End protection
نویسنده
چکیده
www.sciencemag.org (this information is current as of December 14, 2008 ): The following resources related to this article are available online at http://www.sciencemag.org/cgi/content/full/320/5881/1344 version of this article at: including high-resolution figures, can be found in the online Updated information and services, http://www.sciencemag.org/cgi/content/full/1158441/DC1 can be found at: Supporting Online Material http://www.sciencemag.org/cgi/content/full/320/5881/1344#otherarticles , 10 of which can be accessed for free: cites 16 articles This article 4 article(s) on the ISI Web of Science. cited by This article has been http://www.sciencemag.org/cgi/content/full/320/5881/1344#otherarticles 4 articles hosted by HighWire Press; see: cited by This article has been http://www.sciencemag.org/cgi/collection/genetics Genetics : subject collections This article appears in the following http://www.sciencemag.org/about/permissions.dtl in whole or in part can be found at: this article permission to reproduce of this article or about obtaining reprints Information about obtaining
منابع مشابه
Considering Pilot Protection in the Optimal Coordination of Distance and Directional Overcurrent Relays
The aim of the relay coordination is that protection systems detect and isolate the faulted part as fast and selective as possible. On the other hand, in order to reduce the fault clearing time, distance protection relays are usually equipped with pilot protection schemes. Such schemes can be considered in the distance and directional overcurrent relays (D&DOCRs) coordination to achieve faster ...
متن کاملStaged-Fault Testing of Distance Protection Relay Settings
In order to analyze the operation of the protection system during induced fault testing in the Croatian power system, a simulation using the CAPE software has been performed. The CAPE software (Computer-Aided Protection Engineering) is expert software intended primarily for relay protection engineers, which calculates current and voltage values during faults in the power system, so that relay p...
متن کاملApplicability of MPLS Transport Profile for Ring Topologies
This document presents an applicability of existing MPLS protection mechanisms, both local and end-to-end, to the MPLS Transport Profile (MPLS-TP) in ring topologies. This document does not propose any new mechanisms or protocols. Requirements for MPLS-TP protection especially for protection in ring topologies are discussed in "Requirements of an MPLS Transport Profile" (RFC 5654) and "MPLS Tra...
متن کاملTelomere shortening triggers a feedback loop to enhance end protection
Telomere homeostasis is controlled by both telomerase machinery and end protection. Telomere shortening induces DNA damage sensing kinases ATM/ATR for telomerase recruitment. Yet, whether telomere shortening also governs end protection is poorly understood. Here we discover that yeast ATM/ATR controls end protection. Rap1 is phosphorylated by Tel1 and Mec1 kinases at serine 731, and this regula...
متن کاملUsing Local Information for WDM Network Protection
Path protection and link protection schemes are the main means of protecting wavelength-division multiplexed (WDM) networks from the losses caused by a link failure such as a fiber cut. We propose a new protection scheme, which we term partial path protection (PPP), to select end-to-end backup paths using local information about network failures. PPP designates a different restoration path for ...
متن کاملPUF-Based Software Protection for Low-End Embedded Devices
In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable targets for software piracy and software manipulation. Aggravating this situation, low-end embedded devices typically lack secure hardware to effectively protect against such attacks. In th...
متن کامل