Integrating distributed energy resources (DERs) into a power system requires more advanced control mechanisms. One of the control strategies used for Volt-VAR control (VVC) is to manage voltage and reactive power. Wit...
详细信息
Accurate prediction of drivers' gaze is an important component of vision-based driver monitoring and assistive systems. Of particular interest are safety-critical episodes, such as performing maneuvers or crossing...
详细信息
In this paper, we model and characterize an unconventionally wide GaN HEMT device. Each finger of the device has a width of 150 μ m which allows the modeling methodology to examine the wave propagation effects at hig...
详细信息
The formation of 2D lateral heterostructures in rippled MoS2 and similar transition metal dichalcogenides (TMDs) is studied using density functional theory. Compression of rippled TMDs beyond a threshold compression l...
详细信息
The formation of 2D lateral heterostructures in rippled MoS2 and similar transition metal dichalcogenides (TMDs) is studied using density functional theory. Compression of rippled TMDs beyond a threshold compression leads to the formation of a flat valence band associated with strongly localized holes. The implications for exciton manipulation and the emergence of one-dimensional heavy fermion behavior are discussed.
The amortized step complexity of operations on all previous lock-free implementations of double-ended queues is linear in the number of processes. This paper presents the first concurrent double-ended queue where the ...
详细信息
Misinformation is a growing threat to the economy, social stability, public health, democracy, and national security. One of the most effective methods to combat misinformation is fact checking. Fact checking is the p...
详细信息
A prototype of wearable vital sensing system has been developed with Fiber-Bragg-Gratings senor and 180-nm CMOS image sensor process chip. The system can acquire vital signs by capturing reflecting light with a photod...
详细信息
The fifth generation (5G) of wireless communication networks uses the advantages of Massive Multiple-Input Multiple-Output (MIMO) technologies to improve network coverage, increase data speeds, and enhance reliability...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
暂无评论