نتایج جستجو برای: protection systems

تعداد نتایج: 1344171  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

in the first chapter we study the necessary background of structure of commutators of operators and show what the commutator of two operators on a separable hilbert space looks like. in the second chapter we study basic property of jb and jb-algebras, jc and jc-algebras. the purpose of this chapter is to describe derivations of reversible jc-algebras in term of derivations of b (h) which are we...

رشیدیان, آرش, صوفی, مسلم,

financial protection against health expenditures is a major goal of health system policymaking. governments have focused on the risk that high health expenditures pose to the financial security of deprived and vulnerable populations. Health systems need to be sure that people receive health services and are protected from the financial burden of health costs. There is no accepted standard for m...

Journal: :مجله علوم اعصاب شفای خاتم 0
farid bendjellal group technical director, britax childcare group, ulm, germany

the presentation will focus on the key areas that are essential to build a comprehensive policy towards reducing child injury and fatalities. the presentation will focus on the importance of the public awareness (education on the use of child restraint systems), the need to have an overall road safety programme, law enforcement (mandatory use of protection systems for children in car) and final...

2006
Vicky Liu William Caelli Lauren May

It is well recognised that adoption of information communication and technology (ICT) in healthcare can transform healthcare services. Numerous countries are seeking to establish national e-health development and implementation. To collect, store and process individual health information in an electronic system, healthcare providers need to comply with the appropriate security and privacy legis...

2003
Stefan Thiemert Martin Steinebach Jana Dittmann Andreas Lang Uwe Wessely Stefan Eichner Dirk Albrecht Susanne Guth Gustaf Neumann Mark Strembeck Daniel Burgwinkel Herwig Unger Thomas Böhme Patrick Aichroth Jens Hasselbach Stephan Baumann Oliver Hummel Timothy Budd Cheun Ngen Chong Ricardo Corin Sandro Etalle Pieter Hartel Yee Wei Law Paul Judge Mostafa Ammar

There is an increased interest, by content creators and owners, in content protection systems that provide the ability to control or restrict the content that can be shared on peer-to-peer file sharing systems. At the same time, there is much debate that argues that content protection in peer-to-peer systems will unfairly restrict the users’ ability to share content. We explore the issue of con...

In this paper, a multi-stage protective scheme is proposed to maintain the fuse and reclosers coordination. The proposed method operates online and proportional to the photovoltaic sources penetration rate. In the first step, a non-standard Current - Time - Voltage curve is used for fuse saving. If the new calculated TDS from the first stage is not implementable to the reclosers, the second sta...

Owing to the portability and flexibility of mobile energy storage systems (MESSs), they seem to be a promising solution to improve the resilience of the distribution system (DS). So, this paper presents a rolling optimization mechanism for dispatching MESSs and other resources in microgrids in case of a natural disaster occurrence. The proposed mechanism aims to minimize the total system cost b...

ژورنال: حقوق پزشکی 2013

In recent decades, the protection of traditional medicine under the intellectual property system has been the subject of many efforts that was made by international community and especially less developed countries which are rich in this field. Since this knowledge has the unique characteristics and other current legal systems of intellectual property can not protect all aspects of it, the worl...

2014
Adnan RAMAKIĆ Zlatko BUNDALO

The possibilities and ways for data protection in microcomputer systems and their networks are considered and described in the paper. The overview of the most important threats and attacks on security of microcomputer systems and networks is given first. Then, the possibilities and ways for protection of those systems and data are described. Finally, the paper provides a detailed description of...

Journal: :inorganic chemistry research 2014
bahram yadollahi davud karimian valiollah mirkhani

in multi-step organic syntheses, the protection and deprotection of tetrahydropyranyl (thp) ethers is one of the most frequently used methods. over the years, different methods have been used from various catalytic systems for the protection of hydroxyl groups as thp ethers and their deprotection. herein we have reported that various alcohols and phenols have been efficiently converted to the c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید