Academic literature on the topic 'Mitigating techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mitigating techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mitigating techniques"

1

Alqurashi, Fahad, Mohammed AL-Hashimi, Mostafa Saleh, and Osama Abulnaja. "Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction." Computers 14, no. 2 (2025): 71. https://doi.org/10.3390/computers14020071.

Full text
Abstract:
Spectre variants 1 and 2 pose grave security threats to dynamic branch predictors in modern CPUs. While extensive research has focused on mitigating these attacks, little attention has been given to their energy and power implications. This study presents an empirical analysis of how compiler-based Spectre mitigation techniques influence energy consumption. We collect fine-grained energy readings from an HPC-class CPU via embedded sensors, allowing us to quantify the trade-offs between security and power efficiency. By utilizing a standard suite of microbenchmarks, we evaluate the impact of Sp
APA, Harvard, Vancouver, ISO, and other styles
2

Chaki, Emmanuel Sibusiso, and Mthulisi Velempini. "Implementing a Machine Learning based Hybrid Model to Counter Attacks in Mobile Edge Computing." International Conference on Artificial Intelligence and its Applications 2023 (November 9, 2023): 59–64. http://dx.doi.org/10.59200/icarti.2023.008.

Full text
Abstract:
This study focuses on the security of 5G mobile network major technology called Multi-Access Edge Computing (MEC) and its susceptibility to distributed denial of service (DDoS) attacks. The goal of the research is to address the effects of DDoS attacks and implement effective mitigation techniques. Several supervised Machine Learning (ML) techniques, which include Random Forest (RF), Decision Tree, Naïve Bayes, K-Nearest Neighbour, Logistics Regression, and Blending/Stack Model, are evaluated using multiple performance metrics such as accuracy, detection/recall, F1-Measure, Matthew’s correlati
APA, Harvard, Vancouver, ISO, and other styles
3

Naresh Babu Kilaru. "Mitigating Market Volatility Using Machine Learning Techniques." Darpan International Research Analysis 12, no. 2 (2024): 223–34. http://dx.doi.org/10.36676/dira.v12.i2.151.

Full text
Abstract:
This paper uses advanced machine learning algorithms to control market fluctuations and improve the accuracy of the financial forecast decision-making tool. The application of techniques is then simulated with models and real-time situations to evaluate the technique's effectiveness on market forecasting. By analyzing the data, we show that using machine learning as the approach to build models that are more accurate than the existing ones reduces risks connected with flapping markets. Some of the difficulties observed are described, and the results suggest possible solutions. In conclusion, o
APA, Harvard, Vancouver, ISO, and other styles
4

Heverin, Thomas, Michael Cordano, Andy Zeyher, Matthew Lashner, and Sanjana Suresh. "Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 72–80. http://dx.doi.org/10.34190/iccws.17.1.32.

Full text
Abstract:
Mitigating vulnerabilities in industrial control systems (ICSs) represents a highly complex task. ICSs may contain an abundance of device types, all with unique software and hardware components. Upon discovering vulnerabilities on ICS devices, cyber defenders must determine which mitigations to implement, and which mitigations can apply across multiple vulnerabilities. Cyber defenders need techniques to optimize mitigation selection. This exploratory research paper shows how ontologies, also known as linked-data models, can potentially be used to model ICS devices, vulnerabilities, and mitigat
APA, Harvard, Vancouver, ISO, and other styles
5

Ayodeji, A. I., O. S. I. Fayomi, K. O. Babaremu, P. O. Abioye, O. Agboola, and A. A. Daniyan. "Corrosion mitigating techniques and the mechanisms: Comment." IOP Conference Series: Materials Science and Engineering 1107, no. 1 (2021): 012055. http://dx.doi.org/10.1088/1757-899x/1107/1/012055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suleiman, Naziru, and Aidi Ahmi. "Mitigating Corruption Using Forensic Accounting Investigation Techniques." Indian-Pacific Journal of Accounting and Finance 2, no. 1 (2018): 4–25. http://dx.doi.org/10.52962/ipjaf.2018.2.1.38.

Full text
Abstract:
Corruption has been one of the everyday concern for many nations. The effect of corruption has been very devastating in countries across the globe including the developed nations. However, reports indicate that the developing nations are more susceptible to corruption and particularly within the public sector. Nigeria is an example of a developing facing the problem of corruption within the enclave of its public-sector services. Essentially, public sector service performances in Nigeria is inseparable from corruption in one form or the other. Over the years, successive have been making efforts
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, You, Hector Marco-Gisbert, and Paul Keir. "Mitigating Webshell Attacks through Machine Learning Techniques." Future Internet 12, no. 1 (2020): 12. http://dx.doi.org/10.3390/fi12010012.

Full text
Abstract:
A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security products detect webshells based on feature-matching methods—matching input scripts against pre-built malicious code collections. The feature-matching method has a low detection rate for obfuscated webshells. However, with the help of machine learning algorithms, webshells can be detected more efficiently and accurately. In this paper, we propose a new PH
APA, Harvard, Vancouver, ISO, and other styles
8

Md, Badrul Islam Palash, Fahim Islam Md, and Ahamed Foysal. "Mitigating Cybersickness in Virtual Reality: Challenges and Solutions." International Journal of Novel Research in Computer Science and Software Engineering 12, no. 1 (2025): 12–23. https://doi.org/10.5281/zenodo.14608484.

Full text
Abstract:
<strong>Abstract:</strong> Cybersickness, a significant challenge in virtual reality (VR) environments, impedes the seamless adoption of immersive technologies. This study evaluates the effectiveness of various mitigation techniques, including Field of View (FoV) Adjustment, Frame Rate Optimization, Motion Smoothing, and Cognitive Behavioral Therapy (CBT), on reducing Simulator Sickness Questionnaire (SSQ) scores among participants. Data were collected from 50 individuals divided into age and gender groups to examine baseline cybersickness levels and post-intervention outcomes. Combined strate
APA, Harvard, Vancouver, ISO, and other styles
9

Antony Jose, Subin, Merbin John, Manoranjan Misra, and Pradeep L. Menezes. "Peening Techniques for Mitigating Chlorine-Induced Stress Corrosion Cracking of Dry Storage Canisters for Nuclear Applications." Materials 18, no. 2 (2025): 438. https://doi.org/10.3390/ma18020438.

Full text
Abstract:
Fusion-welded austenitic stainless steel (ASS) was predominantly employed to manufacture dry storage canisters (DSCs) for the storage applications of spent nuclear fuel (SNF). However, the ASS weld joints are prone to chloride-induced stress corrosion cracking (CISCC), a critical safety issue in the nuclear industry. DSCs were exposed to a chloride-rich environment during storage, creating CISCC precursors. The CISCC failure leads to nuclear radiation leakage. Therefore, there is a critical need to enhance the CISCC resistance of DSC weld joints using promising repair techniques. This review a
APA, Harvard, Vancouver, ISO, and other styles
10

Rader, Marc A., and Syed (Shawon) M. Rahman. "Phishing Techniques and Mitigating the Associated Security Risks." International Journal of Network Security & Its Applications 5, no. 4 (2013): 23–41. http://dx.doi.org/10.5121/ijnsa.2013.5402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Mitigating techniques"

1

Hedman, Anna. "Browsing techniques for mitigating display-size constraints." Licentiate thesis, Luleå : Luleå University of Technology, 2007. http://epubl.ltu.se/1402-1757/2007/70/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hull, Bret Warren 1980. "Techniques for mitigating congestion in wireless sensor networks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/30170.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2005.<br>Includes bibliographical references (p. 99-105).<br>Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality to degrade and loss rates to rise, leads to buffer drops and increased delays (as in wired networks), and tends to be grossly unfair toward nodes whose data has to traverse a larger number of radio hops. Congestion control in wired networks is u
APA, Harvard, Vancouver, ISO, and other styles
3

Lorilla, Lorenzo M. 1981. "Filtering techniques for mitigating microwave oven interference on 802.11b wireless local area networks." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/16980.

Full text
Abstract:
Thesis (M.Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (p. 165-169).<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>With the increasing popularity and assimilation of wireless devices into the everyday lives of people, the issue of their feasibility for coexisting with other radio frequency (RF) devices arises. Particularly strong interferers for the IEEE 802.11b standard are microw
APA, Harvard, Vancouver, ISO, and other styles
4

McCormick, Angela D. (Angela Dorothy). "Selected growth management techniques for use in mitigating traffic congestion in Masssachusetts [sic] suburban corridors." Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/75990.

Full text
Abstract:
Thesis (M.C.P.)--Massachusetts Institute of Technology, Dept. of Urban Studies and Planning, 1987.<br>Title as it appeared in the Massachusetts Institute of Technology Graduate List, June 1987: Selected growth management techniques to mitigate traffic congestion in suburban corridors.<br>Bibliography: leaves 65-67.<br>by Angela D. McCormick.<br>M.C.P.
APA, Harvard, Vancouver, ISO, and other styles
5

Rewaskar, Sushant Kaur Jasleen. "Real world evaluation of techniques for mitigating the impact of packet losses on TCP performance." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2121.

Full text
Abstract:
Thesis (Ph. D.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science." Discipline: Computer Science; Department/School: Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
6

Guo, Liwen. "Advanced techniques for mitigating the effects of temporal distortions in human in the loop control systems." Diss., Online access via UMI:, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nisi, Dario. "Unveiling and mitigating common pitfalls in malware analysis." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS528.

Full text
Abstract:
L'importance des systèmes informatiques dans les sociétés modernes ne cesse de croître, tout comme les dommages causés par les logiciels malveillants. L'industrie de la sécurité et les auteurs de logiciels malveillants se sont engagés dans une course aux armements, dans laquelle les premiers créent de meilleurs systèmes de détection tandis que les seconds tentent de les contourner. En fait, toute hypothèse erronée (aussi subtile soit-elle) dans la conception d'un outil anti-malware peut créer de nouvelles voies pour échapper à la détection. Cette thèse se concentre sur deux aspects souvent nég
APA, Harvard, Vancouver, ISO, and other styles
8

Aku, Anizizo. "Role of Middle Managers in Mitigating Employee Cyberloafing in the Workplace." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3967.

Full text
Abstract:
Companies in the United States are concerned about the indeterminate effectiveness of corporate cyberloafing mitigation efforts leading to the persistence of employee cyberloafing behavior. Although middle managers are the driving force behind the transformational influences that guide employee productivity and could proffer practical solutions, a lack of clarity surrounds the middle manager's role in the overall cyberloafing mitigation efforts within organizations. The central research question for this transcendental phenomenological research study explored the lived experiences of middle ma
APA, Harvard, Vancouver, ISO, and other styles
9

Powell, Keith. "Next generation wavefront controller for the MMT adaptive optics system: Algorithms and techniques for mitigating dynamic wavefront aberrations." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/222838.

Full text
Abstract:
Wavefront controller optimization is important in achieving the best possible image quality for adaptive optics systems on the current generation of large and very large aperture telescopes. This will become even more critical when we consider the demands of the next generation of extremely large telescopes currently under development. These telescopes will be capable of providing resolution which is significantly greater than the current generation of optical/IR telescopes. However, reaching the full resolving potential of these instruments will require a careful analysis of all disturbanc
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Rujiang. "Mitigating error propagation of decision feedback equalization in boradband communications." Doctoral thesis, Université Laval, 2008. http://www.theses.ulaval.ca/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Mitigating techniques"

1

Dong, Shuning, Wanfang Zhou, Qisheng Liu, Hao Wang, and Yadong Ji. Methods and Techniques for Preventing and Mitigating Water Hazards in Mines. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67059-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Bhim, Ambrish Chandra, and Kamal Al-Haddad, eds. Power Quality Problems and Mitigation Techniques. John Wiley & Sons Ltd, 2015. http://dx.doi.org/10.1002/9781118922064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lindeman, W. Effectiveness of mitigation techniques at the Alafia River crossing. s.n, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salkuti, Surender Reddy, Papia Ray, and Arvind R. Singh, eds. Power Quality in Microgrids: Issues, Challenges and Mitigation Techniques. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2066-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Andrea, Giorgetti, ed. Cognitive radio techniques: Spectrum sensing, interference mitigation, and localization. Artech House, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rainsford, Richard Adams. The adjuster's guide to property loss mitigation procedures and techniques. The Bureau, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Crawford, Jason A. Handbook of selected congestion mitigation techniques in the United States. Texas Transportation Institute, Texas A&M University System, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Steel Construction Institute (Great Britain). Fire and Blast Information Group. Explosion mitigation systems. Steel Construction Institute, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ryan, Brooke J., and Darnall E. Anderson. Carbon sequestration: Technology, measurement techniques, and environmental effects. Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

