<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Protected WLCSP collision test via bowl feeder
2
Protected Working Lightpath Envelope: a New Paradigm for Dynamic Survivable Routing
3
Protected, user-level DMA for the SHRIMP network interface
4
Protecting a distributed data acquisition system from lightning
5
Protecting a Full-Scale \\hbox {Nb}_{3}\\hbox {Sn} Magnet With CLIQ, the New Coupling-Loss-Induced Quench System
6
Protecting a GTO under short circuit conditions
7
Protecting a high horsepower motor
8
Protecting a HVDC link against accidental isolation from its receiving AC system
9
Protecting a MPLS multicast session tree with bounded switchover time
10
Protecting a multicast session against single link failures in a mesh network
11
Protecting a nation´s critical infrastructure: the first steps
12
Protecting a power-laser diode from retroreflections by means of a fiber /spl lambda//4 retarder
13
Protecting A-C motors with low-voltage air-circuit-breaker series trips
14
Protecting Access Confidentiality with Data Distribution and Swapping
15
Protecting Access Pattern Privacy in Database Outsourcing Service
16
Protecting against Cryptographic Trojans in FPGAs
17
Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering
18
Protecting against DNS cache poisoning attacks
19
Protecting against doomed processes in a multi-level memory system
20
Protecting against electrocution
21
Protecting against emerging vmin failures in advanced technology nodes
22
Protecting against evaluation overfitting in empirical reinforcement learning
23
Protecting Against Network Infections: A Game Theoretic Perspective
24
Protecting against rare event failures in archival systems
25
Protecting against screenshots: An image processing approach
26
Protecting against what? The Achilles heel of information assurance
27
Protecting aircraft fuel tanks using reliability analysis
28
Protecting all traffic channels in mobile IPv6 network
29
Protecting an Asynchronous NoC against Transient Channel Faults
30
Protecting an WSN from internal attack based on epistemic uncertainties
31
Protecting and Analysing Health Care Data on Cloud
32
Protecting and controlling virtual LANs by Linux router-firewall
33
Protecting and Identifiying Smartphone Apps Using Icmetrics
34
Protecting and managing electronic content with a digital battery
35
Protecting anonymity in dynamic peer-to-peer networks
36
Protecting at the Speed of Light
37
Protecting at the speed of light: Combining arc flash sensing and arc-resistant technologies
38
Protecting BGP routes to top level DNS servers
39
Protecting BGP routes to top-level DNS servers
40
Protecting Big Blue from Rogue Subatomic Particles
41
Protecting Bioinformatics as Intellectual Property
42
Protecting Biometric Templates Using LBP-Based Authentication Watermarking
43
Protecting Biometric Templates With Sketch: Theory and Practice
44
Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks
45
Protecting Boston´s Environment (PROBE)
46
Protecting bridges: Reorganizing sensor networks after catastrophic events
47
Protecting Bursty Applications Against Traffic Aggressiveness
48
Protecting bus-based hardware IP by secret sharing
49
Protecting buses from congestion using traffic signal control
50
Protecting cache memories through data scrambling technique
51
Protecting caches against multi-bit errors using embedded erasure coding
52
Protecting CATV Equipment Against the Effects of Longitudinal Sheath Currents
53
Protecting circuits from the transient voltage suppressor´s residual pulse during IEC 61000-4-2 stress
54
Protecting Classification Privacy Data Aggregation in Wireless Sensor Networks
55
Protecting client privacy with trusted computing at the server
56
Protecting cloud data using dynamic inline fingerprint checks
57
Protecting Cognitive Radio Networks against Primary Users: A Backup Path Approach
58
Protecting Coherence and Entanglement by Quantum Feedback Controls
59
Protecting combinational logic in pipelined microprocessor cores against transient and permanent faults
60
Protecting Combinational Logic Synthesis Solutions
61
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
62
Protecting communication systems from EMP effects of nuclear explosions
63
Protecting communities from chemical warfare agents
64
Protecting competitive negotiation of mobile agents
65
Protecting computer programs
66
Protecting computer systems against power transients
67
Protecting Consumers´ Private Health Information
68
Protecting content distribution networks from denial of service attacks
69
Protecting control panels against voltage sags using square-wave series voltage compensators
70
Protecting Control Panels Against Voltage Sags: Using a Square-Wave Series Voltage Compensator
71
Protecting convolution-type aritmetic array calculations with generalized cyclic codes
72
Protecting cookies from Cross Site Script attacks using Dynamic Cookies Rewriting technique
73
Protecting Copper Underground
74
Protecting Core Memory Circuits with Error Correcting Cyclic Codes
75
Protecting corporate ICT infrastructures by using digital forensics
76
Protecting COTS ICs for space
77
Protecting Critical Cloud Infrastructures with Predictive Capability
78
Protecting Critical Data
79
Protecting critical loads using high temperature superconducting magnetic energy storage systems (HT-SMES)
80
Protecting critical national infrastructure through collaborative cyber situational awareness
81
Protecting CRT RSA against Fault and Power Side Channel Attacks
82
Protecting cryptographic hardware against malicious attacks by nonlinear robust codes
83
Protecting Cryptographic Keys from Memory Disclosure Attacks
84
Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access
85
Protecting cryptographic keys: the trace-and-revoke approach
86
Protecting Cumulative Node Constraint during XML Update
87
Protecting Customer´s Privacy in Querying Valuable Information Combined with E-Payment Scheme
88
Protecting customers traffic from the effects of EMI in computer controlled telecommunication networks
89
Protecting cyber critical infrastructure (CCI): integrating information security risk analysis and environmental vulnerability analysis
90
Protecting Data against Consecutive Disk Failures in RAID-5
91
Protecting data against unwanted inferences
92
Protecting Data Aggregation from Compromised Nodes in Wireless Sensor Network
93
Protecting data compression: Arithmetic coding
94
Protecting data from malicious software
95
Protecting data in personal cloud storage with security classifications
96
Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
97
Protecting Data Privacy from Being Inferred from High Dimensional Correlated Data
98
Protecting Databases from Query Flood Attacks
99
Protecting david - [engineering wellness]
100
Protecting delay-sensitive traffic transmission against flooding attacks in smart grid networks
101
Protecting designs with a passive thermal tag
102
Protecting Digital Assets: Legal Protections Do ´´Not Equal Practical Security
103
Protecting digital content within the home
104
Protecting Digital Data Privacy in Computer Forensic Examination
105
Protecting digital fingerprint in Automated Fingerprint Identification System using Local Binary Pattern operator
106
Protecting digital identities in future networks
107
Protecting digital image copyrights: a framework
108
Protecting Digital Legal Professional Privilege (LPP) Data
109
Protecting digital music delivery and consumption using the OCCAMM project framework
110
Protecting digital signal processors (DSP) with modified real convolutional codes
111
Protecting digital-image copyrights: A robust and blind watermarking scheme
112
Protecting distance calculation of reradiation interference on AM broadcasting station from UHVDC power line
113
Protecting distance of reradiation interference between UHVDC power line and receiving station of AM broadcasting
114
Protecting distributed software upgrades that involve message-passing
115
Protecting distribution feeders for simultaneous faults
116
Protecting distribution substation assets — Modern protection schemes with microprocessor-based relays
117
Protecting distribution transformers against Very Fast Transients due to switching operation
118
Protecting distribution transformers from low-side current surges
119
Protecting DNS from cache poisoning attack by using secure proxy
120
Protecting DSP circuits through obfuscation
121
Protecting Dynamic Multicast Sessions in Optical WDM Mesh Networks
122
Protecting E-courses Copyright in M-learning Process
123
Protecting EFIE-based scattering computations from effects of interior resonances
124
Protecting electrical and electronic systems from moisture damage
125
Protecting Electrical Technology Through Patents
126
Protecting embedded error detection arithmetic coding from eavesdroppers
127
Protecting employees´ inventions
128
Protecting endpoint devices in IoT supply chain
129
Protecting entanglement from decoherence via weak quantum measurement
130
Protecting enterprise information from employee´s misappropriation in China
131
Protecting Essential Refining Operations Using Blast-Resistant Electrical Equipment Shelters
132
Protecting essential refining operations using blast-resistant electrical equipment shelters
133
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
134
Protecting federated databases using a practical implementation of a formal RBAC policy
135
Protecting Fingerprint Data Using Watermarking
136
Protecting firemen against fire-induced flashovers
137
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture
138
Protecting FPGA bitstreams using authenticated encryption
139
Protecting FPGA-based automotive systems against soft errors through reduced precision redundancy
140
Protecting free expression online with Freenet
141
Protecting free roaming agents against result-truncation attack
142
Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange
143
Protecting from Inside Attacks in Wireless Sensor Networks
144
Protecting future mobile access networks
145
Protecting Future Personal Computing: Challenging Traditional Network Security Models
146
Protecting geospatial data using digital watermarking
147
Protecting GIS vector map using the k-means clustering algorithm and odd-even coding
148
Protecting Global and Static Variables from Buffer Overflow Attacks
149
Protecting GPS availability from EMI
150
Protecting grid data transfer services with active network interfaces
151
Protecting guaranteed service traffic in an OpMiGua hybrid network
152
Protecting Hidden Transmission of Biometrics Using Authentication Watermarking
153
Protecting High-Voltage Motors Against Switching Overvoltages
154
Protecting hosts against attacks in IMAGO system
155
Protecting ideas---Careers in intellectual property and patents [Career Building Blocks]
156
Protecting IEEE 802.11 wireless LANs against the FCS false blocking attack
157
Protecting IEEE 802.11s wireless mesh networks against insider attacks
158
Protecting inappropriate release of data from realistic databases
159
Protecting industrial property rights
160
Protecting information assets through effective computer security training
161
Protecting Information in a Connected World: A Question of Security and of Confidence in Security
162
Protecting information in the Web-position paper
163
Protecting information security availability via self-adapting intelligent agents
164
Protecting Information Systems from DDoS Attack Using Multicore Methodology
165
Protecting information systems from insider threats - concepts and issues
166
Protecting integrated circuits from piracy with test-aware logic locking
167
Protecting integrity and confidentiality for data communication
168
Protecting Intellectual Property by Certified Component Quality Descriptions
169
Protecting intellectual property in cyberspace
170
Protecting intellectual property in digital multimedia networks
171
Protecting IP Backbone: MPLS vs. Optical Mesh Restoration
172
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks
173
Protecting IP-based SCADA System with Crossed-Cipher Scheme
174
Protecting Iris Images through Asymmetric Digital Watermarking
175
Protecting job seekers from identity theft
176
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
177
Protecting Kernel Data through Virtualization Technology
178
Protecting know-how in cross-organisational functional mock-up by a service-oriented approach with trust centres
179
Protecting Laptops
180
Protecting large machines from arcing faults
181
Protecting large machines from arcing faults
182
Protecting LHC components against radiation resulting from an unsynchronized beam abort
183
Protecting LHC components against radiation resulting from colliding beam interactions
184
Protecting load devices from the effects of low-side surges
185
Protecting load devices from the effects of low-side surges
186
Protecting Location Information of Mobile Nodes in Mobile IPv6
187
Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
188
Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id
189
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
190
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
191
Protecting location privacy through Identity Diffusion
192
Protecting Location Privacy Through Path Confusion
193
Protecting Location Privacy Using Cloaking Subgraphs on Road Network
194
Protecting Location Privacy via Synchronously Pseudonym Changing in VANETs
195
Protecting Location Privacy with Clustering Anonymization in vehicular networks
196
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks
197
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks
198
Protecting location privacy with k-confusing paths based on dynamic pseudonyms
199
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
200
Protecting machines from line surges
201
Protecting Machines From Line Surges
202
Protecting machines from line surges
203
Protecting MANETs from Spurious CTS Attacks with Randomized Carrier Sensing
204
Protecting marine environment and promoting the sustainable development of marine economy hard
205
Protecting Me
206
Protecting medical data for analyses
207
Protecting micro-grid systems containing solid-state converter generation
208
Protecting Military Perimeters from Approaching Human and Vehicle Using Biologically Realistic Dynamic Synapse Neural Network
209
Protecting Miners from Electrical Arcing Injury
210
Protecting Mobile Agent´s Computation Results with Reversible Watermarking and Digital Signature
211
Protecting Mobile Agents by patching the execution platforms
212
Protecting mobile agents by using traceability techniques
213
Protecting mobile code
214
Protecting mobile code in the world
215
Protecting Mobile Codes Using the Decentralized Label Model
216
Protecting mobile Web-commerce agents with smartcards
217
Protecting modular multilevel converters (MMC) against ac fault by deadbeat control
218
Protecting Moving Trajectories with Dummies
219
Protecting multicast sessions in WDM optical mesh networks
220
Protecting Multicast Sessions in Wireless Mesh Networks
221
Protecting Multi-Lateral Localization Privacy in Pervasive Environments
222
Protecting multimedia authenticity with ICA vaccination of digital bacteria watermarks
223
Protecting mutually coupled transmission lines: Challenges and solutions
224
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
225
Protecting network coded packets in coalition networks
226
Protecting Networks by Controlling Access
227
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API
228
Protecting Non-dedicated Cluster Environments by Marking Processes with Stigmata
229
Protecting NYSEG´s six-phase transmission line
230
Protecting on-line casinos against fraudulent player drop-out
231
Protecting Online Transactions with Unique Embedded Key Generators
232
Protecting our Nation´s ports with the Port Security Risk Analysis and Resource Allocation System (PortSec 3.0)
233
Protecting Our Shorelines: Modeling the Effects of Tsunamis and Storm Waves
234
Protecting Outsourced Data Privacy with Lifelong Policy Carrying
235
Protecting ownership rights of a lossless image coder through hierarchical watermarking
236
Protecting ownership rights through digital watermarking
237
Protecting password piracy using authentication protocol
238
Protecting Patient Data-The Economic Perspective of Healthcare Security
239
Protecting patient privacy in distributed collaborative healthcare environments by retaining access control of shared information
240
Protecting peer-to-peer network with roaming agents
241
Protecting peer-to-peer networks from the denial of service attacks
242
Protecting personal data: can IT security management standards help?
243
Protecting Personal Privacy: Hauling Down the Jolly Roger
244
Protecting personal space intelligently in collaborative virtual environments
245
Protecting physical layer synchronization: mitigating attacks against OFDM acquisition
246
Protecting pipelined asynchronous communication channels against single event upsets
247
Protecting PONs: A failure impact, availability and cost perspective based on a geometric model
248
Protecting poorly chosen secrets from guessing attacks
249
Protecting power systems in the post-restructuring era
250
Protecting practical FFT implementations that share common processing elements
251
Protecting Premium Traffic in Colorless Core Backbone: Test Results
252
Protecting Primary Users in Cognitive Radio Networks: Peak or Average Interference Power Constraint?
