Academic literature on the topic 'MITIGATION ALGORITHM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MITIGATION ALGORITHM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "MITIGATION ALGORITHM"
Ding, Yi, Weiwei Fan, Zijing Zhang, Feng Zhou, and Bingbing Lu. "Radio Frequency Interference Mitigation for Synthetic Aperture Radar Based on the Time-Frequency Constraint Joint Low-Rank and Sparsity Properties." Remote Sensing 14, no. 3 (February 7, 2022): 775. http://dx.doi.org/10.3390/rs14030775.
Full textDhineshkumar, K., and C. Subramani. "Kalman Filter Algorithm for Mitigation of Power System Harmonics." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 771. http://dx.doi.org/10.11591/ijece.v8i2.pp771-779.
Full textMajumder, Swarnadeep, Christopher G. Yale, Titus D. Morris, Daniel S. Lobser, Ashlyn D. Burch, Matthew N. H. Chow, Melissa C. Revelle, Susan M. Clark, and Raphael C. Pooser. "Characterizing and mitigating coherent errors in a trapped ion quantum processor using hidden inverses." Quantum 7 (May 15, 2023): 1006. http://dx.doi.org/10.22331/q-2023-05-15-1006.
Full textYousif, Tasneem, and Paul Blunt. "Interference Mitigation for GNSS Receivers Using FFT Excision Filtering Implemented on an FPGA." Eng 3, no. 4 (October 31, 2022): 439–66. http://dx.doi.org/10.3390/eng3040032.
Full textSánchez-Cartas, Juan Manuel, Alberto Tejero, and Gonzalo León. "Algorithmic Pricing and Price Gouging. Consequences of High-Impact, Low Probability Events." Sustainability 13, no. 5 (February 26, 2021): 2542. http://dx.doi.org/10.3390/su13052542.
Full textAhmed, Mohamed, and Ezz Eldin Abdelkawy. "GPS correlated jammer mitigation utilizing MUSIC algorithm." International Conference on Electrical Engineering 7, no. 7 (May 1, 2010): 1–10. http://dx.doi.org/10.21608/iceeng.2010.33043.
Full textVU, Trung Kien, Sungoh KWON, and Sangchul OH. "Cooperative Interference Mitigation Algorithm in Heterogeneous Networks." IEICE Transactions on Communications E98.B, no. 11 (2015): 2238–47. http://dx.doi.org/10.1587/transcom.e98.b.2238.
Full textAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (June 11, 2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Full textSHIN, J. H., J. HEO, S. YOON, and S. Y. KIM. "Interference Cancellation and Multipath Mitigation Algorithm for GPS Using Subspace Projection Algorithms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 3 (March 1, 2008): 905–8. http://dx.doi.org/10.1093/ietfec/e91-a.3.905.
Full textGarzia, Fabio, Johannes Rossouw van der Merwe, Alexander Rügamer, Santiago Urquijo, and Wolfgang Felber. "HDDM Hardware Evaluation for Robust Interference Mitigation." Sensors 20, no. 22 (November 13, 2020): 6492. http://dx.doi.org/10.3390/s20226492.
Full textDissertations / Theses on the topic "MITIGATION ALGORITHM"
Zubi, Hazem M. "A genetic algorithm approach for three-phase harmonic mitigation filter design." Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604881.
Full textIkuma, Takeshi. "Non-Wiener Effects in Narrowband Interference Mitigation Using Adaptive Transversal Equalizers." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/26772.
Full textPh. D.
Manmek, Thip Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Real-time power system disturbance identification and its mitigation using an enhanced least squares algorithm." Awarded by:University of New South Wales. Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/26233.
Full textGandhi, Nikhil Tej. "Automatic Dependent Surveillance - Broadcast Enabled, Wake Vortex Mitigation Using Cockpit Display." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1354313600.
Full textLoh, Nolan. "Buildings as urban climate infrastructure: A framework for designing building forms and facades that mitigate urban heat." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553513750865168.
Full textAl-Odat, Zeyad Abdel-Hameed. "Analyses, Mitigation and Applications of Secure Hash Algorithms." Diss., North Dakota State University, 2020. https://hdl.handle.net/10365/32058.
Full textKivrikis, Andreas, and Johan Tjernström. "Development and Evaluation of Multiple Objects Collision Mitigation by Braking Algorithms." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2676.
Full textA CMbB system is a system that with the help of sensors in the front of a car detects when a collision in unavoidable. When a situation like that is detected, the brakes are activated. The decision of whether to activate the brakes or not is taken by a piece of software called a decision maker. This software continuously checks for routes that would avoid an object in front of the car and as long as a path is found nothing is done. Volvo has been investigating several different CMbB-systems, and the research done by Volvo has previously focused on decision makers that only consider one object in front of the car. By instead taking all present objects in consideration, it should be possible to detect an imminent collision earlier. Volvo has developed some prototypes but needed help evaluating their performance.
As part of this thesis a testing method was developed. The idea was to test as many cases as possible but as the objects’ possible states increase, the number of test cases quickly becomes huge. Different ways of removing irrelevant test cases were developed and when these ideas were realized in a test bench, it showed that about 98 % of the test cases could be removed.
The test results showed that there is clearly an advantage to consider many objects if the cost of increased complexity in the decision maker is not too big. However, the risk of false alarms is high with the current decision makers and several possible improvements have therefore been suggested.
Santos, Fernando Fernandes dos. "Reliability evaluation and error mitigation in pedestrian detection algorithms for embedded GPUs." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/159210.
Full textPedestrian detection reliability is a fundamental problem for autonomous or aided driving. Methods that use object detection algorithms such as Histogram of Oriented Gradients (HOG) or Convolutional Neural Networks (CNN) are today very popular in automotive applications. Embedded Graphics Processing Units (GPUs) are exploited to make object detection in a very efficient manner. Unfortunately, GPUs architecture has been shown to be particularly vulnerable to radiation-induced failures. This work presents an experimental evaluation and analytical study of the reliability of two types of object detection algorithms: HOG and CNNs. This research aim is not just to quantify but also to qualify the radiation-induced errors on object detection applications executed in embedded GPUs. HOG experimental results were obtained using two different architectures of embedded GPUs (Tegra and AMD APU), each exposed for about 100 hours to a controlled neutron beam at Los Alamos National Lab (LANL). Precision and Recall metrics are considered to evaluate the error criticality. The reported analysis shows that, while being intrinsically resilient (65% to 85% of output errors only slightly impact detection), HOG experienced some particularly critical errors that could result in undetected pedestrians or unnecessary vehicle stops. This works also evaluates the reliability of two Convolutional Neural Networks for object detection: You Only Look Once (YOLO) and Faster RCNN. Three different GPU architectures were exposed to controlled neutron beams (Kepler, Maxwell, and Pascal) detecting objects in both Caltech and Visual Object Classes data sets. By analyzing the neural network corrupted output, it is possible to distinguish between tolerable errors and critical errors, i.e., errors that could impact detection. Additionally, extensive GDB-level and architectural-level fault-injection campaigns were performed to identify HOG and YOLO critical procedures. Results show that not all stages of object detection algorithms are critical to the final classification reliability. Thanks to the fault injection analysis it is possible to identify HOG and Darknet portions that, if hardened, are more likely to increase reliability without introducing unnecessary overhead. The proposed HOG hardening strategy is able to detect up to 70% of errors with a 12% execution time overhead.
Salomon, Sophie. "Bias Mitigation Techniques and a Cost-Aware Framework for Boosted Ranking Algorithms." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1586450345426827.
Full textBhattacharya, Koustav. "Architectures and algorithms for mitigation of soft errors in nanoscale VLSI circuits." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003280.
Full textBooks on the topic "MITIGATION ALGORITHM"
Casola, Linda, and Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Full textWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms and Applications. Taylor & Francis Group, 2016.
Find full textComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Find full textNational Academies of Sciences, Engineering, and Medicine. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Find full textComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Find full textWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Find full textWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Find full textWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Find full textWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Find full textGreen Communications: Theoretical Fundamentals, Algorithms and Applications. Taylor & Francis Group, 2012.
Find full textBook chapters on the topic "MITIGATION ALGORITHM"
Zhu, Xuanzhang. "A Novel NLOS Mitigation Algorithm Using VBS." In Lecture Notes in Electrical Engineering, 209–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40633-1_27.
Full textÁdám, Zsófia, Levente Bajczi, Mihály Dobos-Kovács, Ákos Hajdu, and Vince Molnár. "Theta: portfolio of CEGAR-based analyses with dynamic algorithm selection (Competition Contribution)." In Tools and Algorithms for the Construction and Analysis of Systems, 474–78. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99527-0_34.
Full textHu, Yang, Zhongliang Deng, Jichao Jiao, Jie Xia, Yuezhou Hu, and Zhuang Yuan. "Cross Correlation Mitigation Algorithm for Indoor Positioning Receiver." In Lecture Notes in Electrical Engineering, 485–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46632-2_42.
Full textRay, Papia, and Surender Reddy Salkuti. "Short-Term Load Forecasting Using Jaya Algorithm." In Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques, 315–42. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2_15.
Full textShi, Sheng, Shanshan Wei, Zhongchao Shi, Yangzhou Du, Wei Fan, Jianping Fan, Yolanda Conyers, and Feiyu Xu. "Algorithm Bias Detection and Mitigation in Lenovo Face Recognition Engine." In Natural Language Processing and Chinese Computing, 442–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60457-8_36.
Full textLi, Jie, Yuliang Li, and Yingwu Zhou. "GPS Multipath Mitigation Algorithm Using C/A Code Correlation Character." In The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems, 1047–58. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00536-2_121.
Full textNamrata, Kumari, Nishant Kumar, Ch Sekhar, Ramjee Prasad Gupta, and Surender Reddy Salkuti. "Modeling and Sizing of the Hybrid Renewable System Opting Genetic Algorithm." In Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques, 535–63. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2_25.
Full textChen, Lei, Shuai Han, Weixiao Meng, and Zijun Gong. "A Spoofing Mitigation Algorithm Based on Subspace Projection for GNSS Receiver." In China Satellite Navigation Conference (CSNC) 2015 Proceedings: Volume I, 727–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46638-4_63.
Full textMallala, Balasubbareddy, P. Venkata Prasad, and Kowstubha Palle. "Analysis of Power Quality Issues and Mitigation Techniques Using HACO Algorithm." In Intelligent Sustainable Systems, 841–51. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1726-6_65.
Full textMinango, Juan, Marcelo Zambrano, and Jorge Caraguay. "Co-channel Interference Mitigation Using Convolutional Enconder via Joint Decoding Viterbi Algorithm." In Innovation and Research - A Driving Force for Socio-Econo-Technological Development, 11–21. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11438-0_2.
Full textConference papers on the topic "MITIGATION ALGORITHM"
Meng, Dawei, Zhenming Feng, and Mingquan Lu. "HOS-Based Interference Mitigation Algorithm." In Multiconference on "Computational Engineering in Systems Applications. IEEE, 2006. http://dx.doi.org/10.1109/cesa.2006.4281616.
Full textLeonid, T. Thomas, Harish Kanna, Claudia Christy V J, Hamritha A S, and Chebolu Lokesh. "Human Wildlife Conflict Mitigation Using YOLO Algorithm." In 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM). IEEE, 2023. http://dx.doi.org/10.1109/iconstem56934.2023.10142629.
Full textHo, M. T., H. A. Krichene, G. F. Ricciardi, and W. J. Geckle. "Multipath mitigation in calibration range estimation algorithm." In 2017 IEEE Radar Conference (RadarConf17). IEEE, 2017. http://dx.doi.org/10.1109/radar.2017.7944397.
Full textMostefa, Mohammed Belhadj, Abdelfettah Boussaid, and Abdelmalek Khezzar. "FPGA-based Algorithm for Harmonic Current Mitigation." In 2022 2nd International Conference on Advanced Electrical Engineering (ICAEE). IEEE, 2022. http://dx.doi.org/10.1109/icaee53772.2022.9962021.
Full textConcatto, Fernando, Wellington Zunino, Luigi A. Giancoli, Rafael Santiago, and Luís C. Lamb. "Genetic algorithm for epidemic mitigation by removing relationships." In GECCO '17: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3071178.3071218.
Full textPeng, Xiaohui, Fei Hu, Feng He, Liang Wu, Jun Li, Dong Zhu, Zhiqiang Liao, and Cuifang Qian. "RFI mitigation of SMOS image based on CLEAN algorithm." In IGARSS 2016 - 2016 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2016. http://dx.doi.org/10.1109/igarss.2016.7729206.
Full textSu, Y. Q., Y. L. Yang, Y. T. Mi, and X. F. Yin. "Multipath mitigation method of GPS signals utilizing SAGE algorithm." In 2012 International Conference on System Simulation (ICUSS 2012). IET, 2012. http://dx.doi.org/10.1049/cp.2012.0561.
Full textHoshida, Takeshi, Liang Dou, Weizhen Yan, Lei Li, Zhenning Tao, Shoichiro Oda, Hisao Nakashima, Chihiro Ohshima, Tomofumi Oyama, and Jens C. Rasmussen. "Advanced and Feasible Signal Processing Algorithm for Nonlinear Mitigation." In Optical Fiber Communication Conference. Washington, D.C.: OSA, 2013. http://dx.doi.org/10.1364/ofc.2013.oth3c.3.
Full textBhagwat, N., K. Liu, and B. Jabbari. "Robust Bias Mitigation Algorithm for Localization in Wireless Networks." In ICC 2010 - 2010 IEEE International Conference on Communications. IEEE, 2010. http://dx.doi.org/10.1109/icc.2010.5501752.
Full textPardhasaradhi, Bethi, Gunnery Srinath, Ashoka Chakravarthi Mahipathi, Pathipati Srihari, and Linga Reddy Cenkeramaddi. "A GNSS Position Spoofing Mitigation Algorithm using Sparse Estimation." In 2022 IEEE 19th India Council International Conference (INDICON). IEEE, 2022. http://dx.doi.org/10.1109/indicon56171.2022.10039936.
Full textReports on the topic "MITIGATION ALGORITHM"
Visser, R., H. Kao, R. M. H. Dokht, A. B. Mahani, and S. Venables. A comprehensive earthquake catalogue for northeastern British Columbia: the northern Montney trend from 2017 to 2020 and the Kiskatinaw Seismic Monitoring and Mitigation Area from 2019 to 2020. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/329078.
Full textPound, B. G. GRI-99-0000 Gap Analysis of the GRI Research Program on Internal Corrosion. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), December 1999. http://dx.doi.org/10.55274/r0010720.
Full textLillard, Scott. DTPH56-15-H-CAP02 Understanding and Mitigating the Threat of AC Induced Corrosion on Buried Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 2017. http://dx.doi.org/10.55274/r0011875.
Full textLi, Baisong, and Bo Xu. PR-469-19604-Z01 Auto Diagnostic Method Development for Ultrasonic Flow Meter. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), February 2022. http://dx.doi.org/10.55274/r0012204.
Full text