To see the other types of publications on this topic, follow the link: Bot Mitigation.

Journal articles on the topic 'Bot Mitigation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Bot Mitigation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Goel, Rahul. "Advanced Email Bot Detection: Threat Analysis and Mitigation Strategies." International Journal of Computer Applications 186, no. 70 (2025): 32–34. https://doi.org/10.5120/ijca2025924555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jun, Jae-Bum, Jae-Sue Lee, and Sam-Su Lee. "Default Risk Mitigation Effect of Financial Structure and Characteristic in BOT Project Finance." Korean Journal of Construction Engineering and Management 12, no. 2 (2011): 121–32. http://dx.doi.org/10.6106/kjcem.2011.12.2.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Semi, and Kyungho Lee. "Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme." Sensors 21, no. 6 (2021): 1976. http://dx.doi.org/10.3390/s21061976.

Full text
Abstract:
Cybersecurity in Industrial Internet of Things (IIoT) has become critical as smart cities are becoming increasingly linked to industrial control systems (ICSs) used in critical infrastructure. Consequently, data-driven security systems for analyzing massive amounts of data generated by smart cities have become essential. A representative method for analyzing large-scale data is the game bot detection approach used in massively multiplayer online role-playing games. We reviewed the literature on bot detection methods to extend the anomaly detection approaches used in bot detection schemes to II
APA, Harvard, Vancouver, ISO, and other styles
4

Still, Andy. "Bot mitigation – how gapsin understanding and ownership are exposingbusinesses to greater threats." Network Security 2020, no. 11 (2020): 8–11. http://dx.doi.org/10.1016/s1353-4858(20)30128-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mahjabin, Tasnuva, Yang Xiao, Tieshan Li, and C. L. Philip Chen. "Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood Attacks." IEEE Internet of Things Journal 7, no. 2 (2020): 986–1000. http://dx.doi.org/10.1109/jiot.2019.2947659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Opawole, Akintayo, Kahilu Kajimo-Shakantu, Oluwaseyi Olalekan Alao, and Chinanu Patience Ogbaje. "Risk factors associated with procuring university hostel facilities through build-operate-transfer model." Journal of Engineering, Design and Technology 17, no. 1 (2019): 136–54. http://dx.doi.org/10.1108/jedt-05-2018-0079.

Full text
Abstract:
PurposeThe build-operate-transfer (BOT) model is fast becoming a sustainable tool for remedying the deficiencies of public financing of hostel facilities in Nigeria. Being a new concept in Nigeria, this study aims to assess clients’ organizations perspective of risk factors associated with BOT model with a view to providing information for their effective management.Design/methodology/approachQuantitative descriptive analysis was used, which was based on primary data obtained through questionnaire survey. The respondents included architects, engineers (structural/civil/mechanical/electrical),
APA, Harvard, Vancouver, ISO, and other styles
7

Aladağ, Hande, and Zeynep Işık. "Design and construction risks in BOT type mega transportation projects." Engineering, Construction and Architectural Management 26, no. 10 (2019): 2223–42. http://dx.doi.org/10.1108/ecam-08-2018-0351.

Full text
Abstract:
Purpose In build-operate-transfer (BOT) transportation projects, design and construction phases are critical in terms of their effect on time and cost overruns. The purpose of this paper is to identify the role of risk factors affecting these phases and their significance level for BOT transportation projects. Design/methodology/approach Design and construction risks were determined and then validated by focus group discussions. Afterwards, an illustrated case study was presented to better understand the effects of determined risks in a BOT mega transportation project. As the last step of the
APA, Harvard, Vancouver, ISO, and other styles
8

Wahid, Abdul, Jumadi Mabe Parenreng, Welly Chandra Kusumah Kusnandar, Puput Dani Prasetyo Adi, Dendy Mahabror, and Ros Sariningrum. "Telegram bot-based Flood Early Warning System with WSN Integration." ILKOM Jurnal Ilmiah 16, no. 2 (2024): 151–60. http://dx.doi.org/10.33096/ilkom.v16i2.1699.151-160.

Full text
Abstract:
Indonesia experiences frequent flooding, with data from the National Disaster Management Agency (BNPB) revealing that floods account for 41% of all natural disasters (1,441 incidents) recorded in 2021. These floods cause significant property damage and casualties. To address this challenge, we have developed a prototype flood early warning system. This system utilizes ultrasonic sensors for real-time water level detection. Sensor data is transmitted to designated personnel through a website interface. Additionally, the system leverages a Telegram bot to deliver flood early warnings directly to
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Liukuan, Xiaoxiao Shi, and Qing Chang. "Exploring Adaptive UHI Mitigation Solutions by Spatial Heterogeneity of Land Surface Temperature and Its Relationship to Urban Morphology in Historical Downtown Blocks, Beijing." Land 11, no. 4 (2022): 544. http://dx.doi.org/10.3390/land11040544.

