An open source software supply-chain vulnerability is an exploitable weakness in trusted software caused by a third-party, ...
Abstract: Aiming at the problem that the traditional degradation prediction method of insulated gate bipolar transistor (IGBT) modules is difficult to be effectively applied under changing working ...
Abstract: We present a capacitance build-up method suitable for the determination of the measurement error of a capacitance meter. The method requires only a small ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results