Search alternatives:
"skde" » "sde" (Expand Search), "skd" (Expand Search), "tkde" (Expand Search)
"side" » "size" (Expand Search), "wide" (Expand Search), "site" (Expand Search)
"skde" » "sde" (Expand Search), "skd" (Expand Search), "tkde" (Expand Search)
"side" » "size" (Expand Search), "wide" (Expand Search), "site" (Expand Search)
-
1
The bright side and dark side of hybrid organic–inorganic perovskites
Published 2020Get full text
Journal Article -
2
Hydrodynamic forces on a side-by-side ellipse pair with and without relative motion
Published 2024“…When both ellipses move at the same velocity, overall drag reductions of 10 %–20 % can be achieved in staggered formations, with the strongest drag reductions occurring at the smallest lateral distances. In side-by-side configurations, the drag on both bodies increases by 10 %–20 %. …”
Get full text
Article -
3
-
4
-
5
Explicit Two-Sided Unique-Neighbor Expanders
Published 2024“…Our main result is the first two-sided construction of imbalanced unique-neighbor expanders, meaning bipartite graphs where small sets contained in both the left and right bipartitions exhibit unique-neighbor expansion, along with algebraic properties relevant to constructing quantum codes. …”
Get full text
Article -
6
The other side of a revolution : stories untold.
Published 2008Get full text
Final Year Project (FYP) -
7
Side-channel analysis based on joint moments
Published 2024Subjects: Get full text
Thesis-Master by Coursework -
8
Fear and attraction : two sides of the same coin?
Published 2010Get full text
Final Year Project (FYP) -
9
-
10
Analysis of improved side-channel attack on AES-128 with masking
Published 2020“…Today, many embedded processors like smart cards are used to store to secret keys, and these are vulnerable to cyber-physical attacks like Side Channel Attack (SCA). Adversaries can exploit the power dissipation, electromagnetic emanation or timing information during the encryption process and obtain the secret key. …”
Get full text
Final Year Project (FYP) -
11
Humanity's dark side: coping with a failing world order
Published 2022“…It is necessary to engage complexity and conflict differently by paying attention to what the circumstances and contexts illuminate about humanity’s dark side.…”
Get full text
Commentary -
12
Cache refinement type for side-channel detection of cryptographic software
Published 2023Subjects: Get full text
Conference Paper -
13
Study of circulation of traffic agents at the road-side bus-stops
Published 2024Get full text
Final Year Project (FYP) -
14
Competition in two-sided market : with heterogeneous users and negative externalities.
Published 2013“…We first structured the general two-sided market model which contains only the end-users and advertisers. …”
Get full text
Final Year Project (FYP) -
15
Side channel attack on mobile devices using machine learning
Published 2019“…This report mainly highlights on what the author has done to explore the current avenues of side channel attacks on mobile devices through the use of a smartwatch. …”
Get full text
Final Year Project (FYP) -
16
State and faith: the supply-side theory of religion and the case of Turkey
Published 2024“…The findings also have political implications that are undertheorized in the supply-side literature.…”
Article -
17
-
18
A first study of compressive sensing for side-channel leakage sampling
Published 2020“…An important prerequisite for Side-Channel Attacks (SCA) is leakage sampling where the side-channel measurements (i.e. power traces) of the cryptographic device are collected for further analysis. …”
Get full text
Journal Article -
19
A formal methodology for verifying side-channel vulnerabilities in cache architectures
Published 2023Subjects: Get full text
Conference Paper -
20
Enhancement of air-side heat transfer performance of additively manufactured condensers
Published 2024“…This report outlines the investigation of Triply Periodic Minimal Surface (TPMS) designs for enhanced air-side performance novel air-cooled heat condensers. …”
Get full text
Final Year Project (FYP)