Full text
Abstract:
Heat stress brought on by the intensification of urban heat island (UHI) has caused many negative effects on human beings, which were found to be more severe in highly urbanized old towns. With the inconsistent findings on how urban spatial morphological characteristics influence land surface temperature (LST) and gaps between design practices being found, we chose Beijing Old Town (BOT) as the study area and took the basic planning implementation module “block” as a study to reveal the spatial heterogeneity of LST and its relationship to multiple urban morphological characteristics with highe
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Ajeet Kumar, and Rakesh Kumar. "IoT malware detection and Mitigation in AMQP simulated Environment." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 18, no. 4 (2024): 469–80. http://dx.doi.org/10.37936/ecti-cit.2024184.257016.

Full text
Abstract:
Internet of Things(IoT) devices are increasing rapidly and providing an infrastructure to connect and share information. Attackers are targeting the IoT network and sending malicious Trac to IoT devices. Devices share large volumes of data, so malware is a security issue. IoT devices work in resource-constrained environments, and malware changes the trac pattern. Due to that, it is a challenging situation to detect malware. An optimized ensemble learning-based approach is applied to detect the malware by analyzing the behavior. Training models employ the NF-BoT-IoT dataset to understand benign
APA, Harvard, Vancouver, ISO, and other styles
11

ZHOU, Cheng, Zhongyou MA, Lin ZHU, et al. "Activated expression of EsHD1 enhances drought tolerance in tobacco plants via mitigation of reactive oxygen species-mediated membrane damage." TURKISH JOURNAL OF BOTANY 39 (2015): 941–51. http://dx.doi.org/10.3906/bot-1506-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Alzahrani, Rami J., and Ahmed Alzahrani. "A Novel Multi Algorithm Approach to Identify Network Anomalies in the IoT Using Fog Computing and a Model to Distinguish between IoT and Non-IoT Devices." Journal of Sensor and Actuator Networks 12, no. 2 (2023): 19. http://dx.doi.org/10.3390/jsan12020019.

Full text
Abstract:
Botnet attacks, such as DDoS, are one of the most common types of attacks in IoT networks. A botnet is a collection of cooperated computing machines or Internet of Things gadgets that criminal users manage remotely. Several strategies have been developed to reduce anomalies in IoT networks, such as DDoS. To increase the accuracy of the anomaly mitigation system and lower the false positive rate (FPR), some schemes use statistical or machine learning methodologies in the anomaly-based intrusion detection system (IDS) to mitigate an attack. Despite the proposed anomaly mitigation techniques, the
APA, Harvard, Vancouver, ISO, and other styles
13

Zaen, Mohammad Taufan Asri, Ahmad Tantoni, and Maulana Ashari. "DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS." JISA(Jurnal Informatika dan Sains) 4, no. 2 (2021): 149–54. http://dx.doi.org/10.31326/jisa.v4i2.1043.

Full text
Abstract:
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing the performance of IS/IT used. The development of IoT in the industrial revolution 4.0, which is all online, is a challenge in itself, from a negative point of view, all of them are able to carry out attacks on ISP servers, often carried out by hackers. DDoS (Distributed Denial of Service) attacks are the most common attacks. The development of
APA, Harvard, Vancouver, ISO, and other styles
14

Djamalyanto, Meidi, Lilik Widyawati, Husain Husain, and I. Putu Hariyadi. "IMPLEMENTASI SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENCEGAH SERANGAN DEFACE PADA SERVER TERINTEGRASI TELEGRAM." Melek IT : Information Technology Journal 11, no. 1 (2025): 31–42. https://doi.org/10.30742/melekitjournal.v11i1.398.

Full text
Abstract:
Deface attacks are critical threats that disrupt server integrity and damage an organization's reputation. This research aims to design a Wazuh-based Security Information and Event Management (SIEM) system integrated with the Telegram Bot to detect, prevent, and provide real-time notifications against deface attacks. The method used is the Network Development Life Cycle (NDLC), which has three main stages: requirement analysis, system design, and prototype simulation. The implementation was conducted on a virtual environment using Ubuntu Server 22.04 as the Wazuh Manager and Parrot Security OS
APA, Harvard, Vancouver, ISO, and other styles
15

Stankovic, Milica, Naruemon Tantipisanuh, and Anchana Prathep. "Carbon storage in seagrass ecosystems along the Andaman coast of Thailand." Botanica Marina 61, no. 5 (2018): 429–40. http://dx.doi.org/10.1515/bot-2017-0101.

Full text
Abstract:
Abstract Seagrass ecosystems are important contributors to mitigation of climate change, since they are responsible for large carbon sinks. However, there is limited knowledge regarding the importance of variability of carbon storage in various ecosystems. In this study, we estimated carbon storage in several structurally different seagrass meadows along the west coast of Thailand and determined whether degree of exposure, human disturbance, and meadow type influenced carbon storage within these meadows. Carbon content within the living vegetation was on average 3±2.7 Mg ha−1, whilst average s
APA, Harvard, Vancouver, ISO, and other styles
16

Deelip, Mali Shrikant, and Govinda K. "ESREHO-MaxNet: Deep Maxout Network For Intrusion Detection And Attack Mitigation In Iot With Wrapper Based Feature Selection Approach." International Journal of Swarm Intelligence Research 13, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijsir.304901.

Full text
Abstract:
An effective intrusion detection method is developed using proposed ESREHO-based Deep Maxout network in the IoT environment. The plant images are captured by the sensor node and are routed to the sink node through CH that is selected by the method named Exponential SFO. The routed data is received at BS, where the intrusion detection strategy is done by undergoing the feature extraction, feature selection and intrusion detection phase. The log file data generated from the predicted data is fed to feature extraction phase, where the Bot-IoT features are acquired and then the unique features are
APA, Harvard, Vancouver, ISO, and other styles
17

ÇAvuşoğlu, Kürşat, and Di̇lek ÇAvuşoğlu. "Role of L-Ornithine in Mitigation of Salt Stress In Allium Cepa L." Bangladesh Journal of Botany 50, no. 4 (2021): 1165–71. http://dx.doi.org/10.3329/bjb.v50i4.57085.

Full text
Abstract:
Effects of L-ornithine (150 mg/l) on the germination, seedling growth, mitotic index, chromosome aberrations and micronucleus frequency of Allium cepa L. bulbs germinated at 0.125 M salinity were studied. The radicle number of the group III bulbs germinated in the medium with ornithine alone as compared to ones of the group I (control) bulbs which germinated in distilled water medium. But, their germination percentage, radicle length and fresh weight were statistically the same as ones of the group I bulbs. Besides, the micronucleus frequency and chromosomal abnormalities in the root-tip meris
APA, Harvard, Vancouver, ISO, and other styles
18

Sree Priyanka Uppu. "The unseen guardian: A research paper on the critical role of content delivery networks in internet security." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 1882–91. https://doi.org/10.30574/wjaets.2025.15.2.0719.

Full text
Abstract:
Content Delivery Networks (CDNs) have transcended their original purpose of optimizing internet performance to become essential guardians in the cybersecurity landscape. While initially designed to enhance content delivery by reducing latency and improving user experience, these geographically distributed networks now serve as critical defense mechanisms against an evolving array of cyber threats. The distributed architecture of CDNs inherently provides a robust security foundation, dispersing attack surfaces and absorbing malicious traffic that would otherwise overwhelm traditional infrastruc
APA, Harvard, Vancouver, ISO, and other styles
19

Barani, S. Sengamala, and R. Durga. "Ftdho Zfnet: Block chain based Fractional Tasmanian Devil Harris optimization enabled deep learning using attack detection and mitigation." Computer Software and Media Applications 7, no. 1 (2024): 5224. http://dx.doi.org/10.24294/csma.v7i1.5224.

Full text
Abstract:
Block chain technology is regarded for enhancing the characteristics of security because of decentralized design, safe distributed storage, and privacy. However, in recent times the present situation of block chain technology has experienced some crisis that may delay the quick acceptance and utilization in real-time applications. To conquer this subdues, a blockchain based system for attack detection and mitigation with Deep Learning (DL) named Fractional Tasmanian Devil Harris Optimization_Zeiler and Fergus network (FTDHO_ZFNet) is introduced. In this investigation, the entities utilized are
APA, Harvard, Vancouver, ISO, and other styles
20

Azad, Abul Kalam, Iftekhar Ahmad, GM Rabiul Islam, and A. Mainuddin. "Application of Statistical Model To Determine The Effectiveness of Plant Extract on The Mortality of Tea Thrips." Bangladesh Journal of Botany 51, no. 3 (2022): 401–10. http://dx.doi.org/10.3329/bjb.v51i3.61984.

Full text
Abstract:
Bioactive chemicals found in medicinal plant extracts aid in the mitigation, eradication and cure of diseases of living animals and plants. In the quest for novel medicinally significant plants, the current article focuses on determining the most successful and promising plants for suppressing tea leaf thrips (Scirtothrips bispinosus) through applying statistical model. 22 medicinal plants extraction had been used to achieve the stated goals of the study. Plant extract solutions were dissolved in their respective solvents at varied concentrations for the assessment of entomopathogenic activity
APA, Harvard, Vancouver, ISO, and other styles
21

Desoky, El Sayed M., Seham A. Ibrahim, and Abdel Rahman M. Merwad. "Mitigation of Salinity Stress Effects on Growth, Physio-Chemical Parameters and Yield of Snapbean (Phaseolus vulgaris L.) by Exogenous Application of Glycine Betaine." International Letters of Natural Sciences 76 (August 2019): 60–71. http://dx.doi.org/10.18052/www.scipress.com/ilns.76.60.

