Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Modeling

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 125

Full-Text Articles in Physical Sciences and Mathematics

Modeling And Analysing Of Complex Combat Systems Based On Symbiosis Theory, Xiangrui Tian, Jie Ying, Rui Yao, Xiaodong Wan Jan 2024

Modeling And Analysing Of Complex Combat Systems Based On Symbiosis Theory, Xiangrui Tian, Jie Ying, Rui Yao, Xiaodong Wan

Journal of System Simulation

Abstract: As the combat systems develop towards clustering, coordination, unmanned, and intelligent direction, traditional combat system modeling methods are unable to reflect the complexity and intelligence of the combat systems. By drawing on symbiosis theory, this paper models and analyzes complex combat systems, and decomposes the complex combat system into various subsystems according to combat missions. The combat units, interaction modes, and combat environments in the subsystems are analyzed. The paper builds mathematical models to capture the collaborative interaction relationships between combat units, finally constructing a symbiotic model of complex combat systems. By the symbiosis principles and methods, quantitative analysis …


Tension Control And Interproximation Techniques Forshape Design And Rgb-Depth Segmentation Reconstruction And Modeling, Anastasia Kazadi Jan 2024

Tension Control And Interproximation Techniques Forshape Design And Rgb-Depth Segmentation Reconstruction And Modeling, Anastasia Kazadi

Theses and Dissertations--Computer Science

Human eyes possess remarkable capabilities to perceive and interpret a wealth of information about our environment; from discerning colors and depths to identifying object boundaries and navigating obstacles, our eyes serve as invaluable guides in our daily lives. Ongoing research in the fields of computer vision and computer graphics continuously explore the ways to replicate extraordinary human vision abilities in order to develop systems and frameworks which would enable computers to capture, analyze, and act upon discerned information. In this context, this dissertation seeks to investigate and automate various shape control and data processing techniques for 3D modeling and shape …


Modeling, Simulation And Control Of Microrobots For The Microfactory., Zhong Yang May 2023

Modeling, Simulation And Control Of Microrobots For The Microfactory., Zhong Yang

Electronic Theses and Dissertations

Future assembly technologies will involve higher levels of automation in order to satisfy increased microscale or nanoscale precision requirements. Traditionally, assembly using a top-down robotic approach has been well-studied and applied to the microelectronics and MEMS industries, but less so in nanotechnology. With the boom of nanotechnology since the 1990s, newly designed products with new materials, coatings, and nanoparticles are gradually entering everyone’s lives, while the industry has grown into a billion-dollar volume worldwide. Traditionally, nanotechnology products are assembled using bottom-up methods, such as self-assembly, rather than top-down robotic assembly. This is due to considerations of volume handling of large …


Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen Mar 2023

Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen

Beyond: Undergraduate Research Journal

Since 2020 the Very Energetic Radiation Imaging Telescope Array System (VERITAS) has observed 48 stellar targets using the technique of Stellar Intensity Interferometry (SII). Angular diameter measurements by VERITAS SII (VSII) in a waveband near 400 nm complement existing angular diameter measurements in the near-infrared. VSII observations will test fundamental predictions of stellar atmosphere models and should be more sensitive to limb darkening and gravity darkening effects than measurements in the near-IR, however, the magnitude of this difference has not been systematically explored in the literature. In order to investigate the synthetic interferometric (as well as spectroscopic) appearance of stars …


Securing The Transportation Of Tomorrow: Enabling Self-Healing Intelligent Transportation, Elanor Jackson, Sahra Sedigh Sarvestani Jan 2023

Securing The Transportation Of Tomorrow: Enabling Self-Healing Intelligent Transportation, Elanor Jackson, Sahra Sedigh Sarvestani

Electrical and Computer Engineering Faculty Research & Creative Works

The safety of autonomous vehicles relies on dependable and secure infrastructure for intelligent transportation. The doctoral research described in this paper aims to enable self-healing and survivability of the intelligent transportation systems required for autonomous vehicles (AV-ITS). The proposed approach is comprised of four major elements: qualitative and quantitative modeling of the AV-ITS, stochastic analysis to capture and quantify interdependencies, mitigation of disruptions, and validation of efficacy of the self-healing process. This paper describes the overall methodology and presents preliminary results, including an agent-based model for detection of and recovery from disruptions to the AV-ITS.


Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy Dec 2022

Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy

Research Collection School Of Computing and Information Systems

Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase. However, there is a lack of a comprehensive comparative summary of existing code search approaches. To understand the research trends in existing code search studies, we systematically reviewed 81 relevant studies. We investigated the publication trends of code search studies, analyzed key components, such as codebase, query, and modeling technique …


Modeling And Simulation Of Ultra Supercritical Unit Using A Composite Weighted Human Learning Network, Chuanliang Cheng, Chen Peng, Deliang Zeng, Tengfei Zhang Jul 2022

Modeling And Simulation Of Ultra Supercritical Unit Using A Composite Weighted Human Learning Network, Chuanliang Cheng, Chen Peng, Deliang Zeng, Tengfei Zhang

Journal of System Simulation

Abstract: Intermediate point temperature is an important parameter in ultra supercritical (USC) unit. However, due to strong nonlinearity, it is difficult to determine the form and coefficients of the corresponding model by using traditional methods. In order to get a better control effect, a novel composite weighted human learning optimization network (CWHLON) is proposed to tackle the above-mentioned problems. Though the real-time dynamic linear model, the characteristics of the object are accurately simulated. In the simulation experiment, CWHLON is compared with the traditional recursive least squares and other three meta heuristic methods. The data show that the proposed method improves …


Deep Learning For Anomaly Detection, Guansong Pang, Charu Aggarwal, Chunhua Shen, Nicu Sebe Jun 2022

Deep Learning For Anomaly Detection, Guansong Pang, Charu Aggarwal, Chunhua Shen, Nicu Sebe

Research Collection School Of Computing and Information Systems

A nomaly detection aims at identifying data points which are rare or significantly different from the majority of data points. Many techniques are explored to build highly efficient and effective anomaly detection systems, but they are confronted with many difficulties when dealing with complex data, such as failing to capture intricate feature interactions or extract good feature representations. Deep-learning techniques have shown very promising performance in tackling different types of complex data in a broad range of tasks/problems, including anomaly detection. To address this new trend, we organized this Special Issue on Deep Learning for Anomaly Detection to cover the …


Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli May 2022

Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous underwater vehicles (AUVs) operating in deep sea and littoral environments have diverse applications including marine biology exploration, ocean environment monitoring, search for plane crash sites, inspection of ship-hulls and pipelines, underwater oil rig maintenance, border patrol, etc. Achieving autonomy in underwater vehicles relies on a tight integration between modules of sensing, navigation, decision-making, path-planning, trajectory tracking, and low-level control. This system integration task benefits from testing the related algorithms and techniques in a simulated environment before implementation in a physical test bed. This thesis reports on the development of a modeling and simulation platform that supports the design and …


Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev Mar 2022

Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev

LSU Doctoral Dissertations

Applications (apps) of the Digital Sharing Economy (DSE), such as Uber, Airbnb, and TaskRabbit, have become a main facilitator of economic growth and shared prosperity in modern-day societies. However, recent research has revealed that the participation of minority groups in DSE activities is often hindered by different forms of bias and discrimination. Evidence of such behavior has been documented across almost all domains of DSE, including ridesharing, lodging, and freelancing. However, little is known about the under- lying design decisions of DSE systems which allow certain demographics of the market to gain unfair advantage over others. To bridge this knowledge …


Research On Digital Twin-Based Modeling And Monitoring Of Five-Axis Grinder, Xiao Tong, Haifan Jiang, Guofu Ding, Jiang Lei, Shuwen Ma Jan 2022

Research On Digital Twin-Based Modeling And Monitoring Of Five-Axis Grinder, Xiao Tong, Haifan Jiang, Guofu Ding, Jiang Lei, Shuwen Ma

Journal of System Simulation

Abstract: Aiming at the poor virtual-real interaction ability, single data presentation mode, and hysteretic abnormality handling in CNC machine tool status monitoring, a visual monitoring method for machine tool process based on digital twin is proposed, Which realizes the mapping of three subsystems of machine tool, machinery, control and electrical to the information space from three dimensions of geometry, logic and data. The verification of instructions and CNC programs, real-time status monitoring and abnormality handling during operation are carried out. A digital twin-based machine tool modeling and monitoring system is designed and developed. Taking a five-axis CNC …


Track Deception Modeling Method Based On Multi-Jammer Cooperation, Wang Rui, Xiangyang Li, Zhili Zhang, Hongguang Ma Jan 2022

Track Deception Modeling Method Based On Multi-Jammer Cooperation, Wang Rui, Xiangyang Li, Zhili Zhang, Hongguang Ma

Journal of System Simulation

Abstract: The false track generated by the jammer formation is an effective interference measure against networked radars. This paper starts from the basic principle of false track generation and presents the model of the measurement error of the radar for the false track and the control error of the jammer formation. It also presents an analysis of the effects of these errors on the false track. The effectiveness of the false track is further analyzed through the confrontation scenario between the rectangular front formation of a certain type of equipment and networked radars. The simulation results show that the false …


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen Jan 2022

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …


Modeling The Heterogeneous Temporal Dynamics Of Epidemics On Networks, Andrea Joan Allen Jan 2022

Modeling The Heterogeneous Temporal Dynamics Of Epidemics On Networks, Andrea Joan Allen

Graduate College Dissertations and Theses

Mathematical models of infectious disease are important tools for understanding large-scale patterns of how a disease spreads through a population. Predictions of trends from disease models help guide public health prevention and mitigation measures. Most simple disease models assume that the population is randomly mixed, but real-world populations exhibit heterogeneous patterns in the way people interact. These differences in population structure can be represented by networks. Networks can then be incorporated into disease models by using various interdisciplinary concepts and tools. Yet even network disease models often overlook that populations change over time. In this thesis, two models of infectious …


Rapid Development Technology Of Virtual Maintenance Training Simulation Model For Aviation Equipment, Rongqiang Li, Aibing Wen, Bin Hua, Jiajun Li, Jiang Bing Jun 2021

Rapid Development Technology Of Virtual Maintenance Training Simulation Model For Aviation Equipment, Rongqiang Li, Aibing Wen, Bin Hua, Jiajun Li, Jiang Bing

Journal of System Simulation

Abstract: Taking the practical application of the aircraft virtual maintenance training as the demand, the basic development process and technical means of the aircraft virtual maintenance training simulation model are analyzed, which solves the technical bottleneck in the popularization and application of the large-scale engineering. Aiming at the crucial problems such as the low efficiency in the development of maintenance training simulation model and the difficulties in updating the model, a rapid development process to support the large-scale engineering applications is proposed. The principles and implementation ways of three key technologies supporting the rapid development of virtual maintenance training simulation …


The Effect Of Initial Conditions On The Weather Research And Forecasting Model, Aaron D. Baker May 2021

The Effect Of Initial Conditions On The Weather Research And Forecasting Model, Aaron D. Baker

Electronic Theses and Dissertations

Modeling our atmosphere and determining forecasts using numerical methods has been a challenge since the early 20th Century. Most models use a complex dynamical system of equations that prove difficult to solve by hand as they are chaotic by nature. When computer systems became more widely adopted and available, approximating the solution of these equations, numerically, became easier as computational power increased. This advancement in computing has caused numerous weather models to be created and implemented across the world. However a challenge of approximating these solutions accurately still exists as each model have varying set of equations and variables to …


Characterizing Students’ Engineering Design Strategies Using Energy3d, Jasmine Singh, Viranga Perera, Alejandra Magana, Brittany Newell Apr 2021

Characterizing Students’ Engineering Design Strategies Using Energy3d, Jasmine Singh, Viranga Perera, Alejandra Magana, Brittany Newell

Discovery Undergraduate Interdisciplinary Research Internship

The goals of this study are to characterize design actions that students performed when solving a design challenge, and to create a machine learning model to help future students make better engineering design choices. We analyze data from an introductory engineering course where students used Energy3D, an open source computer-aided design software, to design a zero-energy home (i.e. a home that consumes no net energy over a period of a year). Student design actions within the software were recorded into text files. Using a sample of over 300 students, we first identify patterns in the data to assess how students …


Architecture Design Of An Emergency Command Simulation Exercise Platform Based On Tena, Peng Zhang, Qinfu Li Jan 2021

Architecture Design Of An Emergency Command Simulation Exercise Platform Based On Tena, Peng Zhang, Qinfu Li

Journal of System Simulation

Abstract: Based on the analysis of the current situation and development needs of the emergency command simulation exercise platform and the common characteristics of most emergency command case scenarios, an emergency command simulation exercise platform architecture based on TENA (Test and Training Enabling Architecture) is designed and put forward, which can expand various simulation models such as disaster accidents, disaster-bearing subjects, higher-lower linkage command organizations, rescue forces, natural environment, etc. in a multi-granularity and modular manner, and interface with various exercise support and analysis evaluation tools, as well as heterogeneous systems such as external three-dimensional simulation, virtual reality/augmented reality equipment …


