{"title":"Load Flow Analysis for Non Commercial Power Reactor 10 MW Electrical Emergency Power Supply","authors":"M. Tukiman, K. Handono, I. M. Putra, F. Hermana","doi":"10.34218/ijeet.10.6.2019.003","DOIUrl":"https://doi.org/10.34218/ijeet.10.6.2019.003","url":null,"abstract":"Load flow analysis has been carried out for the emergency power supply system on Non-Commercial Power Reactors. The function of the electric power supply is very important so if there is a failure of the electric power supply it can have an impact on the continuity of the reactor operation. The only emergency diesel generators available are enough to supply the power supply for equipment needs related to the reactor safety system. The RDNK electrical system is designed in such a way that it is able to supply reliable electrical energy to loads consisting of various safety classifications. From the results of the analysis of power flow using ETAP simulation shows that all electrical power requirements related to the reactor safety system can be done properly and safely.<br>","PeriodicalId":313101,"journal":{"name":"EngRN: Electrical System (Topic)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Security in Case of Scan Based Attack on Crypto Hardware","authors":"J. Popat, U. Mehta","doi":"10.5121/VLSIC.2018.9201","DOIUrl":"https://doi.org/10.5121/VLSIC.2018.9201","url":null,"abstract":"The latest innovation technology in computing devices has given a rise of compact, speedy and economical products which also embeds cryptography hardware on-chip. This device generally holds secret key and confidential information, more attention has been given to attacks on hardware which guards such secure information. The attacker may leak secret information from symmetric crypto-hardware (AES, DES etc.) using side-channel analysis, fault injection or exploiting existing test infrastructure. This paper examines various DFT based attack implementation method applied to cryptographic hardware. The paper contains an extensive analysis of attacks based on various parameters. The countermeasures are classified and analyzed in details.<br>","PeriodicalId":313101,"journal":{"name":"EngRN: Electrical System (Topic)","volume":"87 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123444838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}