Showing 2,521 - 2,540 results of 99,603 for search '"analysis"', query time: 0.24s Refine Results
  1. 2521

    Reliability analysis of wireless communication equipment based on model selection by SUN Jin, HU Jicheng, JIAO Yaqi, WANG Kun

    Published 2025-02-01
    “…By introducing the information criterion and the special goodness of fit test to analyze the fitting effect of the reliability model, the reliability analysis method of wireless communication equipment based on model selection is proposed, and the test and analysis are combined with actual cases to improve the accuracy and effectiveness of model selection.…”
    Get full text
    Article
  2. 2522
  3. 2523

    Fault Characteristics Analysis of High-Speed Train Transmission Systems by Yang Liu, Zhang Dengbo, Yang Yueting, Ruquan Liang

    Published 2022-01-01
    “…The main focus of this paper is on the fault characteristics analysis of a high-speed train transmission system. …”
    Get full text
    Article
  4. 2524
  5. 2525
  6. 2526
  7. 2527

    Discrete Symmetries Analysis and Exact Solutions of the Inviscid Burgers Equation by Hongwei Yang, Yunlong Shi, Baoshu Yin, Huanhe Dong

    Published 2012-01-01
    “…Based on discrete symmetries analysis, two groups of discrete symmetries are obtained, which lead to new exact solutions of the inviscid Burgers equation.…”
    Get full text
    Article
  8. 2528

    Privacy policy compliance detection and analysis based on knowledge graph by ZHANG Xiheng, LI Xin, TANG Peng, HUANG Ruiqi, HE Yuan, QIU Weidong

    Published 2024-12-01
    “…First, a comprehensive analysis of the PIPL was conducted, and a multi-level privacy policy knowledge graph was proposed that covered concepts related to information protection that needed to be explained in privacy policies. …”
    Get full text
    Article
  9. 2529
  10. 2530

    Behavior-oriented inside network security situation modeling and analysis by Cheng ZHU, Jia-jia MIAO, Han-dong MAO

    Published 2016-08-01
    “…According to the situation awareness theory as well as the characteristics of the inside network security,a PMDV model for behavior-oriented inside network security situation modeling by dividing the inside network space into physical domain,information domain and social domain was proposed.A sound base for situation modeling of inside network security,which classified the entities inside the network space into the following 4 classes:person(P),machine(M),data(D) and virtual agent(V),was provided and the core element “behavior” in situation model with the interactions between different PMDV entities was defined.The structure and implementation guideline of the situation analysis platform based on PMDV model were also presented and studied.…”
    Get full text
    Article
  11. 2531

    Host security threat analysis approach for network dynamic defense by Lixun LI, Bin ZHANG, Shuqin DONG

    Published 2018-04-01
    Subjects: “…host security threat analysis…”
    Get full text
    Article
  12. 2532
  13. 2533
  14. 2534
  15. 2535
  16. 2536
  17. 2537
  18. 2538

    Analysis and forecasting of pet food markets using extrapolation methods by O. Nikolaieva, YE Svishchova, A. Hladka

    Published 2024-06-01
    “…From the variety of formalized methods for forecasting the demand in pet food markets, the authors chose extrapolation methods, namely, methods of trend analysis and adaptive methods of exponential smoothing. …”
    Get full text
    Article
  19. 2539

    COST OPTMIZATION WITH INTERNET SUPPORTED FMEA AND FUZZY FMEA ANALYSIS by Buket Karatop, Ceren Arslan Kazan, Halil Koruca

    Published 2023-08-01
    Subjects: “…failure mode and effect analysis (fmea)…”
    Get full text
    Article
  20. 2540