Results 21 to 30 of about 2,254,969 (255)
Transient Stability Analysis of an HPR-1000 Power Plant using ETAP Software
Transient stability analysis has become an important subject, as the world’s demand for electricity is increasing with an enormous speed, and power systems are facing different challenges, new power plants are being installed to fulfill the demand and ...
Muhammad Awais +3 more
doaj +1 more source
ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers
Application-Specific Integrated Circuit (ASIC)-resistant Proof-of-Work (PoW) is widely adopted in modern cryptocurrency. The operation of ASIC-resistant PoW on ASIC is designed to be inefficient due to its special features.
Hyunjun Kim +3 more
doaj +1 more source
Design of a 470 MHz band IoT antenna for a handheld terminal
Many handheld terminal devices require a light and compact receiving and transmitting antenna. FPC antennas are popular among designers because of their light weight and thin thickness. In order to obtain an antenna with suitable size, bandwidth and gain,
Sun Nan +6 more
doaj +1 more source
Distance similarity measure based profiling attacks against masked chips
The attack price of higher order side channel attacks (HOSCA) grows exponentially with the mask order. When the mask order is larger than 3, HOSCA can be inapplicable.
Dejian Li +5 more
doaj +1 more source
Market Review and Technical Properties of Electric Vehicles in Germany
Electromobility has grown rapidly, and especially in China, Europe, and the United States. Within Europe, Germany is the largest market. Our goal in this paper is to provide a data-driven overview of the key data, including the number of vehicles sold ...
Christopher Hecht +3 more
doaj +1 more source
In coastal hot and humid regions, the steel pin of AC porcelain insulators often suffers from severe electrochemical corrosion due to surface contamination and moisture, leading to insulator string breakage.
Cong Zhang +6 more
doaj +1 more source
Authenticated ciphers, which combine the cryptographic services of confidentiality, integrity, and authentication into one algorithmic construct, can potentially provide improved security and efficiencies in the processing of sensitive data.
William Diehl +4 more
doaj +1 more source
For many imperiled fishes in the Laurentian Great Lakes basin, detection protocols and population monitoring programs are lacking. In this study, we used a repeat-sampling approach to compare the effectiveness of two seines (bag and beach) to detect and ...
Scott M. Reid, Alan J. Dextrase
doaj +1 more source
In recent years, numerous attacks have appeared that aim to steal secret information from their victim using the power side-channel vector, yet without direct physical access. These attacks are called Remote Power Attacks or Remote Power Analysis, utilizing resources that are natively present inside the victim environment.
Brumley Billy Bob +2 more
openaire +2 more sources

