source
Construction of a Transformer DGA Health Index Based on DGA Screening Processes [PDF]
An automated transformer dissolved gas analysis evaluation system based on the recently released IEEE Standard C57.104-2019 for mineral oil-immersed transformers is implemented and its outputs demonstrated. The system includes diagnostic capabilities using the Duval Triangles 1-4-5 and Rogers Ratio method.
Hosseini, Michael +3 more
openaire +2 more sources
Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on two AES-like permutations, P1024 and Q1024, with non-square input and output registers.
Victor Cauchois +2 more
doaj +1 more source
General Diffusion Analysis: How to Find Optimal Permutations for Generalized Type-II Feistel Schemes
Type-II Generalized Feistel Schemes are one of the most popular versions of Generalized Feistel Schemes. Their round function consists in applying a classical Feistel transformation to p sub-blocks of two consecutive words and then shifting the k = 2p ...
Victor Cauchois +2 more
doaj +1 more source
Transformator merupakan peralatan utama dalam pemasokan listrik dari unit pembangkitan menuju konsumen. Oleh karena itu, perlu perhatian khusus dalam pemeliharaan kinerja transformator agar tidak terjadi kerusakan pada transformator.
Abdul Syakur, Wildan Lazuardi
doaj +1 more source
Field tests and computational simulations of the explosion of buried charges
Modelling buried explosion is a matter of concern for vehicle protection. Indeed, in the battlefield, Improvised Explosive Devices (IEDs) are one of the major threats for land vehicles and, more specifically, for their underbelly.
Roger Eve +2 more
doaj +1 more source