Full text
Abstract:
Pots experiment was carried out during season 2017 at greenhouse of the Agric. Bot. Dep., Fac. of Agric., Zagazig Univ., Egypt to evaluate the effect of glycine betaine (GB) application under salinity stress (50 and100 mM NaCl) on growth, physio-chemical analysis and yield of snap bean cv. Bronco. A complete randomized blocks design was used in this search with three replications. Growth parameters, chlorophyll content and green pod yield were significantly decreased with subjecting plants to NaCl. However foliar application of GB detoxified the stress generated by NaCl and significantly impro
APA, Harvard, Vancouver, ISO, and other styles
22

Desoky, El Sayed M., Seham A. Ibrahim, and Abdel Rahman M. Merwad. "Mitigation of Salinity Stress Effects on Growth, Physio-Chemical Parameters and Yield of Snapbean (<i>Phaseolus vulgaris</i> L.) by Exogenous Application of Glycine Betaine." International Letters of Natural Sciences 76 (August 6, 2019): 60–71. http://dx.doi.org/10.56431/p-x8aad9.

Full text
Abstract:
Pots experiment was carried out during season 2017 at greenhouse of the Agric. Bot. Dep., Fac. of Agric., Zagazig Univ., Egypt to evaluate the effect of glycine betaine (GB) application under salinity stress (50 and100 mM NaCl) on growth, physio-chemical analysis and yield of snap bean cv. Bronco. A complete randomized blocks design was used in this search with three replications. Growth parameters, chlorophyll content and green pod yield were significantly decreased with subjecting plants to NaCl. However foliar application of GB detoxified the stress generated by NaCl and significantly impro
APA, Harvard, Vancouver, ISO, and other styles
23

Miryahyaei, Meysam, Mehdi Fartash, and Javad Akbari Torkestani. "Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks." Sensors 24, no. 19 (2024): 6335. http://dx.doi.org/10.3390/s24196335.

Full text
Abstract:
The Industrial Internet of Things (IIoT) deals with vast amounts of data that must be safeguarded against tampering or theft. Identifying rare attacks and addressing data imbalances pose significant challenges in the detection of IIoT cyberattacks. Innovative detection methods are important for effective cybersecurity threat mitigation. While many studies employ resampling methods to tackle these issues, they often face drawbacks such as the use of artificially generated data and increased data volume, which limit their effectiveness. In this paper, we introduce a cutting-edge deep binary neur
APA, Harvard, Vancouver, ISO, and other styles
24

Cuervo, Wilmer, Camila Gomez Lopez, Ignacio Fernandez Marenchino, et al. "340 Ruminal Protozoa Viability Under Diverse Additives Using Trypan Blue Exclusion Method as an Alternative Counting Methodology." Journal of Animal Science 101, Supplement_3 (2023): 269–70. http://dx.doi.org/10.1093/jas/skad281.322.

Full text
Abstract:
Abstract Beef cattle are a major contributor to methane (CH4) emissions. Enteric CH4 is produced by archaea, mostly hosted by ruminal protozoa, thus, changes in protozoa counts have been associated with CH4 production. Therefore, reliable ruminal protozoa count (PROT) is essential to evaluate CH4-mitigation strategies. Typically, PROT are done by fixation with methyl-green-formalin-saline solution (MFS), which reveals ciliate numbers but not ruminal protozoa viability (VIAB). The Trypan Blue Exclusion Method (TBEM) involves an intracellular probe that dyes the cytoplasm of apoptotic eukaryotic
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Yongjun, Tengfei Wang, You’an Xiao, Yang Wang, and Gang’ao Yan. "An Approach of Consensus-Based Double-Layer Blockchain System for Multi-Ship Collision Risk Mitigation Considering COLREGs." Applied Sciences 13, no. 20 (2023): 11178. http://dx.doi.org/10.3390/app132011178.

Full text
Abstract:
Ship collision avoidance (CA) is the most fundamental and essential issue of maritime safety, regardless of whether the ship is a conventional ship or a future maritime autonomous surface ship (MASS). However, effective ship-to-ship communication has been recognized as a critical issue and one of the major challenges affecting the success of ship CA. This study intends to investigate the basic trust concerns in the cybersecurity components of the ship CA process and develop a blockchain-based solution for trustworthy communication. The novel idea behind applying blockchain to ship CA decision-
APA, Harvard, Vancouver, ISO, and other styles
26

Tarunamulia, Tarunamulia, Kamariah Kamariah, and Akhmad Mustafa. "KETERKAITAN SPASIAL KUALITAS LINGKUNGAN DAN KEBERADAAN FITOPLANKTON BERPOTENSI HABs PADA TAMBAK EKSTENSIF DI KECAMATAN LOSARI KABUPATEN CIREBON, JAWA BARAT." Jurnal Riset Akuakultur 11, no. 2 (2016): 181. http://dx.doi.org/10.15578/jra.11.2.2016.181-195.

Full text
Abstract:
Harmful Algal Blooms (HABs) dapat memberikan dampak negatif secara ekologis, ekonomis dan kesehatan. Kejadian dapat bervariasi menurut faktor lingkungan lokal pemicu serta kemampuan adaptasi spesies. Penelitian ini bertujuan untuk mengetahui keterkaitan antara karakteristik kualitas lingkungan dengan keberadaan fitoplankton berpotensi HABs pada tambak ekstensif di Kecamatan Losari Kabupaten Cirebon, Jawa Barat. Sebanyak masing-masing 45 contoh air dan tanah diambil pada total luas petakan tambak ±2300 ha dengan metode transek yang dimodifikasi. Peubah kualitas air yang diukur meliputi; Total A
APA, Harvard, Vancouver, ISO, and other styles
27

Gandam Vijay Kumar. "A Novel MLSTM-Based IDS for Cloud Security: Leveraging Jarratt-Butterfly Optimization." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 228–44. https://doi.org/10.52783/anvi.v28.4148.

Full text
Abstract:
Introduction: Cloud Computing (CC) has emerged as a transformative technology offering scalability and flexibility to businesses worldwide. However, security challenges, including unauthorized access, data breaches, and insider threats, remain a significant concern. Traditional Intrusion Detection Systems (IDS) struggle with evolving cyber threats, necessitating advanced approaches leveraging machine learning (ML) and deep learning (DL). Objectives: This study aims to develop a novel IDS model incorporating a Morlet Wavelet Kernel Function and an MLSTM (Modified Long Short-Term Memory) classif
APA, Harvard, Vancouver, ISO, and other styles
28

Arun, Raju Chinna Raju. "ADVANCING AI-DRIVEN CUSTOMER SERVICE WITH NLP: A NOVEL BERT-BASED MODEL FOR AUTOMATED RESPONSES." Journal of Emerging Technologies and Innovative Research 12, no. 1 (2025): h89—h123. https://doi.org/10.5281/zenodo.14963999.

Full text
Abstract:
&nbsp; &nbsp;The study focuses&ensp;on the integration of AI and NLP in the automation of customer service, and their evolution from theory to actual implementations. Building on core principles of AI, such as the Turing Test, as well as customer service frameworks like SERVQUAL and the Kano&ensp;Model, the research creates a holistic theoretical grounding. The study delves into fundamental areas&ensp;of NLP (such as syntactic, semantic, and pragmatic analysis) as well as advanced AI architectures ranging from traditional machine learning to cutting-edge transformer models like BERT and GPT, d
APA, Harvard, Vancouver, ISO, and other styles
29

Jamali, Ali, Masoud Mahdianpari, Brian Brisco, Jean Granger, Fariba Mohammadimanesh, and Bahram Salehi. "Comparing Solo Versus Ensemble Convolutional Neural Networks for Wetland Classification Using Multi-Spectral Satellite Imagery." Remote Sensing 13, no. 11 (2021): 2046. http://dx.doi.org/10.3390/rs13112046.

Full text
Abstract:
Wetlands are important ecosystems that are linked to climate change mitigation. As 25% of global wetlands are located in Canada, accurate and up-to-date wetland classification is of high importance, nationally and internationally. The advent of deep learning techniques has revolutionized the current use of machine learning algorithms to classify complex environments, specifically in remote sensing. In this paper, we explore the potential and possible limitations to be overcome regarding the use of ensemble deep learning techniques for complex wetland classification and discusses the potential
APA, Harvard, Vancouver, ISO, and other styles
30

Gundla, Sandeep Reddy. "Serverless Java: Cold Start Mitigation in Cloud Run/Spring Boot." International journal of IoT 05, no. 01 (2025): 126–45. https://doi.org/10.55640/ijiot-05-01-07.

Full text
Abstract:
This paper focuses on the cold start latency problem in serverless Java applications, seen mainly when deploying with Google Cloud Run and Spring Boot. Auto-scaling, reduced infrastructure use, and cost savings are why serverless computing is becoming more popular. Still, Java applications generally face delays when starting up, referred to as cold starts, because the JVM must boot up, and Spring Boot comprises complex settings. Because of this latency, users' experience can become very poor, especially when using real-time APIs, chatbots, and e-commerce systems. The study explains the process
APA, Harvard, Vancouver, ISO, and other styles
31

Hale, Amanda M., Cris D. Hein, and Bethany R. Straw. "Acoustic and Genetic Data Can Reduce Uncertainty Regarding Populations of Migratory Tree-Roosting Bats Impacted by Wind Energy." Animals 12, no. 1 (2021): 81. https://doi.org/10.5281/zenodo.13460971.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Wind turbine-related mortality may pose a population-level threat for migratory treeroosting bats, such as the hoary bat (Lasiurus cinereus) in North America. These species are dispersed within their range, making it impractical to estimate census populations size using traditional survey methods. Nonetheless, understanding population size and trends is essential for evaluating and mitigating risk from wind turbine mortality. Using various sampling techniques, including systematic acoustic sampling and genetic analyses, we argue that building
APA, Harvard, Vancouver, ISO, and other styles
32

