Results 11 to 20 of about 6,885,434 (317)

Numerical Investigations on Temperature Distribution and Evolution of Cavitation Bubble Collapsed Near Solid Wall

open access: yesFrontiers in Energy Research, 2022
The internal temperature distribution and evolution in cavitation bubble can be investigated numerically by a thermal lattice Boltzmann method. The simulation results are consistent with the calculational results of the Rayleigh-Plesset equation and the ...
Minglei Shan   +5 more
doaj   +1 more source

Device for online monitoring of insulation faults in high-voltage switchgears

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Partial discharges are the major cause of deterioration in the insulation characteristics of switchgears. Therefore, timely detection of partial discharge in switchgear and potential insulation faults is an urgent problem that needs to be addressed in ...
Jiajia Song, Jinbo Zhang, Xinnan Fan
doaj   +1 more source

Short-Term Load Forecasting Based on Deep Learning Bidirectional LSTM Neural Network

open access: yesApplied Sciences, 2021
Accurate load forecasting guarantees the stable and economic operation of power systems. With the increasing integration of distributed generations and electrical vehicles, the variability and randomness characteristics of individual loads and the ...
Changchun Cai   +3 more
doaj   +1 more source

No Signaling and Quantum Key Distribution [PDF]

open access: yesPhysical Review Letters, 2005
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles.
Barrett, Jonathan   +2 more
openaire   +3 more sources

Quantum dense key distribution [PDF]

open access: yesPhysical Review A, 2004
This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present ...
DEGIOVANNI, IVO PIETRO   +6 more
openaire   +5 more sources

High-Frequency Current Ripple Sample Anti-Aliasing Strategy of Digitally Controlled Converter Based on Notch Filter

open access: yesIEEE Access, 2023
The digital controller of the grid-connected converter achieves closed-loop control by sampling key voltage and current signals. High-frequency switching of power electronic switches introduces high-frequency ripples into the signals, which may cause ...
Ma Chunyan   +4 more
doaj   +1 more source

On the Computational Security of a Distributed Key Distribution Scheme [PDF]

open access: yesIEEE Transactions on Computers, 2008
The work of the first two authors was partially supported by the Spanish Ministry of Education and Science under Projects TSI2007-65406-C03-02 (“eAEGIS”) and CONSOLIDER CSD2007-00004 (“ARES”). The work of V. Daza was also supported by the Government of Catalonia under Grant 2005-SGR-00446. The work of J.
Daza, Vanesa   +2 more
openaire   +5 more sources

A Key Verification Protocol for Quantum Key Distribution [PDF]

open access: yesIEEE Access, 2019
Sharing a secret key between two physically separated nodes, Alice and Bob, is possible through the use of quantum key distribution (QKD) techniques. In the presence of an eavesdropper, Alice's key may not be identical with Bob's key, due to the characteristics of a quantum channel.
Gunes Karabulut Kurt   +3 more
openaire   +5 more sources

A two-stage optimization method for unmanned aerial vehicle inspection of an oil and gas pipeline network

open access: yesPetroleum Science, 2019
Oil and gas pipeline networks are a key link in the coordinated development of oil and gas both upstream and downstream. To improve the reliability and safety of the oil and gas pipeline network, inspections are implemented to minimize the risk of ...
Yamin Yan   +6 more
doaj   +1 more source

Layered quantum key distribution [PDF]

open access: yesPhysical Review A, 2018
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of users, can be implemented by using a particular multi-partite high-dimensional quantum state.
Mehul Malik   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy