mitigation techniques
Recently Published Documents


TOTAL DOCUMENTS

857
(FIVE YEARS 248)

H-INDEX

35
(FIVE YEARS 10)

2022 ◽  
pp. 309-331
Author(s):  
G. N. Tanjina Hasnat

Tropical dry forests is one of the most unique forest types. It differs from other tropical forests with its climatic behavior like a prominent dry period, little annual rainfall, and high evapotranspiration. Out of six global bioclimatic zones, the forests are distributed in four. Climate change is now the most challenging issue regarding the fate of tropical dry forests. A severe climatic change is estimated to occur between 2040 and 2069 that could drastically change the precipitation pattern, temperature, aridity, and distribution of biodiversity. It could alter the forest type permanently. With a large number of heat-tolerant species, tropical dry forests have a great potentiality to conservationists with the prediction of a large area that could attain the climatic condition favorable for extension of tropical dry forests. But many of the species of tropical dry forests could be extinct due to changing climate at the same time. Proper adaptation and mitigation techniques could minimize the severity of climate change effects.


2022 ◽  
pp. 143-160
Author(s):  
Md Abdullah Al Momin ◽  
Md Nazmul Islam

Technology has greatly increased the availability of medical procedures in remote locations that are difficult to access, such as battlefields. Teleoperated surgical robots can be used to perform surgeries on patients over the internet in remote locations. A surgeon can remotely operate the robot to perform a procedure in another room or in a different continent. However, security technology has not yet caught up to these cyber-physical devices. There exist potential cybersecurity attacks on these medical devices that could expose a patient to danger in contrast to traditional surgery. Hence, the security of the system is very important. A malicious actor can gain control of the device and potentially threaten the life of a patient. In this chapter, the authors conduct a survey of potential attack vectors a malicious actor could exploit to deny service to the device, gain control of the device, and steal patient data. Furthermore, after the vulnerability analysis, the authors provide mitigation techniques to limit the risk of these attack vectors.


2021 ◽  
Author(s):  
Purushotham Tukkaraja ◽  
Rahul Bhargava ◽  
Srivatsan Jayaraman Sridharan

Radon, a radioactive noble gas, is a decay product of uranium found in varying concentrations in all soils and rocks in the earth crust. It is colorless, odorless, tasteless, and a leading cause of lung cancer death in the USA. A study of underground miners shows that 40% of lung cancer deaths may be due to radon progeny exposure. In underground mines, radon monitoring and exposure standards help in limiting miners’ exposure to radioactivity. Radon mitigation techniques play an important role in keeping its concentration levels under permissible limits. This chapter presents a review of the radon sources and monitoring standards followed for underground mines in the USA. Also, the different radon prediction and measurement techniques employed in the underground mines and potential mitigation techniques for underground mining operations are discussed.


2021 ◽  
Author(s):  
Salunke M. D ◽  
Kumbharkar P. B ◽  
Pramod Kumar

Now a day’s network security becomes more important to organizations, government offices. With the fast advancement of the innovation, assaults throughout the years have turned out to be both progressively various and modern. Ransomware attack becomes one of the most popular weapons for network attackers that ransomware attack is increased rapidly year by year. The study shows that the ransomware attack is one of the top attacks that are most attacked malware by the attackers. In this paper, we focus on mitigation techniques that can be used to recover and mitigate the ransomware attack. The mitigation or recovery approach is very difficult as ransomware is depending upon cryptographic algorithms which are very difficult to crack.


2021 ◽  
Author(s):  
Ayse Arslan

Given the impact of Machine Learning (ML) on individuals and the society, understanding how harm might be occur throughout the ML life cycle becomes critical more than ever. By offering a framework to determine distinct potential sources of downstream harm in ML pipeline, the paper demonstrates the importance of choices throughout distinct phases of data collection, development, and deployment that extend far beyond just model training. Relevant mitigation techniques are also suggested for being used instead of merely relying on generic notions of what counts as fairness.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7787
Author(s):  
Ciro Gioia ◽  
Daniele Borio

A multi-layered interference mitigation approach can significantly improve the performance of Global Navigation Satellite System (GNSS) receivers in the presence of jamming. In this work, three levels of defence are considered including: pre-correlation interference mitigation techniques, post-correlation measurement screening and FDE at the Position, Velocity, and Time (PVT) level. The performance and interaction of these receiver defences are analysed with specific focus on Robust Interference Mitigation (RIM), measurement screening through Lock Indicator (LIs) and Receiver Autonomous Integrity Monitoring (RAIM). The case of timing receivers with a known user position and using Galileo signals from different frequencies has been studied with Time-Receiver Autonomous Integrity Monitoring (T-RAIM) based on the Backward-Forward method. From the experimental analysis it emerges that RIM improves the quality of the measurements reducing the number of exclusions performed by T-RAIM. Effective measurements screening is also fundamental to obtain unbiased timing solutions: in this respect T-RAIM can provide the required level of reliability.


Sign in / Sign up

Export Citation Format

Share Document