Results 31 to 40 of about 9,414,122 (340)

Distance similarity measure based profiling attacks against masked chips

open access: yesElectronics Letters, 2022
The attack price of higher order side channel attacks (HOSCA) grows exponentially with the mask order. When the mask order is larger than 3, HOSCA can be inapplicable.
Dejian Li   +5 more
doaj   +1 more source

Formation of fractal structure in many-body systems with attractive power-law potentials [PDF]

open access: yes, 2005
We study the formation of fractal structure in one-dimensional many-body systems with attractive power-law potentials. Numerical analysis shows that the range of the index of the power for which fractal structure emerges is limited.
A. Fersht   +8 more
core   +1 more source

Market Review and Technical Properties of Electric Vehicles in Germany

open access: yesVehicles, 2022
Electromobility has grown rapidly, and especially in China, Europe, and the United States. Within Europe, Germany is the largest market. Our goal in this paper is to provide a data-driven overview of the key data, including the number of vehicles sold ...
Christopher Hecht   +3 more
doaj   +1 more source

A Bibliometric Analysis on Power Analysis Studies

open access: yesEğitimde ve Psikolojide Ölçme ve Değerlendirme Dergisi, 2023
The primary purpose of this study was to establish a theoretical framework for studies on power analysis conducted in the fields of education, psychology, and statistics for researchers. Therefore, the bibliometric characteristics of publications related to power analysis in the Web of Science database were analyzed using the Biblioshiny interface in ...
openaire   +3 more sources

Leakage Current Equalization via Thick Semiconducting Coatings Suppresses Pin Corrosion in Disc Insulators

open access: yesEnergies
In coastal hot and humid regions, the steel pin of AC porcelain insulators often suffers from severe electrochemical corrosion due to surface contamination and moisture, leading to insulator string breakage.
Cong Zhang   +6 more
doaj   +1 more source

Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers

open access: yesCryptography, 2018
Authenticated ciphers, which combine the cryptographic services of confidentiality, integrity, and authentication into one algorithmic construct, can potentially provide improved security and efficiencies in the processing of sensitive data.
William Diehl   +4 more
doaj   +1 more source

Light Sterile Neutrinos and Inflationary Freedom [PDF]

open access: yes, 2015
We perform a cosmological analysis in which we allow the primordial power spectrum of scalar perturbations to assume a shape that is different from the usual power-law predicted by the simplest models of cosmological inflation.
Gariazzo, S., Giunti, C., Laveder, M.
core   +2 more sources

Monitoring lake populations of Eastern Sand Darter (Ammocrypta pellucida): a comparison of two seines

open access: yesJournal of Freshwater Ecology, 2017
For many imperiled fishes in the Laurentian Great Lakes basin, detection protocols and population monitoring programs are lacking. In this study, we used a repeat-sampling approach to compare the effectiveness of two seines (bag and beach) to detect and ...
Scott M. Reid, Alan J. Dextrase
doaj   +1 more source

Adherence to Protocol Recommendations for Children With Wilms Tumour in Two Consecutive Studies in the United Kingdom and Ireland—Does Variation Matter?

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background and Aims Wilms tumour (WT) has excellent event‐free and overall survival (OS). However, small differences exist between countries participating in the same international study. This led us to examine variation in adherence to protocol recommendations as a potential contributing factor.
Suzanne Tugnait   +23 more
wiley   +1 more source

Home - About - Disclaimer - Privacy