Gotowa bibliografia na temat „MITIGATION ALGORITHM”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „MITIGATION ALGORITHM”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "MITIGATION ALGORITHM"
Ding, Yi, Weiwei Fan, Zijing Zhang, Feng Zhou i Bingbing Lu. "Radio Frequency Interference Mitigation for Synthetic Aperture Radar Based on the Time-Frequency Constraint Joint Low-Rank and Sparsity Properties". Remote Sensing 14, nr 3 (7.02.2022): 775. http://dx.doi.org/10.3390/rs14030775.
Pełny tekst źródłaDhineshkumar, K., i C. Subramani. "Kalman Filter Algorithm for Mitigation of Power System Harmonics". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 2 (1.04.2018): 771. http://dx.doi.org/10.11591/ijece.v8i2.pp771-779.
Pełny tekst źródłaMajumder, Swarnadeep, Christopher G. Yale, Titus D. Morris, Daniel S. Lobser, Ashlyn D. Burch, Matthew N. H. Chow, Melissa C. Revelle, Susan M. Clark i Raphael C. Pooser. "Characterizing and mitigating coherent errors in a trapped ion quantum processor using hidden inverses". Quantum 7 (15.05.2023): 1006. http://dx.doi.org/10.22331/q-2023-05-15-1006.
Pełny tekst źródłaYousif, Tasneem, i Paul Blunt. "Interference Mitigation for GNSS Receivers Using FFT Excision Filtering Implemented on an FPGA". Eng 3, nr 4 (31.10.2022): 439–66. http://dx.doi.org/10.3390/eng3040032.
Pełny tekst źródłaSánchez-Cartas, Juan Manuel, Alberto Tejero i Gonzalo León. "Algorithmic Pricing and Price Gouging. Consequences of High-Impact, Low Probability Events". Sustainability 13, nr 5 (26.02.2021): 2542. http://dx.doi.org/10.3390/su13052542.
Pełny tekst źródłaAhmed, Mohamed, i Ezz Eldin Abdelkawy. "GPS correlated jammer mitigation utilizing MUSIC algorithm". International Conference on Electrical Engineering 7, nr 7 (1.05.2010): 1–10. http://dx.doi.org/10.21608/iceeng.2010.33043.
Pełny tekst źródłaVU, Trung Kien, Sungoh KWON i Sangchul OH. "Cooperative Interference Mitigation Algorithm in Heterogeneous Networks". IEICE Transactions on Communications E98.B, nr 11 (2015): 2238–47. http://dx.doi.org/10.1587/transcom.e98.b.2238.
Pełny tekst źródłaAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye i Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS". Journal of Information and Communication Technology 20, Number 3 (11.06.2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Pełny tekst źródłaSHIN, J. H., J. HEO, S. YOON i S. Y. KIM. "Interference Cancellation and Multipath Mitigation Algorithm for GPS Using Subspace Projection Algorithms". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, nr 3 (1.03.2008): 905–8. http://dx.doi.org/10.1093/ietfec/e91-a.3.905.
Pełny tekst źródłaGarzia, Fabio, Johannes Rossouw van der Merwe, Alexander Rügamer, Santiago Urquijo i Wolfgang Felber. "HDDM Hardware Evaluation for Robust Interference Mitigation". Sensors 20, nr 22 (13.11.2020): 6492. http://dx.doi.org/10.3390/s20226492.
Pełny tekst źródłaRozprawy doktorskie na temat "MITIGATION ALGORITHM"
Zubi, Hazem M. "A genetic algorithm approach for three-phase harmonic mitigation filter design". Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604881.
Pełny tekst źródłaIkuma, Takeshi. "Non-Wiener Effects in Narrowband Interference Mitigation Using Adaptive Transversal Equalizers". Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/26772.
Pełny tekst źródłaPh. D.
Manmek, Thip Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Real-time power system disturbance identification and its mitigation using an enhanced least squares algorithm". Awarded by:University of New South Wales. Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/26233.
Pełny tekst źródłaGandhi, Nikhil Tej. "Automatic Dependent Surveillance - Broadcast Enabled, Wake Vortex Mitigation Using Cockpit Display". Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1354313600.
