دانلود و نمایش مقالات مرتبط با مدل سازی تصادفی::صفحه 1
بلافاصله پس از پرداخت دانلود کنید
نتیجه جستجو - مدل سازی تصادفی

تعداد مقالات یافته شده: 7
ردیف عنوان نوع
1 Enhancing images of shale formations by a hybrid stochastic and deep learning algorithm
تقویت تصاویر سازندهای shale توسط یک الگوریتم یادگیری تصادفی ترکیبی و عمیق-2019
Accounting for the morphology of shale formations, which represent highly heterogeneous porous media, is a difficult problem. Although two- or three-dimensional images of such formations may be obtained and analyzed, they either do not capture the nanoscale features of the porous media, or they are too small to be an accurate representative of the media, or both. Increasing the resolution of such images is also costly. While high-resolution images may be used to train a deep-learning network in order to increase the quality of low-resolution images, an important obstacle is the lack of a large number of images for the training, as the accuracy of the network’s predictions depends on the extent of the training data. Generating a large number of high-resolution images by experimental means is, however, very time consuming and costly, hence limiting the application of deep-learning algorithms to such an important class of problems. To address the issue we propose a novel hybrid algorithm by which a stochastic reconstruction method is used to generate a large number of plausible images of a shale formation, using very few input images at very low cost, and then train a deep-learning convolutional network by the stochastic realizations. We refer to the method as hybrid stochastic deep-learning (HSDL) algorithm. The results indicate promising improvement in the quality of the images, the accuracy of which is confirmed by visual, as well as quantitative comparison between several of their statistical properties. The results are also compared with those obtained by the regular deep learning algorithm without using an enriched and large dataset for training, as well as with those generated by bicubic interpolation.
Keywords: Deep learning | Stochastic modeling | Shale formation | Imaging
مقاله انگلیسی
2 A review of stochastic battery models and health management
بررسی مدل های باتری تصادفی و مدیریت سلامت-2017
Batteries are promising sources of green and sustainable energy that have been widely used in various applications. Battery modelling as the basis of battery management system is vital for both technology development and applications of batteries. Compared with other battery models, stochastic battery models feature high accuracy and low time consumption. Moreover, charging profile, battery behavior, and discharging profile can all be considered to optimize battery performance and usage, which is a key issue in battery usage in real life. Given the significance of stochastic modelling and the progress of battery health management, this paper reviews various aspects of related studies and developments from different fields, while identifying their corresponding merits and weaknesses. Remaining challenges are discussed, and several suggestions are offered as possible inspirations for further research.
Keywords: Renewable energy storage | Battery modelling | Battery health management | Stochastic modelling | Markov chain | Stochastic process
مقاله انگلیسی
3 Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace
با استفاده از تجزیه و تحلیل شبکه برای بررسی نفوذ بین فردی رفتارهای امنیتی اطلاعات در محل کار-2017
As organisations are developing people-centric security workplaces, where proactive security behaviours are fostered, it is important to understand more about the sources of security influence. This research applied social network analysis methods to investigate security influence within a large interior contractor in Vietnam. The findings revealed that security influence occurs between employees in the same department, particularly those in senior positions, have longer tenure or younger age. Engagement in daily work and security-related activities can also increase the likelihood of influencing security behaviours. Moreover, the security influence network is transitive and has a hierarchical structure.
Keywords: Security compliance | Security behaviour | Security management | Interpersonal influence | Social network analysis | Exponential random graph modelling
مقاله انگلیسی
4 Stochastic modeling for vehicle platoons (I): Dynamic grouping behavior and online platoon recognition
مدل سازی تصادفی برای گردان های وسایل نقلیه (I): رفتار گروه بندی پویا و شناخت گردان آنلاین-2017
A vehicle platoon is a group of vehicles traveling together at approximately the same speed. Traffic platooning is an important phenomenon that can substantially increase the capacity of roads. This two-part paper presents a new approach to stochastic dynamic modeling for vehicle platoons. In part I, we develop a vehicle platoon model with two interconnected components: a Markov regime-switching stochastic process that is used to model the dynamic behavior of platoon-to-platoon transitions, and a state space model that is employed to describe individual vehicles’ dynamic movements within each vehicle platoon. On the basis of the developed stochastic dynamic model, we then develop an al gorithm for online platoon recognition. The proposed stochastic dynamic model for vehicle platoons also provides a new approach to vehicle speed filtering for traffic with a platoon structure.
Keywords: Dynamic grouping behavior | Markov regime switching process | State space model | Vehicle platoon | Vehicle speed | Vehicle time headway
مقاله انگلیسی
5 Stochastic modeling for vehicle platoons (II): Statistical characteristics
مدل سازی تصادفی برای گردان های وسایل نقلیه (II): مشخصات آماری-2017
This two-part paper presents a new approach to stochastic dynamic modeling for vehi cle platoons. Part I develops a vehicle platoon model to capture the dynamics of vehi cles’ grouping behavior and proposes an online platoon recognition algorithm. On the ba sis of the developed platoon model, Part II investigates various important characteristics of vehicle platoons and derives their statistical distribution models, including platoon size, within-platoon headway, between-platoon headway and platoon speed. It is shown that the derived statistical distributions include some important existing models in the litera ture as their special cases. These statistical distribution models are crucial for us to under stand the traffic platooning phenomenon. In practice, they can be used as the inputs for the design of traffic management and control algorithms for traffic with a platoon struc ture. Real traffic data is used to illustrate the obtained theoretical results.
Keywords: Between-platoon headway | Platoon size | Platoon speed | Within-platoon headway
مقاله انگلیسی
6 Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace
با استفاده از تجزیه و تحلیل شبکه برای بررسی نفوذ بین فردی رفتارهای امنیتی اطلاعات در محل کار-2017
As organisations are developing people-centric security workplaces, where proactive security behaviours are fostered, it is important to understand more about the sources of security influence. This research applied social network analysis methods to investigate security influence within a large interior contractor in Vietnam. The findings revealed that security influence occurs between employees in the same department, particularly those in senior positions, have longer tenure or younger age. Engagement in daily work and security-related activities can also increase the likelihood of influencing security behaviours. Moreover, the security influence network is transitive and has a hierarchical structure.© 2016 Elsevier B.V. All rights reserved.
Keywords:Security compliance | Security behaviour | Security management | Interpersonal influence | Social network analysis | Exponential random graph modelling
مقاله انگلیسی
7 Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace
چرا کارکنان مشاوره امنیت اطلاعات را به اشتراک می گذارند؟ بررسی عوامل مشارکتی و الگوهای سازمانی مشارکت مشاوره امنیتی در محل کار-2017
As modern organisations are dealing with a growing amount of data and strategic information systems, the need to protect these vital assets becomes paramount. An emerging topic in behavioural security field is security advice sharing, which plays a crucial role in helping organisations develop people-centric security workplaces whereby the employees information security awareness and personal account- ability for security are fostered. This research employs social network analysis methods to explore why the employees are willing to share information security advice, as well as examines the structural pat- terns of this sharing network. We found favourable security attitude and engagement in daily activities have positive impacts on security advice sharing, whereas perceiving too much social pressure makes the employees deliberately refuse to share security advice. We also found security advice sharing is transitive and non-reciprocal, and there are a few dominant employees who control the flow of security advice. Practical recommendations about strategies to increase security advice sharing within the workplace are discussed, and by conducting this research we demonstrate the empirical adoption of social network analysis techniques in the behavioural security field.© 2016 Elsevier Ltd. All rights reserved.
Keywords:Information security behaviour | Information security management | Knowledge sharing | Social network analysis | Exponential random graph modeling
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی