Results 11 to 20 of about 6,885,434 (317)
The internal temperature distribution and evolution in cavitation bubble can be investigated numerically by a thermal lattice Boltzmann method. The simulation results are consistent with the calculational results of the Rayleigh-Plesset equation and the ...
Minglei Shan +5 more
doaj +1 more source
Device for online monitoring of insulation faults in high-voltage switchgears
Partial discharges are the major cause of deterioration in the insulation characteristics of switchgears. Therefore, timely detection of partial discharge in switchgear and potential insulation faults is an urgent problem that needs to be addressed in ...
Jiajia Song, Jinbo Zhang, Xinnan Fan
doaj +1 more source
Short-Term Load Forecasting Based on Deep Learning Bidirectional LSTM Neural Network
Accurate load forecasting guarantees the stable and economic operation of power systems. With the increasing integration of distributed generations and electrical vehicles, the variability and randomness characteristics of individual loads and the ...
Changchun Cai +3 more
doaj +1 more source
No Signaling and Quantum Key Distribution [PDF]
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles.
Barrett, Jonathan +2 more
openaire +3 more sources
Quantum dense key distribution [PDF]
This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present ...
DEGIOVANNI, IVO PIETRO +6 more
openaire +5 more sources
The digital controller of the grid-connected converter achieves closed-loop control by sampling key voltage and current signals. High-frequency switching of power electronic switches introduces high-frequency ripples into the signals, which may cause ...
Ma Chunyan +4 more
doaj +1 more source
On the Computational Security of a Distributed Key Distribution Scheme [PDF]
The work of the first two authors was partially supported by the Spanish Ministry of Education and Science under Projects TSI2007-65406-C03-02 (“eAEGIS”) and CONSOLIDER CSD2007-00004 (“ARES”). The work of V. Daza was also supported by the Government of Catalonia under Grant 2005-SGR-00446. The work of J.
Daza, Vanesa +2 more
openaire +5 more sources
A Key Verification Protocol for Quantum Key Distribution [PDF]
Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques. In the presence of an eavesdropper, Alice's key may not be identical with Bob's key, due to the characteristics of a quantum channel.
Gunes Karabulut Kurt +3 more
openaire +5 more sources
Oil and gas pipeline networks are a key link in the coordinated development of oil and gas both upstream and downstream. To improve the reliability and safety of the oil and gas pipeline network, inspections are implemented to minimize the risk of ...
Yamin Yan +6 more
doaj +1 more source
Layered quantum key distribution [PDF]
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of users, can be implemented by using a particular multi-partite high-dimensional quantum state.
Mehul Malik +4 more
openaire +2 more sources