253
Protecting Privacy Credentials from Phishing and Spyware Attacks
254
Protecting privacy in a decentralized environment
255
Protecting Privacy in case based reasoning by disordered PCA on one class data
256
Protecting Privacy in Key-Value Search Systems
257
Protecting Privacy in Location-Based Services Using K-Anonymity without Cloaked Region
258
Protecting privacy in remote-patient monitoring
259
Protecting Privacy in Signal Processing
260
Protecting privacy in the cyber era
261
Protecting privacy of children in social networking sites with rule-based privacy tool
262
Protecting Privacy of Health Information through Privacy Broker
263
Protecting Privacy of Sensitive Data Dissemination Using Active Bundles
264
Protecting privacy of topology in consensus networks
265
Protecting Privacy of User Information in Continuous Location-Based Services
266
Protecting privacy using the decentralized label model
267
Protecting Privacy While Discovering and Maintaining Association Rules
268
Protecting privacy, civil rights and civil liberties using data labeling and segmentation
269
Protecting privacy, in continuous location-tracking applications
270
Protecting privacy: Towards a visual framework for handling end-user data
271
Protecting private cloud located within public cloud
272
Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse
273
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory
274
Protecting processing elements in communications satellites
275
Protecting Professional Rights: The AAUP Approach
276
Protecting Programs Against Memory Violation In Hardware
277
Protecting Public Keys and Signature Keys
278
Protecting publicly-available images with an invisible image watermark
279
Protecting QoS in the Ciphertext Domain
280
Protecting quantum discord using weak measurement and quantum measurement reversal
281
Protecting RAID Arrays against Unexpectedly High Disk Failure Rates
282
Protecting real-time traffic service in a 3-LIHON hybrid node
283
Protecting Receiver-Location Privacy in Wireless Sensor Networks
284
Protecting Rechargeable-Batteries against Abusive Deep Discharging
285
Protecting Reconfiguration in Future Mobile Communication Systems
286
Protecting regular customer traffic from ad-hoc traffic in public WLAN hot-spots
287
Protecting Remotely Located Motors: Application Issues and Solutions to the Technical Challenges
288
Protecting replicated objects against media failures
289
Protecting Resources in an Open and Trusted Peer-to-Peer Network
290
Protecting resources with resource control lists
291
Protecting respondents identities in microdata release
292
Protecting revenue in the distribution industry: a new approach with the revenue assurance and audit process
293
Protecting RF ICs: a new reliability challenge
294
Protecting RF signal paths from accidental DC misconnects or ESD without affecting RF performance
295
Protecting router cache privacy in named data networking
296
Protecting Router Forwarding Table in Space
297
Protecting RSA against Fault Attacks: The Embedding Method
298
Protecting Run-Time Filters for Network Intrusion Detection Systems
299
Protecting satellite networks from disassociation DoS attacks
300
Protecting Scalable Video Flows from Congestion Loss
301
Protecting Schrodinger Cat States By Use Of Feedback
302
Protecting security information in distributed systems
303
Protecting Sensitive Business Information While Sharing Serial-Level Data
304
Protecting Sensitive Customer Information in Call Center Recordings
305
Protecting sensitive knowledge by data sanitization
306
Protecting Sensitive Labels in Social Network Data Anonymization
307
Protecting Sensitive Labels in Weighted Social Networks
308
Protecting Sensor Location Privacy against Adversaries in Wireless Sensor Networks
309
Protecting Sensor Networks using Risk Analysis
310
Protecting servers against DDoS attacks with improved source IP address monitoring scheme
311
Protecting Service Innovations against Imitation The Case of Mobile TV
312
Protecting Service Providers by Using Agent Virtual Machine
313
Protecting services from security mis-configuration
314
Protecting Shared Cryptographic Keys
315
Protecting signal integrity against atomic clock anomalies on board GNSS satellites
316
Protecting Signal Integrity Against Atomic Clock Anomalies on Board GNSS Satellites
317
Protecting SIP against Very Large Flooding DoS Attacks
318
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
319
Protecting SIP server from CPU-based DoS attacks using history-based IP filtering
320
Protecting SIP-Based Networks and Services from Unwanted Communications
321
Protecting Small Flows from Large Ones for Quality of Service
322
Protecting Smart Grid Automation Systems Against Cyberattacks
323
Protecting Smart-Grid with Breno-Silva fast single pattern match algorithm for small patterns
324
Protecting Software and Firmware Developments
325
Protecting software, visual display systems
326
Protecting SRAM-based FPGAs against multiple bit upsets using erasure codes
327
Protecting teenagers from potential internet security threats
328
Protecting teredo clients from source routing exploits
329
Protecting TFRC from a Selfish Receiver
330
Protecting The Big Easy From the Next Big One
331
Protecting the Channel Tunnel
332
Protecting the code against side attacks using chaotically controlled clock and supply
333
Protecting the Confidentiality of Virtual Machines Against Untrusted Host
334
Protecting the critical information infrastructure
335
Protecting the DNS from Routing Attacks: Two Alternative Anycast Implementations
336
Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling with Network Sensors
337
Protecting the DNS infrastructure of a top level domain: Real-time monitoring with network sensors
338
Protecting the Domain Name System
339
Protecting the electric power infrastructure with a mobile agent monitoring and analysis system
340
Protecting the electricity user
341
Protecting the Exchange of Document Images in Cross-Enterprise Process Integration with Web Services
342
Protecting the Exchange of Medical Images in Healthcare Process Integration with Web Services
343
Protecting the global positioning system
344
Protecting the Grid: Strengthening it against cyberattacks [In My View]
345
Protecting the head/disk interface from the chemical environment with disk drive filtration
346
Protecting the hosted application server
347
Protecting the integrity of a sequence of images
348
Protecting the integrity of an entire file system
349
Protecting the Internet from distributed denial-of-service attacks: a proposal
350
Protecting the Leads of a Powered Magnet That is Protected With Diodes and Resistors
351
Protecting the method of auxiliary sources (MAS) solutions from the interior resonance problem
352
Protecting the mobile enterprise
353
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
354
Protecting the power grid from solar storms [News]
355
Protecting the primary users´ operational privacy in spectrum sharing
356
Protecting the Privacy Based on Reasoning in E-business Using Anonymous
357
Protecting the Privacy of Users in Retrieving Valuable Information by a PIR Scheme with Mutual Authentication by RSA Signature Algorithm
358
Protecting the process
359
Protecting the protectors: Legal liabilities from the use of Web 2.0 for Australian disaster response
360
Protecting the purchaser
361
Protecting the quality of service of existing information systems
362
Protecting the robustness of ADSL and VDSL DMT modems when applying DSM
363
Protecting the Royal Navy from Lightning-William Snow Harris and His Struggle with the British Admiralty for Fixed Lightning Conductors
364
Protecting the smart grid: A risk based approach
365
Protecting the Train Driver and the Public at the User Worked Crossing
366
Protecting the user
367
Protecting the user
368
Protecting the user
369
Protecting TOR exit nodes from abuse
370
Protecting transmission lines terminated into transformers
371
Protecting Transportation Infrastructure
372
Protecting Tubular Heating Elements Against Moisture
373
Protecting unattended computers without software
374
Protecting user anonymity in location-based services with fragmented cloaking region
375
Protecting user privacy in WiFi sharing networks
376
Protecting User Trajectory in Location-Based Services
377
Protecting users against phishing attacks with AntiPhish
378
Protecting Users´ Anonymity in Pervasive Computing Environments
379
Protecting users´ privacy in healthcare cloud computing with APB-TTP
380
Protecting Vehicular Cloud against malicious nodes using zone authorities
381
Protecting VHF antennas from EMP
382
Protecting video data through watermarking: A comprehensive study
383
Protecting video service quality in multimedia access networks through PCN
384
Protecting Voice over IP Communication Using Electronic Identity Cards
385
Protecting Water Resources from Large-Scale Animal Production
386
Protecting Wavelengths in a DWDM Network Using a Minimal Number of Optical Transponders
387
Protecting wavelet lifting transforms
388
Protecting Web 2.0 Services from Botnet Exploitations
389
Protecting web applications via Unicode extension
390
Protecting Web Browser Extensions from JavaScript Injection Attacks
391
Protecting Web servers from octopus attacks
392
Protecting Web servers from security holes in server-side includes
393
Protecting web services with Service Oriented Traceback Architecture
394
Protecting Web usage of credit cards using One-Time Pad cookie encryption
395
Protecting Websites from Attack with Secure Delivery Networks
396
Protecting Wi-Fi networks from rogue access points
397
Protecting Wireless Local Area Networks
398
Protecting Wireless Mesh Networks through a distributed intrusion prevention framework
399
Protecting wireless sensor networks from internal attacks based on uncertain decisions
400
Protecting with Sensor Networks: Attention and Response
401
Protecting with sensor networks: perimeters and axes
402
Protecting XML Databases against Ontology-Based Inference Attack
403
Protecting XML documents
404
Protecting You [Guest editors´ introduction]
405
Protecting your guardforce-fenestration obscuration techniques
406
Protecting your intellectual property
407
Protecting your intellectual property: Serurity, encryption and anti-copy technologies
408
Protecting your most valuable asset: intellectual property
409
Protecting your organisation´s most valuable asset [LAN security]
410
Protecting your products in foreign marketplaces
411
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
412
Protecting Your Software Updates
413
Protecting your staff from arcing hazards
414
Protecting Yourself with RFID: Embracing the benefits of wireless tracking technology.
