نتایج جستجو برای: side stream reactor

تعداد نتایج: 295110  

2016
Moritz Horsch Mario Schlipf Stefan Haas Johannes Braun Johannes A. Buchmann

Password-based authentication is the most widely used authentication scheme for granting access to user accounts on the Internet. Despite this, there exists no standard implementation of passwords by services. They have different password requirements as well as interfaces and procedures for login, password change, and password reset. This situation is very challenging for users and often leads...

2008
Mariano Asteasuain Adriana Brandolin

High-pressure polymerization of ethylene in tubular reactors is a widely employed industrial process. It allows obtaining branched low density polyethylene (LDPE) with characteristics that have not been reproduced by the more modern low or medium pressure polymerizations. The process is carried out under rigorous conditions. For instance, the reactor is operated at very high pressure, between 1...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

a one dimensional dynamic model for a riser reactor in a fluidized bed catalytic cracking unit (fccu) for gasoil feed has been developed in two distinct conditions, one for industrial fccu and another for fccu using various frequencies of microwave energy spaced at the height of the riser reactor (fccu-mw). in addition, in order to increase the accuracy of component and bulk diffusion, instanta...

2008
Mukesh Agrawal Sandip Karmakar Dhiman Saha Debdeep Mukhopadhyay

Scan chain based attacks are a kind of side channel attack, which targets one of the most important feature of todays hardware the test circuitry. Design for Testability (DFT) is a design technique that adds certain testability features to a hardware design. On the other hand, this very feature opens up a side channel for cryptanalysis, rendering crypto-devices vulnerable to scan-based attack. ...

2008
J. Jordanova

The work presents the results of the detailed analyses performed on the shielding capability of HCLL DEMO-type fusion reactor. The analysis is based on three-dimensional calculations with the Monte Carlo code MCNP-4C and consists in assessment of radiation loads to the super-conducting TF-coil at the inboard side of the reactor. A suitable 20-sector model of DEMO reactor, based on the reactor p...

Journal: :Nuclear Engineering and Technology 2022

STREAM - a lattice transport calculation code with method of characteristics for the purpose light water reactor analysis has been developed by Computational Reactor Physics and Experiment laboratory (CORE) Ulsan National Institute Science Technology (UNIST). Recently, efforts have taken to develop photon module in assess heating influence gamma on power distributions, as only neutron was consi...

2008
Pascal Delaunay Antoine Joux

We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length nonlinear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to ...

Journal: :Journal of visualized experiments : JoVE 2012
Joseph G Usack Catherine M Spirito Largus T Angenent

Anaerobic digestion (AD) is a bioprocess that is commonly used to convert complex organic wastes into a useful biogas with methane as the energy carrier. Increasingly, AD is being used in industrial, agricultural, and municipal waste(water) treatment applications. The use of AD technology allows plant operators to reduce waste disposal costs and offset energy utility expenses. In addition to tr...

2011
Olivier Pereira

Side-channel attacks are one of the most dangerous threats against secure devices. By exploiting physical properties of the circuits running cryptographic protocols, that is, by analyzing the power consumption, running time, or electomagnetic radiations of circuits computing on secret data, sidechannel attacks circumvent traditional security proofs and show to be extremely effective in breaking...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید