Academic literature on the topic 'Differential protection function'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Differential protection function.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Differential protection function"

1

Shen, Bing, Hong Zhi Zhang, Xin Yi Jiang, and Guo Shun Xu. "The Simulation Research and Analysis of Transformer with Differential Protection in Shipboard Medium Voltage Based on Matlab." Advanced Materials Research 1021 (August 2014): 181–85. http://dx.doi.org/10.4028/www.scientific.net/amr.1021.181.

Full text
Abstract:
In order to ensure the safe operation of the ship in the medium-voltage grid, transformer protection is particularly important. Using Matlab/Simulink, this paper established transformer and its differential protection simulation model of the medium-voltage ship. To achieve differential protection function, this paper uses the M-file to program the differential protection S-function. The simulation results indicate that the differential protection models can achieve their protection functions and have better quick-acting and stability.
APA, Harvard, Vancouver, ISO, and other styles
2

Cai, Wei, Lin Sun, and Hua Ren Wu. "Simulation of Transformer Protection Based on an Embedded MATLAB Function." Advanced Materials Research 960-961 (June 2014): 995–99. http://dx.doi.org/10.4028/www.scientific.net/amr.960-961.995.

Full text
Abstract:
This paper establishes a simulation model of a simplified power system with transformer differential protection based on an embedded Matlab function block. The differential protection consists of percentage restraint differential protection, second harmonic restraint, differential current instantaneous trip protection and over-excitation protection. The model is able to correctly simulate the transformer’s inrush current and internal and external faults. The results from the simulation show that the circuit breaker correctly operates for a transformer internal fault and provides a good braking
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Lin, Liang Gao, Jian Jie Chen, and Yong Jing Hao. "Interactive Diagram Modeling of Current Differential Protection Based on IEC61850." Advanced Materials Research 805-806 (September 2013): 682–87. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.682.

Full text
Abstract:
Introducing substation to substation communication interface, tunneling communication and gateway communication described in IEC61850-90-1. For current differential protection, by adopting the idea of object-oriented modeling, dividing functions into logical nodes, gives the protection logic node model, shows the function of logic nodes and the realization of function based on the protection principle; Using Unified Modeling Language (UML) technology of collaboration diagram and sequence diagram, describes the protection logic node interaction and communication process from the messaging level
APA, Harvard, Vancouver, ISO, and other styles
4

Le, Kim Hung, and Phan Huan Vu. "Performance Evaluation of a Generator Differential Protection Function for a Numerical Relay." Engineering, Technology & Applied Science Research 9, no. 4 (2019): 4342–48. https://doi.org/10.5281/zenodo.3370571.

Full text
Abstract:
This paper describes the advantages and disadvantages of a generator differential protection relay system which uses double slope characteristics of Areva P343, ABB REG670, SEL300G and GE G60. A Buon Tua Srah Hydropower Plant in Vietnam was selected as an example for the relay setting calculations of these characteristics. The performance of the introduced relay model was tested at various fault conditions in Matlab/Simulink. The results apply to the problems of solving the performance of the relay accurately and with reliable differential protection against internal faults, and keeping the ge
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Yang, and Guo Yan Liang. "The Analysis and Discussion of the Actual Case about the Differential Protection Malfunction Caused by the Transient Exciting Current of Large-Scale High-Voltage Main Transformer at the Time of Switching." Advanced Materials Research 694-697 (May 2013): 785–89. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.785.

Full text
Abstract:
In this paper, based on the choice of voltage level 500kV for large transformer differential protection of maloperation accident actually as an example, discusses how to improve the reliability and the transformer differential protection with the relationship between pressure test. Analysis found that in order to avoid the excitation transient exciting current transformer differential protection sparked the misoperation, on-site technical personnel in the differential protection setting calculation process, make use of data in conformity with the relevant parameters, rules and standards, famil
APA, Harvard, Vancouver, ISO, and other styles
6

Le, K. H., and P. H. Vu. "Performance Evaluation of a Generator Differential Protection Function for a Numerical Relay." Engineering, Technology & Applied Science Research 9, no. 4 (2019): 4342–48. http://dx.doi.org/10.48084/etasr.2754.

Full text
Abstract:
This paper describes the advantages and disadvantages of a generator differential protection relay system which uses double slope characteristics of Areva P343, ABB REG670, SEL300G and GE G60. A Buon Tua Srah Hydropower Plant in Vietnam was selected as an example for the relay setting calculations of these characteristics. The performance of the introduced relay model was tested at various fault conditions in Matlab/Simulink. The results apply to the problems of solving the performance of the relay accurately and with reliable differential protection against internal faults, and keeping the ge
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Xingyu. "Differentially Private Reinforcement Learning with Linear Function Approximation." ACM SIGMETRICS Performance Evaluation Review 50, no. 1 (2022): 77–78. http://dx.doi.org/10.1145/3547353.3522648.

Full text
Abstract:
Motivated by the wide adoption of reinforcement learning (RL) in real-world personalized services, where users' sensitive and private information needs to be protected, we study regret minimization in finite-horizon Markov decision processes (MDPs) under the constraints of differential privacy (DP). Compared to existing private RL algorithms that work only on tabular finite-state, finite-actions MDPs, we take the first step towards privacy-preserving learning in MDPs with large state and action spaces. Specifically, we consider MDPs with linear function approximation (in particular linear mixt
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Xingyu. "Differentially Private Reinforcement Learning with Linear Function Approximation." Proceedings of the ACM on Measurement and Analysis of Computing Systems 6, no. 1 (2022): 1–27. http://dx.doi.org/10.1145/3508028.

Full text
Abstract:
Motivated by the wide adoption of reinforcement learning (RL) in real-world personalized services, where users' sensitive and private information needs to be protected, we study regret minimization in finite-horizon Markov decision processes (MDPs) under the constraints of differential privacy (DP). Compared to existing private RL algorithms that work only on tabular finite-state, finite-actions MDPs, we take the first step towards privacy-preserving learning in MDPs with large state and action spaces. Specifically, we consider MDPs with linear function approximation (in particular linear mixt
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yaling, and Jin Han. "Differential privacy fuzzy C-means clustering algorithm based on gaussian kernel function." PLOS ONE 16, no. 3 (2021): e0248737. http://dx.doi.org/10.1371/journal.pone.0248737.

Full text
Abstract:
Fuzzy C-means clustering algorithm is one of the typical clustering algorithms in data mining applications. However, due to the sensitive information in the dataset, there is a risk of user privacy being leaked during the clustering process. The fuzzy C-means clustering of differential privacy protection can protect the user’s individual privacy while mining data rules, however, the decline in availability caused by data disturbances is a common problem of these algorithms. Aiming at the problem that the algorithm accuracy is reduced by randomly initializing the membership matrix of fuzzy C-me
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Guowei, Jiayuan Du, Xiaowei Yuan, and Kewei Zhang. "Differential Privacy-Based Location Privacy Protection for Edge Computing Networks." Electronics 13, no. 17 (2024): 3510. http://dx.doi.org/10.3390/electronics13173510.

Full text
Abstract:
Mobile Edge Computing (MEC) has been widely applied in various Internet of Things (IoT) scenarios due to its advantages of low latency and low energy consumption. However, the offloading of tasks generated by terminal devices to edge servers inevitably raises privacy leakage concerns. Given the limited resources in MEC networks, this paper proposes a task scheduling strategy, named DQN-DP, to minimize location privacy leakage under the constraint of offloading costs. The strategy is based on a differential privacy location obfuscation probability density function. Theoretical analysis demonstr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Differential protection function"

1

Bergfalck, Ludwig, and Johannes Engström. "Designing a Physical Unclonable Function for Cryptographic Hardware." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178109.

Full text
Abstract:
Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. The HSM concept involves a sensing mesh structured Physical Unclonable Function (PUF), where the cryptographic key is derived from the sum of cross-sectional area capacitance between conductors on adjacent layers of a flex PCB forming a grid. This sensing mesh PUF that stores a digital fingerprint in its microstructure is used to enclose an inter
APA, Harvard, Vancouver, ISO, and other styles
2

Habib, MD Zakaria. "The Impacts of UHV AC Transmission Lines on Traditional Line Differential Protection Functions." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-228389.

Full text
Abstract:
UHV transmission lines have several advantages when it comes to transferring of bulk amount ofpower in long distances. Although the technology is available from 1980’s, the number of UHVtransmission lines around the world has been increased in the beginning of this century in orderto supply the high demand of electricity. The number is going to increase even more in the nextfew years. Thus, it is important to study the UHV line characteristics and update the powersystem equipment as well as the operation procedure accordingly.UHV transmission lines exhibits some distinct phenomena which are no
APA, Harvard, Vancouver, ISO, and other styles
3

Gilbert, Peter Brian. "Sieve analysis : statistical methods for assessing differential vaccine protection against human immunodeficiency virus types /." Thesis, Connect to this title online; UW restricted, 1996. http://hdl.handle.net/1773/9551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alborch, escobar Ferran. "Private Data Analysis over Encrypted Databases : Mixing Functional Encryption with Computational Differential Privacy." Electronic Thesis or Diss., Institut polytechnique de Paris, 2025. http://www.theses.fr/2025IPPAT003.

Full text
Abstract:
Dans l'actuelle société numérique, les données dominent le monde. Associées la plupart du temps à des individus, leur exploitation doit respecter la vie privée de ces derniers. Cette contrainte a donné naissance au paradigme de confidentialité différentielle, qui permet de protéger les individus lors de requêtes sur des bases contenant des données les concernant. Mais avec l'émergence du "cloud computing'', il devient nécessaire de prendre en compte la confidentialité du stockage de ces dernières dans le cloud, en utilisant du chiffrement. Cette thèse étudie comment assurer à la fois la confid
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Differential protection function"

1

Abduganiyevna, Kulmirzayeva Gulrabo, and Muhammad Alvan Rizki. Differential Equations TUTORIAL For Lecture and for Practical Exercise. Umsida Press, 2024. http://dx.doi.org/10.21070/2024/978-623-464-095-3.

Full text
Abstract:
The textbook is compiled in accordance with the program of the discipline “Differential Equations” (Section - Ordinary Differential Equations). Basic theoretical information and 115 examples of solving typical problems are given, as well as recommendations for studying the discipline. Examples are provided for independent work, 85 examples and 20 questions for self-test, recommended literature.This collection was prepared in accordance with the undergraduate curriculum (Construction) in the subject “Differential Equations” in the Republic of Uzbekistan based on existing state educational stand
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Differential protection function"

1

Russell, Brenda, and Emily Seisler. "The Law Enforcement Response to Intimate Partner Violence." In Gender and Domestic Violence, edited by Brenda Russell and John Hamel. Oxford University Press, 2022. http://dx.doi.org/10.1093/med-psych/9780197564028.003.0003.

Full text
Abstract:
As first responders, law enforcement officers encounter intimate partner violence (IPV) regularly, and agencies have enhanced IPV policies and training to ensure officer and victim safety. Nevertheless, empirical research suggests the gender paradigm is alive and well within the criminal justice system, demonstrating differential response to IPV incidents as a function of gender, race, sexual minority status, socioeconomic status, and or any intersectionality of these characteristics. This chapter provides an overview of the foundation and evolution of law enforcement’s response to IPV. It pro
APA, Harvard, Vancouver, ISO, and other styles
2

Bentarzi, Hamid, and Rachid Bouderballa. "Differential Protection Enhancement for Power Transformer." In Advances in Computer and Electrical Engineering. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4027-5.ch014.

Full text
Abstract:
A power transformer is protected against internal faults using a differential protection which is sensitive and a fast. However, during transformer magnetization (inrush current or over-excitation), the differential relay may operate unnecessarily. This phenomenon appears only when a transformer is first energized or after clearing external fault. During periodic magnetization condition due to over-excitation, the third and fifth harmonic components are largely noticed; however, during the normal apperiodic inrush conditions, the second harmonic is relatively high. In the conventional techniqu
APA, Harvard, Vancouver, ISO, and other styles
3

Chikrii, Arkadii. "Making Decisions and Motion Control in Conditions of Conflict." In Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection 2: Methods and Tools. ISTE-Wiley, 2025. https://doi.org/10.1115/1.862smo_ch5.

Full text
Abstract:
In this chapter, we consider a problem of bringing the trajectory of quasilinear conflict-controlled process to a given cylindrical set. We proceed with representation of a trajectory of dynamic system in the form, in which the block of initial data is separated from the control block. This makes it feasible to consider a wide spectrum of functional-differential systems. The method of resolving functions, based on use of the inverse Minkovski functionals, serves as an ideological tool for study. Attention is focused on the case when Pontryagin’s condition does not hold. In this case, the upper
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Shaoquan, Jianping Cai, and Lan Sun. "Rényi Differential Privacy Protection Algorithm for SVD Recommendation Model." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2021. http://dx.doi.org/10.3233/faia210171.

Full text
Abstract:
With the widely use of recommendation systems in various mobile applications, privacy leakage has been a longstanding threat, for which many researchers have come up with a great number of methods that achieve the protective effect to a certain extent. However, the protection scope of these methods is limited, especially in the protection of original data. To address this issue, we propose a data perturbation based Rényi differential privacy algorithm to protect the SVD recommendation model. This paper uses the data perturbation method to perturb the original training dataset in the data prepr
APA, Harvard, Vancouver, ISO, and other styles
5

Aarthi, S., K. Aravinthan, R. N. Ravikumar, N. Sivakumar, and Soram Wanglen. "Cryptography Securing Data in Motion Within Blockchain, Internet of Everything, and Federated Learning." In Convergence of Blockchain, Internet of Everything, and Federated Learning for Security. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-1424-2.ch002.

Full text
Abstract:
Data protection relies on cryptography to secure data across Blockchain, IoE, and Federated Learning systems. Strong cryptographic methods ensure confidentiality, authenticity, and integrity, safeguarding evolving digital security needs. Key techniques include symmetric and asymmetric encryption, hash functions, digital signatures, and zero-knowledge proofs. Cryptography enables secure protocols like TLS, homomorphic encryption, and differential privacy while addressing quantum-resistant security challenges, ensuring robust digital privacy solutions.
APA, Harvard, Vancouver, ISO, and other styles
6

Shadab, Mohd, MD Saqib Javed, Mohammad Sajid, Mukesh Prasad, Maria A. Lapina, and Mikhail Babenko. "Generating Highly Nonlinear S-Boxes Using a Hybrid Approach With Particle Swarm Optimization." In Advances in Computer and Electrical Engineering. IGI Global, 2024. https://doi.org/10.4018/979-8-3693-6834-3.ch001.

Full text
Abstract:
A substitution box (S-box) is a fundamental component in cryptographic algorithms that enhance data security by providing a complex mapping between input and output values. S-box strengthens the encryption and decryption process by introducing nonlinearity and protecting the encrypted data against various differential and linear cryptanalytic attacks. The problem of generating an S-box with optimal properties is challenging and falls under the category of NP-Hard problems. This study proposes a hybrid approach combining the Particle Swarm optimization algorithm (PSO) and the Booster algorithm
APA, Harvard, Vancouver, ISO, and other styles
7

Santos, Clara Cruz, Helena Reis Luz, Vanessa Nunes, and Joana Ricarte. "Portugal between Crises: Justice and Deservingness in the Current Social Protection System." In Direitos Económicos, Sociais e Culturais: Vinculação e (re)construções no Século XXI. JUS.XXI, 2022. http://dx.doi.org/10.51389/myfp8361.

Full text
Abstract:
Objectives: This paper aims to analyse the evolution of the Welfare State by looking at the intersection between its current reconfigurations in face of great societal crises (2008-09 and 2020) and the emergence of a suspicion speech regarding deservingness of different beneficiaries to the social protection regimes. Method: Critical analysis based on literature review focusing on the genesis of Welfare State in light of the recent transformations occurred within societies, aiming to understand the dimension of deservingness (its conceptualization, application and variables) in the access to t
APA, Harvard, Vancouver, ISO, and other styles
8

Spreen, Otfried, Anthony H. Risser, and Dorothy Edgell. "Auditory Disorders." In Developmental Neuropsychology. Oxford University PressNew York, NY, 1995. http://dx.doi.org/10.1093/oso/9780195067361.003.0026.

Full text
Abstract:
Abstract The auditory system in lower mammals primarily seives as a protective sense and is reflexive. The reflex action is controlled and coordinated by various centers in the brainstem (Barr 1972). The human cortex has larger association areas for storage and processing of information arriving from the sensory organs, which allows differential recognition, interpretation, and association of sounds with meanings. Most importantly, an intact auditory system permits the reception, sorting, and codifying of speech and thus verbal communication with others.Auditory processing may be divided into
APA, Harvard, Vancouver, ISO, and other styles
9

Trinkaus, Erik, Alexandra P. Buzhilova, Maria B. Mednikova, and Maria V. Dobrovolskaya. "The Human Facial Skeletons from Sunghir." In The People of Sunghir. Oxford University Press, 2014. http://dx.doi.org/10.1093/oso/9780199381050.003.0011.

Full text
Abstract:
The human (and mammalian) facial skeleton is a complex response to the protection, support, and functional demands of a diversity of neurological and physiological processes that must be structurally integrated, and each places limitations on the others. The processes involve respiration (nasal and oral) and mastication (and deglutition), as well as thermoregulation through respiration. Three of the special senses (vision, smell, and taste) are housed within the facial skeleton, although only the first has a major impact on the shape and structure of the facial skeleton. The challenge in asses
APA, Harvard, Vancouver, ISO, and other styles
10

V. Chernodarov, Alexander. "Perspective Chapter: Optimization of Observations Based on Non-Quadratic Criteria and Controlled Error Compensation in Nonlinear Dynamical Systems." In Dynamical Systems - Latest Developments and Applications [Working Title]. IntechOpen, 2025. https://doi.org/10.5772/intechopen.1008705.

Full text
Abstract:
This section is devoted to the problem of joint estimation and control of parameters of nonlinear dynamic systems (NDS) under stochastic conditions. The errors of the NDS with respect to the reference phase path, which is determined by external observations, are considered as such parameters. When including the extended Kalman filter (EKF) in the estimation loop, the control must limit the change in NDS errors to a linear region relative to the reference phase path. The implementation of this approach to damping error estimates is associated with the simultaneous solution of nonlinear differen
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Differential protection function"

1

Bieri, Timothy. "Pipeline Cathodic Protection Using Steel Reference Electrodes." In CORROSION 2001. NACE International, 2001. https://doi.org/10.5006/c2001-01590.

Full text
Abstract:
Abstract The Colville River cathodic protection (CP) system is unique in many ways. The cased pipelines are isolated from the CP system and are directionally drilled 85 feet (26 m) below the river surface. Both thawed soils under the active channel and frozen soils under the floodplain and riverbanks characterize the crossing. These conditions make for differential thermal and soil resistivity states over time. The CP system is designed to protect the casings from external corrosion, and must function in a very dynamic and aggressive environment. Conventional reference electrodes were unsuitab
APA, Harvard, Vancouver, ISO, and other styles
2

Bieri, Timothy, Kurt Lawson, and Cory A. Wilder. "Cathodic Protection System Design for the Colville River." In CORROSION 2000. NACE International, 2000. https://doi.org/10.5006/c2000-00735.

Full text
Abstract:
Abstract The Colville River cathodic protection (CP) system is unique in many ways. The cased pipelines are isolated from the mainline CP system and are directionally drilled 85 feet (26 m) below the river surface. Both thawed soils under the active channel and frozen soils under the floodplain and river banks characterize the crossing. These conditions make for differential thermal and soil resistivity states over time. The CP system is designed to protect the casings from external corrosion, and must function in a very dynamic and aggressive environment. High temperature and high chloride co
APA, Harvard, Vancouver, ISO, and other styles
3

Bennett, Jack, Thomas Turk, and Robert F. Savinell. "Mathematical Modeling of the Effects of Current Flow Through Concrete." In CORROSION 1994. NACE International, 1994. https://doi.org/10.5006/c1994-94285.

Full text
Abstract:
Abstract A mathematical model was developed to predict the movement of ions resulting from the flow of direct current through concrete. The model is based on applying a differential mass balance and incorporating flux equations based on dilute solution theory. Electrochemical reactions establish flux equations which determine the boundary conditions at the electrode surfaces. The model was used to predict the effects of different variables on the development of chloride and hydroxide concentration profiles. Variables examined include chloride concentration, chloride distribution, pH, temperatu
APA, Harvard, Vancouver, ISO, and other styles
4

Medvec, Zdenek, and Richard Stranik. "Motor Overcurrent Protection in the Function of a Differential Protection." In 2019 20th International Scientific Conference on Electric Power Engineering (EPE). IEEE, 2019. http://dx.doi.org/10.1109/epe.2019.8777972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

de Oliveira, Glaufe S., César C. de S. Silva, Nilo S. S. Ribeiro, and Kleber M. e Silva. "HVDC Converter Transformers Protection - Part 2: Differential Function Assessment." In 2023 Workshop on Communication Networks and Power Systems (WCNPS). IEEE, 2023. http://dx.doi.org/10.1109/wcnps60622.2023.10344533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cvorovic, B., and A. Edwards. "A novel current-based differential CT supervision function." In IET 9th International Conference on Developments in Power Systems Protection (DPSP 2008). IEE, 2008. http://dx.doi.org/10.1049/cp:20080038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tripathy, Manoj, and Suresh Ala. "Optimal Radial Basis Function Neural Network power transformer differential protection." In 2009 IEEE Bucharest PowerTech (POWERTECH). IEEE, 2009. http://dx.doi.org/10.1109/ptc.2009.5282183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khatiwada, Alish, Hai H. Hyunh, Bikrant Poudel, et al. "Electromagnetic Transient Analysis of Differential Protection Function in Grid-Connected IBR." In 2023 IEEE Kansas Power and Energy Conference (KPEC). IEEE, 2023. http://dx.doi.org/10.1109/kpec58008.2023.10215401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Shuyang, Hong Cao, Jiaqi Liu, Jian Liu, and Shu Chen. "Improved Braking Criterion for Phasor Current Differential Protection Based on Sigmoid Function." In 2023 5th International Conference on Power and Energy Technology (ICPET). IEEE, 2023. http://dx.doi.org/10.1109/icpet59380.2023.10367454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xia, Renyi, Qiongliang Chen, Qinwen Xia, and Lei Huang. "Application and Improvement of RCS/PCS Type Fiber Optic Current Differential Protection Joint Trip Function." In 2023 IEEE 3rd International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2023. http://dx.doi.org/10.1109/icdsca59871.2023.10392720.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Differential protection function"

1

Steffens, John C., and Eithan Harel. Polyphenol Oxidases- Expression, Assembly and Function. United States Department of Agriculture, 1995. http://dx.doi.org/10.32747/1995.7571358.bard.

Full text
Abstract:
Polyphenol oxidases (PPOs) participate in the preparation of many plant products on the one hand and cause considerable losses during processing of plant products on the other hand. However, the physiological functions of plant PPO were still a subject of controversy at the onset of the project. Preliminary observations that suggested involvement of PPOs in resistance to herbivores and pathogens held great promise for application in agriculture but required elucidation of PPO's function if modulation of PPO expression is to be considered for improving plant protection or storage and processing
APA, Harvard, Vancouver, ISO, and other styles
2

Slater, Rachel, Ella Haruna, and Daniela Baur. What is Known About Capacity and Coordination of Social Assistance Programmes in Crisis Situations? Institute of Development Studies, 2022. http://dx.doi.org/10.19088/basic.2022.018.

Full text
Abstract:
This paper reviews the literature and documented evidence on capacity and coordination issues in crisis situations, where social protection and humanitarian assistance intersect. The paper finds that while there is a burgeoning literature that mentions capacity and coordination, very little of this focuses on crisis situations. Although both terms are mentioned frequently, they are rarely defined or robustly and systematically assessed. The little literature that does exist points to a substantial knowledge gap on both the ways in which capacity and coordination deficits undermine the delivery
APA, Harvard, Vancouver, ISO, and other styles
3

Christopher, David A., and Avihai Danon. Plant Adaptation to Light Stress: Genetic Regulatory Mechanisms. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7586534.bard.

Full text
Abstract:
Original Objectives: 1. Purify and biochemically characterize RB60 orthologs in higher plant chloroplasts; 2. Clone the gene(s) encoding plant RB60 orthologs and determine their structure and expression; 3. Manipulate the expression of RB60; 4. Assay the effects of altered RB60 expression on thylakoid biogenesis and photosynthetic function in plants exposed to different light conditions. In addition, we also examined the gene structure and expression of RB60 orthologs in the non-vascular plant, Physcomitrella patens and cloned the poly(A)-binding protein orthologue (43 kDa RB47-like protein).
APA, Harvard, Vancouver, ISO, and other styles
4

Whitham, Steven A., Amit Gal-On, and Tzahi Arazi. Functional analysis of virus and host components that mediate potyvirus-induced diseases. United States Department of Agriculture, 2008. http://dx.doi.org/10.32747/2008.7591732.bard.

Full text
Abstract:
The mechanisms underlying the development of symptoms in response to virus infection remain to be discovered in plants. Insight into symptoms induced by potyviruses comes from evidence implicating the potyviral HC-Pro protein in symptom development. In particular, recent studies link the development of symptoms in infected plants to HC-Pro's ability to interfere with small RNA metabolism and function in plant hosts. Moreover, mutation of the highly conserved FRNK amino acid motif to FINK in the HC-Pro of Zucchini yellow mosaic virus (ZYMV) converts a severe strain into an asymptomatic strain,
APA, Harvard, Vancouver, ISO, and other styles
5

Sessa, Guido, and Gregory Martin. A functional genomics approach to dissect resistance of tomato to bacterial spot disease. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7695876.bard.

Full text
Abstract:
The research problem. Bacterial spot disease in tomato is of great economic importance worldwide and it is particularly severe in warm and moist areas affecting yield and quality of tomato fruits. Causal agent of spot disease is the Gram-negative bacterium Xanthomonas campestris pv. vesicatoria (Xcv), which can be a contaminant on tomato seeds, or survive in plant debris and in association with certain weeds. Despite the economic significance of spot disease, plant protection against Xcvby cultural practices and chemical control have so far proven unsuccessful. In addition, breeding for resist
APA, Harvard, Vancouver, ISO, and other styles
6

Sela, Shlomo, and Michael McClelland. Investigation of a new mechanism of desiccation-stress tolerance in Salmonella. United States Department of Agriculture, 2013. http://dx.doi.org/10.32747/2013.7598155.bard.

Full text
Abstract:
Low-moisture foods (LMF) are increasingly involved in foodborne illness. While bacteria cannot grow in LMF due to the low water content, pathogens such as Salmonella can still survive in dry foods and pose health risks to consumer. We recently found that Salmonella secretes a proteinaceous compound during desiccation, which we identified as OsmY, an osmotic stress response protein of 177 amino acids. To elucidate the role of OsmY in conferring tolerance against desiccation and other stresses in Salmonella entericaserovarTyphimurium (STm), our specific objectives were: (1) Characterize the invo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!