Showing 21 - 40 results of 69,792 for search 'model analysis methods', query time: 0.61s Refine Results
  1. 21
  2. 22

    Design and Realization of a Modeling Method in Security Analysis of Signal System by WU Weiping, HU Jian, LI Pengdong

    Published 2018-01-01
    “…It is necessary to analyze scenarios in which several failures are occurred at the same time for improving signal system security analysis efficiency. Since the existing finite automaton could not solve above problems, a hybrid modeling method for signal system security analysis was designed. …”
    Get full text
    Article
  3. 23
  4. 24

    Feature Extraction and Analysis Method of Trombone Timbre Based on CNN Model by Yanjun Wang

    Published 2022-01-01
    “…Moreover, this paper deduces the parameters of the trombone timbre signal and the corresponding network model and uses mathematical expressions to model the trombone timbre signal, which is convenient for theoretical analysis and processing of the trombone timbre signal. …”
    Get full text
    Article
  5. 25

    Formal modeling and security analysis method of security protocol based on CPN by Xiang GONG, Tao FENG, Jinze DU

    Published 2021-09-01
    “…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
    Get full text
    Article
  6. 26

    A Proposed Modeling Method in Finite Element Slope Stability Analysis by A. Asakereh, H. Bazazzadeh

    Published 2019-09-01
    “…Limit-equilibrium method (LEM) and finite element method (FEM) with strength reduction method (SRM) techniques are the most widely used analysis tools in slope stability assessment. …”
    Get full text
    Article
  7. 27

    Fractal Enterprise Model in Intangible Resource Analysis: Double-Hierarchy Method by Victoria Klyukina

    Published 2025-04-01
    “…In particular, the study presents the application of the Fractal Enterprise Model (FEM) in strategic resource analysis. This research aims to propose a double-hierarchy resource modeling method using FEM and the patterns developed using this method. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36

    Methods and Models for the Coupled Neutronics and Thermal-Hydraulics Analysis of the CROCUS Reactor at EFPL by A. Rais, D. Siefman, G. Girardin, M. Hursin, A. Pautz

    Published 2015-01-01
    “…In order to analyze the steady state and transient behavior of the CROCUS reactor, several methods and models need to be developed in the areas of reactor physics, thermal-hydraulics, and multiphysics coupling. …”
    Get full text
    Article
  17. 37
  18. 38
  19. 39
  20. 40

    Comparative Analysis of Different Interpolation Methods in Modeling Spatial Distribution of Monthly Precipitation by Yılmaz İçağa, Emin Taş

    Published 2018-05-01
    “…Then, uncertainty analysis by means of PSE (prediction standard error) is applied to SK-CK methods with clear advantages over the IDW method and with the close RMSE values. …”
    Get full text
    Article