Results 211 to 220 of about 35,764 (258)
Some of the next articles are maybe not open access.

The research of microprocessor protection device based on DSP

2010 IEEE International Conference on Software Engineering and Service Sciences, 2010
In microprocessor protection, in order to improve the real-time of sampling data, the article uses TMS320F2812 that TI company produces as main control chip, equipping with various peripheral chip, to realize the acquisition and the processing of microprocessor protection, and also introduces the selection of devices as well as the flow charts of the ...
Jianye Zhang   +3 more
exaly   +2 more sources

Microprocessor-based protective relays

IEEE Industry Applications Magazine, 2009
This article describes the benefits of microprocessor (muP) relay performance and its capabilities beyond previous protective relaying technologies. This article also discusses a multiple quality-measurement approach to observing, measuring, and then calculating muP relay reliability and unavailability.
Richard Kirby, Ronald Schwartz
openaire   +1 more source

Lightning protection for microprocessor based electronic systems

Industrial Applications Society, 36th Annual Petroleum and Chemical Industry Conference, 1989
The authors address the issues of lightning threats, suppressor components, and guidelines for selection and placement of protectors for microprocessor-based electronic systems. It is noted that more than 75% of all field failures of microprocessor-based electronic systems are caused by electrical overstress. The fundamental ingredients of an effective
O.M. Clark, R.E. Gavender
openaire   +1 more source

A Microprocessor Protection Architecture against Hardware Trojans in Memories

2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2020
Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs and, very recently, in memories. Such attacks may allow malicious users to run their own software or to gain unauthorized privileges over the system. Therefore, HWTs are nowadays considered a serious threat both from academy and industry.
Alperen Bolat   +4 more
openaire   +3 more sources

Testing microprocessor-based numerical transformer differential protection

2015 IEEE Industry Applications Society Annual Meeting, 2015
Transformer differential protection application has always been a challenge to protection engineers and commissioning personnel, even with older electromechanical and solid-state technologies. The emergence of microprocessor-based protection, where the intelligence is implemented numerically in software algorithms, and the fact that different relay ...
Quintin Verzosa, Wah A. Lee Alex
openaire   +1 more source

A microprocessor selective encryption terminal for privacy protection

Proceedings of the June 13-16, 1977, national computer conference on - AFIPS '77, 1977
This paper reports on an experiment performed by the METREK Division of The MITRE Corporation from November 1975 through August 1976. The purpose of the experiment was to determine how effectively a low cost microcomputer could provide privacy protection to a user of a time-shared computer system.
John H. Carson   +2 more
openaire   +1 more source

RELIABILITY FACTORS OF SOFTWARE FOR MICROPROCESSOR PROTECTIONS

2023
The features of the program functioning reliability that are typical for critical applications operating in real mode for microprocessor protections are considered. Among the main characteristics of the relay protection functioning are reliability indicators.
openaire   +1 more source

Microprocessor Implementation of Breaker-Fail Protection

IFAC Proceedings Volumes, 1980
Abstract This paper describes the implementation of a digital technique for breaker-fail protection, using rate of rise of current at zero crossings as an indicator of current magnitude. Results obtained on a PDP 11/10 computer for single and multiple circuit breaker failure (with and without C.T. saturation) are given.
openaire   +1 more source

Reliability of a Microprocessor-Based Protection Switching System

Bell System Technical Journal, 1978
High-capacity transmission systems usually include one or more hot spares for protection. When a regular transmission channel fails, its signal is rapidly transferred to the spare channel under the control of protection switching circuits so that there is little signal degradation or interruption.
openaire   +1 more source

A 16b microprocessor with on chip memory protection

1983 IEEE International Solid-State Circuits Conference. Digest of Technical Papers, 1983
A 16b microprocessor, containing on-chip memory management and protection, which executes up to 1.5-million instructions per second,will be discussed. The chip (334×340 mils2) with 120K transistors uses an 8MHz clock and provides a 242.5ns data access time at the pins of the chip.
J. Slager   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy