نتایج جستجو برای: mitigation

تعداد نتایج: 32498  

Journal: :EURASIP J. Adv. Sig. Proc. 2010
Bernhard Krach Patrick Robertson Robert Weigel

Multipath is today still one of the most critical problems in satellite navigation, in particular in urban environments, where the received navigation signals can be affected by blockage, shadowing, and multipath reception. Latest multipath mitigation algorithms are based on the concept of sequential Bayesian estimation and improve the receiver performance by exploiting the temporal constraints...

Journal: :Network Security 2011
Steve Mansfield-Devine

According to a report from Prolexic, one of the first and largest companies offering DDoS mitigation services, ⁠ attack traffic rose 66% over the course of a year (to Q3 2011). 1 Network-layer attacks accounted for 83%, the rest being application-layer attacks. The average duration was 1.4 days and the average bandwidth consumed was 1.5Gbps. The size of attacks is getting bigger, too. In July 2...

2011
Patrick Bajari Sean Chu Minjung Park

The increase in defaults in the subprime mortgage market is widely held to be one of the causes behind the recent …nancial turmoil. Key issues of policy concern include identifying the main drivers behind the wave of defaults and predicting the e¤ects of various policy instruments designed to mitigate default. To address these questions, we estimate a dynamic structural model of subprime borrow...

2016
Wouter B. de Vries Ricardo de Oliveira Schmidt Aiko Pras

IP anycast is widely being used to distribute essential Internet services, such as DNS, across the globe. One of the main reasons for doing so is to increase the redundancy of the service and reduce the impacts of the growing threat of DDoS attacks. IP anycast can be further used to mitigate DDoS attacks by confining the attack traffic to certain areas. This might cause the targeted service to ...

2008
Prodipto Ghosh

The Bali Action Plan (BAP) envisages enhanced “measurable, reportable, and verifiable” (MRV) developing country mitigation actions “supported and enabled by” MRV technology, financing and technology building from developed countries. Finding an acceptable operationalisation of this North/South relation will be key to a success of the BAP. The authors suggest that one way of doing so could invol...

ژورنال: مواد پرانرژی 2020

The intrinsic properties of some materials, such as foams, porous materials and granular materials, are their ability to mitigation waves. In this study, we investigated the ability of granular materials in explosion-induced wave mitigation. The present study was carried out using numerical simulations with Autodyn hydro-code and experimental tests by shock tube. Two materials of sawdust and mi...

Journal: :Perfusion 2008
Prakash P Punjabi

Anxiety prepares an organism for dealing with threats by recruiting cognitive resources to process information about the threat, and by engaging physiological systems to prepare a response. Heightened trait anxiety is associated with biases in both these processes: high trait-anxious individuals tend to report heightened risk perceptions, and inappropriate engagement in danger mitigation behavi...

2013
Elmar Kriegler Ottmar Edenhofer Gunnar Luderer David Klein

The ability to directly remove carbon dioxide from the atmosphere allows the decoupling of emissions and emissions control in space and time. We ask the question whether this unique feature of carbon dioxide removal technologies fundamentally alters the dynamics of climate mitigation pathways. The analysis is performed in the coupled energyeconomy-climate model ReMIND using the bioenergy with C...

Journal: :Journal of environmental quality 2006
Changsheng Li William Salas Benjamin DeAngelo Steven Rose

Assessments of the efficacy of mitigation of greenhouse gas (GHG) emissions from paddy rice systems have typically been analyzed based on field studies. Extrapolation of the mitigation potential of alternative management practices from field studies to a national scale may be enhanced by spatially explicit process models, like the DeNitrification and DeComposition (DNDC) model. Our objective wa...

2017
Veronica Marotta Sasha Romanosky

Information security controls can help reduce the probability of a breach, but cannot guarantee that one will not occur. In order to reduce the costs of data breaches, firms are faced with competing alternatives. Investments in ex ante security measures can help prevent a breach, but this is costly and may be inefficient; ex post mitigation efforts can help reduce losses following a breach, but...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید