Hierarchic Analysis Method to Evaluate Rock Burst Risk
نویسندگان
چکیده
منابع مشابه
Hierarchic Method for CDMA Synchronization
CDMA (Code Division Multiple Access) is a multiple access technique based on spread spectrum methods. To estimate the delay parameters appearing in the data model, several authors have proposed subspace-based solutions. Unfortunately, these methods, for example the eigenvector-based MUSIC method yields poor results at low signal-to-noise ratios. On the other hand, theoretically optimal maximum ...
متن کاملUsing Risk Analysis to Evaluate Design Alternatives
Recently, multi-agent systems have proved to be a suitable approach to the development of real-life information systems. In particular, they are used in the domain of safety critical systems where availability and reliability are crucial. For these systems, the ability to mitigate risk (e.g., failures, exceptional events) is very important. In this paper, we propose to incorporate risk concerns...
متن کاملNew Method for Analysis of image sensor to produce and evaluate the image
In this paper, a new method for evaluating CMOS image sensors based on computer modeling and analysis is introduced. Image sensors are composed of different parts, each of which has a specific effect on image quality. Circuits of image sensors can be evaluated and analyzed using circuit simulators or theoretically, but these methods cannot help to produce the final image. In order to produce th...
متن کاملRock Slope Stability Analysis Using Discrete Element Method
Rock slope stability depends very much on the strength features of the rock and the geometrical and strength characteristics of the discontinuities (e.g., roughness, wall strength and persistence). Since a rock mass is not a continuum, its behavior is dominated by such discontinuities as faults, joints and bedding planes. Also, Rock slope instability is a major hazard for human activities and o...
متن کاملA Method to Evaluate Response Models
We are working towards computational models of mind of virtual characters that act as suspects in interview (interrogation) training of police officers. We implemented a model that calculates the responses of the virtual suspect based on theory and observation. We evaluated it by means of our test, the “Guess who you are talking to?” test. We show that this test can contribute to building respo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2015
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2015/184398