A system dynamics application in the mining industry

Download
2002
Alpagut, Merih Ayşe

Suggestions

A simulation application in a flow shop
Kaplan, A. Celal; Erkip, Nesim; Department of Electrical Engineering (1987)
A fast fourier transform implementation and performance evaluation on a transputer based parallel computer system
Bazlamaçcı, Cüneyt F; Güran, Hasan; Department of Electrical and Electronics Engineering (1991)
A Microwave Imaging Model for Biomedical Applications
ÖZGÜN, ÖZLEM; Kuzuoğlu, Mustafa (2017-07-14)
A microwave imaging model is presented for detection of breast cancer tissues by combining the finite element method and the transformation electromagnetics approach. An inverse scattering problem is formulated based on genetic optimization algorithm, and its expensive cost function evaluations are accelerated by using the transformation electromagnetics approach, which allows using a uniform or rectangular mesh even when irregular geometries are present inside the domain. Simulation results are demonstrate...
A helicopter rotor modelling and meshing system
Uzun, Halit Eldem; Yutük, Kaan; Baran, Özgür Uğraş; AKSEL, MEHMET HALUK (2021-09-08)
Helicopter rotors in flight constitute a fairly complex wing geometry and exhibit motion in several axes. As a result, rotor motion creates quite complex flow patterns, and unlike fixed wings, flow around each rotor blade interacts with each other. These complexities make the analysis of the rotor flow is a challenge for CFD solvers. The challenge starts with very high requirements on the quality of the computational mesh. A modern helicopter rotor involves a number of different airfoil sections, complex pr...
A Collaborative Process Based Risk Analysis for Information Security Management Systems
Karabacak, Bilge; Özkan Yıldırım, Sevgi (2010-04-09)
Today, many organizations quote intent for ISO/IEC 27001:2005 certification. Also, some organizations are en route to certification or already certified. Certification process requires performing a risk analysis in the specified scope. Risk analysis is a challenging process especially when the topic is information security. Today, a number of methods and tools are available for information security risk analysis. The hard task is to use the best fit for the certification. In this work we have proposed a pro...
Citation Formats
M. A. Alpagut, “A system dynamics application in the mining industry,” M.S. - Master of Science, Middle East Technical University, 2002.