Results 21 to 30 of about 4,621,200 (286)
A novel compressed air energy storage (CAES) system has been developed, which is innovatively integrated with a coal-fired power plant based on its feedwater heating system.
Peiyuan Pan +5 more
doaj +1 more source
In order to solve the problems of soaring costs and supply fluctuation in permanent magnet materials, this paper investigates and develops a magnetless wound field synchronous motor (WFSM) drive system for electric vehicle (EV) application.
Yanhui Li +3 more
doaj +1 more source
Multi-dimensional key generation of ICMetrics for cloud computing [PDF]
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa +3 more
core +2 more sources
Generating Sequences and Key Polynomials
The main goal of this paper is to study the different definitions of generating sequences appearing in the literature. We present these definitions and show that under certain situations they are equivalent. We also present an example that shows that they are not, in general, equivalent.
Barnabé, M. S., Novacoski, J.
openaire +3 more sources
With the rapid growth of grid-connected wind power penetration level, it is necessary to study the impacts of wind power on power system stability. The small-signal stability of power systems with large-scale wind power is explored using the eigenvalue ...
Nan Ding +3 more
doaj +1 more source
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng +3 more
core +1 more source
Research on low frequency ripple suppression technology of inverter based on model prediction [PDF]
The low frequency ripple of the input side current of the single-phase inverter will reduce the efficiency of the power generation system and affect the overall performance of the system. Aiming at this problem, this paper proposes a two-modal modulation
Haiyang Liu +4 more
doaj +1 more source
Security proof of differential phase shift quantum key distribution in the noiseless case [PDF]
Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation. However, its unconditional security proof is still missing, even though it has been proposed for many years.
Fung, Chi-Hang Fred +3 more
core +2 more sources
A Complete Key Management Scheme for LoRaWAN v1.1
Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications.
Xingda Chen, Margaret Lech, Liuping Wang
doaj +1 more source
Physical layer security techniques for data transmission for future wireless networks
The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference.
Shi Weiping +9 more
doaj +1 more source

