To see the other types of publications on this topic, follow the link: Mitigating techniques.

Journal articles on the topic 'Mitigating techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mitigating techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alqurashi, Fahad, Mohammed AL-Hashimi, Mostafa Saleh, and Osama Abulnaja. "Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction." Computers 14, no. 2 (2025): 71. https://doi.org/10.3390/computers14020071.

Full text
Abstract:
Spectre variants 1 and 2 pose grave security threats to dynamic branch predictors in modern CPUs. While extensive research has focused on mitigating these attacks, little attention has been given to their energy and power implications. This study presents an empirical analysis of how compiler-based Spectre mitigation techniques influence energy consumption. We collect fine-grained energy readings from an HPC-class CPU via embedded sensors, allowing us to quantify the trade-offs between security and power efficiency. By utilizing a standard suite of microbenchmarks, we evaluate the impact of Sp
APA, Harvard, Vancouver, ISO, and other styles
2

Chaki, Emmanuel Sibusiso, and Mthulisi Velempini. "Implementing a Machine Learning based Hybrid Model to Counter Attacks in Mobile Edge Computing." International Conference on Artificial Intelligence and its Applications 2023 (November 9, 2023): 59–64. http://dx.doi.org/10.59200/icarti.2023.008.

Full text
Abstract:
This study focuses on the security of 5G mobile network major technology called Multi-Access Edge Computing (MEC) and its susceptibility to distributed denial of service (DDoS) attacks. The goal of the research is to address the effects of DDoS attacks and implement effective mitigation techniques. Several supervised Machine Learning (ML) techniques, which include Random Forest (RF), Decision Tree, Naïve Bayes, K-Nearest Neighbour, Logistics Regression, and Blending/Stack Model, are evaluated using multiple performance metrics such as accuracy, detection/recall, F1-Measure, Matthew’s correlati
APA, Harvard, Vancouver, ISO, and other styles
3

Naresh Babu Kilaru. "Mitigating Market Volatility Using Machine Learning Techniques." Darpan International Research Analysis 12, no. 2 (2024): 223–34. http://dx.doi.org/10.36676/dira.v12.i2.151.

Full text
Abstract:
This paper uses advanced machine learning algorithms to control market fluctuations and improve the accuracy of the financial forecast decision-making tool. The application of techniques is then simulated with models and real-time situations to evaluate the technique's effectiveness on market forecasting. By analyzing the data, we show that using machine learning as the approach to build models that are more accurate than the existing ones reduces risks connected with flapping markets. Some of the difficulties observed are described, and the results suggest possible solutions. In conclusion, o
APA, Harvard, Vancouver, ISO, and other styles
4

Heverin, Thomas, Michael Cordano, Andy Zeyher, Matthew Lashner, and Sanjana Suresh. "Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 72–80. http://dx.doi.org/10.34190/iccws.17.1.32.

Full text
Abstract:
Mitigating vulnerabilities in industrial control systems (ICSs) represents a highly complex task. ICSs may contain an abundance of device types, all with unique software and hardware components. Upon discovering vulnerabilities on ICS devices, cyber defenders must determine which mitigations to implement, and which mitigations can apply across multiple vulnerabilities. Cyber defenders need techniques to optimize mitigation selection. This exploratory research paper shows how ontologies, also known as linked-data models, can potentially be used to model ICS devices, vulnerabilities, and mitigat
APA, Harvard, Vancouver, ISO, and other styles
5

Ayodeji, A. I., O. S. I. Fayomi, K. O. Babaremu, P. O. Abioye, O. Agboola, and A. A. Daniyan. "Corrosion mitigating techniques and the mechanisms: Comment." IOP Conference Series: Materials Science and Engineering 1107, no. 1 (2021): 012055. http://dx.doi.org/10.1088/1757-899x/1107/1/012055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suleiman, Naziru, and Aidi Ahmi. "Mitigating Corruption Using Forensic Accounting Investigation Techniques." Indian-Pacific Journal of Accounting and Finance 2, no. 1 (2018): 4–25. http://dx.doi.org/10.52962/ipjaf.2018.2.1.38.

Full text
Abstract:
Corruption has been one of the everyday concern for many nations. The effect of corruption has been very devastating in countries across the globe including the developed nations. However, reports indicate that the developing nations are more susceptible to corruption and particularly within the public sector. Nigeria is an example of a developing facing the problem of corruption within the enclave of its public-sector services. Essentially, public sector service performances in Nigeria is inseparable from corruption in one form or the other. Over the years, successive have been making efforts
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, You, Hector Marco-Gisbert, and Paul Keir. "Mitigating Webshell Attacks through Machine Learning Techniques." Future Internet 12, no. 1 (2020): 12. http://dx.doi.org/10.3390/fi12010012.

Full text
Abstract:
A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security products detect webshells based on feature-matching methods—matching input scripts against pre-built malicious code collections. The feature-matching method has a low detection rate for obfuscated webshells. However, with the help of machine learning algorithms, webshells can be detected more efficiently and accurately. In this paper, we propose a new PH
APA, Harvard, Vancouver, ISO, and other styles
8

Md, Badrul Islam Palash, Fahim Islam Md, and Ahamed Foysal. "Mitigating Cybersickness in Virtual Reality: Challenges and Solutions." International Journal of Novel Research in Computer Science and Software Engineering 12, no. 1 (2025): 12–23. https://doi.org/10.5281/zenodo.14608484.

Full text
Abstract:
<strong>Abstract:</strong> Cybersickness, a significant challenge in virtual reality (VR) environments, impedes the seamless adoption of immersive technologies. This study evaluates the effectiveness of various mitigation techniques, including Field of View (FoV) Adjustment, Frame Rate Optimization, Motion Smoothing, and Cognitive Behavioral Therapy (CBT), on reducing Simulator Sickness Questionnaire (SSQ) scores among participants. Data were collected from 50 individuals divided into age and gender groups to examine baseline cybersickness levels and post-intervention outcomes. Combined strate
APA, Harvard, Vancouver, ISO, and other styles
9

Antony Jose, Subin, Merbin John, Manoranjan Misra, and Pradeep L. Menezes. "Peening Techniques for Mitigating Chlorine-Induced Stress Corrosion Cracking of Dry Storage Canisters for Nuclear Applications." Materials 18, no. 2 (2025): 438. https://doi.org/10.3390/ma18020438.

Full text
Abstract:
Fusion-welded austenitic stainless steel (ASS) was predominantly employed to manufacture dry storage canisters (DSCs) for the storage applications of spent nuclear fuel (SNF). However, the ASS weld joints are prone to chloride-induced stress corrosion cracking (CISCC), a critical safety issue in the nuclear industry. DSCs were exposed to a chloride-rich environment during storage, creating CISCC precursors. The CISCC failure leads to nuclear radiation leakage. Therefore, there is a critical need to enhance the CISCC resistance of DSC weld joints using promising repair techniques. This review a
APA, Harvard, Vancouver, ISO, and other styles
10

Rader, Marc A., and Syed (Shawon) M. Rahman. "Phishing Techniques and Mitigating the Associated Security Risks." International Journal of Network Security & Its Applications 5, no. 4 (2013): 23–41. http://dx.doi.org/10.5121/ijnsa.2013.5402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

AJAYI, Wumi. "ANALYSIS OFMODERN CYBERSECURITY THREAT TECHNIQUES ANDAVAILABLE MITIGATING METHODS." International Journal of Advanced Research in Computer Science 13, no. 2 (2022): 49–55. http://dx.doi.org/10.26483/ijarcs.v13i2.6815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bithas, Petros S., Athanasios S. Lioumpas, and Angeliki Alexiou. "Mitigating shadowing effects through cluster‐head cooperation techniques." IET Networks 2, no. 2 (2013): 71–80. http://dx.doi.org/10.1049/iet-net.2012.0136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Setyawati, Luthfiyah Hanim, Mangatur Rudolf Nababan, and Djatmika Djatmika. "Translation Analysis toward Expressions Mitigating Speech Act of Criticizing in Harper Lee’s to Kill A Mockingbird and Go Set A Watchman." Journal of English Language Teaching and Linguistics 3, no. 2 (2018): 69. http://dx.doi.org/10.21462/jeltl.v3i2.113.

Full text
Abstract:
&lt;p&gt;&lt;em&gt;Using descriptive qualitative method, this paper aims to identify the forms of mitigation of criticizing speech acts in two novels entitled To Kill a Mockingbird and Go Set A Watchman, to identify translation technique used and to describe the quality of translation of expressions mitigating speech act of criticizing in those novels. Data used were linguistic units (words, phrases, clauses, or sentences) represented mitigation types of criticizing speech act. The findings indicate that there were two mitigation types of speech act criticizing, namely external and internal. E
APA, Harvard, Vancouver, ISO, and other styles
14

Ishak, Bahrul Samuindarwan, and Kuntala Chowdhury. "Role of Local Governments in Flood Disaster Mitigation in Makassar City." Tamalanrea: Journal of Government and Development (JGD) 1, no. 2 (2024): 55–65. http://dx.doi.org/10.69816/jgd.v1i2.36472.

Full text
Abstract:
This study aims to determine and describe the Role of the Government in mitigating flood disasters in Makassar City as well as factors that influence the government's role in mitigating flood disasters in Makassar City. This type of research uses a qualitative approach with descriptive elaboration. A qualitative approach with descriptive elaboration is a study that aims to obtain an overview to understand and explain the role of local governments in mitigating flood disasters in the city of Makassar. The data collection in this study used observation techniques, interviews, literature studies,
APA, Harvard, Vancouver, ISO, and other styles
15

G K, Abbhinaya, and Dr P. A. Prabakaran. "Review on Mitigating Schedule Overrun in Tamil Nadu Construction Projects with AI-Driven Techniques." International Journal of Research Publication and Reviews 6, no. 3 (2025): 8361–67. https://doi.org/10.55248/gengpi.6.0325.12167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

D. Sandhya rani, T. Varalakshmi, and G. Hemanth kumar. "Risk Management Framework: Identifying and Mitigating Business Risks." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 05 (2024): 1740–43. http://dx.doi.org/10.47392/irjaem.2024.0255.

Full text
Abstract:
Despite significant efforts to ensure the success of software projects, the risk of failure remains high. Although these risks cannot be entirely eliminated, they can be effectively managed through proper risk management techniques throughout the software development lifecycle. This study aims to classify and identify the most effective risk management techniques using factor analysis. We surveyed software project managers, presenting them with thirty different risk management techniques, which they frequently used and deemed effective. We categorized these techniques into three main component
APA, Harvard, Vancouver, ISO, and other styles
17

Hutagaol, Meilinasari Nurhasanah, and Ferro Hidayah. "Sustainable bioremediation techniques for mitigating marine pollution in maritime operations." JPBI (Jurnal Pendidikan Biologi Indonesia) 11, no. 1 (2025): 179–85. https://doi.org/10.22219/jpbi.v11i1.39484.

Full text
Abstract:
Marine pollution from oil spills, vessel discharges, and ballast water poses significant challenges to environmental sustainability and maritime operations. This research explores the potential of bioremediation techniques, focusing on oil-degrading microorganisms, biofilters, bioreactors, and marine plants, to address these issues. By integrating biological and environmental engineering, the study evaluates the effectiveness and adaptability of these methods for maritime applications. Using a qualitative methodology, data were collected through interviews with 13 maritime professionals, 24 ed
APA, Harvard, Vancouver, ISO, and other styles
18

K. Devasenapathy, Arun Padmanabhan,. "Uncovering Bias: Exploring Machine Learning Techniques for Detecting and Mitigating Bias in Data – A Literature Review." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 776–81. http://dx.doi.org/10.17762/ijritcc.v11i9.8965.

Full text
Abstract:
The presence of Bias in models developed using machine learning algorithms has emerged as a critical issue. This literature review explores the topic of uncovering the existence of bias in data and the application of techniques for detecting and mitigating Bias. The review provides a comprehensive analysis of the existing literature, focusing on pre-processing techniques, post-pre-processing techniques, and fairness constraints employed to uncover and address the existence of Bias in machine learning models. The effectiveness, limitations, and trade-offs of these techniques are examined, highl
APA, Harvard, Vancouver, ISO, and other styles
19

