Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Asim Mukhtar"'
Publikováno v:
Alexandria Engineering Journal, Vol 57, Iss 1, Pp 147-157 (2018)
The aim of this work was to work out the mechanical stresses within transformer resulting from the extreme short-circuit currents. The forces and stresses set up in transformer windings as the result of exterior or interior short-circuits or of switc
Externí odkaz:
https://doaj.org/article/4b649c09b5594328a1e61bced71e6adb
Autor:
Ahmed, Asim Mukhtar1 mukhtarsson@gmail.com
Publikováno v:
International Journal of Social Science Archives (IJSSA). Dec2021, Vol. 4 Issue 2, p1-11. 11p.
Autor:
Teena Brown Pulu, Asim Mukhtar
Publikováno v:
Te Kaharoa. 15
Our paper reflects on creating a short documentary in 2021 centred around an online discussion, which the second author recorded with three Punjabi migrants. At the time of being interviewed, these migrants had New Zealand temporary work and study vi
Autor:
Asim Mukhtar Janjua, Teena Brown Pulu
Publikováno v:
Te Kaharoa. 15
The second author interviewed three Punjabi Sikhs in South Auckland on camera in the Punjabi language, and two Punjabi Muslims in Lahore via an online video call where one participant responded in Punjabi and the other in the Urdu language. Their dis
Publikováno v:
Alexandria Engineering Journal, Vol 57, Iss 1, Pp 147-157 (2018)
The aim of this work was to work out the mechanical stresses within transformer resulting from the extreme short-circuit currents. The forces and stresses set up in transformer windings as the result of exterior or interior short-circuits or of switc
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783030582005
SEC
IFIP Advances in Information and Communication Technology
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.32-45, ⟨10.1007/978-3-030-58201-2_3⟩
SEC
IFIP Advances in Information and Communication Technology
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.32-45, ⟨10.1007/978-3-030-58201-2_3⟩
Part 1: Channel Attacks; International audience; Protecting critical information against eviction-based cache side-channel attacks has always been challenging. In these attacks, attacker reveals secrets by observing cache lines evicted by the co-runn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aadb8252c90d333d1a607340e84ced96
https://doi.org/10.1007/978-3-030-58201-2_3
https://doi.org/10.1007/978-3-030-58201-2_3
Publikováno v:
Information Systems
Information Systems, Elsevier, In press, ⟨10.1016/j.is.2020.101524⟩
Information Systems, Elsevier, In press, ⟨10.1016/j.is.2020.101524⟩
International audience; Timing-based side-channels play an important role in exposing the state of a process execution on underlying hardware by revealing information about timing and access patterns. Side-channel attacks (SCAs) are powerful cryptana
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bb2ce1277d6f671ba1729f468c2a7f7b
https://hal.archives-ouvertes.fr/hal-02537540
https://hal.archives-ouvertes.fr/hal-02537540
Publikováno v:
C-CODE 2019-2nd International Conference on Communication, Computing and Digital systems
C-CODE 2019-2nd International Conference on Communication, Computing and Digital systems, Mar 2019, Islamabad, Pakistan. pp.299-304, ⟨10.1109/C-CODE.2019.8680982⟩
C-CODE 2019-2nd International Conference on Communication, Computing and Digital systems, Mar 2019, Islamabad, Pakistan. pp.299-304, ⟨10.1109/C-CODE.2019.8680982⟩
International audience; A variety of applications are executing on a large untrusted computing base, which includes the operating system, hypervisor, firmware, and hardware. This large computing base is becoming complex and unverifiable. This untrust
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f1e125da36ef08ac1aaf5bb80765ff85
https://hal.archives-ouvertes.fr/hal-02451440
https://hal.archives-ouvertes.fr/hal-02451440
Publikováno v:
Journal of Systems Architecture
Journal of Systems Architecture, Elsevier, 2020, 104, pp.101698. ⟨10.1016/j.sysarc.2019.101698⟩
Journal of Systems Architecture, Elsevier, 2020, 104, pp.101698. ⟨10.1016/j.sysarc.2019.101698⟩
International audience; Cache-based side-channel attacks (SCAs) are becoming a security threat to the emerging computing platforms. To mitigate these attacks, numerous countermeasures have been proposed. However, these countermeasures require either
Publikováno v:
International Journal of Computer and Electrical Engineering. :762-770
I n this paper, an experimental study is carried out to investigate the performance of various voltage control signal techniques for single phase PWM inverter. These techniques include single pulse width modulation, multiple pulse width modulation, s