J, Gadsby Kenneth, Reddy T. A, and Air and Energy Engineering Research Laboratory., eds. Natural basement ventilation as a radon mitigation technique: Project summary. U.S. Environmental Protection Agency, Air and Energy Engineering Research Laboratory, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Mitigating techniques"

1

Kato, Takahiko, and Yukiko Mizuguchi. "Characterization Techniques for Film Characteristics." In Mitigating Tin Whisker Risks. John Wiley & Sons, Inc, 2016. http://dx.doi.org/10.1002/9781119011965.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sobti, RC, Apurav Sharma, and Sanjeev Kumar Soni. "Applications of Biotechnological Techniques in Mitigating Environmental Concerns." In Genomic, Proteomics, and Biotechnology. CRC Press, 2022. http://dx.doi.org/10.1201/9781003220831-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Bharati, and Debasish Jena. "Mitigating Cloud Computing Cybersecurity Risks Using Machine Learning Techniques." In Algorithms for Intelligent Systems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5243-4_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oladapo, Kayode Abiodun, Jide Ebenezer Taiwo Akinsola, Moruf Adeagbo, Fathia Onipede, Samuel Ayomikun Akinseinde, and Adebola Abdulwaheed Yusuf. "Intelligent Optimization and Computational Learning Techniques for Mitigating Pandemics." In Emerging Technologies for Combatting Pandemics. Auerbach Publications, 2022. http://dx.doi.org/10.1201/9781003324447-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Haidar, Elissa, Cedric Mhasseb, Jana Khalil, et al. "A Journey through Peanut Processing Techniques for Mitigating Allergenicity." In Food Allergies. CRC Press, 2024. http://dx.doi.org/10.1201/9781003433781-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Halabi, Marwan. "Limits of Waste Materials on Concrete Mixture Base Using Digital Design and Fabrication Techniques." In Renewable Energy for Mitigating Climate Change. CRC Press, 2021. http://dx.doi.org/10.1201/9781003240129-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aguiar, Ygor Quadros de, Frédéric Wrobel, Jean-Luc Autran, and Rubén García Alía. "Analysis of Layout-Based RHBD Techniques." In Single-Event Effects, from Space to Accelerator Environments. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-71723-9_5.

Full text
Abstract:
AbstractRadiation hardening techniques play a pivotal role in enhancing the resilience of VLSI circuits employed in radiation environments, most notably in critical applications such as in space technologies. Building upon the preceding chapter, some Radiation Hardening by Design (RHBD) techniques have been devised to effectively counteract the detrimental impact of radiation on electronic circuits, addressing diverse levels of abstraction ranging from circuit layout to system and software design. This chapter delves into an insightful analysis of the efficacy achieved through layout design te
APA, Harvard, Vancouver, ISO, and other styles
8

Chaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Risks of Data Breaches and Mitigating Controls in Financial Sector." In Intelligent Computing Techniques for Smart Energy Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-0252-9_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Komatsu, Takanori, and Akira Namatame. "Distributed Consensus and Mitigating Risk Propagation in Evolutionary Optimized Networks." In Advanced Methods, Techniques, and Applications in Modeling and Simulation. Springer Japan, 2012. http://dx.doi.org/10.1007/978-4-431-54216-2_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Haroon-Sulyman, Shakirat Oluwatosin, Siti Sakira Kamaruddin, Farzana Kabir Ahmad, Shuzlina Abdul-Rahman, and Nor Idalaila Aziz. "Techniques for Mitigating the Vanishing Gradient Problem in Deep Neural Networks." In Information Systems Engineering and Management. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-91485-0_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mitigating techniques"

1

Bin Rahman, Asadullah, Masud Ibn Afjal, and Md Abdulla Al Mamun. "Mitigating Noise from Biomedical Images Using Wavelet Transform Techniques." In 2025 International Conference on Electrical, Computer and Communication Engineering (ECCE). IEEE, 2025. https://doi.org/10.1109/ecce64574.2025.11013062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

S, Thamizhiniyan C., Chiranjeevi Sai Kapuluru, and Balakiruthiga B. "Mitigating NoSQL Injection Vulnerabilities: Techniques, Examples, and Best Practices." In 2025 International Conference on Emerging Systems and Intelligent Computing (ESIC). IEEE, 2025. https://doi.org/10.1109/esic64052.2025.10962645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Giri, Rakesh Kumar, Arpit Arora, Renuka Pappu, U. M. Netravati, Kuldeep Sharma, and Devansh Desai. "Mitigating Interferences with Error Resilience Techniques for Optimal Electromagnetic Compatibility." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lever, Emma, Justin Roessler, Charles Baylis, et al. "Mitigating Notch Filtering: Compensation Techniques for Notching a Received Waveform." In 2025 IEEE International Radar Conference (RADAR). IEEE, 2025. https://doi.org/10.1109/radar52380.2025.11032030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lakshmikanthan, Govindarajan, Sreejith Sreekandan Nair, J. Partha Sarathy, Sachin Singh, S. Santiago, and B. Jegajothi. "Mitigating IoT Botnet Attacks: Machine Learning Techniques for Securing Connected Devices." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10895253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gujar, Shantanu Sudhir, and Prithvi Aiyattira Kishor Kumar. "Mitigating Rogue Switch Attacks in Software-Defined Networking: Techniques and Countermeasures." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10862080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sidana, Sagar, Sujata Negi Thakur, Sandeep Kumar, et al. "Mitigating Racial Bias in Facial Expression Recognition Using Enhanced Data Diversification Techniques." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10723863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Das Adhikary, Dibya Ranjan, Paramjit Baxi, Lakshmi Sevukamoorthy, E. Annadevi, Dhananjay Kumar Yadav, and Prateek Garg. "Mitigating DDoS Attacks in Software-Defined Networks (SDN) Using Machine Learning Techniques." In 2025 International Conference on Automation and Computation (AUTOCOM). IEEE, 2025. https://doi.org/10.1109/autocom64127.2025.10957665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Asim, Nadia, Jude Osamor, Funminiyi Olajide, Celestine Iwendi, and Njideka Okeke. "Detecting and Mitigating Anti-Forensic Techniques: A Comprehensive Framework for Digital Investigators." In 2025 AI-Driven Smart Healthcare for Society 5.0. IEEE, 2025. https://doi.org/10.1109/ieeeconf64992.2025.10963229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hannan, Nasif, Md Ismail Hossain, Abu Shufian, Sadman Shahriar Alam, S. M. Tanvir Hassan Shovon, and Protik Parvez Sheikh. "Advanced Control Strategy for Mitigating Imbalances in Centralized Microgrids Using Grid-Forming Converters." In 2025 4th International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). IEEE, 2025. https://doi.org/10.1109/icrest63960.2025.10914396.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mitigating techniques"

1

Rahman, Mohammad, Ahmed Ibrahim, and Riyadh Hindi. Bridge Decks: Mitigation of Cracking and Increased Durability—Phase III. Illinois Center for Transportation, 2020. http://dx.doi.org/10.36501/0197-9191/20-022.

Full text
Abstract:
Early-age cracking in concrete decks significantly reduces the service life of bridges. This report discusses the application of various concrete mixtures that include potential early mitigation ingredients. Large-scale (7 ft × 10 ft) experimental bridge prototypes with similar restraint conditions found in actual bridges were poured with different concrete mixtures to investigate mitigation techniques. Portland cement (control), expansive Type K cement, internally cured lightweight aggregate (LWA), shrinkage-reducing admixture (SRA), and gypsum mineral were investigated as mitigating ingredie
APA, Harvard, Vancouver, ISO, and other styles
2

Brousseau, R., and Mr Bob Gummow. CR-6352 Research into Methods of Mitigating External Corrosion Underneath Unbonded Dielectric Coating. Pipeline Research Council International, Inc. (PRCI), 1992. http://dx.doi.org/10.55274/r0011776.

Full text
Abstract:
The main objective of this research program was to determine whether or not cost effective methods could be developed and applied to mitigate corrosion occurring on the external surface of a pipeline beneath unbonded or disbonded coating. Conventional cathodic protection techniques have not been completely successful in preventing underfilm corrosion particularly in fresh water and soils environments. Two new methods were investigated for mitigating corrosion. These involved modifying the traditional cathodic protection approach used in the field. In the laboratory, the measurements were perfo
APA, Harvard, Vancouver, ISO, and other styles
3

Author, Unknown. L51752 Water Crossing Design and Installation Manual. Pipeline Research Council International, Inc. (PRCI), 1996. http://dx.doi.org/10.55274/r0010323.

Full text
Abstract:
The pipeline industry has recognized the need for a reference guide to assist design personnel in the selection of the most environmentally appropriate and cost-effective construction techniques for pipeline water and wetland crossings. Operating companies have already been developing, implementing, and perfecting water and wetland crossing techniques and associated preventative, mitigative, and monitoring procedures in order to minimize the impacts on water quality and associated habitat. However, these activities, to date have largely been performed on an individual basis with little transfe
APA, Harvard, Vancouver, ISO, and other styles
4

Sancio, Rodolfo. PR-616-164506-R01 Management of Geohazards Affecting Engineering and Construction of Pipelines. Pipeline Research Council International, Inc. (PRCI), 2018. http://dx.doi.org/10.55274/r0011484.

Full text
Abstract:
The available literature includes numerous publications describing approaches, methods, and recommendations, for identifying, characterizing, and mitigating geohazards, as well and case histories of pipelines affected by geohazards and how their effects were mitigated. However, these publications are not comprehensive; separately provide information for identification, characterization, and mitigation; do not include all geohazards affecting pipelines; or may not have been developed specifically for pipelines. PRCI identified this gap and commissioned the development of a guidance document to
APA, Harvard, Vancouver, ISO, and other styles
5

Dietiker, B., A. J.-M. Pugin, H. Crow, K. Brewer, and H. A. J. Russell. Geophysical data interpretation for the York University ATES site investigation, Ontario. Natural Resources Canada/CMSS/Information Management, 2024. http://dx.doi.org/10.4095/332366.

Full text
Abstract:
Aquifer Thermal Energy Storage (ATES) systems have the potential of reducing heating and cooling energy consumption at institutional and commercial scales. ATES systems are popular in Europe, particularly in areas of extensive glacial and post glacial unconsolidated sediment. Southern Ontario shares numerous similarities with such settings. To support an ATES study at York University, Toronto, Ontario, three geophysical datasets were collected i) Microtremor analysis (the horizontal-to-vertical spectral ratio technique, HVSR), ii) seismic reflection, and iii) borehole geophysics. The three tec
APA, Harvard, Vancouver, ISO, and other styles
6

McKinley, Richard L. Bone Conducted Noise and Mitigation Techniques. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada501586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Kyle K., and Jason R. Foley. A Review of Shock Mitigation Techniques (Briefing Charts). Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada627176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deal, Brian M., Donald F. Fournier, Diane M. Timlin, and Elisabeth M. Jenicek. An Assessment of Encroachment Mitigation Techniques for Army Lands. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada409139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Saulnier, Gary J., and Catalina A. Silva. Comparison of Time and Transform Domain Interference Mitigation Techniques. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada351524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Giovando, Jeremy, Chandler Engel, Daniel Vandevort, and Christina Chow. Summary of ice jams and mitigation techniques in Alaska. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47069.

Full text
Abstract:
Ice is an important part of the Alaska ecosystems and can form through dynamic (e.g., frazil) or static (e.g., thermal) processes. In Alaska, both freeze-up and breakup ice jams occur, however breakup jams during the spring snowmelt period are most common. Historically there have been many river systems in Alaska that have chronic ice jam issues. These ice jams have resulted in several significant ice jam floods. There are ice jam mitigation techniques that can be used to either provide state and local emergency managers warnings of a potential ice jam or reduce the impacts of a jam. Common re
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!