Results 11 to 20 of about 2,622,455 (327)
Study on the Technology of Leakage Protection [PDF]
Failure leakage of equipment or electric shock may make the residual current amplitude decrease, which causes effective protection of the fault and the existence of dead zone of operation. This paper presents the principle of residual current leakage protection based on vector, using residual current amplitude and residual current variation of fault ...
Shen Zixing +3 more
openaire +2 more sources
Label Leakage and Protection from Forward Embedding in Vertical Federated Learning [PDF]
Vertical federated learning (vFL) has gained much attention and been deployed to solve machine learning problems with data privacy concerns in recent years. However, some recent work demonstrated that vFL is vulnerable to privacy leakage even though only
Jiankai Sun +3 more
semanticscholar +1 more source
Interplay of Leakage Radiation and Protection in Topological Photonic Crystal Cavities [PDF]
The introduction of topological concepts to the design of photonic crystal cavities holds great promise for applications in integrated photonics due to the prospect of topological protection.
R. Barczyk +5 more
semanticscholar +1 more source
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential information.
Isabel Herrera Montano +5 more
semanticscholar +1 more source
Design and Research on DC Electric Leakage Protection Circuit Breaker
In recent years, DC power supply and distribution technology plays an increasingly significant role in power supply and distribution systems with a low loss and large power supply radius.
Lei Hou +4 more
semanticscholar +1 more source
Numerical Investigation on the Liquid Hydrogen Leakage and Protection Strategy
One of China’s ambitious hydrogen strategies over the past few years has been to promote fuel cells. A number of hydrogen refueling stations (HRSs) are currently being built in China to refuel hydrogen-powered automobiles.
Y. Rong +7 more
semanticscholar +1 more source
Leakage Power Analysis in Different S-Box Masking Protection Schemes
Internet-of- Things (IoT) devices are natural targets for side-channel attacks. Still, side-channel leakage can be com-plex: its modeling can be assisted by statistical tools.
Javad Bahrami +4 more
semanticscholar +1 more source
This research establishes a security evaluation model from the insider leakage perspective and suggests an objective evaluation measurement. Organizational security risks are fused and compounded both inside and outside the organization.
Jawon Kim, Chanwoo Lee, Hangbae Chang
semanticscholar +1 more source
A new leakage protection method for mine power network
A new leakage protection method was proposed which was based on least-square matrix algorithm. In the method, zero sequence current signal of each brance is extracted on the basis of additional DC source system, and DC component of the zero sequence ...
ZHAO Jianwen +6 more
doaj +1 more source
Design of a mine-used low-voltage leakage protection device
In view of low reliability of leakage protection device of coal mine low-voltage power grid based on line selection principle of zero-sequence power direction, a hardware and software design scheme of mine-used low-voltage leakage protection device was ...
ZHENG Qingle +3 more
doaj +1 more source

