Calibration of Rock Cutting Numerical Model based on Monitoring Data
نویسندگان
چکیده
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولa study on insurer solvency by panel data model: the case of iranian insurance market
the aim of this thesis is an approach for assessing insurer’s solvency for iranian insurance companies. we use of economic data with both time series and cross-sectional variation, thus by using the panel data model will survey the insurer solvency.
OPTIMIZATION-BASED MONITORING-SUPPORTED CALIBRATION OF A THERMAL PERFORMANCE SIMULATION MODEL
Building performance simulation is being increasingly deployed beyond the building design phase to support efficient building operation. Specifically, the predictive feature of the simulation-assisted building systems control strategy provides distinct advantages in view of building systems with high latency and inertia. Such advantages can be exploited only if model predictions can be relied u...
متن کاملDevelopment of a site-specific regression model for assessment of road-header cutting performance of Tabas coal mine based on rock properties
In underground excavation, where the road-headers are employed, a precise prediction of the road-header performance has a vital role in the economy of the project. In this paper, a new model is developed for prediction of the road-header performance using the non-linear multivariate regression analysis. This model is able to estimate the instantaneous cutting rate (ICR) of roadheader based on r...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sains Malaysiana
سال: 2019
ISSN: 0126-6039
DOI: 10.17576/jsm-2019-4810-06