415
Protection Access Network: An Architecture Approach to Remote Monitor and Control
416
Protection Against Accidental Beam Losses at the LHC
417
Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization
418
Protection against Byzantine attacks on Wireless Sensor Networks
419
Protection against cascading failures in scale-free networks
420
Protection against cochannel interference from neighboring cells using down-tilting of antenna beams
421
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems
422
Protection against common mode currents on exposed cables
423
Protection against covert storage and timing channels
424
Protection against data drop, an enhanced security model of authentication protocol for Ad-hoc N/w
425
Protection against direct lightning strokes by Charge Transfer System
426
Protection against Electric Shock
427
Protection against electric shock from central office communications equipment
428
Protection Against External Errors in a Dedicated System
429
Protection against Ground-Faults in Tetrapole Unit-Generator with Two Parallel Branches in Phase
430
Protection against hackers on client computers for e-voting systems
431
Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
432
Protection Against Hazards
433
Protection against indirect overflow attacks on pointers
434
Protection against junction burnout by current limiting
435
Protection against lightning of reinforced concrete buildings
436
Protection against lightning on monitoring system of transmission line icing
437
Protection against lightning surges
438
Protection against lightning surges of electrical and industrial installations
439
Protection against lightning, and the multigap lightning arrester
440
Protection against Lightning, and the Multigap Lightning Arrester
441
Protection Against Link Errors and Failures Using Network Coding
442
Protection against link errors and failures using network coding in overlay networks
443
Protection against loss of utility grid supply for a dispersed storage and generation unit
444
Protection against Mobile Adversaries in Mobile Ad-hoc Networks
445
Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes
446
Protection against packet drop attack
447
Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer
448
Protection against penetration attacks using Metasploit
449
Protection against Reactor Inter-Turn Fault with Shunt Capacitance Compensator Based on Voltage Ratio
450
Protection against remote code execution exploits of popular applications in Windows
451
Protection against reverse engineering in digital cameras
452
Protection against secondary ESD effects
453
Protection against shock to earth
454
Protection against the effects of lightning
455
Protection against thrust-bearing damage
456
Protection against voltage collapse based on local phasors
457
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
458
Protection AgainstWeb-based Password Phishing
459
Protection Algorithm against security holes of IPv6 routing header
460
Protection algorithm based on differential voltage measurement for MTDC grids
461
Protection Algorithm Based on Lightpath Load in GMPLS Optical Networks
462
Protection algorithm based on spectrum characteristic of transient component
463
Protection algorithm for a wind turbine generator based on positive- and negative-sequence fault components
464
Protection algorithm for a wind turbine generator in a large wind farm
465
Protection algorithm for the windings of a doubly-fed induction generator using the d-q equivalent circuits
466
Protection algorithms for groupcast sessions in transparent optical networks with mesh topologies
467
Protection analysis for plant rating and power quality issues in LVDC distribution power systems
468
Protection and Application or Series Capacitors Used with Distribution Transformers
469
Protection and Commissioning of Digital Transformer Relays: Improvements in Medium-Voltage Industrial Transformer Protection
470
Protection and commissioning of multifunction digital transformer relays at medium voltage industrial facilities
471
Protection and commissioning of multifunction digital transformer relays at medium voltage industrial facilities
472
Protection and Commissioning of Multifunction Digital Transformer Relays at Medium Voltage Industrial Facilities
473
Protection and connection of renewable energy systems
474
Protection and control aspects of improved utilisation of existing overhead lines
475
Protection and Control for Grid Connected Photovoltaic Power Generation System Based on Instantaneous Power Theory
476
Protection and control of accelerator microwave sources using a high power IGBT switch
477
Protection and control of CHP installations
478
Protection and control of domestic PV based micro-grids
479
Protection and control of low voltage motors used in industrial applications
480
Protection and control of networks with distributed generators capable of operating in islanded mode
481
Protection and control of two phase shifting transformers in the Netherlands
482
Protection and Control Redundancy Considerations in Medium Voltage Distribution Systems
483
Protection and control system for cophase supply traction substation
484
Protection and control system upgrade based on IEC- 61850 and PRP
485
Protection and control systems in substations, are they working independent from each other system?
486
Protection and Coordination Concepts for 600-Volt Refinery Electrical Systems
487
Protection and development of famous historical and cultural cities based on sustainable development—A case study of Nanjing
488
Protection and economic sustainable development of water resources on the middle route of south- to-north water transfer project of water district
489
Protection and energy management of zero net electric energy clusters of buildings
490
Protection and excitation systems for the TEXT upgrade generators
491
Protection and fairness oriented cognitive radio MAC protocol for ad hoc networks (PROFCR)
492
Protection and Fault Analysis
493
Protection and fault identification in presence of power swing blocking/unblocking function
494
Protection and fundamental vulnerability of GNSS
495
Protection and guarantee for voice and video traffic in IEEE 802.11e wireless LANs
496
Protection and LAN emulation in Ethernet passive optical networks
497
Protection and monitoring of large machines
498
Protection and Monitoring of Large Machines
499
Protection and monitoring of nonsolidly earthed networks
500
Protection and monitoring of the ISR superconducting low- β quadrupoles
501
Protection and Quench Detection of YBCO Coils Results With Small Test Coil Assemblies
502
Protection and Recovery of Disk Encryption Key Using Smart Cards
503
Protection and regeneration planning research of Hanyang historic scene
504
Protection and remediation of the Black Sea and the Caspian Sea — Through the international environmental information center (http://pims.ed.ornl.gov)
505
Protection and remote control equipment in medium-voltage stations
506
Protection and Restoration [Session 10]
507
Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study
508
Protection and restoration in ad hoc wireless networks
509
Protection and restoration in optical networks
510
Protection and restoration scheme for light-trail WDM ring networks
511
Protection and safety. Part 1: Fuses
512
Protection and safety. Part 2: Cutouts
513
Protection and safety. Part 3: Power supplies
514
Protection and safety. Part 4: Physiology and staying alive
515
Protection and safety. Part 5: Static, CMOS, and all that
516
Protection and safety. Part 6: Electromagnetic problems
517
Protection and safety. Part 7: The real safety problems in the laboratory
518
Protection and self-protection of the Murchison Radio-astronomy Observatory from radio frequency interference
519
Protection and Spatial Reuse in Optical Burst Transport (OBT) Networks
520
Protection and stabilisation of large superconducting coils
521
Protection and stability assessment in future distribution networks using PMUs
522
Protection and Substation Automation Systems: Standardization, Integration and Information Technology
523
Protection and Supervision of DC-DC Converters for Electronic Telephone Switching Systems
524
Protection and switching of large loads for the more electric aircraft
525
Protection and Switching-Aid Networks for Transistor Bridge Inverters
526
Protection and telecommunications interface problems for digital transfer relays
527
Protection and transmission of side information for peak-to-average power ratio reduction of an OFDM signal using partial transmit sequences
528
Protection and tripping strategy for pumped-storage unit startup in back-to-back mode
529
Protection And tRuSt In FinanciAL infrastructures
530
Protection and Versioning for OCT
531
Protection and voltage control of DFIG wind turbines during grid faults
532
Protection application considerations for northern transmission
533
Protection approaches for dynamic traffic in IP/MPLS-over-WDM networks
534
Protection Architecture for Colorless DWDM Passive Optical Networks
535
Protection architecture for Passive Optical Networks using cascaded AWG and tunable components
536
Protection Architecture for WDM based Access Network with Colorless ONUs
537
Protection arrangements for grounded wye shunt capacitor bank
538
Protection asset maintenance-what business value?
539
Protection asset replacement-what business value?
540
Protection at the heart of railway asset management
541
Protection at the speed of light: Arc-flash protection combining arc flash sensing and arc-resistant technologies
542
Protection augmentation using key replacement in acoustic steganography
543
Protection Based on Neighborhood-Trust in Clustered Wireless Mesh Networks
544
Protection boundary for internetwork security
545
Protection capacity savings due to end-to-end shared backup path restoration in optical mesh networks
546
Protection challenges facing Distributed Generation on rural feeders
547
Protection challenges for the overhead / underground / undersea double circuit 400 kV EHV GIS Aliveri - System transmission line
548
Protection challenges in future converter dominated power systems: Demonstration through simulation and hardware tests
549
Protection Circuit against Differential Power Analysis Attacks for Smart Cards
550
Protection Circuit and Quench Simulation of a 7 T Superconducting Magnet for Animal MRI
551
Protection circuit for electronic ballasts at fluorescent lamp life-end
552
Protection circuit for high power amplifiers operating under mismatch conditions
553
Protection circuit for the matrix converter
554
Protection circuit of normally-on SiC JFET using an inrush current
555
Protection circuit to prevent a transition from ZVS mode to ZCS mode under variable frequency operation
556
Protection circuitry and time resolution in high frequency ultrasonic NDE
557
Protection circuits for ultrasound applications
558
Protection complex for power converters based on turn-off devices
559
Protection computers or protection relays?
560
Protection configuration research in distribution network with distributed generation
561
Protection considerations for installation of distributed energy resources
562
Protection co-ordinated with communication and control
563
Protection coordination — An important task for network security
564
Protection coordination analysis of closed-loop distribution system
565
Protection coordination analysis under a real-time architecture for industrial distribution systems based on the Std IEEE 242-2001
566
Protection coordination for a multi-source traction power supply network
567
Protection coordination for dual failure on two-layer networks
568
Protection coordination in active distribution grids with IEC 61850
569
Protection coordination in grid connected & islanded modes of micro-grid operations
570
Protection coordination in modern distribution grids integrating optimization techniques with adaptive relay setting
571
Protection coordination issues with DFIG wind generation on weak networks; Preliminary issues
572
Protection coordination of directional overcurrent relays considering fault current direction
573
Protection coordination of meshed MMC-MTDC transmission systems under DC faults
574
Protection coordination of over current relays in distribution system with DG and superconducting fault current limiter
575
Protection co-ordination: determination of the break point set
576
Protection cost evaluation of two WDM-based next generation optical access networks
577
Protection costs of a fully connected IP core network over a WDM ring
578
Protection cycle covers in optical networks with arbitrary mesh topologies
579
Protection cycles in mesh WDM networks
580
Protection design against system-level ESD transient disturbance on display panels
581
Protection design and coordination of DC Distributed Power Systems Architectures
582
Protection design and management using global resources
583
Protection designs in medium voltage distribution networks, time to reconsider
584
Protection device monitoring using data from power quality monitoring devices
585
Protection device of high-voltage explosion-proof switch based on IEC 61850
586
Protection devices against DC fault in a back-to-back converter applied to distribution grids
587
Protection devices and systems for high-voltage applications - Book Review
588
Protection devices for aircraft electrical power distribution systems: a survey
589
Protection Devices for Aircraft Electrical Power Distribution Systems: State of the Art
590
Protection devices in the transfer lines to the LHC
591
Protection devices testing based on power-hardware-in-the-loop simulation
592
Protection domain allocation for optical networks with partial wavelength conversion
593
Protection domain extensions in Mungi
594
Protection Dynamic Reliability Analysis System Based on 3RF Technique
595
Protection ellipsoids for stability analysis of feedforward neural-net controllers
596
Protection Equipment for Power Company Communication Lines
597
Protection Evaluation Framework for Tactical SATCOM Architectures
598
Protection features for the joint use of wood poles
599
Protection Features for the Joint Use of Wood Poles Carrying Communication Circuits and Power-Distribution Circuits Above 5,000 Volts
600
Protection features for the joint use of wood poles: Carrying communication circuits and power-distribution circuits above 5,000 volts
601
Protection for a ring-based EPON architecture
602
Protection for adaptive multi-layer traffic engineering
603
Protection for DC substations and AC track feeder stations
604
Protection for DC substations and AC track feeder stations
605
Protection for DC Substations and AC Track Feeder Stations
606
Protection for DC substations and AC track feeder stations
607
Protection for design
608
Protection for designers
609
Protection for distributed generations in the DC micro-grid
610
Protection for low and medium voltage AC trailing cables
611
Protection for low current superconducting coils wound with insulated strand cable
612
Protection for MPLS-TP multicast services
613
Protection for overvoltage of 40.5 kV vacuum circuit breaker switching off shunt reactors
614
Protection for switching systems: lightning, power grid, EMC, NEMP and related phenomena
615
Protection for the transmission grid
616
Protection for underwater instruments
617
Protection from distributed denial of service attacks using history-based IP filtering
618
Protection from flashing for direct current apparatus
619
Protection from Flashing for Direct-Current Apparatus
620
Protection from Human Error: Guarded Motion Methodologies for Mobile Robots
621
Protection from lightning of France Telecom centres: from kilo-amperes to kilo-francs
622
Protection from paging and signaling attack in 3G CDMA networks
623
Protection from unresponsive flows with geometric CHOKe
624
Protection from voltage dips with the dynamic voltage restorer
625
Protection from Wishful Thinking
626
Protection functions for distribution networks with distributed generation applying wavelet transform
627
Protection Functions in Integrated Low Side Switches
628
PROTECTION FUSE FOR A 4.5 MJ CAPACITOR BANK
629
Protection Goals for Privacy Engineering
630
Protection Heater Delay Time Optimization for High-Field \\hbox {Nb}_{3}\\hbox {Sn} Accelerator Magnets
631
Protection Heater Development for REBCO Coils
632
Protection heater performance of Nb3Sn epoxy impregnated superconducting solenoids
633
Protection implications from a communications system upgrade
634
Protection in an object-oriented distributed virtual machine
635
Protection in Core Packet Networks: Layer 1 or Layer 3?
636
Protection in elastic optical networks
637
Protection in Elastic Optical Networks against up to Two Failures Based FIPP p-Cycle
638
Protection in multi-granular waveband networks [optical WDM systems]
639
Protection in MV networks using electronic instrument transformers
640
Protection in the BirliX operating system
641
Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences
642
Protection interoperability for WDM optical networks
643
Protection interworking for SDH networks
644
Protection is a software issue
645
Protection issue discussion of DC network development: Circuit breaker or fault-tolerant converter
646
Protection issues and solutions for protecting feeder with distributed generation
647
Protection issues and state of the art for microgrids with inverter-interfaced distributed generators
648
Protection Issues Associated with the Proliferation of Static Synchronous Compensator (STATCOM) Type Facts Devices in Power Systems
649
Protection issues during system restoration
650
Protection issues for renewable generators
651
Protection Issues in Microgrids with Multiple Distributed Generation Units
652
Protection Level During Extraction, Transfer and Injection into the LHC
653
Protection level evaluation of distribution systems based on Dempster-Shafer theory of evidence
654
Protection LNA at X-range of PIN diode limiter for higher RF power
655
Protection margins for joint operation of WiMAX 802.16e and WiMedia-defined UWB radio in personal area networks
656
Protection matching: A new scheduling rule for improved design of BICM-ID systems
657
Protection Measure and Sustainable Development on Eco-Geological Environment of Rare Earth Mining in Southern Jiangxi Province
658
Protection Measures Against Radiations From Cathode-ray Tubes By Using Anti-glare Screens
659
Protection Mechanism and Deployment Cost Analysis for Ethernet PON FTTH Access Network
660
Protection Mechanism for Development of Warrants from the Accounting Management Aspects
661
Protection mechanism for modern telecommunications
662
Protection mechanism for the N2R topological routing algorithm
663
Protection Mechanism in Privileged Memory Space for Embedded Systems, Real-Time OS
664
Protection mechanism with differentiated service reliability in multi-domain optical networks based on conditional risk disjunction degree
665
Protection mechanisms for application service hosting platforms
666
Protection mechanisms for optical WDM networks based on wavelength converter multiplexing and backup path relocation techniques
667
Protection Mechanisms for Well-behaved TCP Flows from Tampered-TCP at Edge Routers
668
Protection method from APP repackaging attack on mobile device with separated domain
669
Protection methods for power-transistor circuits
670
Protection model of an horizontal lightning conductor in the case of earth discontinuity
671
Protection modes for segmented video streaming over broadband wireless
672
Protection Money (viewpoint)
673
Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data
674
Protection networking of ethernet PON FTTH access network
675
Protection noiseproof device on radiating cables
676
Protection of 1000kV fixed series compensation against lightning
677
Protection of 132-kV transmission systems
678
Protection of 25Kv electrified railway system
679
Protection of 35kV delta connected Wind Farm transformers with fuses
680
Protection of 3D Object Through Silhouette Watermarking
681
Protection of 3-D object usage through texture watermarking
682
Protection of 3D Object Visual Representations
683
Protection of 3-Phase Motors Against Single-Phase Operation
684
Protection of 6–7GHZ band spaceborne microwave radiometer from interferences to derive sea surface temperature and others
685
Protection of a 3.3V domain and switchable 1.8V/3.3V I/O in a 40nm pure 1.8V process
686
Protection of a delay-locked loop from simultaneous switching noise coupling using an on-chip electromagnetic bandgap structure
687
Protection of a distribution network: An adaptive approach
688
Protection of a embedded generator shaft system from an instantaneous voltage sag
689
Protection of a Narrow-Band BPSK Communication System with an Adaptive Array
690
Protection of a priority connection from an optical switch failure in mesh networks with planar topologies
691
Protection of a receiving area from underwater pile driving noise using large encapsulated air bubbles
692
Protection of a Shared HPC Cluster
693
Protection of a Static Frequency Converter fed traction network, a case study
694
Protection of a transformerless intelligent power substation
695
Protection of AC and DC microgrids: Challenges, solutions and future trends
696
Protection of AC motors by means of microcontrollers
697
Protection of Alpha Spectrometry Detectors Using Thin Formvar Films and Influence on Detection Characteristics
698
Protection of alpha spectrometry detectors using thin formvar films and influence on detection characteristics
699
Protection of arc furnace supply systems from switching surges
700
Protection of audio amplifiers based on temperature measurements in power transistors
701
Protection of Auxiliary Power Systems in a Nuclear Power Plant
702
Protection of battery energy storage systems
703
Protection of bi-directional AC-DC/DC-AC converter in hybrid AC/DC microgrids
704
Protection of Binding Update Message in Mobile IPv6
705
Protection of Buried Cable from Direct Lightning Strike
706
Protection of buried telecommunication cables against high amplitude transient currents
707
Protection of bus duct with current-limiting fuses
708
Protection of c.m.r. motors
709
Protection of cables at risk from exposure to fire
710
Protection of cables by grounding structures
711
Protection of Cables by Open-Metal Conduits
712
Protection of Cables from Arcs Due to the Failure of Adjacent Cables
713
Protection of call detail records data in federal telecommunications
714
Protection of Chinese ecological environment under financial crisis
715
Protection of Coaxial Cable Assemblies
716
Protection of commercial installations from the high-frequency electromagnetic threats of HEMP and IEMI using IEC standards
717
Protection of computer equipment from power surges
718
Protection of Computer Ideawork&#8212;Today and Tomorrow
719
Protection of conduction cooled Nb3Sn SMES coil
720
Protection of confidential color image information based on Reversible Data Hiding technique (PCCIRT)
721
Protection of consumer right to a fair transaction in E-commerce
722
Protection of consumer rights in cyberspace
723
Protection of content streamed through the retransmission
724
Protection of control and monitoring equipment from electromagnetic noise in the 67MJ, 50kV capacitor bank
725
Protection of Control Circuit Rectifiers against Surges from D-C Coil Interruption
726
Protection of converter dense power systems
727
Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework
728
Protection of cultural heritage contents on the Web
729
Protection of data processing equipment against static electricity discharges
730
Protection of data relating to EU consumers in the IoT age
731
Protection of Database Security via Collaborative Inference Detection
732
Protection of depth-image-based rendering 3D images using blind watermarking
733
Protection of Digital Telecom Exchanges Against Lightning Surges and Earth Faults
734
Protection of digitally controlled inverter units in rapid prototyping applications
735
Protection of dispersed storage and generation units against islanding
736
Protection of Distributed Generation (DG) interconnection
737
Protection of distributed generation (DG) interconnection
738
Protection of distributed generation connected distribution system
739
Protection of distributed generation connected networks with coordination of overcurrent relays
740
Protection of distributed internetworked computers
741
Protection of distribution networks in presence of DG using Distribution Automation System capabilities
742
Protection of distribution systems using electronic devices
743
Protection of distribution systems with distributed generation using current phase variation
744
Protection of distribution systems with significant penetration of distributed generation
745
Protection of distribution transformers from failure due to lightning
746
Protection of divers in biologically polluted waters
747
Protection of domestic solar photovoltaic based microgrid
748
Protection of Double Circuit Transmission Lines
749
Protection of DRAM Spatial Light Modulators from Incident Light using a Multilevel Metallization Procedure
750
Protection of DVR against short circuit faults at the load side
751
Protection of DVR against Short Circuit Faults at the Load Side
752
Protection of Dynamic and Flexible Bandwidth on Demand in Metro Agile All-Optical Ring Networks
753
Protection of EHV transmission lines with series compensation: BC Hydro´s lessons learned
754
Protection of electric equipment against corrosion
755
Protection of Electric Equipment Against Corrosion in Industrial Plants
756
Protection of Electric Locomotives and Cars to Operate with High-Speed Circuit Breakers
757
Protection of electrical apparatus — Recommended relay practice
758
Protection of Electrical Apparatus Recommended Practise
759
Protection of Electrical Equipment
760
Protection of electrical equipment
761
Protection of Electrical Transmission Lines
762
Protection of electrical transmission lines
763
Protection of Electricity Distribution Networks [Book Review]
764
Protection of electricity distribution networks, 2nd ed. [Book review]
765
Protection of electronic devices against hostile environments
766
Protection of electronic equipment in a substation environment
767
Protection of electronic health records (EHRs) in cloud
768
Protection of Electronic Power Converters
769
Protection of embedded generation connected to a distribution network and loss of mains detection
770
Protection of embedded generation connected to a distribution network and loss of mains detection
771
Protection of embedded generation schemes
772
Protection of enclosures with harmonic pressure variation
773
Protection of engineering innovation
774
Protection of Fe pigments with amine-quinone polymers
775
Protection of fingerprint data with the glass maze algorithm
776
Protection of fixed monitoring station against interference from strong electromagnetic fields
777
Protection of force incentive on bone lose of tail-suspended rats
778
Protection of gas-insulated substations including corona and ohmic losses
779
Protection of gate movement in hydroelectric power stations
780
Protection of Generators Against Unbalanced Currents [includes discussion]
781
Protection of Geographical Indications in China
782
Protection of grid connected photovoltaic system during voltage sag
783
Protection of h.v. insulators
784
Protection of Hexagonal Phase Shifting Transformer
785
Protection of high and extra high voltage cables
786
Protection of high current density superconducting magnets
787
Protection Of High Power Modulators During Main Power Loss And Recovery
788
Protection of high value waterside assets: A new paradigm
789
Protection of high voltage power and programming pins
790
Protection of high voltage power and programming pins
791
Protection of High-Voltage AC Cables
792
Protection of High-Voltage AC Cables
793
Protection of High-Voltage Distribution Systems by Isolating Transformers
794
Protection of high-voltage distribution systems by isolating transformers
795
Protection of Historic Buildings through Structural Translocation during Construction of Deep Foundation Pit
796
Protection of Historical Buildings by Using New Chemical Techniques: Taking Nanjing as an Example
797
Protection of HTS Coils in the Limit of Zero Quench Propagation Velocity
798
Protection of HV systems: is simple and cheap good enough?
799
Protection of HVDC transmission lines based on wavelet transformation and analysis of energy spectrum
800
Protection of Identity Information in Cloud Computing without Trusted Third Party
801
Protection of indoor SF6 substations against lightning overvoltages in hybrid overhead/underground medium voltage networks
802
Protection of Induction Motor Using PLC
803
Protection of induction motors
804
Protection of Induction Motors Against Unbalanced Voltage Operation
805
Protection of Industrial Plants Against Insulation Breakdown and Consequential Damages
806
Protection of industrial plants against insulation breakdown and consequential damages
807
Protection of Industrial Plants Against Insulation Breakdown and Consequential Damages
808
Protection of industrial plants against insulation breakdown and consequential damages
809
Protection of information in computer systems
810
Protection of information in the IT era
811
Protection of InP epi-ready wafers by controlled oxide growth
812
Protection of Integrity and Ownership of PDF Documents Using Invisible Signature
813
Protection of intellectual property
814
Protection Of Intellectual Property
815
Protection of Intellectual Property in Web Communities by Modular Digital Watermarking
816
Protection of ion source electronics against dynamic conditions in ion source at elevated potentials in mass spectrometers
817
Protection of JPEG compressed e-comics by selective encryption
818
Protection of keys against modification attack
819
Protection of Large D-C Machines by Means of High-Speed Circuit Breakers
820
Protection of large D-C machines by means of high-speed circuit breakers
821
Protection of large D-C machines by means of high-speed circuit breakers
822
Protection of large power conversion equipment
823
Protection of Large Power Converters
824
Protection of Large Steam Turbine-Generator Units on TVA System
825
Protection of Large Three-Phase Motors
826
Protection of LEP experiments against particle background at highest beam energies
827
Protection of lightning caused interruptions on transmission line
828
Protection of local high voltage DC regenerative network on MEA
829
Protection of Location Privacy using Dummies for Location-based Services
830
Protection of low-voltage circuits by air circuit breakers in cascade arrangement
831
Protection of low-voltage circuits by air circuit breakers in cascade arrangement
832
Protection of Low-Voltage Circuits by Air Circuit Breakers in Cascade Arrangement
833
Protection of Low-Voltage DC Microgrids
834
Protection of LV networks
835
Protection of Mammograms Using Blind Steganography and Watermarking
836
Protection of medium and large a.c. motors
837
Protection of medium voltage DC power systems against ground faults and negative incremental impedances
838
Protection of medium-power pulse klystrons
839
Protection of Memories Suffering MCUs Through the Selection of the Optimal Interleaving Distance
840
Protection of memory using code redundancies a survey
841
Protection of meshed microgrids with communication overlay
842
Protection of MHV OH-lines and cables by digital distance relays-results of laboratory tests and field experience in a Belgian MHV network
843
Protection of microgrid
844
Protection of microgrid through coordinated directional over-current relays
845
Protection of micro-grids dominated by distributed generation using solid state converters
846
Protection of Microgrids During Utility Voltage Sags
847
Protection of microgrids using differential relays
848
Protection of microgrids with a high penetration of inverter-coupled energy sources
849
Protection of microprocessor-based cores for FPL devices
850
Protection of Microscopy Images through Digital Watermarking Techniques
851
Protection of mixed overhead and underground cable lines
852
Protection of mobile agent and its itinerary from malicious host
853
Protection of mobile agent data collection by using ring signature
854
Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP)
855
Protection of modern marine power systems: challenges and solutions
856
Protection of Motor from Switching Surge by Vacuum Switch
857
Protection of Motors : Examples of Setting with and Without Complete Data
858
Protection of motors against high voltage switching surges
859
Protection of motors with incomplete or minimal motor data
860
Protection of MP3 Music Files Using Digital Rights Management and Symmetric Ciphering
861
Protection of MPEG-2 multicast streaming in IP-TV
862
Protection of Muller-Pipelines from transient faults
863
Protection of multicast sessions in WDM mesh optical networks
864
Protection of Multicast Traffic in WDM Mesh Networks
865
Protection of Multiterminal and Tapped Lines AIEE Committee Report
866
Protection of MV and LV networks against lightning. I. Basic information
867
Protection of MV covered conductor lines against overvoltages and fault arcs
868
Protection of MV industrial networks
869
Protection of MV underground power cables
870
Protection of MV/LV solid-state transformers in the distribution grid
871
Protection of Nonpermanent Faults on DC Overhead Lines in MMC-Based HVDC Systems
872
Protection of offshore wind turbine blades against extreme conditions
873
Protection of oil storage tanks against direct lightning strikes: Self protection scheme or standalone LPS?
874
Protection of oil-filled transformer against explosion: Numerical simulations on a 200 MVA transformer
875
Protection of Optical Networks against Interchannel Eavesdropping and Jamming Attacks
876
Protection of optical rings interconnected by an ATM cross-connect
877
Protection of orchard from wild animals and birds using USN facilities
878
Protection of originating calls in handoff prioritization schemes
879
Protection of outside plant conductors
880
Protection of overhead line with inserted underground cable
881
Protection of parallel multi-circuit transmission lines
882
Protection of parallel passive filters against lightning surges
883
Protection of parallel passive filters against lightning surges [abstract only]
884
Protection of parallel transmission lines using wavelet transform
885
Protection of parallel transmission lines using Wi-Fi protocol
886
Protection of passive optical network by using ring topology
887
Protection of passive sensing use in the 18.6-18.8 GHz band
888
Protection of Patient´s Privacy and Data Security in E-Health Services
889
Protection of people against lightning in open environments: Impact of publication of IEC Std 62793: “Protection Against Lightning - Thunderstorm Warning Systems”
890
Protection of permanent faults on DC overhead lines in hybrid converter based HVDC system
891
Protection of Personal Information in the South African Cloud Computing environment: A framework for Cloud Computing adoption
892
Protection of Personnel Against Electrical Shock Hazards in Central Office Communications Equipment [includes discussion]
893
Protection of photovoltaic and wind generators
894
Protection of photovoltaic systems against lightning experimental verifications and techno-economic analysis of protection
895
Protection of pilot wires from induced potentials
896
Protection of Pilot Wires From Induced Potentials
897
Protection of Pilot-Wire Circuits
898
Protection of pilot-wire circuits
899
Protection of pilot-wire circuits
900
Protection of Pilot-Wire Relay Circuits AIEE Committee Report
901
Protection of polyphase motors
902
Protection of Power Lines Against Lighting
903
Protection of power lines against lightning
904
Protection of power plant transformers using digital technology
905
Protection of power system apparatus against arcing faults
906
Protection of power transformer using microcontroller-based relay
907
Protection of Power Transformers
908
Protection of Power Transformers Against Lighting Surges
909
Protection of power transformers against lightning surges
910
Protection of power transformers against lightning surges: AIEE committee on electrical machinery: Transformer subcommittee
911
Protection of Power Transformers By Using Continuous Wavelet Transform
912
Protection of power transistors in electric vehicle drives
913
Protection of powerformers in neutral ineffectively earthed power systems
914
Protection of Powerhouse Auxiliaries
915
Protection of powerhouse auxiliaries
916
Protection of Powerhouse Auxiliaries
917
Protection of powerhouse auxiliaries
918
Protection of pressure sensitive components in cordwood modules
919
Protection of prestressed high strength concrete pipe pile from large-scale excavation of deep foundation pit
920
Protection of primary users in areas where cognitive radio is deployed
921
Protection of printed circuit board structures in microwave process
922
Protection of privacy in JPEG files using reversible information hiding
923
Protection of privacy in pervasive computing environments
924
Protection of Program Integrity Based on Trusted Computing
925
Protection of property rights in computer software
926
Protection of PSK Communication Systems with Adaptive Arrays
927
Protection of query privacy for continuous location based services
928
Protection of radar against Anti-Radiation Missile using single electromagnetic decoy
929
Protection of radar systems against nearby or direct lightning strokes
930
Protection of radio frequency systems against lightning induced transient overvoltages
931
Protection of regional object and camera tampering
932
Protection of regions of interest against data loss in a generalized multiple description framework
933
Protection of remotely located motors
934
Protection of remotely located motors
935
Protection of remotely located motors
936
Protection of RF electronics using tuneable Frequency Selective Surfaces
937
Protection of Rotating A-C Machines Against Traveling Wave Voltages Due to Lightning
938
Protection of RPR strict order traffic
939
Protection of safety installations for nuclear sites
940
Protection of satellite communication links against intentional interference
941
Protection of semiconductor devices, circuits, and equipment from voltage transients
942
Protection of semiconductor rectifiers
943
Protection of Sensitive Data based on Reducts in a Distributed Knowledge Discovery System
944
Protection of series compensation station against lightning intruded wave in 1000kV AC transmission system
945
Protection of service in the 74B microwave radio system
946
Protection of SF6 Gas Insulated Substations IEEE Power System Relaying Committee Working Group
947
Protection of SF6 Gas Insulated Substations - Industry Survey Results
948
Protection of shared data among multiple users for online social networks
949
Protection of short transmission lines
950
Protection of SiO2from sodium contamination with phosphosilicate glass
951
Protection of Si-SiO2 interfaces from damp heat by overlying SiNx and Si3N4 coatings
952
Protection of Six Phase Transmission system of Allegheny Power System, USA against shunt faults
953
Protection of small computers from disturbances on the mains
954
Protection of software-based survivability mechanisms
955
Protection of software-based survivability mechanisms
956
Protection of SONET based networks
957
Protection of spaceborne and terrestrial passive sensors to observe trace gasses from 200 to 700 GHz
958
Protection of squirrel cage induction motor utilizing instantaneous power and phase information
959
Protection of squirrel-cage induction motor utilizing instantaneous power and phase information
960
Protection of station equipment against lightning
961
Protection of station equipment against lightning
962
Protection of structures against LEMP
963
Protection of structures against lightning
964
Protection of submarine cables by placement “underground”
965
Protection of superconducting AC windings
966
Protection of superconducting field windings for electrical machines by the use of an inertial free electromechanical shield
967
Protection of superconducting magnets
968
Protection of superconducting magnets with high current density
969
Protection of Supervisory Control Lines Against Over-Voltage
970
Protection of Teed transmission circuit using a new directional comparison technique
971
Protection of telecommunication equipment from nearby lightning magnetic field
972
Protection of telecommunication systems from lightning via pin diverter
973
Protection of the Airplane Main Bus
974
Protection of the airplane main bus
975
Protection of the child/ elderly/ disabled/ pet by smart and intelligent GSM and GPS based automatic tracking and alert system
976
Protection of the Digital Holy Quran Hash Digest by Using Cryptography Algorithms
977
Protection of the distribution lines against lightning overvoltages by surge arrester in the context of distributed generation and smart grids
978
Protection of the distribution lines with distributed generation against lightning overvoltages in the context of smart grids
979
Protection of the health care and public health critical infrastructure and key assets
980
Protection of the Human Body from Dangerous Currents
981
Protection of the Induction Motor/Generator
982
Protection of the Internal Insulation of a Static Transformer against High-Frequency Strains
983
Protection of the internal insulation of a static transformer against high-frequency strains
984
Protection of the network as a reputation of organization
985
Protection of the Public from Radioactivity Produced in Nuclear Power Reactors
986
Protection of the Spectr-R Spacecraft Against ESD Effects Using Satellite-MIEM Computer Code
987
Protection of the undetectables: A study on the primary receiver protection problem in cognitive radio networks
988
Protection of third party in UPT system
989
Protection of thyristors against overvoltage with breakover diodes
990
Protection of tombstone problems for small chip devices
991
Protection of Transformer Neutrals against Destructive Transient Disturbances
992
Protection of transformer neutrals against destructive transient disturbances
993
Protection of transformer-ended feeders using multifunction relays
994
Protection of transistor RF power amplifiers
995
Protection of transistors in class B audio output stages
996
Protection of transmission and distribution lines containing series capacitors
997
Protection of Transmission Line Over Mountainous Region Where Lightning Incidence Is High
998
Protection of transmission lines using fault component integrated power
999
Protection of transmission lines with series compensation new tools
1000
Protection of transmission systems using transient polarity comparison technique
بازگشت