Essays about: "Correlation power analysis"
Showing result 1 - 5 of 157 essays containing the words Correlation power analysis.
-
1. (Swift) sanctions and the rise of parallel payment systems: A qualitative study of financial infrastructure and power dynamics in times of FinTech
University essay from Göteborgs universitet/Institutionen för globala studierAbstract : In 2022, the West imposed sanctions of unprecedented scale on Russia following the war in Ukraine, including severing Moscow from the main global financial message provider, Swift, with the objective to harm the ability of Russian banks to operate globally. As the global financial system is centralised, being severed from Swift significantly complicates the process of conducting cross border payments. READ MORE
-
2. Hosting Capacity Methods Considering Complementarity between Solar and Wind Power : A Case Study on a Swedish Regional Grid
University essay from Linköpings universitet/EnergisystemAbstract : The demand for electrical power is growing due to factors such as population growth, urbanisation, and the transition from fossil fuels to renewable energy sources. To be able to keep up with the changes in electricity demand, the Swedish power grid must connect more renewable power generation, but also increase its transmission capacity. READ MORE
-
3. Exergame Analysis : Creating an exergame and evaluating game components and motion movement correlation
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As technology progresses, people start engaging in sedentary behaviour more and could raise the risk of getting health deficits such as cardiovascular diseases, cancer, and type-2 diabetes. Recent studies on how to prevent sedentary behaviour is to incorporate physical activity through exergaming. READ MORE
-
4. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
5. Proverbial Language Of American Presidents (1945-2008) : A Digital Methods Approach of the Use of Proverbs in Political Discourse
University essay from Linnéuniversitetet/Institutionen för kulturvetenskaper (KV)Abstract : Political language's power to influence public opinion drives the present investigation into proverbs used by presidents during 1945-2008. The study’s purpose is to explore the proverbial language of American presidents, employing a digital methods approach. READ MORE
