Results 101 to 110 of about 1,057,095 (301)

Evaluations on Performance of Overcurrent Protection Relay Based on Relay Operation

open access: yesInternational Journal of Electrical Engineering and Applied Sciences, 2019
Protection system plays an important role in detecting the presence disorders and may prevent damage caused interference. This can improve the reliability of the system to maintain continuity of supply to the load.
MOHD SHAHRIEEL MOHD ARAS
doaj  

An Iterative Detection Aided Unequal Error Protection Wavelet Video Scheme Using Irregular Convolutional Codes

open access: yes, 2006
A wavelet-based videophone scheme proposed, where the video bits are Unequal Error Protection (UEP) using Irregular Convolutional Codes (IRCCs). The proposed system uses Adaptive Arithmetic Coding (AAC) for encoding the motion vectors and individual ...
Hanzo, L.   +3 more
core  

Development Of Knowledge-Based Power System Protection Design Courseware [PDF]

open access: yes, 2004
Power system protection is a relatively specialized topic that encompasses a large variety of areas from generator protection at the source side to as far as motor protection at the load end.
Othman, Mohammad Lutfi
core  

Detect-and-forward relaying aided cooperative spatial modulation for wireless networks

open access: yes, 2013
A novel detect-and-forward (DeF) relaying aided cooperative SM scheme is proposed, which is capable of striking a flexible tradeoff in terms of the achievable bit error ratio (BER), complexity and unequal error protection (UEP).
Dong, Binhong   +6 more
core   +1 more source

Dimethyl fumarate combined with cisplatin at subcytotoxic doses sensitizes cervical cancer toward ferroptosis and apoptosis through GSH restriction and p53 (re)activation

open access: yesMolecular Oncology, EarlyView.
Dimethyl fumarate (DMF) reduces growth of HPV‐positive cervical cancer spheroids and induces ferroptosis in cervical cancer cells via blocking SLC7A11/Glutathione (GSH) axis. Combination of subcytotoxic doses of DMF and cisplatin (CDDP) further suppresses spheroid growth and drives cell death in 2D culture models.
Carolina Punziano   +6 more
wiley   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Energy-Function Based Pilot Protection Scheme for Hybrid UHVDC Transmission Applying Improved Hausdorff Distance

open access: yesCSEE Journal of Power and Energy Systems
A hybrid UHVDC transmission system applying LCC as the rectifier and MMC as the inverter combines the advantages of both converter types, which makes this protection scheme more complicated.
Zijiang Wang   +3 more
doaj   +1 more source

Findings of the Joint Workshop on Evaluation of Impacts of Space Station Freedom Ground Configurations [PDF]

open access: yes
At the workshop, experts from the plasma interactions community evaluated the impacts of environmental interactions on the Space Station Freedom (SSF) under each of the proposed grounding schemes.
Carruth, Ralph   +2 more
core   +1 more source

COMP–PMEPA1 axis promotes epithelial‐to‐mesenchymal transition in breast cancer cells

open access: yesMolecular Oncology, EarlyView.
This study reveals that cartilage oligomeric matrix protein (COMP) promotes epithelial‐to‐mesenchymal transition (EMT) in breast cancer. We identify PMEPA1 (protein TMEPAI) as a novel COMP‐binding partner that mediates EMT via binding to the TSP domains of COMP, establishing the COMP–PMEPA1 axis as a key EMT driver in breast cancer.
Konstantinos S. Papadakos   +6 more
wiley   +1 more source

CUP: Comprehensive User-Space Protection for C/C++

open access: yes, 2017
Memory corruption vulnerabilities in C/C++ applications enable attackers to execute code, change data, and leak information. Current memory sanitizers do no provide comprehensive coverage of a program's data. In particular, existing tools focus primarily
Akritidis Periklis   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy