End protection

نویسنده

  • Ugrappa Nagalakshmi
چکیده

www.sciencemag.org (this information is current as of December 14, 2008 ): The following resources related to this article are available online at http://www.sciencemag.org/cgi/content/full/320/5881/1344 version of this article at: including high-resolution figures, can be found in the online Updated information and services, http://www.sciencemag.org/cgi/content/full/1158441/DC1 can be found at: Supporting Online Material http://www.sciencemag.org/cgi/content/full/320/5881/1344#otherarticles , 10 of which can be accessed for free: cites 16 articles This article 4 article(s) on the ISI Web of Science. cited by This article has been http://www.sciencemag.org/cgi/content/full/320/5881/1344#otherarticles 4 articles hosted by HighWire Press; see: cited by This article has been http://www.sciencemag.org/cgi/collection/genetics Genetics : subject collections This article appears in the following http://www.sciencemag.org/about/permissions.dtl in whole or in part can be found at: this article permission to reproduce of this article or about obtaining reprints Information about obtaining

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Considering Pilot Protection in the Optimal Coordination of Distance and Directional Overcurrent Relays

The aim of the relay coordination is that protection systems detect and isolate the faulted part as fast and selective as possible. On the other hand, in order to reduce the fault clearing time, distance protection relays are usually equipped with pilot protection schemes. Such schemes can be considered in the distance and directional overcurrent relays (D&DOCRs) coordination to achieve faster ...

متن کامل

Staged-Fault Testing of Distance Protection Relay Settings

In order to analyze the operation of the protection system during induced fault testing in the Croatian power system, a simulation using the CAPE software has been performed. The CAPE software (Computer-Aided Protection Engineering) is expert software intended primarily for relay protection engineers, which calculates current and voltage values during faults in the power system, so that relay p...

متن کامل

Applicability of MPLS Transport Profile for Ring Topologies

This document presents an applicability of existing MPLS protection mechanisms, both local and end-to-end, to the MPLS Transport Profile (MPLS-TP) in ring topologies. This document does not propose any new mechanisms or protocols. Requirements for MPLS-TP protection especially for protection in ring topologies are discussed in "Requirements of an MPLS Transport Profile" (RFC 5654) and "MPLS Tra...

متن کامل

Telomere shortening triggers a feedback loop to enhance end protection

Telomere homeostasis is controlled by both telomerase machinery and end protection. Telomere shortening induces DNA damage sensing kinases ATM/ATR for telomerase recruitment. Yet, whether telomere shortening also governs end protection is poorly understood. Here we discover that yeast ATM/ATR controls end protection. Rap1 is phosphorylated by Tel1 and Mec1 kinases at serine 731, and this regula...

متن کامل

Using Local Information for WDM Network Protection

Path protection and link protection schemes are the main means of protecting wavelength-division multiplexed (WDM) networks from the losses caused by a link failure such as a fiber cut. We propose a new protection scheme, which we term partial path protection (PPP), to select end-to-end backup paths using local information about network failures. PPP designates a different restoration path for ...

متن کامل

PUF-Based Software Protection for Low-End Embedded Devices

In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable targets for software piracy and software manipulation. Aggravating this situation, low-end embedded devices typically lack secure hardware to effectively protect against such attacks. In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008