Добірка наукової літератури з теми "MITIGATION ALGORITHM"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "MITIGATION ALGORITHM".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "MITIGATION ALGORITHM"
Ding, Yi, Weiwei Fan, Zijing Zhang, Feng Zhou, and Bingbing Lu. "Radio Frequency Interference Mitigation for Synthetic Aperture Radar Based on the Time-Frequency Constraint Joint Low-Rank and Sparsity Properties." Remote Sensing 14, no. 3 (February 7, 2022): 775. http://dx.doi.org/10.3390/rs14030775.
Повний текст джерелаDhineshkumar, K., and C. Subramani. "Kalman Filter Algorithm for Mitigation of Power System Harmonics." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 771. http://dx.doi.org/10.11591/ijece.v8i2.pp771-779.
Повний текст джерелаMajumder, Swarnadeep, Christopher G. Yale, Titus D. Morris, Daniel S. Lobser, Ashlyn D. Burch, Matthew N. H. Chow, Melissa C. Revelle, Susan M. Clark, and Raphael C. Pooser. "Characterizing and mitigating coherent errors in a trapped ion quantum processor using hidden inverses." Quantum 7 (May 15, 2023): 1006. http://dx.doi.org/10.22331/q-2023-05-15-1006.
Повний текст джерелаYousif, Tasneem, and Paul Blunt. "Interference Mitigation for GNSS Receivers Using FFT Excision Filtering Implemented on an FPGA." Eng 3, no. 4 (October 31, 2022): 439–66. http://dx.doi.org/10.3390/eng3040032.
Повний текст джерелаSánchez-Cartas, Juan Manuel, Alberto Tejero, and Gonzalo León. "Algorithmic Pricing and Price Gouging. Consequences of High-Impact, Low Probability Events." Sustainability 13, no. 5 (February 26, 2021): 2542. http://dx.doi.org/10.3390/su13052542.
Повний текст джерелаAhmed, Mohamed, and Ezz Eldin Abdelkawy. "GPS correlated jammer mitigation utilizing MUSIC algorithm." International Conference on Electrical Engineering 7, no. 7 (May 1, 2010): 1–10. http://dx.doi.org/10.21608/iceeng.2010.33043.
Повний текст джерелаVU, Trung Kien, Sungoh KWON, and Sangchul OH. "Cooperative Interference Mitigation Algorithm in Heterogeneous Networks." IEICE Transactions on Communications E98.B, no. 11 (2015): 2238–47. http://dx.doi.org/10.1587/transcom.e98.b.2238.
Повний текст джерелаAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (June 11, 2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Повний текст джерелаSHIN, J. H., J. HEO, S. YOON, and S. Y. KIM. "Interference Cancellation and Multipath Mitigation Algorithm for GPS Using Subspace Projection Algorithms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 3 (March 1, 2008): 905–8. http://dx.doi.org/10.1093/ietfec/e91-a.3.905.
Повний текст джерелаGarzia, Fabio, Johannes Rossouw van der Merwe, Alexander Rügamer, Santiago Urquijo, and Wolfgang Felber. "HDDM Hardware Evaluation for Robust Interference Mitigation." Sensors 20, no. 22 (November 13, 2020): 6492. http://dx.doi.org/10.3390/s20226492.
Повний текст джерелаДисертації з теми "MITIGATION ALGORITHM"
Zubi, Hazem M. "A genetic algorithm approach for three-phase harmonic mitigation filter design." Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604881.
Повний текст джерелаIkuma, Takeshi. "Non-Wiener Effects in Narrowband Interference Mitigation Using Adaptive Transversal Equalizers." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/26772.
Повний текст джерелаPh. D.
Manmek, Thip Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Real-time power system disturbance identification and its mitigation using an enhanced least squares algorithm." Awarded by:University of New South Wales. Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/26233.
Повний текст джерелаGandhi, Nikhil Tej. "Automatic Dependent Surveillance - Broadcast Enabled, Wake Vortex Mitigation Using Cockpit Display." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1354313600.
Повний текст джерелаLoh, Nolan. "Buildings as urban climate infrastructure: A framework for designing building forms and facades that mitigate urban heat." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553513750865168.
Повний текст джерелаAl-Odat, Zeyad Abdel-Hameed. "Analyses, Mitigation and Applications of Secure Hash Algorithms." Diss., North Dakota State University, 2020. https://hdl.handle.net/10365/32058.
Повний текст джерелаKivrikis, Andreas, and Johan Tjernström. "Development and Evaluation of Multiple Objects Collision Mitigation by Braking Algorithms." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2676.
Повний текст джерелаA CMbB system is a system that with the help of sensors in the front of a car detects when a collision in unavoidable. When a situation like that is detected, the brakes are activated. The decision of whether to activate the brakes or not is taken by a piece of software called a decision maker. This software continuously checks for routes that would avoid an object in front of the car and as long as a path is found nothing is done. Volvo has been investigating several different CMbB-systems, and the research done by Volvo has previously focused on decision makers that only consider one object in front of the car. By instead taking all present objects in consideration, it should be possible to detect an imminent collision earlier. Volvo has developed some prototypes but needed help evaluating their performance.
As part of this thesis a testing method was developed. The idea was to test as many cases as possible but as the objects’ possible states increase, the number of test cases quickly becomes huge. Different ways of removing irrelevant test cases were developed and when these ideas were realized in a test bench, it showed that about 98 % of the test cases could be removed.
The test results showed that there is clearly an advantage to consider many objects if the cost of increased complexity in the decision maker is not too big. However, the risk of false alarms is high with the current decision makers and several possible improvements have therefore been suggested.
Santos, Fernando Fernandes dos. "Reliability evaluation and error mitigation in pedestrian detection algorithms for embedded GPUs." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/159210.
Повний текст джерелаPedestrian detection reliability is a fundamental problem for autonomous or aided driving. Methods that use object detection algorithms such as Histogram of Oriented Gradients (HOG) or Convolutional Neural Networks (CNN) are today very popular in automotive applications. Embedded Graphics Processing Units (GPUs) are exploited to make object detection in a very efficient manner. Unfortunately, GPUs architecture has been shown to be particularly vulnerable to radiation-induced failures. This work presents an experimental evaluation and analytical study of the reliability of two types of object detection algorithms: HOG and CNNs. This research aim is not just to quantify but also to qualify the radiation-induced errors on object detection applications executed in embedded GPUs. HOG experimental results were obtained using two different architectures of embedded GPUs (Tegra and AMD APU), each exposed for about 100 hours to a controlled neutron beam at Los Alamos National Lab (LANL). Precision and Recall metrics are considered to evaluate the error criticality. The reported analysis shows that, while being intrinsically resilient (65% to 85% of output errors only slightly impact detection), HOG experienced some particularly critical errors that could result in undetected pedestrians or unnecessary vehicle stops. This works also evaluates the reliability of two Convolutional Neural Networks for object detection: You Only Look Once (YOLO) and Faster RCNN. Three different GPU architectures were exposed to controlled neutron beams (Kepler, Maxwell, and Pascal) detecting objects in both Caltech and Visual Object Classes data sets. By analyzing the neural network corrupted output, it is possible to distinguish between tolerable errors and critical errors, i.e., errors that could impact detection. Additionally, extensive GDB-level and architectural-level fault-injection campaigns were performed to identify HOG and YOLO critical procedures. Results show that not all stages of object detection algorithms are critical to the final classification reliability. Thanks to the fault injection analysis it is possible to identify HOG and Darknet portions that, if hardened, are more likely to increase reliability without introducing unnecessary overhead. The proposed HOG hardening strategy is able to detect up to 70% of errors with a 12% execution time overhead.
Salomon, Sophie. "Bias Mitigation Techniques and a Cost-Aware Framework for Boosted Ranking Algorithms." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1586450345426827.
Повний текст джерелаBhattacharya, Koustav. "Architectures and algorithms for mitigation of soft errors in nanoscale VLSI circuits." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003280.
Повний текст джерелаКниги з теми "MITIGATION ALGORITHM"
Casola, Linda, and Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. Washington, D.C.: National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Повний текст джерелаWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms and Applications. Taylor & Francis Group, 2016.
Знайти повний текст джерелаComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Знайти повний текст джерелаNational Academies of Sciences, Engineering, and Medicine. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Знайти повний текст джерелаComputer Science and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Intelligence Community Studies Board, and Board on Mathematical Sciences and Analytics. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies: Proceedings of a Workshop. National Academies Press, 2019.
Знайти повний текст джерелаWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Знайти повний текст джерелаWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Знайти повний текст джерелаWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Знайти повний текст джерелаWu, Jinsong, Sundeep Rangan, and Honggang Zhang. Green Communications: Theoretical Fundamentals, Algorithms, and Applications. Taylor & Francis Group, 2016.
Знайти повний текст джерелаGreen Communications: Theoretical Fundamentals, Algorithms and Applications. Taylor & Francis Group, 2012.
Знайти повний текст джерелаЧастини книг з теми "MITIGATION ALGORITHM"
Zhu, Xuanzhang. "A Novel NLOS Mitigation Algorithm Using VBS." In Lecture Notes in Electrical Engineering, 209–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40633-1_27.
Повний текст джерелаÁdám, Zsófia, Levente Bajczi, Mihály Dobos-Kovács, Ákos Hajdu, and Vince Molnár. "Theta: portfolio of CEGAR-based analyses with dynamic algorithm selection (Competition Contribution)." In Tools and Algorithms for the Construction and Analysis of Systems, 474–78. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99527-0_34.
Повний текст джерелаHu, Yang, Zhongliang Deng, Jichao Jiao, Jie Xia, Yuezhou Hu, and Zhuang Yuan. "Cross Correlation Mitigation Algorithm for Indoor Positioning Receiver." In Lecture Notes in Electrical Engineering, 485–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46632-2_42.
Повний текст джерелаRay, Papia, and Surender Reddy Salkuti. "Short-Term Load Forecasting Using Jaya Algorithm." In Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques, 315–42. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2_15.
Повний текст джерелаShi, Sheng, Shanshan Wei, Zhongchao Shi, Yangzhou Du, Wei Fan, Jianping Fan, Yolanda Conyers, and Feiyu Xu. "Algorithm Bias Detection and Mitigation in Lenovo Face Recognition Engine." In Natural Language Processing and Chinese Computing, 442–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-60457-8_36.
Повний текст джерелаLi, Jie, Yuliang Li, and Yingwu Zhou. "GPS Multipath Mitigation Algorithm Using C/A Code Correlation Character." In The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems, 1047–58. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00536-2_121.
Повний текст джерелаNamrata, Kumari, Nishant Kumar, Ch Sekhar, Ramjee Prasad Gupta, and Surender Reddy Salkuti. "Modeling and Sizing of the Hybrid Renewable System Opting Genetic Algorithm." In Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques, 535–63. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2_25.
Повний текст джерелаChen, Lei, Shuai Han, Weixiao Meng, and Zijun Gong. "A Spoofing Mitigation Algorithm Based on Subspace Projection for GNSS Receiver." In China Satellite Navigation Conference (CSNC) 2015 Proceedings: Volume I, 727–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46638-4_63.
Повний текст джерелаMallala, Balasubbareddy, P. Venkata Prasad, and Kowstubha Palle. "Analysis of Power Quality Issues and Mitigation Techniques Using HACO Algorithm." In Intelligent Sustainable Systems, 841–51. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1726-6_65.
Повний текст джерелаMinango, Juan, Marcelo Zambrano, and Jorge Caraguay. "Co-channel Interference Mitigation Using Convolutional Enconder via Joint Decoding Viterbi Algorithm." In Innovation and Research - A Driving Force for Socio-Econo-Technological Development, 11–21. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11438-0_2.
Повний текст джерелаТези доповідей конференцій з теми "MITIGATION ALGORITHM"
Meng, Dawei, Zhenming Feng, and Mingquan Lu. "HOS-Based Interference Mitigation Algorithm." In Multiconference on "Computational Engineering in Systems Applications. IEEE, 2006. http://dx.doi.org/10.1109/cesa.2006.4281616.
Повний текст джерелаLeonid, T. Thomas, Harish Kanna, Claudia Christy V J, Hamritha A S, and Chebolu Lokesh. "Human Wildlife Conflict Mitigation Using YOLO Algorithm." In 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM). IEEE, 2023. http://dx.doi.org/10.1109/iconstem56934.2023.10142629.
Повний текст джерелаHo, M. T., H. A. Krichene, G. F. Ricciardi, and W. J. Geckle. "Multipath mitigation in calibration range estimation algorithm." In 2017 IEEE Radar Conference (RadarConf17). IEEE, 2017. http://dx.doi.org/10.1109/radar.2017.7944397.
Повний текст джерелаMostefa, Mohammed Belhadj, Abdelfettah Boussaid, and Abdelmalek Khezzar. "FPGA-based Algorithm for Harmonic Current Mitigation." In 2022 2nd International Conference on Advanced Electrical Engineering (ICAEE). IEEE, 2022. http://dx.doi.org/10.1109/icaee53772.2022.9962021.
Повний текст джерелаConcatto, Fernando, Wellington Zunino, Luigi A. Giancoli, Rafael Santiago, and Luís C. Lamb. "Genetic algorithm for epidemic mitigation by removing relationships." In GECCO '17: Genetic and Evolutionary Computation Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3071178.3071218.
Повний текст джерелаPeng, Xiaohui, Fei Hu, Feng He, Liang Wu, Jun Li, Dong Zhu, Zhiqiang Liao, and Cuifang Qian. "RFI mitigation of SMOS image based on CLEAN algorithm." In IGARSS 2016 - 2016 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2016. http://dx.doi.org/10.1109/igarss.2016.7729206.
Повний текст джерелаSu, Y. Q., Y. L. Yang, Y. T. Mi, and X. F. Yin. "Multipath mitigation method of GPS signals utilizing SAGE algorithm." In 2012 International Conference on System Simulation (ICUSS 2012). IET, 2012. http://dx.doi.org/10.1049/cp.2012.0561.
Повний текст джерелаHoshida, Takeshi, Liang Dou, Weizhen Yan, Lei Li, Zhenning Tao, Shoichiro Oda, Hisao Nakashima, Chihiro Ohshima, Tomofumi Oyama, and Jens C. Rasmussen. "Advanced and Feasible Signal Processing Algorithm for Nonlinear Mitigation." In Optical Fiber Communication Conference. Washington, D.C.: OSA, 2013. http://dx.doi.org/10.1364/ofc.2013.oth3c.3.
Повний текст джерелаBhagwat, N., K. Liu, and B. Jabbari. "Robust Bias Mitigation Algorithm for Localization in Wireless Networks." In ICC 2010 - 2010 IEEE International Conference on Communications. IEEE, 2010. http://dx.doi.org/10.1109/icc.2010.5501752.
Повний текст джерелаPardhasaradhi, Bethi, Gunnery Srinath, Ashoka Chakravarthi Mahipathi, Pathipati Srihari, and Linga Reddy Cenkeramaddi. "A GNSS Position Spoofing Mitigation Algorithm using Sparse Estimation." In 2022 IEEE 19th India Council International Conference (INDICON). IEEE, 2022. http://dx.doi.org/10.1109/indicon56171.2022.10039936.
Повний текст джерелаЗвіти організацій з теми "MITIGATION ALGORITHM"
Visser, R., H. Kao, R. M. H. Dokht, A. B. Mahani, and S. Venables. A comprehensive earthquake catalogue for northeastern British Columbia: the northern Montney trend from 2017 to 2020 and the Kiskatinaw Seismic Monitoring and Mitigation Area from 2019 to 2020. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/329078.
Повний текст джерелаPound, B. G. GRI-99-0000 Gap Analysis of the GRI Research Program on Internal Corrosion. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), December 1999. http://dx.doi.org/10.55274/r0010720.
Повний текст джерелаLillard, Scott. DTPH56-15-H-CAP02 Understanding and Mitigating the Threat of AC Induced Corrosion on Buried Pipelines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), January 2017. http://dx.doi.org/10.55274/r0011875.
Повний текст джерелаLi, Baisong, and Bo Xu. PR-469-19604-Z01 Auto Diagnostic Method Development for Ultrasonic Flow Meter. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), February 2022. http://dx.doi.org/10.55274/r0012204.
Повний текст джерела