Results 11 to 20 of about 147,390 (303)

Mitigating Routing Misbehavior in Disruption Tolerant Networks [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2012
In disruption tolerant networks (DTNs), selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing misbehavior in mobile ad hoc networks, they cannot be directly applied to DTNs ...
Qinghua Li, Guohong Cao
openaire   +1 more source

Roles of inventory and reserve capacity in mitigating supply chain disruption risk [PDF]

open access: yes, 2018
This research focuses on managing disruption risk in supply chains using inventory and reserve capacity under stochastic demand. While inventory can be considered as a speculative risk mitigation lever, reserve capacity can be used in a reactive ...
Bicer, I., Lucker, F., Seifert, R. W.
core   +2 more sources

Development of the upgraded single crystal dispersion interferometer (SCDI-U) and its first measurements of the line integrated electron densities in KSTAR during shattered pellet injections

open access: yesNuclear Fusion, 2023
Dispersion interferometers (DI) are widely used to measure line integrated electron densities in many fusion devices. A recent development of a heterodyne single crystal DI (SCDI) with a laser wavelength of 1064   nm (Lee et al 2021 Rev. Sci. Instrum. 92
Dong-Geun Lee   +10 more
doaj   +1 more source

Comparing Mitigation Strategies for Supply Chain under Operational Disruptions Using Monte Carlo Simulation [PDF]

open access: yesPort Said Engineering Research Journal, 2021
Although supply chain disruptions have been under study since the 1990’s, they attracted more attention last year due to the COVID-19 pandemic. Not only researchers, but all people realized how disruptions can negatively affect the performance of ...
Raghda Taha   +2 more
doaj   +1 more source

Overview of the JET results in support to ITER [PDF]

open access: yes, 2017
The 2014–2016 JET results are reviewed in the light of their significance for optimising the ITER research plan for the active and non-active operation. More than 60 h of plasma operation with ITER first wall materials successfully took place since its
Abduallev, S.   +7 more
core   +1 more source

Consequences of asteroid fragmentation during impact hazard mitigation [PDF]

open access: yes, 2009
The consequences of the fragmentation of an Earth-threatening asteroid due to an attempted deflection are examined in this paper. The minimum required energy for a successful impulsive deflection of a threatening object is computed and compared to the ...
Davis D. R.   +8 more
core   +1 more source

The constraint of plasma power balance on runaway avoidance

open access: yesNuclear Fusion, 2023
In a post-thermal-quench plasma, mitigated or unmitigated, the plasma power balance is mostly between collisional or Ohmic heating and plasma radiative cooling.
Christopher J. McDevitt   +4 more
doaj   +1 more source

Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks [PDF]

open access: yes2011 Ninth Annual Communication Networks and Services Research Conference, 2011
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information.
Cervera, Gimer   +3 more
openaire   +1 more source

Blast disruption using 3D grids/perforated plates for vehicle protection

open access: yesDefence Technology, 2023
In this work, blast disruption and mitigation using 3D grids/perforated plates were tested for underbelly and side protection of vehicles. Two vehicle simulants were used: a small-scale one for side vehicle protection assessment and a true-to-scale ...
Thérèse Schunck   +2 more
doaj   +1 more source

Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures [PDF]

open access: yes, 2009
An IT risk assessment must deliver the best possible quality of results in a time-effective way. Organisations are used to customise the general-purpose standard risk assessment methods in a way that can satisfy their requirements.
Etalle, Sandro   +4 more
core   +11 more sources

Home - About - Disclaimer - Privacy