نتایج جستجو برای: timing device

تعداد نتایج: 758352  

M. V. S. Murali Krishna P. V. K. Murthy R. P. Chowdary T. Kishen Kumar Reddy

Investigations were carried out to evaluate the performance of direct injection diesel engine with medium grade low heat rejection (LHR) combustion chamber and 3 mm air gap insulated piston, 3 mm air gap insulated liner, and ceramic coated cylinder head [ceramic coating with the thickness of 500 µ was made on the inside portion of the cylinder head].The engine had different operating conditions...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2023

A side channel attack is a means of security attacks that tries to restore secret information by analyzing side-information such as electromagnetic wave, heat, electric energy and running time are unintentionally emitted from computer system. The focuses on the cryptosystem specifically named “timing attack”. Timing relatively easy carry out, particularly threatening for tiny systems used in sm...

Journal: :Nuclear Instruments and Methods in Physics Research 2021

The multi-pad PICOSEC-Micromegas is an improved detector prototype with a segmented anode, consisting of 19 hexagonal pads. Detailed studies are performed data collected in muon beam over four representative We demonstrate that such device, scalable to larger area, provides excellent time resolution and detection efficiency. As expected from earlier single-cell device studies, we measure approx...

سیدشریفی, رئوف, نعمتی , علیرضا ,

In order to study the effects of nitrogen application rate and timing on grain yield, phyllochron and leaf appearance rate of corn (Zea mays L.), an experiment was conducted as split plot based on randomized complete block design with three replications at the Research Farm of University of Mohaghegh Ardabili, Ardabil, Iran during 2009 growing season. Nitrogen rates were arranged in main plot w...

2008
Antonio Ferreira Pedro Antunes

We propose an attentive device for synchronous groupware systems to mitigate information overload. The opportunity seeker device leverages the users’ natural alternation between doing individual work and attending to the group to dynamically manage the delivery timing and quantity of group awareness information that each user is exposed to. We describe how this device can be implemented in an e...

2009
P. Erhard D. Leibfritz

Introduction: Galvanic skin conductance (GSC) measurement has been used since the late 1880 [1] some times for “lie detectors”, but later in psychological research for reliable monitoring of arousal and changes in arousal due to applied stimuli [2]. The galvanic skin resistance (GSR) method relies on the fact, that arousal causes excretion by the perspiratory glands, which in turn increases the...

2006
Carole Delporte-Gallet Hugues Fauconnier Felix C. Freiling

It has recently been shown that fair exchange, a security problem in distributed systems, can be reduced to a fault tolerance problem, namely a special form of distributed consensus. The reduction uses the concept of security modules which reduce the type and nature of adversarial behavior to two standard fault-assumptions: message omission and process crash. In this paper, we investigate the f...

Journal: :Neural networks : the official journal of the International Neural Network Society 2008
Jeffrey L. McKinstry Anil K. Seth Gerald M. Edelman Jeffrey L. Krichmar

In order to respond appropriately to environmental stimuli, organisms must integrate over time spatiotemporal signals that reflect object motion and self-movement. One possible mechanism to achieve this spatiotemporal transformation is to delay or lag neural responses. This paper reviews our recent modeling work testing the sufficiency of delayed responses in the nervous system in two different...

2000
K. Dioury A. Lester A. Debreil

This paper describes the method used in the design of a 26 million transistors chip at BULL to verify the timing performance using the hierarchical timing analysis tool HiTas as well as the interactive path browser Xtas. Those tools have been designed at UPMC and are now commercialized by AVERTEC. The complexity is handled by partitioning the analysis according to the hierarchical partitioning ...

1994
Ira S. Moskowitz Allen R. Miller

We discuss the di erent ways of de ning channel capacity for certain types of illicit communication channels. We also correct some errors from the literature, o er new proofs of some historical results, and give bounds for channel capacity. Special function techniques are employed to express the results in closed form. We conclude with examples.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید