Results 21 to 30 of about 275,215 (238)
Extinction measurements with low-power hsrl systems—error limits
HSRL measurements of extinction are more difficult than backscatter measurements. This is particularly true for low-power, eye-safe systems. This paper looks at error sources that currently provide an error limit of ~10-5 m-1 for boundary layer ...
Eloranta Ed
doaj +1 more source
Method for Localization Aerial Target in AC Electric Field Based on Sensor Circular Array
The traditional method of using electric field sensors to realize early warning of electric power safety distance cannot measure the distance of dangerous sources. Therefore, aiming at the electric field with a frequency of 50 to 60 Hz (AC electric field)
Wenbin Zhang +7 more
doaj +1 more source
Experimental evaluation of two software countermeasures against fault attacks [PDF]
Injection of transient faults can be used as a way to attack embedded systems. On embedded processors such as microcontrollers, several studies showed that such a transient fault injection with glitches or electromagnetic pulses could corrupt either the ...
Dehbaoui, Amine +4 more
core +5 more sources
Analysis of luminosity distributions of strong lensing galaxies: subtraction of diffuse lensed signal [PDF]
Strong gravitational lensing gives access to the total mass distribution of galaxies. It can unveil a great deal of information about the lenses dark matter content when combined with the study of the lenses light profile.
Biernaux, Judith +2 more
core +1 more source
A two-layer model predictive control (MPC) algorithm with curvature adaptive is introduced and adopted in path tracking, especially for high-speed autonomous driving.
Hebing Liu +2 more
doaj +1 more source
Efficient and Secure ECDSA Algorithm and its Applications: A Survey [PDF]
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC)and elliptic curve digital signature algorithm (ECDSA) have been attracting attention frommany researchers in different institutions because these algorithms provide security
Al-Zubaidie, Mishall +2 more
core +2 more sources
Among the monitored telemetry raw data record (RDR) parameters with the STAR Integrated/Validation System (ICVS), the Advanced Technology Microwave Sounder (ATMS) scan motor mechanism temperature is especially important because the instrument might be ...
Warren Dean Porter +2 more
doaj +1 more source
A review on structured scheme representation on data security application [PDF]
With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel.
Din, Roshidi +3 more
core +3 more sources
Physical functions : the common factor of side-channel and fault attacks ? [PDF]
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Le Bouder, Hélène, Robisson, Bruno
core +5 more sources
Estimating Autonomous Vehicle Localization Error Using 2D Geographic Information
Accurately and precisely knowing the location of the vehicle is a critical requirement for safe and successful autonomous driving. Recent studies suggest that error for map-based localization methods are tightly coupled with the surrounding environment ...
Kelvin Wong +3 more
doaj +1 more source

