Active Protection of an ${\rm MgB}_{2}$ Test Coil
نویسندگان
چکیده
منابع مشابه
Transcervical Migration of an Essure® Coil
Introduction: Essure® device malposition is a rare, but clinically significant complication, for which management is idiosyncratic. This case report describes an unusual example of Essure® migration in order to clarify reasonable management options. Case Presentation: A 50-year old G4P2022 underwent hysteroscopi...
متن کاملIdentifying an Honest ${\rm EXP}^{\rm NP}$ Oracle Among Many
We provide a general framework to remove short advice by formulating the following computational task for a function f : given two oracles at least one of which is honest (i.e. correctly computes f on all inputs) as well as an input, the task is to compute f on the input with the help of the oracles by a probabilistic polynomial-time machine, which we shall call a selector. We characterize the ...
متن کاملEffect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection
Appropriate operation of protection system is one of the effective factors to have a desirable reliability in power systems, which vitally needs routine test of protection system. Precise determination of optimum routine test time interval (ORTTI) plays a vital role in predicting the maintenance costs of protection system. In the most previous studies, ORTTI has been determined while remote bac...
متن کاملActive Pedestrian Protection
Vulnerable road users, especially pedestrians, are more susceptible to fatal and serious injury compared with vehicle occupants. Although the frequency of accidents involving pedestrians has reduced in recent years, there are still approximately 800 pedestrians killed and 7,000 seriously injured every year in Great Britain. Furthermore, in the late nineties, more than 6,000 pedestrians were fat...
متن کاملAcronis Active Protection Whitepaper
What is Ransomware? Ransomware is a type of malware that blocks access to some or all information that is stored on a device. In order to unlock the device or the data, the user is required to pay a ransom, usually in widely used e-currency. The term ransomware covers two types of malware: so-called Windows® blockers, which block the operating system or browser with a pop-up window, and encrypt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Applied Superconductivity
سال: 2011
ISSN: 1051-8223,1558-2515
DOI: 10.1109/tasc.2010.2095812