Verzariu, Pompiliu. "Risk Mitigating Roles for Countertrade Techniques in Project Finance." Journal of Structured Finance 4, no. 3 (1998): 57–62. http://dx.doi.org/10.3905/jsf.4.3.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Maynard, D. N., R. J. Rosner, J. D. Hibbeler, J. A. Culp, and T. S. Barnett. "High-Value Design Techniques for Mitigating Random Defect Sensitivities." IEEE Transactions on Semiconductor Manufacturing 21, no. 3 (2008): 329–36. http://dx.doi.org/10.1109/tsm.2008.2001206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Noussia, Kyriaki, and Georgios Nousias. "Pandemics and Climate Change as Systemic Risks: Law, Policy, Insurance, Physical Activity and Exercise as Mitigating Environmental Degradation Mechanisms." European Energy and Environmental Law Review 33, Issue 1 (2024): 28–34. http://dx.doi.org/10.54648/eelr2023022.

Full text
Abstract:
Climate change and the Covid-19 pandemic have been classified as systemic risks and have elaborated that such systemic risks will become the new normal. Ways to tackle the long-term effects of climate change include law and environmental policy. In addition, insurance can help mitigate the burden placed on governments when such systemic risks occur, including pandemics. In relation to the Covid-19 pandemic and the effects of long-Covid, sports and exercise are examined as a mitigating factor able to release pressure from public health and help mitigate its long-term effects. This article discu
APA, Harvard, Vancouver, ISO, and other styles
22

Lee, Yu-Hao, Norah E. Dunbar, Claude H. Miller, et al. "Training Anchoring and Representativeness Bias Mitigation Through a Digital Game." Simulation & Gaming 47, no. 6 (2016): 751–79. http://dx.doi.org/10.1177/1046878116662955.

Full text
Abstract:
Objective. Humans systematically make poor decisions because of cognitive biases. Can digital games train people to avoid cognitive biases? The goal of this study is to investigate the affordance of different educational media in training people about cognitive biases and to mitigate cognitive biases within their decision-making processes. Method. A between-subject experiment was conducted to compare a digital game, a traditional slideshow, and a combined condition in mitigating two types of cognitive biases: anchoring bias and representativeness bias. We measured both immediate effects and de
APA, Harvard, Vancouver, ISO, and other styles
23

Putri, Ratih Mutiara Kencana, Rita Harisma, and Muhammad Khoirul Fahmi. "Mitigating Speech Acts of Criticizing and Its Translation Techniques Analysis in Siren’s Lament Webtoon in English to Indonesian Version." KREDO : Jurnal Ilmiah Bahasa dan Sastra 7, no. 1 (2023): 100–113. http://dx.doi.org/10.24176/kredo.v7i1.11589.

Full text
Abstract:
Mitigation merupakan modifikasi tindak tutur yang perlu disesuaikan sesuai dengan suatu bahasa, pengesuaian ini dipengaruhi oleh penerapan teknik terjemahan yang dipakai oleh penerjemah. Penelitian ini dibuat untuk menganalisis bentuk-bentuk mitigasi tindak tutur mengkritik di Webtoon Siren's Lament versi bahasa Inggris ke bahasa Indonesia, menentukan penggunaan teknik penerjemahan, dan mengukur kualitas terjemahan dari ekspresi mitigasi tindak tutur mengkritik di webtoon tersebut. Penelitian ini menggunakan metode deskriptif kualitatif. Peneliti menemukan 34 data ungkapan-ungkapan mitigasi ti
APA, Harvard, Vancouver, ISO, and other styles
24

Vinay Tila Patil. "DDoS Attack Detection: Strategies, Techniques, and Future Directions." Journal of Electrical Systems 20, no. 9s (2024): 2030–46. https://doi.org/10.52783/jes.4808.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks represent one of the most significant threats to network security, capable of causing widespread disruption to digital infrastructures. The potential for extensive damage becomes even more critical when these attacks are executed on a large scale. Numerous research efforts have been dedicated to understanding and mitigating this formidable threat. This study delves into the complex landscape of DDoS attacks, examining a range of strategies proposed for their detection and mitigation. Special attention is given to the exploration of advanced deep lea
APA, Harvard, Vancouver, ISO, and other styles
25

Duc, Minh Ly, Petr Bilik, and Radek Martinek. "Harmonics Signal Feature Extraction Techniques: A Review." Mathematics 11, no. 8 (2023): 1877. http://dx.doi.org/10.3390/math11081877.

Full text
Abstract:
Harmonic estimation is essential for mitigating or suppressing harmonic distortions in power systems. The most important idea is that spectrum analysis, waveform estimation, harmonic source classification, source location, the determination of harmonic source contributions, data clustering, and filter-based harmonic elimination capacity are also considered. The feature extraction method is a fundamental component of the optimization that improves the effectiveness of the Harmonic Mitigation method. In this study, techniques to extract fundamental frequencies and harmonics in the frequency doma
APA, Harvard, Vancouver, ISO, and other styles
26

Bagawade, Ramdas Pandurang, and Thirupurasundari D.R. "Ensemble Machine Learning Techniques." International Journal of Emerging Technology and Advanced Engineering 15, no. 4 (2025): 15–23. https://doi.org/10.46338/ijetae0425_02.

Full text
Abstract:
Ensemble machine learning techniques have emerged as powerful tools to enhance predictive performance and robustness in various applications. By combining multiple base models, ensemble methods leverage the strengths of individual learners while mitigating their weaknesses. This paper explores three principal ensemble strategies: bagging, boosting, and stacking. Through empirical evaluations, we demonstrate the superior performance of ensemble methods over single-model approaches in diverse datasets. Our findings underscore the potential of ensemble techniques to achieve state-of-the-art resul
APA, Harvard, Vancouver, ISO, and other styles
27

Siebert, Jana, and Johannes Ulrich Siebert. "Enhancing misinformation correction: New variants and a combination of awareness training and counter-speech to mitigate belief perseverance bias." PLOS ONE 19, no. 2 (2024): e0299139. http://dx.doi.org/10.1371/journal.pone.0299139.

Full text
Abstract:
Belief perseverance bias refers to individuals’ tendency to persevere in biased opinions even after the misinformation that initially shaped those opinions has been retracted. This study contributes to research on reducing the negative impact of misinformation by mitigating the belief perseverance bias. The study explores the previously proposed awareness-training and counter-speech debiasing techniques, further developing them by introducing new variants and combining them. We investigate their effectiveness in mitigating the belief perseverance bias after the retraction of misinformation rel
APA, Harvard, Vancouver, ISO, and other styles
28

Yang, Yu-Ping. "Recent Advances in the Prediction of Weld Residual Stress and Distortion - Part 2." Welding Journal 100, no. 6 (2021): 193–205. http://dx.doi.org/10.29391/2021.100.016.

Full text
Abstract:
Weld residual stress can contribute to the reduction of structure lifetime and accelerate the formation of fatigue cracks, brittle fractures, or stress corrosion cracking. Distortion can have a significant impact on the dimensional ac-curacy of assembly, structure strength, and fabrication cost. In the past two decades, there have been many significant and exciting developments in the prediction and mitigation of weld residual stress and distortion. This paper reviews the recent advances in mitigation techniques that have been applied in the structure design, manufacturing, and postweld stages
APA, Harvard, Vancouver, ISO, and other styles
29

Huang, Zhen, Gang Tan, and Xiaowei Yu. "Mitigating Vulnerabilities in Closed Source Software." ICST Transactions on Security and Safety 8, no. 30 (2022): e4. http://dx.doi.org/10.4108/eetss.v8i30.253.

Full text
Abstract:
Many techniques have been proposed to harden programs with protection mechanisms to defend against vulnerability exploits. Unfortunately the vast majority of them cannot be applied to closed source software because they require access to program source code. This paper presents our work on automatically hardening binary code with security workarounds, a protection mechanism that prevents vulnerabilities from being triggered by disabling vulnerable code. By working solely with binary code, our approach is applicable to closed source software. To automatically synthesize security workarounds, we
APA, Harvard, Vancouver, ISO, and other styles
30

Ritesh Kumar Singh. "An Integrated Approach to Optimize Risk in SCM using Blockchain and Machine Learning Techniques." Communications on Applied Nonlinear Analysis 32, no. 6s (2025): 497–510. https://doi.org/10.52783/cana.v32.3313.

Full text
Abstract:
In the dynamic field of supply chain management (SCM), identifying and mitigating risks is crucial for sustaining resilience and efficiency. Conventional risk management strategies frequently inadequately handle the complexities and uncertainties intrinsic to contemporary supply networks. This study investigates a hybrid approach that combines blockchain technology with machine learning to improve risk detection and management in supply chain management. Blockchain provides a decentralised and transparent system for monitoring supply chain operations, guaranteeing data integrity and transparen
APA, Harvard, Vancouver, ISO, and other styles
31

Hameed, A., and Ali Oudah. "Interference in Wireless Networks: Causes, Analyses and Practical Mitigating Techniques." Modern Applied Science 8, no. 5 (2014): 56. http://dx.doi.org/10.5539/mas.v8n5p56.

Full text
Abstract:
This paper addresses the key characteristics of interference in wireless networks. Moreover, it considers the impact of interference from Code Division Multiple Access base station to Wideband-Code Division Multiple Access one. A detailed discussion of major interference mitigation techniques in wireless networks, in general, and CDMA and W-CDMA systems, in particular is also imparted on. The techniques and findings in this paper can be easily used in the analyses of other wireless technologies.
APA, Harvard, Vancouver, ISO, and other styles
32

Elzamly, Abdelrafe, and Burairah Hussin. "Mitigating Software Maintenance Project Risks with Stepwise Regression Analysis Techniques." Journal of Modern Mathematics Frontier 3, no. 2 (2014): 34. http://dx.doi.org/10.14355/jmmf.2014.0302.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Premsai, Ranga. "MITIGATING CYBER THREATS WITH ROBUST IDENTITY AND ACCESS MANAGEMENT TECHNIQUES." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem17705.

Full text
Abstract:
Abstract—Identity and Access Management (IAM) is a fundamental security framework that ensures legitimate users can access critical resources within a computer system while preventing unauthorized access. This is especially vital in financial organizations, where safeguarding sensitive information such as user identities, financial data, and medical records is paramount. These organizations face a heightened risk of cyberattacks due to the valuable and often high- stakes nature of the data they manage. Data breaches in such institutions can result in identity theft, billing fraud, insurance fr
APA, Harvard, Vancouver, ISO, and other styles
34

AL-Rawi, Muhanned. "Detection techniques for mitigating the nonlinear distortion of ADPCM link." Australian Journal of Multi-Disciplinary Engineering 14, no. 1 (2018): 26–33. http://dx.doi.org/10.1080/14488388.2018.1453973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Venkataraman, Kalyana Sundaram, Guiqiang Dong, and Tong Zhang. "Techniques Mitigating Update-Induced Latency Overhead in Shingled Magnetic Recording." IEEE Transactions on Magnetics 48, no. 5 (2012): 1899–905. http://dx.doi.org/10.1109/tmag.2011.2178099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Alnajim, Abdullah M., Shabana Habib, Muhammad Islam, Rana Albelaihi, and Abdulatif Alabdulatif. "Mitigating the Risks of Malware Attacks with Deep Learning Techniques." Electronics 12, no. 14 (2023): 3166. http://dx.doi.org/10.3390/electronics12143166.

Full text
Abstract:
Malware has become increasingly prevalent in recent years, endangering people, businesses, and digital assets worldwide. Despite the numerous techniques and methodologies proposed for detecting and neutralizing malicious agents, modern automated malware creation methods continue to produce malware that can evade modern detection techniques. This has increased the need for advanced and accurate malware classification and detection techniques. This paper offers a unique method for classifying malware, using images that use dual attention and convolutional neural networks. Our proposed model has
APA, Harvard, Vancouver, ISO, and other styles
37

Hadijah, Nansamba, Dr Stella Kyohairwe, and Dr Nyenje Aida Lubwama. "Institutionalization of Semi-Formal Local Council Courts and Their Role in Mitigating Gender-Based Violence in Bundibugyo District, Uganda." European Journal of Gender Studies 6, no. 3 (2025): 36–65. https://doi.org/10.47672/ejgs.2609.

Full text
Abstract:
Purpose: The study assessed the impact of institutionalizing semi-formal Local Council Courts (LCCs) on mitigating gender-based violence (GBV) in Bundibugyo District, Uganda. Materials and Methods: Grounded in a positivist paradigm, the study employed a quantitative correlation design. Data were collected from 203 officers involved in GBV mitigation in Bundibugyo District using structured questionnaires. Simple random sampling and census techniques were applied. The study adopted an explanatory linear regression analysis, a parametric test aimed at explaining the effect of the independent vari
APA, Harvard, Vancouver, ISO, and other styles
38

Osazee, Faithfulness O., and Benjamin Ewanole Ohiocheoya. "Mitigating rubber waste effluent through microbial approaches: A review." Dutse Journal of Pure and Applied Sciences 9, no. 2a (2023): 213–24. http://dx.doi.org/10.4314/dujopas.v9i2a.21.

Full text
Abstract:
This review discusses the progress made in the remediation of rubber waste effluent using microbial techniques. Rubber processing facilities generate wastewater containing various pollutants, such as organic compounds, that are harmful to the environment. Microbial techniques, such as bioremediation, have been developed as a sustainable solution to treat these effluents. This article highlights the recent advancements made in this field, including the use of trickling filter systems and microbial fuel cells. These methods have been found to be effective in removing various pollutants, includin
APA, Harvard, Vancouver, ISO, and other styles
39

Al-Azzawi, Qasim Obayes. "Media discourse techniques in political interviews." Edelweiss Applied Science and Technology 9, no. 1 (2025): 252–58. https://doi.org/10.55214/25768484.v9i1.4106.

Full text
Abstract:
The study investigates a theoretical background about media discourse in general and how media affects our life and change it in a way or another, it deals specifically with the political interview and its discourse, checking for all the available techniques used in such a discourse for the purpose of mitigating face threatening acts between both the interview and interviewee. Since in most cases they (the interviewer and interviewee) are from different social states, so there is a cautious speech from both sides and still there is a persistent need for clinging to certain techniques and ways
APA, Harvard, Vancouver, ISO, and other styles
40

Bultrini, Daniel, Max Hunter Gordon, Piotr Czarnik, et al. "Unifying and benchmarking state-of-the-art quantum error mitigation techniques." Quantum 7 (June 6, 2023): 1034. http://dx.doi.org/10.22331/q-2023-06-06-1034.

Full text
Abstract:
Error mitigation is an essential component of achieving a practical quantum advantage in the near term, and a number of different approaches have been proposed. In this work, we recognize that many state-of-the-art error mitigation methods share a common feature: they are data-driven, employing classical data obtained from runs of different quantum circuits. For example, Zero-noise extrapolation (ZNE) uses variable noise data and Clifford-data regression (CDR) uses data from near-Clifford circuits. We show that Virtual Distillation (VD) can be viewed in a similar manner by considering classica
APA, Harvard, Vancouver, ISO, and other styles
41

Maripova, Tamanno. "Mitigating Algorithmic Bias in Predictive Models." American Journal of Engineering and Technology 07, no. 05 (2025): 192–201. https://doi.org/10.37547/tajet/volume07issue05-19.

Full text
Abstract:
This article considers the issue of systematic errors in predictive machine-learning models generating disparate outcomes for different social groups and proposes a holistic approach to its mitigation. The risks and increasing legal requirements, along with corporate commitments to ethical AIs, drive the relevance of this study. The work herewith attempts to develop a bias-source taxonomy at data collection and annotation, proxy-feature selection, model training, and deployment stages; also, it tries to compare pre-, in-, and post-processing methods' effectiveness on representative datasets me
APA, Harvard, Vancouver, ISO, and other styles
42

Bajwa, Muhammad Shahzad Bajwa, Muhammad Usman Keerio, Noor Hussain Mugheri, Riaz Hussain Memon, and Wajid Ali Shaikh. "Analytical Approach of Designing Passive Filter for SMPS Load." Pakistan Journal of Engineering and Technology 5, no. 2 (2022): 163–70. http://dx.doi.org/10.51846/vol5iss2pp163-170.

Full text
Abstract:
The use of switch mode power supply (SMPS) load such as computer, laptop, etc in residential as well as commercial areas give rise to harmonics pollution in the electrical power distribution system which causes the quality of power poor and the function of equipment connected to the electrical system is affected. Many electrical appliances have an SMPS design that characteristically draws a distorted current that flows back to the input supply and causes distortion in the voltage waveform. To ensure the safe functioning of various electrical devices, there is a need for the implementation of e
APA, Harvard, Vancouver, ISO, and other styles
43

Arivazhagan, Dr. "Unhealthy Citrus Leaf Detection Using Machine Learning Techniques." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 11 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem27390.

Full text
Abstract:
The project presents a groundbreaking solution to the challenges faced by citrus agriculture in identifying and mitigating diseased plants. This application development initiative aims to harness the power of modern machine learning methodologies to accurately and efficiently detect unhealthy citrus leaves, thereby enabling timely intervention and safeguarding agricultural yield. Keywords: Unhealthy citrus leaves detection, CNN, OpenCV2, TensorFlow, Keras
APA, Harvard, Vancouver, ISO, and other styles
44

kumar, Sanjeev. "3PL Fire and Safety Hazard Assessment and Mitigation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32153.

Full text
Abstract:
3PL facilities, handling high volumes of goods, face unique fire and safety risks. This abstract explores assessing and mitigating these hazards. Common fire hazards include flammable materials, electrical issues, and improper storage. Safety hazards encompass slips, falls, and misuse of machinery. Assessment techniques involve inspections, reviewing safety data sheets, and analyzing incidents. Mitigation strategies focus on fire safety plans, proper storage, electrical safety, and employee training. The abstract emphasizes preventative maintenance and a culture of safety for a safer 3PL envir
APA, Harvard, Vancouver, ISO, and other styles
45

Panibratov, Andrei, and Tashauna Brown. "Mitigating divestment stigma: a legitimation perspective." Kybernetes 47, no. 5 (2018): 920–36. http://dx.doi.org/10.1108/k-12-2017-0470.

Full text
Abstract:
Purpose Foreign divestment (FD) has often different roles such as being a corporate diversification strategy, and of such divestment may have effects on a company’s image and reputation. Ongoing businesses trends including internationalization, deregulation and diversification have forced executives to exploit image and reputation as strategic corporate resources, which make them the target of a firm’s active management. The paper aims at developing the understanding of the framing techniques of discursive legitimation and of the strategies used by companies when signalizing their FD decision.
APA, Harvard, Vancouver, ISO, and other styles
46

Bajaj, Tarun. "Mitigating SAP Duplicate Payments Using Generative AI." International Journal of Computer Science and Mobile Computing 13, no. 5 (2024): 105–6. http://dx.doi.org/10.47760/ijcsmc.2024.v13i05.010.

Full text
Abstract:
This document presents a method to mitigate duplicate payments in SAP systems using Generative AI. The integration of advanced AI techniques offers a significant improvement in the accuracy and efficiency of financial operations. This paper outlines the methodology, implementation steps, and expected outcomes, demonstrating the potential of AI to revolutionize financial management in ERP systems.
APA, Harvard, Vancouver, ISO, and other styles
47

Gubaua, José Eduardo, Gabriela Wessling Oening Dicati, Jéderson da Silva, João Luiz do Vale, and Jucélio Tomás Pereira. "Techniques for mitigating the checkerboard formation: application in bone remodeling simulations." Medical Engineering & Physics 99 (January 2022): 103739. http://dx.doi.org/10.1016/j.medengphy.2021.103739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Luo, Yi, Jian Yang, and Hua Jiang. "Techniques for Assessing and Mitigating Longwall Subsidence Effects on Highway Bridges." Mining, Metallurgy & Exploration 37, no. 1 (2019): 197–210. http://dx.doi.org/10.1007/s42461-019-00111-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Luo, Yi, Jian Yang, and Hua Jiang. "Techniques for Assessing and Mitigating Longwall Subsidence Effects on Interstate Highways." Mining, Metallurgy & Exploration 36, no. 6 (2019): 1157–67. http://dx.doi.org/10.1007/s42461-019-0087-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Singh, Chaturi, Joseph John, Y. N. Singh, and K. K. Tripathi. "Indoor Optical Wireless Systems: Design Challenges, Mitigating Techniques and future Prospects." IETE Technical Review 21, no. 2 (2004): 101–17. http://dx.doi.org/10.1080/02564602.2004.11417136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!