Hale, Amanda M., Cris D. Hein, and Bethany R. Straw. "Acoustic and Genetic Data Can Reduce Uncertainty Regarding Populations of Migratory Tree-Roosting Bats Impacted by Wind Energy." Animals 12, no. 1 (2021): 81. https://doi.org/10.5281/zenodo.13460971.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Wind turbine-related mortality may pose a population-level threat for migratory treeroosting bats, such as the hoary bat (Lasiurus cinereus) in North America. These species are dispersed within their range, making it impractical to estimate census populations size using traditional survey methods. Nonetheless, understanding population size and trends is essential for evaluating and mitigating risk from wind turbine mortality. Using various sampling techniques, including systematic acoustic sampling and genetic analyses, we argue that building
APA, Harvard, Vancouver, ISO, and other styles
33

Hale, Amanda M., Cris D. Hein, and Bethany R. Straw. "Acoustic and Genetic Data Can Reduce Uncertainty Regarding Populations of Migratory Tree-Roosting Bats Impacted by Wind Energy." Animals 12, no. 1 (2021): 81. https://doi.org/10.5281/zenodo.13460971.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Wind turbine-related mortality may pose a population-level threat for migratory treeroosting bats, such as the hoary bat (Lasiurus cinereus) in North America. These species are dispersed within their range, making it impractical to estimate census populations size using traditional survey methods. Nonetheless, understanding population size and trends is essential for evaluating and mitigating risk from wind turbine mortality. Using various sampling techniques, including systematic acoustic sampling and genetic analyses, we argue that building
APA, Harvard, Vancouver, ISO, and other styles
34

Hale, Amanda M., Cris D. Hein, and Bethany R. Straw. "Acoustic and Genetic Data Can Reduce Uncertainty Regarding Populations of Migratory Tree-Roosting Bats Impacted by Wind Energy." Animals 12, no. 1 (2021): 81. https://doi.org/10.5281/zenodo.13460971.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Wind turbine-related mortality may pose a population-level threat for migratory treeroosting bats, such as the hoary bat (Lasiurus cinereus) in North America. These species are dispersed within their range, making it impractical to estimate census populations size using traditional survey methods. Nonetheless, understanding population size and trends is essential for evaluating and mitigating risk from wind turbine mortality. Using various sampling techniques, including systematic acoustic sampling and genetic analyses, we argue that building
APA, Harvard, Vancouver, ISO, and other styles
35

Hale, Amanda M., Cris D. Hein, and Bethany R. Straw. "Acoustic and Genetic Data Can Reduce Uncertainty Regarding Populations of Migratory Tree-Roosting Bats Impacted by Wind Energy." Animals 12, no. 1 (2021): 81. https://doi.org/10.5281/zenodo.13460971.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Wind turbine-related mortality may pose a population-level threat for migratory treeroosting bats, such as the hoary bat (Lasiurus cinereus) in North America. These species are dispersed within their range, making it impractical to estimate census populations size using traditional survey methods. Nonetheless, understanding population size and trends is essential for evaluating and mitigating risk from wind turbine mortality. Using various sampling techniques, including systematic acoustic sampling and genetic analyses, we argue that building
APA, Harvard, Vancouver, ISO, and other styles
36

Höffler, Hannes, Sebastian Prass, Jakob Hog, and Linda Ney. "Effects of Missing Catalyst Area on Anode and Cathode Side after Screen Printing on the Performance and Aging of PEM Fuel Cells." ECS Meeting Abstracts MA2025-01, no. 40 (2025): 2106. https://doi.org/10.1149/ma2025-01402106mtgabs.

Full text
Abstract:
Introduction: The transport sector is still responsible for a large part (~8Gt/a) of worldwide carbon emission [1]. Polymer Electrolyte Membrane (PEM) Fuel Cells (FCs) are an important emission-free alternative for transport application. Increased commercialization will lead to a large demand of PEM-FCs. As the catalyst coated membrane (CCM) is the heart of every FC, there is need of a lean and cost-effective way to produce CCMs. During CCM production inhomogeneities in the catalyst layer can occur. Several groups worked on understanding the impact of such irregularities on performance and dur
APA, Harvard, Vancouver, ISO, and other styles
37

Gabriel, Kyle T., Ashley G. McDonald, Kelly E. Lutsch, et al. "Development of a multi-year white-nose syndrome mitigation strategy using antifungal volatile organic compounds." PLOS ONE 17, no. 12 (2022): e0278603. https://doi.org/10.5281/zenodo.13485591.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Pseudogymnoascus destructans is a fungal pathogen responsible for a deadly disease among North American bats known as white-nose syndrome (WNS). Since detection of WNS in the United States in 2006, its rapid spread and high mortality has challenged development of treatment and prevention methods, a significant objective for wildlife management agencies. In an effort to mitigate precipitous declines in bat populations due to WNS, we have developed and implemented a multi-year mitigation strategy at Black Diamond Tunnel (BDT), Georgia, singly kn
APA, Harvard, Vancouver, ISO, and other styles
38

Gabriel, Kyle T., Ashley G. McDonald, Kelly E. Lutsch, et al. "Development of a multi-year white-nose syndrome mitigation strategy using antifungal volatile organic compounds." PLOS ONE 17, no. 12 (2022): e0278603. https://doi.org/10.5281/zenodo.13485591.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Pseudogymnoascus destructans is a fungal pathogen responsible for a deadly disease among North American bats known as white-nose syndrome (WNS). Since detection of WNS in the United States in 2006, its rapid spread and high mortality has challenged development of treatment and prevention methods, a significant objective for wildlife management agencies. In an effort to mitigate precipitous declines in bat populations due to WNS, we have developed and implemented a multi-year mitigation strategy at Black Diamond Tunnel (BDT), Georgia, singly kn
APA, Harvard, Vancouver, ISO, and other styles
39

Gabriel, Kyle T., Ashley G. McDonald, Kelly E. Lutsch, et al. "Development of a multi-year white-nose syndrome mitigation strategy using antifungal volatile organic compounds." PLOS ONE 17, no. 12 (2022): e0278603. https://doi.org/10.5281/zenodo.13485591.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Pseudogymnoascus destructans is a fungal pathogen responsible for a deadly disease among North American bats known as white-nose syndrome (WNS). Since detection of WNS in the United States in 2006, its rapid spread and high mortality has challenged development of treatment and prevention methods, a significant objective for wildlife management agencies. In an effort to mitigate precipitous declines in bat populations due to WNS, we have developed and implemented a multi-year mitigation strategy at Black Diamond Tunnel (BDT), Georgia, singly kn
APA, Harvard, Vancouver, ISO, and other styles
40

Gabriel, Kyle T., Ashley G. McDonald, Kelly E. Lutsch, et al. "Development of a multi-year white-nose syndrome mitigation strategy using antifungal volatile organic compounds." PLOS ONE 17, no. 12 (2022): e0278603. https://doi.org/10.5281/zenodo.13485591.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Pseudogymnoascus destructans is a fungal pathogen responsible for a deadly disease among North American bats known as white-nose syndrome (WNS). Since detection of WNS in the United States in 2006, its rapid spread and high mortality has challenged development of treatment and prevention methods, a significant objective for wildlife management agencies. In an effort to mitigate precipitous declines in bat populations due to WNS, we have developed and implemented a multi-year mitigation strategy at Black Diamond Tunnel (BDT), Georgia, singly kn
APA, Harvard, Vancouver, ISO, and other styles
41

Hale, Amanda M., Cris D. Hein, and Bethany R. Straw. "Acoustic and Genetic Data Can Reduce Uncertainty Regarding Populations of Migratory Tree-Roosting Bats Impacted by Wind Energy." Animals 12, no. 1 (2021): 81. http://dx.doi.org/10.3390/ani12010081.

Full text
Abstract:
Wind turbine-related mortality may pose a population-level threat for migratory tree-roosting bats, such as the hoary bat (Lasiurus cinereus) in North America. These species are dispersed within their range, making it impractical to estimate census populations size using traditional survey methods. Nonetheless, understanding population size and trends is essential for evaluating and mitigating risk from wind turbine mortality. Using various sampling techniques, including systematic acoustic sampling and genetic analyses, we argue that building a weight of evidence regarding bat population stat
APA, Harvard, Vancouver, ISO, and other styles
42

Putra, Yanuar Dharma, and Imron Mawardi. "ELIMINASI RISIKO OPERASIONAL BMT SRI SEJAHTERA SURABAYA." Jurnal Ekonomi Syariah Teori dan Terapan 6, no. 7 (2020): 1317. http://dx.doi.org/10.20473/vol6iss20197pp1317-1330.

Full text
Abstract:
The results of this research are risk mitigation measures in the continuity of internal processes, human resources, technology and information. Risk mitigation on the internal processes is done by performing supervision based on employees job description, and implementation of sharia financing agreements with customers. Risk mitigation on human resources is done by providing moral guidance to employees. Risk mitigation in information technology is carried out by performing regular maintenance of computer software and hardware, as well as other devices that support Baitul Maal wa tamwil Sri Sej
APA, Harvard, Vancouver, ISO, and other styles
43

Weller, Theodore J., and James A. Baldwin. "Using echolocation monitoring to model bat occupancy and inform mitigations at wind energy facilities." Journal of Wildlife Management 76, no. 3 (2012): 619–31. https://doi.org/10.5281/zenodo.13425852.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Fatalities of migratory bats, many of which use low frequency (&lt;35 kHz; LowF) echolocation calls, have become a primary environmental concern associated with wind energy development. Accordingly, strategies to improve compatibility between wind energy development and conservation of bat populations are needed. We combined results of continuous echolocation and meteorological monitoring at multiple stations to model conditions that explained presence of LowF bats at a wind energy facility in southern California. We used a site occupancy appr
APA, Harvard, Vancouver, ISO, and other styles
44

Weller, Theodore J., and James A. Baldwin. "Using echolocation monitoring to model bat occupancy and inform mitigations at wind energy facilities." Journal of Wildlife Management 76, no. 3 (2012): 619–31. https://doi.org/10.5281/zenodo.13425852.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Fatalities of migratory bats, many of which use low frequency (&lt;35 kHz; LowF) echolocation calls, have become a primary environmental concern associated with wind energy development. Accordingly, strategies to improve compatibility between wind energy development and conservation of bat populations are needed. We combined results of continuous echolocation and meteorological monitoring at multiple stations to model conditions that explained presence of LowF bats at a wind energy facility in southern California. We used a site occupancy appr
APA, Harvard, Vancouver, ISO, and other styles
45

Weller, Theodore J., and James A. Baldwin. "Using echolocation monitoring to model bat occupancy and inform mitigations at wind energy facilities." Journal of Wildlife Management 76, no. 3 (2012): 619–31. https://doi.org/10.5281/zenodo.13425852.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Fatalities of migratory bats, many of which use low frequency (&lt;35 kHz; LowF) echolocation calls, have become a primary environmental concern associated with wind energy development. Accordingly, strategies to improve compatibility between wind energy development and conservation of bat populations are needed. We combined results of continuous echolocation and meteorological monitoring at multiple stations to model conditions that explained presence of LowF bats at a wind energy facility in southern California. We used a site occupancy appr
APA, Harvard, Vancouver, ISO, and other styles
46

Weller, Theodore J., and James A. Baldwin. "Using echolocation monitoring to model bat occupancy and inform mitigations at wind energy facilities." Journal of Wildlife Management 76, no. 3 (2012): 619–31. https://doi.org/10.5281/zenodo.13425852.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Fatalities of migratory bats, many of which use low frequency (&lt;35 kHz; LowF) echolocation calls, have become a primary environmental concern associated with wind energy development. Accordingly, strategies to improve compatibility between wind energy development and conservation of bat populations are needed. We combined results of continuous echolocation and meteorological monitoring at multiple stations to model conditions that explained presence of LowF bats at a wind energy facility in southern California. We used a site occupancy appr
APA, Harvard, Vancouver, ISO, and other styles
47

Weller, Theodore J., and James A. Baldwin. "Using echolocation monitoring to model bat occupancy and inform mitigations at wind energy facilities." Journal of Wildlife Management 76, no. 3 (2012): 619–31. https://doi.org/10.5281/zenodo.13425852.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Fatalities of migratory bats, many of which use low frequency (&lt;35 kHz; LowF) echolocation calls, have become a primary environmental concern associated with wind energy development. Accordingly, strategies to improve compatibility between wind energy development and conservation of bat populations are needed. We combined results of continuous echolocation and meteorological monitoring at multiple stations to model conditions that explained presence of LowF bats at a wind energy facility in southern California. We used a site occupancy appr
APA, Harvard, Vancouver, ISO, and other styles
48

Weller, Theodore J., and James A. Baldwin. "Using echolocation monitoring to model bat occupancy and inform mitigations at wind energy facilities." Journal of Wildlife Management 76, no. 3 (2012): 619–31. https://doi.org/10.5281/zenodo.13425852.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Fatalities of migratory bats, many of which use low frequency (&lt;35 kHz; LowF) echolocation calls, have become a primary environmental concern associated with wind energy development. Accordingly, strategies to improve compatibility between wind energy development and conservation of bat populations are needed. We combined results of continuous echolocation and meteorological monitoring at multiple stations to model conditions that explained presence of LowF bats at a wind energy facility in southern California. We used a site occupancy appr
APA, Harvard, Vancouver, ISO, and other styles
49

HASE, KAZUMA, and SHIZUKO HIRYU. "Mitigation of Signal Jamming in Bat Echolocation." Japanese Journal of Animal Psychology 69, no. 2 (2019): 55–67. http://dx.doi.org/10.2502/janip.69.1.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hase, Kazuma, and Shizuko Hiryu. "Mitigation of Signal Jamming in Bat Echolocation." Japanese Journal of Animal Psychology 69, no. 2 (2019): 55–67. https://doi.org/10.5281/zenodo.13473362.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Bats emit ultrasonic vocalizations through their mouths or nostrils, listen to echoes returning from surrounding objects, and reconstruct three-dimensional images to navigate in the dark. To perform the reconstruction, bats compare their original emission with returning echoes that have been changed by the surroundings. In natural environments, echolocating bats receive various sensory inputs, including insect echoes, clutter echoes, and pulses and echoes from other bats, which must create a complex acoustic situation. Here, we discuss how bat
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!