نتایج جستجو برای: elliptic grid generator
تعداد نتایج: 156325 فیلتر نتایج به سال:
Wind is one of the most abundant renewable sources of energy in nature. Wind energy can be harnessed by a wind energy conversion system (WECS) composed of a wind turbine, an electric generator, a power electronic converter and the corresponding control system. The most advanced generator type is perhaps the permanent magnet synchronous generator (PMSG). As far as microgrid is concerned the load...
The aim of this paper is to propose different methods of control for a Doubly-Fed Induction Generator (DFIG) used in wind energy conversion systems. This paper presents a comparative study on the performance of three control methods for DFIG wind turbine. The study focuses on the regulation of the active and reactive power exchanged between the generator and the grid by the generator inverter u...
The Photovoltaic (PV) plants are significantly different from the conventional synchronous generators in terms of physical and electrical characteristics, as it connects to the power grid through the voltage-source converters. High penetration PV in power system will bring several critical challenges to the safe operation of power grid including transient stability. To address this problem, the...
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography which is based on the arithmetic on elliptic curves and security of the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Elliptic curve cryptographic schemes are public-key mechanisms that provide encryption, digital signature and key exchange capabilities. Elliptic curve algorithms are also applie...
Let E/Q be an elliptic curve of rank 1. We describe an algorithm which uses the value of L′(E, 1) and the theory of canonical heghts to efficiently search for points in E(Q) and E(ZS). For rank 1 elliptic curves E/Q of moderately large conductor (say on the order of 107 to 1010) and with a generator having moderately large canonical height (say between 13 and 50), our algorithm is the first pra...
In [1], four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept a...
It has been roughly two decades since the random oracle model for security reductions was introduced and one decade since we first discussed the controversy that had arisen concerning its use. In this retrospective we argue that there is no evidence that the need for the random oracle assumption in a proof indicates the presence of a realworld security weakness in the corresponding protocol. We...
In this paper, we introduce a new approach to the generation of binary sequences by applying trace functions to elliptic curves over GF (2). We call these sequences elliptic curve pseudorandom sequences (EC-sequence). We determine their periods, distribution of zeros and ones, and linear spans for a class of EC-sequences generated from supersingular curves. We exhibit a class of EC-sequences wh...
Pollicott–Ruelle resonances for chaotic flows are the characteristic frequencies of correlations. They are typically defined as eigenvalues of the generator of the flow acting on specially designed functional spaces. We show that these resonances can be computed as viscosity limits of eigenvalues of second order elliptic operators. These eigenvalues are the characteristic frequencies of correla...
We show that, for all odd natural numbers N , the N-torsion points on an elliptic curve may be placed in an N × N grid such that the sum of each column and each row is the point at infinity.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید