Results 21 to 30 of about 9,241,972 (330)

A Practical Primer To Power Analysis for Simple Experimental Designs

open access: yesInternational Review of Social Psychology, 2018
Power analysis is an important tool to use when planning studies. This contribution aims to remind readers what power analysis is, emphasize why it matters, and articulate when and how it should be used. The focus is on applications of power analysis for
Marco Perugini   +2 more
doaj   +1 more source

Transient Stability Analysis of an HPR-1000 Power Plant using ETAP Software

open access: yesPakistan Journal of Engineering & Technology, 2022
Transient stability analysis has become an important subject, as the world’s demand for electricity is increasing with an enormous speed, and power systems are facing different challenges, new power plants are being installed to fulfill the demand and ...
Muhammad Awais   +3 more
doaj   +1 more source

Site-specific assessments of the abundance of three inshore dolphin species to inform conservation and management

open access: yesFrontiers in Marine Science, 2016
Assessing the abundance of wildlife populations is essential to their effective conservation and management. Concerns have been raised over the vulnerability of tropical inshore dolphins in waters off northern Australia to anthropogenic impacts on local ...
Alexander Mark Brown   +7 more
doaj   +1 more source

Wanted Dead or Alive? The tradeoff between in-vivo versus ex-vivo MR brain imaging in the mouse.

open access: yesFrontiers in Neuroinformatics, 2012
High resolution MRI of the mouse brain is gaining prominence in estimating changes in neuroanatomy over time to understand both normal developmental as well as disease processes and mechanisms.
Jason P Lerch   +9 more
doaj   +1 more source

Design of a 470 MHz band IoT antenna for a handheld terminal

open access: yesDianzi Jishu Yingyong, 2021
Many handheld terminal devices require a light and compact receiving and transmitting antenna. FPC antennas are popular among designers because of their light weight and thin thickness. In order to obtain an antenna with suitable size, bandwidth and gain,
Sun Nan   +6 more
doaj   +1 more source

Optimal Monitoring Strategy to Detect Rule-breaking: A Power and Simulation Approach Parameterised with Field Data from Gola Rainforest National Park, Sierra Leone

open access: yesConservation & Society, 2017
Protected area designation aims to protect forests from illegal activities such as hunting. However, the effectiveness of protection and how this changes over time in response to protection measures is difficult to assess, including the design of ...
Sorrel Jones   +4 more
doaj   +1 more source

ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers

open access: yesMathematics, 2020
Application-Specific Integrated Circuit (ASIC)-resistant Proof-of-Work (PoW) is widely adopted in modern cryptocurrency. The operation of ASIC-resistant PoW on ASIC is designed to be inefficient due to its special features.
Hyunjun Kim   +3 more
doaj   +1 more source

Distance similarity measure based profiling attacks against masked chips

open access: yesElectronics Letters, 2022
The attack price of higher order side channel attacks (HOSCA) grows exponentially with the mask order. When the mask order is larger than 3, HOSCA can be inapplicable.
Dejian Li   +5 more
doaj   +1 more source

Market Review and Technical Properties of Electric Vehicles in Germany

open access: yesVehicles, 2022
Electromobility has grown rapidly, and especially in China, Europe, and the United States. Within Europe, Germany is the largest market. Our goal in this paper is to provide a data-driven overview of the key data, including the number of vehicles sold ...
Christopher Hecht   +3 more
doaj   +1 more source

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling

open access: yesIEEE Access, 2023
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy