Results 71 to 80 of about 22,594 (217)
Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol [PDF]
The ISO/IEC 61850 protocol for substation automation is a key component for the safe and efficient operation of smart grids, whilst offering a substantial range of functions.
Wolthusen, Stephen, Wright, James
core +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Exploring supported ionic liquids for IgY antibody purification
Abstract BACKGROUND Immunoglobulin Y (IgY), a scalable alternative to mammalian antibodies, typically found in hen's egg yolk, has gained attraction in diagnostic and therapeutic applications. However, its purification from egg yolk remains challenging due to the complex matrix and limitations of conventional techniques. Supported Ionic Liquids (SILs),
Amanda RP Silva +4 more
wiley +1 more source
Towards the decarbonisation of the power system, digital substations have gradually increased in smart grids, where Ethernet cables have replaced large quantities of copper wires. With this transition, the standardised communication protocols through the
Le Nam Hai Pham +4 more
doaj +1 more source
Reflections on the Arts, Environment, and Culture After Ten Years of The Goose [PDF]
To mark the tenth anniversary of The Goose, we asked prominent ecologically-minded scholars, writers, artists, and educators from across Canada to reflect on the relationship between the arts, culture, and the environment.
Banting, Pamela +15 more
core +1 more source
AI Epistemic Disengagement and Consumer Dependence: An Augmentation‐Substitution Framework
ABSTRACT Artificial intelligence has become consumers' primary decision‐making resource, raising two questions: how do consumers justify accepting AI as a trusted source of reasoning, and when does this acceptance maintain rather than forfeit their capacity to think independently?
Vasilis Theoharakis +1 more
wiley +1 more source
Corrupted GOOSE Detectors: Anomaly Detection in Power Utility Real-Time Ethernet Communications
International audienceGOOSE protocol is used for critical protection operations in the power grid, as standardized by IEC61850. It thus has strong real-time constraints that make very hard to implement any security means for integrity and confidentiality
Bellemain, Pascal +4 more
core +1 more source
Carnívoros invasores en Patagonia: Definiendo prioridades para su manejo usando el visón americano (Neovison vison) como caso de estudio [PDF]
El visón Americano es una especie introducida con una amplia distribución en Patagonia y por su comportamiento de forrajeo es el carnívoro invasor con el mayor potencial para afectar a la biodiversidad en la región. La información disponible acerca de la
Fasola, Laura +1 more
core
ABSTRACT Studying goose domestication through archaeological finds has been challenging due to the similar skeletal morphology of the European domestic goose and its wild progenitor, the greylag goose (Anser anser). We analyzed stable carbon (δ13C) and nitrogen (δ15N) isotopes from bone collagen of subfossil domestic and potentially domestic geese to ...
Johanna Honka +7 more
wiley +1 more source
Evaluation of colostrum on an immunological and microbiological level and its relation to calf health: a case study of calves at UVM Miller Research Center [PDF]
The objective of this study was to evaluate the colostrum fed to calves at the UVM Miller Research Center on an immunological and bacteriological level as well as to explore the relationship between these factors and the health of the calves.
Pietrafesa, Brooke Ann
core +1 more source

