Facies Modeling Using a Markov Mesh Model Specification
نویسندگان
چکیده
منابع مشابه
Modeling land use changes using Markov chain model and LCM model
Land use maps are considered as the most important sources of information in natural resource management. The purpose of this research is to review, model, and predict landslide changes in the 30-year period by LCM model in Shiraz. In this research, TM Landsat 4, 5 and OLI Landsat 8 images were used for 1985, 2000 and 2015 respectively, as well as topographic maps and area coverage. Subsequent ...
متن کاملtuberculosis surveillance using a hidden markov model
background: routinely collected data from tuberculosis surveillance system can be used to investigate and monitor the irregularities and abrupt changes of the disease incidence. we aimed at using a hidden markov model in order to detect the abnormal states of pulmonary tuberculosis in iran. methods: data for this study were the weekly number of newly diagnosed cases with sputum smear-positive p...
متن کاملAbnormality Detection in a Landing Operation Using Hidden Markov Model
The air transport industry is seeking to manage risks in air travels. Its main objective is to detect abnormal behaviors in various flight conditions. The current methods have some limitations and are based on studying the risks and measuring the effective parameters. These parameters do not remove the dependency of a flight process on the time and human decisions. In this paper, we used an HMM...
متن کاملONASI: Online Agent Modeling Using a Scalable Markov Model
Human and software agents exhibit regularities in their activities. We describe our ONASI algorithm, which derives a Markov model from such observed regularities, and dynamically scales the model through merging and splitting of states. ONASI uses this model to predict the agent’s next action. We evaluate ONASI’s predictive accuracy on a dataset of Wumpus World games, and demonstrate from this ...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Geosciences
سال: 2011
ISSN: 1874-8961,1874-8953
DOI: 10.1007/s11004-011-9350-9