Search for dissertations about: "modellvalidering"
Found 4 swedish dissertations containing the word modellvalidering.
-
1. Novel beam shaping and computer vision methods for laser beam welding
Abstract : Laser beam welding has been widely applied in different industrial sectors due to its unique advantages. However, there are still challenges, such as beam positioning in T-joint welding, and gap bridging in butt joint welding,especially in the case of varying gap width along a joint. READ MORE
-
2. Methods for Early Model Validation : Applied on Simulation Models of Aircraft Vehicle Systems
Abstract : Simulation models of physical systems, with or without control software, are widely used in the aeronautic industry in applications ranging from system development to verification and end-user training. With the main drivers of reducing the cost of physical testing and in general enhancing the ability to take early model-based design decisions, there is an ongoing trend of further increasing the portion of modeling and simulation. READ MORE
-
3. Numerical modeling of fluid flow and solute transport in rock fractures
Abstract : This study focuses on numerical modeling of fluid flow and solute transport in rough-walled rock fractures and fracture-matrix systems, with the main aim to investigate the impacts of fracture surface roughness on flow and transport processes in rock fractures. Both 2D and 3D fracture models were built from laser-scanned surface tomography of a real granite rock sample, to consider realistic features of surface tomography and potential asperity contacts. READ MORE
-
4. Modeling, Model Validation and Uncertainty Identification for Power System Analysis
Abstract : It is widely accepted that correct system modeling and identification are among the most important issues power system operators face when managing instability and post-contingency scenarios. The latter is usually performed involving special computational tools that allow the operator to forecast, prevent system failure and take appropriate actions according to protocols for different contingency cases in the system. READ MORE