Results 41 to 50 of about 33,029 (226)

Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation

open access: yes, 2010
Smart grid, equipped with modern communication infrastructures, is subject to possible cyber attacks. Particularly, false report attacks which replace the sensor reports with fraud ones may cause the instability of the whole power grid or even result in ...
Djouadi, Seddik M.   +2 more
core   +1 more source

Universal Neuromorphic Element: NbOx Memristor with Co‐Existing Volatile, Non‐Volatile, and Threshold Switching

open access: yesAdvanced Functional Materials, EarlyView.
A W/NbOx/Pt memristor demonstrates the coexistence of volatile, non‐volatile, and threshold switching characteristics. Volatile switching serves as a reservoir computing layer, providing dynamic short‐term processing. Non‐volatile switching, stabilized through ISPVA, improves reliable long‐term readout. Threshold switching operates as a leaky integrate
Ungbin Byun, Hyesung Na, Sungjun Kim
wiley   +1 more source

Defense Method for Smart Grid GPS Spoofing Attack Based on BiLSTM and Self-attention Mechanism Generative Adversarial Network

open access: yesZhongguo dianli
Phasor measurement unit (PMU) plays a crucial role in smart grids, enabling precise synchronized acquisition of electric power data. Due to the use of the global positioning system (GPS) for time synchronization, the PMU is vulnerable to GPS spoofing ...
Hui WU   +5 more
doaj   +1 more source

Intermediate Resistive State in Wafer‐Scale Vertical MoS2 Memristors Through Lateral Silver Filament Growth for Artificial Synapse Applications

open access: yesAdvanced Functional Materials, EarlyView.
In MOCVD MoS2 memristors, a current compliance‐regulated Ag filament mechanism is revealed. The filament ruptures spontaneously during volatile switching, while subsequent growth proceeds vertically through the MoS2 layers and then laterally along the van der Waals gaps during nonvolatile switching.
Yuan Fa   +19 more
wiley   +1 more source

The study of synchronization accuracy of ENMU devices according to the PTPv2 protocol in laboratory conditions

open access: yesВестник Северо-Кавказского федерального университета
Introduction. One of the directions of digital transformation of the electric power industry is the introduction of intelligent electronic devices (IED) with the function of synchronized measurements.
Yu. G. Kononov   +4 more
doaj   +1 more source

UPS: Unified PMU-Data Storage System to Enhance T+D PMU Data Usability

open access: yesIEEE Transactions on Smart Grid, 2020
The emerging distribution-level phasor measurement unit (D-PMU) is expected to play an important role in enhancing distribution system observability and situational-awareness. It is a demanding yet challenging task to develop advanced D-PMU data management and analytics tools to improve D-PMU data usability and further promote D-PMU projects deployment.
Ian Kosen   +7 more
openaire   +1 more source

Field‐Free, Deterministic Giant Spin‐Orbit Torque Switching of 1.3 T Perpendicular Magnetization With Symmetry‐Lifted Topological Surface States

open access: yesAdvanced Materials, EarlyView.
We show a giant, bias‐field free, deterministic, spin‐orbit‐torque switching of perpendicular hard magnets with HC over 1.3 T. By combining the three‐fold 3m symmetry from topological insulator surface states with the rectangular mm2 symmetry from the 2 x 1 intercalation in Cr3Te4, the interface symmetry is significantly reduced into a unidirectional m
He Ren   +6 more
wiley   +1 more source

Why Permanent Makeup (PMU) Is Not a Lifetime Application

open access: yesCosmetics
Permanent makeup (PMU) is a popular form of tattooing applied to the eyebrows, eyelids, and lips for corrective and aesthetic purposes. It also has medical applications, such as reconstructing the breast areola, mimicking hair follicles on the head, and ...
Eleni Andreou   +3 more
doaj   +1 more source

Cross-World Covert Channel on ARM Trustzone through PMU

open access: yesSensors, 2022
The TrustZone technology is incorporated in a majority of recent ARM Cortex A and Cortex M processors widely deployed in the IoT world. Security critical code execution inside a so-called secure world is isolated from the rest of the application ...
Xinyao Li, Akhilesh Tyagi
doaj   +1 more source

Application of Advanced Early Warning Systems with Adaptive Protection [PDF]

open access: yes, 2015
This project developed and field-tested two methods of Adaptive Protection systems utilizing synchrophasor data. One method detects conditions of system stress that can lead to unintended relay operation, and initiates a supervisory signal to modify ...
Ashrafi, Frank   +7 more
core  

Home - About - Disclaimer - Privacy