Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Analyzing undesired behaviors

TABLE 6-1. ABC ANALYSIS, STEP 1-ANALYZE UNDESIRED BEHAVIOR. [Pg.143]

Using the formalism developed in section 20.4, we can analyze the behavior of the approximations to the valence spinors in the AIMP method. The purpose of this exercise is to determine whether the approximations to the one-electron Hamiltonian and the pseudospinors are likely to cause any undesirable behavior, such as collapse when a core spinor is mixed in. As before, the model we use is the simplest an atom with two valence electrons. We have three separate cases to consider. [Pg.420]

Analyze the undesired behavior. Identify the target behavior you wish to understand or influence, and state it in the negative—the undesirable or problematic form of the behavior. For instance, if the behavior in question is action orientation, the undesired form would be a failure to act proactively. List the antecedents and consequences for the behavior, and list the potency of each consequence. This analysis gives you insight into why the problematic form of the behavior occurs and provides the data you need to develop a change strategy. [Pg.141]

TA are used to model and analyze dynamic systems with discrete and timed behavior. One of their strengths is the easy modeling in a decomposed fashion as a set of often small and individually acting automata. Time in TA is modeled in a very natural way by a set of clocks that simply measure the time between events. This is a major difference to MIP techniques, where time and dynamic components are described in a rather artificial way by providing variables and inequalities for every point of time within a discretized time horizon. In addition to the advantages in modeling, TA serve as a computational model which can be analyzed by techniques for reachability analysis. These techniques are widely used in the context of verification, in which the objective is to detect possible undesired (bad or forbidden) behaviors [9-11]. The success of these techniques was pushed by the availability and increasing performance of tools for TA, e.g., Uppaal [9, 10, 12, 13]. [Pg.220]


See other pages where Analyzing undesired behaviors is mentioned: [Pg.1741]    [Pg.55]    [Pg.1735]    [Pg.111]    [Pg.141]    [Pg.79]    [Pg.273]    [Pg.179]    [Pg.151]    [Pg.123]    [Pg.179]    [Pg.273]    [Pg.186]   
See also in sourсe #XX -- [ Pg.141 , Pg.142 ]




SEARCH



Undesirability

Undesirable

© 2024 chempedia.info