Pełny tekst źródłaLoh, Nolan. "Buildings as urban climate infrastructure: A framework for designing building forms and facades that mitigate urban heat". University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553513750865168.
Pełny tekst źródłaAl-Odat, Zeyad Abdel-Hameed. "Analyses, Mitigation and Applications of Secure Hash Algorithms". Diss., North Dakota State University, 2020. https://hdl.handle.net/10365/32058.
Pełny tekst źródłaKivrikis, Andreas, i Johan Tjernström. "Development and Evaluation of Multiple Objects Collision Mitigation by Braking Algorithms". Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2676.
Pełny tekst źródłaA CMbB system is a system that with the help of sensors in the front of a car detects when a collision in unavoidable. When a situation like that is detected, the brakes are activated. The decision of whether to activate the brakes or not is taken by a piece of software called a decision maker. This software continuously checks for routes that would avoid an object in front of the car and as long as a path is found nothing is done. Volvo has been investigating several different CMbB-systems, and the research done by Volvo has previously focused on decision makers that only consider one object in front of the car. By instead taking all present objects in consideration, it should be possible to detect an imminent collision earlier. Volvo has developed some prototypes but needed help evaluating their performance.
As part of this thesis a testing method was developed. The idea was to test as many cases as possible but as the objects’ possible states increase, the number of test cases quickly becomes huge. Different ways of removing irrelevant test cases were developed and when these ideas were realized in a test bench, it showed that about 98 % of the test cases could be removed.
The test results showed that there is clearly an advantage to consider many objects if the cost of increased complexity in the decision maker is not too big. However, the risk of false alarms is high with the current decision makers and several possible improvements have therefore been suggested.
Santos, Fernando Fernandes dos. "Reliability evaluation and error mitigation in pedestrian detection algorithms for embedded GPUs". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/159210.
Pełny tekst źródłaPedestrian detection reliability is a fundamental problem for autonomous or aided driving. Methods that use object detection algorithms such as Histogram of Oriented Gradients (HOG) or Convolutional Neural Networks (CNN) are today very popular in automotive applications. Embedded Graphics Processing Units (GPUs) are exploited to make object detection in a very efficient manner. Unfortunately, GPUs architecture has been shown to be particularly vulnerable to radiation-induced failures. This work presents an experimental evaluation and analytical study of the reliability of two types of object detection algorithms: HOG and CNNs. This research aim is not just to quantify but also to qualify the radiation-induced errors on object detection applications executed in embedded GPUs. HOG experimental results were obtained using two different architectures of embedded GPUs (Tegra and AMD APU), each exposed for about 100 hours to a controlled neutron beam at Los Alamos National Lab (LANL). Precision and Recall metrics are considered to evaluate the error criticality. The reported analysis shows that, while being intrinsically resilient (65% to 85% of output errors only slightly impact detection), HOG experienced some particularly critical errors that could result in undetected pedestrians or unnecessary vehicle stops. This works also evaluates the reliability of two Convolutional Neural Networks for object detection: You Only Look Once (YOLO) and Faster RCNN. Three different GPU architectures were exposed to controlled neutron beams (Kepler, Maxwell, and Pascal) detecting objects in both Caltech and Visual Object Classes data sets. By analyzing the neural network corrupted output, it is possible to distinguish between tolerable errors and critical errors, i.e., errors that could impact detection. Additionally, extensive GDB-level and architectural-level fault-injection campaigns were performed to identify HOG and YOLO critical procedures. Results show that not all stages of object detection algorithms are critical to the final classification reliability. Thanks to the fault injection analysis it is possible to identify HOG and Darknet portions that, if hardened, are more likely to increase reliability without introducing unnecessary overhead. The proposed HOG hardening strategy is able to detect up to 70% of errors with a 12% execution time overhead.
Salomon, Sophie. "Bias Mitigation Techniques and a Cost-Aware Framework for Boosted Ranking Algorithms". Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1586450345426827.
Pełny tekst źródłaBhattacharya, Koustav. "Architectures and algorithms for mitigation of soft errors in nanoscale VLSI circuits". [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003280.
Pełny tekst źródłaKsiążki na temat "MITIGATION ALGORITHM"
Casola, Linda, i Dionna Ali, red. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Pełny tekst źródłaWu, Jinsong, Sundeep Rangan i Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms and Applications. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board i Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Znajdź pełny tekst źródłaNational Academies of Sciences, Engineering, and Medicine. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Znajdź pełny tekst źródłaComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board i Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Znajdź pełny tekst źródłaWu, Jinsong, Sundeep Rangan i Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaWu, Jinsong, Sundeep Rangan i Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaWu, Jinsong, Sundeep Rangan i Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaWu, Jinsong, Sundeep Rangan i Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Znajdź pełny tekst źródłaGreen Communications: Theoretical Fundamentals, Algorithms and Applications. Taylor & Francis Group, 2012.
Znajdź pełny tekst źródłaCzęści książek na temat "MITIGATION ALGORITHM"
Zhu, Xuanzhang. "A Novel NLOS Mitigation Algorithm Using VBS". W Lecture Notes in Electrical Engineering, 209–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40633-1_27.
Pełny tekst źródłaÁdám, Zsófia, Levente Bajczi, Mihály Dobos-Kovács, Ákos Hajdu i Vince Molnár. "Theta: portfolio of CEGAR-based analyses with dynamic algorithm selection (Competition Contribution)". W Tools and Algorithms for the Construction and Analysis of Systems, 474–78. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99527-0_34.
Pełny tekst źródłaHu, Yang, Zhongliang Deng, Jichao Jiao, Jie Xia, Yuezhou Hu i Zhuang Yuan. "Cross Correlation Mitigation Algorithm for Indoor Positioning Receiver". W Lecture Notes in Electrical Engineering, 485–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46632-2_42.
Pełny tekst źródłaRay, Papia, i Surender Reddy Salkuti. "Short-Term Load Forecasting Using Jaya Algorithm". W Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques, 315–42. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2_15.
Pełny tekst źródłaShi, Sheng, Shanshan Wei, Zhongchao Shi, Yangzhou Du, Wei Fan, Jianping Fan, Yolanda Conyers i Feiyu Xu. "Algorithm Bias Detection and Mitigation in Lenovo Face Recognition Engine". W Natural Language Processing and Chinese Computing, 442–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60457-8_36.
Pełny tekst źródłaLi, Jie, Yuliang Li i Yingwu Zhou. "GPS Multipath Mitigation Algorithm Using C/A Code Correlation Character". W The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems, 1047–58. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00536-2_121.
Pełny tekst źródłaNamrata, Kumari, Nishant Kumar, Ch Sekhar, Ramjee Prasad Gupta i Surender Reddy Salkuti. "Modeling and Sizing of the Hybrid Renewable System Opting Genetic Algorithm". W Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques, 535–63. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2_25.
Pełny tekst źródłaChen, Lei, Shuai Han, Weixiao Meng i Zijun Gong. "A Spoofing Mitigation Algorithm Based on Subspace Projection for GNSS Receiver". W China Satellite Navigation Conference (CSNC) 2015 Proceedings: Volume I, 727–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46638-4_63.
Pełny tekst źródłaMallala, Balasubbareddy, P. Venkata Prasad i Kowstubha Palle. "Analysis of Power Quality Issues and Mitigation Techniques Using HACO Algorithm". W Intelligent Sustainable Systems, 841–51. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1726-6_65.
Pełny tekst źródłaMinango, Juan, Marcelo Zambrano i Jorge Caraguay. "Co-channel Interference Mitigation Using Convolutional Enconder via Joint Decoding Viterbi Algorithm". W Innovation and Research - A Driving Force for Socio-Econo-Technological Development, 11–21. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11438-0_2.
Pełny tekst źródłaStreszczenia konferencji na temat "MITIGATION ALGORITHM"
Meng, Dawei, Zhenming Feng i Mingquan Lu. "HOS-Based Interference Mitigation Algorithm". W Multiconference on "Computational Engineering in Systems Applications. IEEE, 2006. http://dx.doi.org/10.1109/cesa.2006.4281616.
Pełny tekst źródłaLeonid, T. Thomas, Harish Kanna, Claudia Christy V J, Hamritha A S i Chebolu Lokesh. "Human Wildlife Conflict Mitigation Using YOLO Algorithm". W 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM). IEEE, 2023. http://dx.doi.org/10.1109/iconstem56934.2023.10142629.
Pełny tekst źródłaHo, M. T., H. A. Krichene, G. F. Ricciardi i W. J. Geckle. "Multipath mitigation in calibration range estimation algorithm". W 2017 IEEE Radar Conference (RadarConf17). IEEE, 2017. http://dx.doi.org/10.1109/radar.2017.7944397.
Pełny tekst źródłaMostefa, Mohammed Belhadj, Abdelfettah Boussaid i Abdelmalek Khezzar. "FPGA-based Algorithm for Harmonic Current Mitigation". W 2022 2nd International Conference on Advanced Electrical Engineering (ICAEE). IEEE, 2022. http://dx.doi.org/10.1109/icaee53772.2022.9962021.
Pełny tekst źródłaConcatto, Fernando, Wellington Zunino, Luigi A. Giancoli, Rafael Santiago i Luís C. Lamb. "Genetic algorithm for epidemic mitigation by removing relationships". W GECCO '17: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3071178.3071218.
Pełny tekst źródłaPeng, Xiaohui, Fei Hu, Feng He, Liang Wu, Jun Li, Dong Zhu, Zhiqiang Liao i Cuifang Qian. "RFI mitigation of SMOS image based on CLEAN algorithm". W IGARSS 2016 - 2016 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2016. http://dx.doi.org/10.1109/igarss.2016.7729206.
Pełny tekst źródłaSu, Y. Q., Y. L. Yang, Y. T. Mi i X. F. Yin. "Multipath mitigation method of GPS signals utilizing SAGE algorithm". W 2012 International Conference on System Simulation (ICUSS 2012). IET, 2012. http://dx.doi.org/10.1049/cp.2012.0561.
Pełny tekst źródłaHoshida, Takeshi, Liang Dou, Weizhen Yan, Lei Li, Zhenning Tao, Shoichiro Oda, Hisao Nakashima, Chihiro Ohshima, Tomofumi Oyama i Jens C. Rasmussen. "Advanced and Feasible Signal Processing Algorithm for Nonlinear Mitigation". W Optical Fiber Communication Conference. Washington, D.C.: OSA, 2013. http://dx.doi.org/10.1364/ofc.2013.oth3c.3.
Pełny tekst źródłaBhagwat, N., K. Liu i B. Jabbari. "Robust Bias Mitigation Algorithm for Localization in Wireless Networks". W ICC 2010 - 2010 IEEE International Conference on Communications. IEEE, 2010. http://dx.doi.org/10.1109/icc.2010.5501752.
Pełny tekst źródłaPardhasaradhi, Bethi, Gunnery Srinath, Ashoka Chakravarthi Mahipathi, Pathipati Srihari i Linga Reddy Cenkeramaddi. "A GNSS Position Spoofing Mitigation Algorithm using Sparse Estimation". W 2022 IEEE 19th India Council International Conference (INDICON). IEEE, 2022. http://dx.doi.org/10.1109/indicon56171.2022.10039936.
Pełny tekst źródłaRaporty organizacyjne na temat "MITIGATION ALGORITHM"
Visser, R., H. Kao, R. M. H. Dokht, A. B. Mahani i S. Venables. A comprehensive earthquake catalogue for northeastern British Columbia: the northern Montney trend from 2017 to 2020 and the Kiskatinaw Seismic Monitoring and Mitigation Area from 2019 to 2020. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/329078.
Pełny tekst źródłaPound, B. G. GRI-99-0000 Gap Analysis of the GRI Research Program on Internal Corrosion. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), grudzień 1999. http://dx.doi.org/10.55274/r0010720.
Pełny tekst źródłaLillard, Scott. DTPH56-15-H-CAP02 Understanding and Mitigating the Threat of AC Induced Corrosion on Buried Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), styczeń 2017. http://dx.doi.org/10.55274/r0011875.
Pełny tekst źródłaLi, Baisong, i Bo Xu. PR-469-19604-Z01 Auto Diagnostic Method Development for Ultrasonic Flow Meter. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), luty 2022. http://dx.doi.org/10.55274/r0012204.
Pełny tekst źródła