Xem 1-18 trên 18 kết quả Mitigation techniques
  • In this contribution several topics concerning magnetic fields and overhead medium voltage power lines are reviewed: simple formulation to assess the magnetic field (MF) level; characterization of magnetic fields generated by typical three-phase and one-phase primary distribution lines, with balanced and unbalanced current; and main mitigation techniques, analysed in relation with typical reduction level obtained. Additional data concerning cost and performance of different solutions are also provided....

    doc31p powersystem 06-07-2010 62 5   Download

  • Tham khảo tài liệu 'adc krone - guide - mitigation techniques to reduce alien crosstalk noise in 10gbe channels', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf2p xabenglengkeng 27-05-2009 52 7   Download

  • Mitigation Techniques To Reduce Alien Crosstalk Noise In 10GBE Channels Using UTP Cabling These mitigation techniques are good installation practices that will benefit both Class E and Class EA performance. Always use the Random Lay mantra; “Random lay in the bundle and tray For Cat 6 cable and Cat 6A “ © P.

    pdf2p qd-tek 28-04-2010 70 4   Download

  • Tham khảo tài liệu 'adc krone - guide - 10gbase-t - mitigation technique to reduce alien crosstalk', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf2p xabenglengkeng 27-05-2009 39 3   Download

  • Tuyển tập các báo cáo nghiên cứu về hóa học được đăng trên tạp chí hóa hoc quốc tế đề tài : Interference mitigation techniques for clustered multicell joint decoding systems

    pdf13p dauphong11 06-02-2012 24 2   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Interference Mitigation Technique for Coexistence of Pulse-Based UWB and OFDM

    pdf11p dauphong16 20-02-2012 24 2   Download

  • Vulnerability assessment methodologies for information systems have been weakest in their ability to guide the evaluator through a determination of the critical vulnerabilities and to identify appropriate security mitigation techniques to consider for these vulnerabilities. The Vulnerability Assessment and Mitigation (VAM) methodology attempts to fill this gap, building on and expanding the earlier RAND methodology used to secure a system’s minimum essential information infrastructure (MEII).

    pdf0p trinhosieupham 06-02-2013 16 3   Download

  • LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple. Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch.

    pdf361p vusuakhonghat 28-05-2009 524 250   Download

  • The treatment of contaminated land to eliminate or reduce the presence of pollutants in the contaminated site has received (and will continue to receive) considerable attention from the practicing profession. Extensive research and development are still underway in respect to the delivery of more effective (and economic) means for site decontamination.

    pdf285p 951864273 11-05-2012 47 19   Download

  • The Cisco Certified Security Professional (CCSP) certification is the newest midlevel certification from Cisco Systems. This certification is on a par with CCNP and CCDP. The aim of this certification is to provide professional-level recognition to network engineers in the design and implementation of Cisco secure networks. This certification provides validation of knowledge and skills in key areas of security, including firewalls, intrusion detection, VPNs, identity, and security management....

    pdf407p tailieuvip13 19-07-2012 33 11   Download

  • In conducting their operations, farmers are exposed to financial losses because of production risks—droughts, floods, and other natural disasters—as well as price risks. The federal government has played an active role in helping to mitigate the effects of these risks on farm income by promoting the use of crop insurance. RMA has overall responsibility for administering the federal crop insurance program, including controlling costs and protecting against fraud, waste, and abuse.

    pdf50p thangbienthai 27-11-2012 34 8   Download

  • The proposed activity is the most appropriate approach to the problems outlined under Section 1.5. Vietnamese and Australian scientists and industry stakeholders will work jointly, intensively and sequentially to: (i) describe the existing situations; (ii) identify and describe problems and constraints; (iii) develop recommendations and plans for mitigating the constraints and encouraging future research and development in the industry; and (iv) seek industry feedback by wide dissemination and discussion of the plans, proposals, and findings and recommendations....

    pdf13p tam_xuan 02-03-2012 19 5   Download

  • Forests cover about 30 percent of total land area, but they store about 50 percent of the Earth’s terrestrial carbon (1,150 GtC) in plant biomass, litter and debris, or in the soil. About 20 percent of total GHG emissions are caused by deforestation and land use changes but in tropical regions emissions attributable to land clearance are much higher, up to 40 percent of national totals. Reducing deforestation and degradation (REDD) is the forest mitigation option with the largest potential for maintaining carbon stocks in standing forests over the short term.

    pdf41p yeurauxanh88 01-10-2012 24 2   Download

  • Learning objectives of this chapter include: Identify the devices and protocols used in a small network; explain how a small network serves as the basis of larger networks; explain the need for basic security measures on network devices; identify security vulnerabilities and general mitigation techniques;...

    pdf55p youcanletgo_01 29-12-2015 4 1   Download

  • Pollution prevention practices include low impact development techniques, installation of green roofs and improved chemical handling (e.g. management of motor fuels & oil, fertilizers and pesticides). Runoff mitigation systems include basin infiltration basins, bio retention systems, constructed wetlands, retention basins and similar devices. Thermal pollution from runoff can be controlled by storm water management facilities that absorb the runoff or direct it into groundwater, such as bio retention systems and infiltration basins.

    pdf12p tainhacmienphi 19-02-2013 22 4   Download

  • In this paper we study the question, whether the technique of botnet tracking can be extended to analyze and mitigate P2P based botnets. Roughly speaking, we adapt the three steps of botnet tracking in the following way using Storm Worm as a case study: In the first step, we must get hold of a copy of the bot binary. In the case of this botnet, we use spam traps to col- lect Storm Worm generated spam and client side honeypots to simulate the infection process.

    pdf15p giamdocamnhac 06-04-2013 18 4   Download

  • This document is one of several white papers that summarize readily available information on control techniques and measures to mitigate greenhouse gas (GHG) emissions from specific industrial sectors.

    pdf62p loixinloi 08-05-2013 31 4   Download

  • In addition to understanding the analytical techniques, agricultural lending requires the understanding and management of uncontrollable risks like weather: crop damage due to freezing, droughts, hail, floods, and winds. There are always risks in lending, but without knowledge about the industry, both farmers and lenders are unsure how to mitigate them.

    pdf5p loginnhanh 22-04-2013 16 1   Download

Đồng bộ tài khoản