<--- Back to Details
First PageDocument Content
Power engineering / Analog circuits / Electric power distribution / Electric motors / Automation / Circuit breaker / Fault / Thyristor / Inverter / Electromagnetism / Electrical engineering / Electric power
Date: 2013-04-16 14:54:59
Power engineering
Analog circuits
Electric power distribution
Electric motors
Automation
Circuit breaker
Fault
Thyristor
Inverter
Electromagnetism
Electrical engineering
Electric power

DC FAULT PROTECTION IN SHIPBOARD POWER SYSTEMS USING Z-SOURCE BREAKERS P. Prempraneerach, G. E. Karniadakis and C. Chryssostomidis MITSG 11-30

Add to Reading List

Source URL: esrdc.mit.edu

Download Document from Source Website

File Size: 870,06 KB

Share Document on Facebook

Similar Documents

Algorithm / Mathematical logic / Theoretical computer science / IP / Model checking / Mathematics / Machine learning

Verification of Fault-Tolerant Protocols with Sally Bruno Dutertre, Dejan Jovanovi´c, and Jorge A. Navas Computer Science Laboratory, SRI International Abstract. Sally is a model checker for infinite-state systems that

DocID: 1xVqL - View Document

Order theory / Binary relations / Partially ordered set

arXiv:1810.05256v1 [cs.DC] 11 OctALEPH: A LEADERLESS, ASYNCHRONOUS, BYZANTINE FAULT TOLERANT CONSENSUS PROTOCOL ´ ADAM GA

DocID: 1xVeW - View Document

Cryptography / Public-key cryptography / Post-quantum cryptography / Hash-based cryptography / Hashing / Merkle signature scheme / Digital signature / Cryptographic hash function / Merkle tree / RSA / Hash function / Quantum digital signature

Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1 EPFL, Lausanne, Switzerland

DocID: 1xV59 - View Document

Computing / Network architecture / Emerging technologies / Configuration management / Software-defined networking / OpenFlow / Information and communications technology / Computer engineering / Scalability / Software-defined

Robust fault-recovery in Software-Defined Networks IBSDN: IGP as a Backup in SDN JuneOlivier Tilmans

DocID: 1xUQl - View Document

Cryptography / Cryptographic hash functions / Post-quantum cryptography / Hashing / Search algorithms / Power analysis / XMSS / Hash function / SHA-2 / DPA / Digital signature / Crypt

Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands

DocID: 1xUM2 - View Document