![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessNovel MAXPOWER biological antibacterial liquid for eradicating oral Helicobacter pylori
Eradication of oral Helicobacter pylori (H. pylori) not only reduces the infection rate from the transmission route but also improves the success rate of intragastric eradication. MAXPOWER Biological Bacteriostat...
-
Article
Open AccessCase report: acute isolated cilioretinal artery occlusion secondary to percutaneous coronary intervention
This case report aims to describe in detail the acute isolated cilioretinal artery occlusion (CLRAO) secondary to complicated therapeutic percutaneous coronary intervention (PCI).
-
Article
Open AccessNrf2 regulates iron-dependent hippocampal synapses and functional connectivity damage in depression
Neuronal iron overload contributes to synaptic damage and neuropsychiatric disorders. However, the molecular mechanisms underlying iron deposition in depression remain largely unexplored. Our study aims to inv...
-
Article
Open AccessA novel random finite element model for holistically modeling of the frost effects on soils and cold region pavements
This paper describes the development of a random finite element model (RFEM) that allows holistic simulation of frozen soil behaviors, including the effects of phase transition and the consequent internal stre...
-
Chapter and Conference Paper
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...
-
Chapter and Conference Paper
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum attack on hash functions—a quantum version of the rebound attack exploiting differentials whose probabilities are too low to be use...
-
Article
Open AccessA day-ahead scheduling framework for thermostatically controlled loads with thermal inertia and thermal comfort model
This paper proposes a day-ahead dispatch framework of thermostatically controlled loads (TCLs) for system peak load reduction. The proposed day-ahead scheduling framework estimates the user’s indoor thermal co...
-
Article
Open AccessEffects of centralized and local PV plant control for voltage regulation in LV feeder based on cyber-physical simulations
In the modern power system, both local and centralized reactive power control strategies for photovoltaic (PV) plants, are proposed and compared. While local control improves the network security, it lacks the...
-
Article
Open AccessBlockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems
Modern power systems are rapidly evolving into complex cyber-physical systems. The increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber infrastructur...
-
Article
Open AccessOptimal operation of electricity, natural gas and heat systems considering integrated demand responses and diversified storage devices
In recent years, the increasing penetration level of renewable generation and combined heat and power (CHP) technology in power systems is leading to significant changes in energy production and consumption pa...
-
Chapter and Conference Paper
A Key-Recovery Attack on 855-round Trivium
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the solution of the secret key...
-
Article
Open AccessRolling horizon optimization for real-time operation of thermostatically controlled load aggregator
Thermostatically controlled loads (TCLs) have great potentials to participate in the demand response programs due to their flexibility in storing thermal energy. The two-way communication infrastructure of sma...
-
Article
Open AccessCoordinated expansion co-planning of integrated gas and power systems
As a significant clean energy source, natural gas plays an important role in modern energy context. The growing utilization of natural gas brings uncertainties into the power system, which requires an integrat...
-
Chapter and Conference Paper
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method
Conditional cube attack is an efficient key-recovery attack on Keccak keyed modes proposed by Huang et al. at EUROCRYPT 2017. By assigning bit conditions, the diffusion of a conditional cube variable is reduced. ...
-
Article
Open AccessOptimal air-conditioning load control in distribution network with intermittent renewables
The coordinated operation of controllable loads, such as air-conditioning load, and distributed generation sources in a smart grid environment has drawn significant attention in recent years. To improve the wi...
-
Article
Open AccessOptimal integration of mobile battery energy storage in distribution system with renewables
An optimal sizing method is proposed in this paper for mobile battery energy storage system (MBESS) in the distribution system with renewables. The optimization is formulated as a bi-objective problem, consid...
-
Article
Open AccessExpansion co-planning for shale gas integration in a combined energy market
Shale gas resources have the potential to significantly contribute to worldwide energy portfolio. A great number shale gas reserves have been identified in many countries. Connections of newly found gas reserv...
-
Article
Open AccessA low-carbon oriented probabilistic approach for transmission expansion planning
Following the deregulation of the power industry, transmission expansion planning (TEP) has become more complicated due to the presence of uncertainties and conflicting objectives in a market environment. Als...
-
Chapter and Conference Paper
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
As one of the generalizations of differential cryptanalysis, the truncated differential cryptanalysis has become a powerful toolkit to evaluate the security of block ciphers. In this article, taking advantage ...
-
Article
Open AccessPrimary energy congestion of power systems
Primary energy has the potential to bring challenges to the reliability, economic, and eco-friendliness of global electric power systems. The concept of electric power security are proposed, including many fac...