Modeling Emergence Of Network Radar Countermeasure System, Huang Chen, Jianqing Qi, Fangzheng Liu Jan 2021

Modeling Emergence Of Network Radar Countermeasure System, Huang Chen, Jianqing Qi, Fangzheng Liu

Journal of System Simulation

Abstract: Network radar countermeasure system (NRCS) is a new kind of integrated electronic warfare system with the integrated network developing trend of radar and EW equipment, and emergence is the typical complex feature of NRCS. The connotation and composition of the NRCS emergence was interpreted. Four sources of the NRCS emergence were analyzed: composition effect, structural effect, interaction effect and environmental effect. The conceptual models and mathematical models of the NRCS emergence were built from three aspects: system reconnaissance detection emergence, system target identification emergence and system jamming emergence. Simulation results coincide with the NRCS emergence source analysis, which verifies …


Modeling And Simulation Of Traction System In Hybrid Shunting Locomotive, Kun Shen, Wang Ling, Wang Jian, Xiaoyang Yao Jan 2021

Modeling And Simulation Of Traction System In Hybrid Shunting Locomotive, Kun Shen, Wang Ling, Wang Jian, Xiaoyang Yao

Journal of System Simulation

Abstract: The structure of traction system in hybrid shunting locomotive was analyzed, and the working principles of traction system under multiform power models were introduced. Based on which, the models of traction system and power accumulators of this hybrid shunting locomotive were built by MATLAB/Simulink, then the simulation experiments on hybrid shunting locomotive with the power models of hybrid power, and pure diesel generator power or pure accumulator power were done respectively. The simulation results show that hybrid shunting locomotive can achieve reliable operation in diflFerent conditions by the designed main circuit structure, parameters and system energy management strategy.


Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor Jan 2021

Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor

Walden Dissertations and Doctoral Studies

Some IT project managers working for U.S. military organizations are struggling to implement modern modeling and simulation (M&S) technology. Implementation strategies are needed to help IT practitioners deliver meaningful simulations and models that ultimately help senior leaders make logical and science-based decisions. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple-case study was to explore strategies some IT project managers supporting U.S. military organizations use to implement modern M&S technology. The participants included 10 civil servants who successfully implemented modeling and simulation technology for military organizations located in the United States eastern region. Data was collected …


Exposure Assessment Of Emerging Contaminants: Rapid Screening And Modeling Of Plant Uptake, Majid Bagheri Jan 2021

Exposure Assessment Of Emerging Contaminants: Rapid Screening And Modeling Of Plant Uptake, Majid Bagheri

Doctoral Dissertations

"With the advent of new chemicals and their increasing uses in every aspect of our life, considerable number of emerging contaminants are introduced to environment yearly. Emerging contaminants in forms of pharmaceuticals, detergents, biosolids, and reclaimed wastewater can cross plant roots and translocate to various parts of the plants. Long-term human exposure to emerging contaminants through food consumption is assumed to be a pathway of interest. Thus, uptake and translocation of emerging contaminants in plants are important for the assessment of health risks associated with human exposure to emerging contaminants. To have a better understanding over fate of emerging contaminants …


Modeling Human Visual Detection Using Deep Networks, Zach Dekraker Jan 2021

Modeling Human Visual Detection Using Deep Networks, Zach Dekraker

Dissertations, Master's Theses and Master's Reports

The work in this report describes the use of machine learning to model human visual detection. This is in contrast to typical machine learning models, which seek to optimize detection performance overall, e.g., precision versus recall or F1 scores. Instead the goal is to develop models that can accurately match humans' abilities to detect objects in images. There are many AI algorithms that have far surpassed humans in, for example, object detection in large image databases or games such as Go. What is different about this work is that the objective is to accurately model humans' performance in visual detection …


Modeling And Relevance Analysis Of Urban Epidemic Transmission And Work Resumption Intensity, Gan Mi, Yunyi Tian, Wenchang Zhang, Xihan Zhao Nov 2020

Modeling And Relevance Analysis Of Urban Epidemic Transmission And Work Resumption Intensity, Gan Mi, Yunyi Tian, Wenchang Zhang, Xihan Zhao

Journal of System Simulation

Abstract: On the basis of multi-source big data, the model for analyzing the population migration changes and manpower gaps caused by the COVID-19 epidemic in 34 typical cities across the country is constructed , and the work resumption intensity of other cities is predicited by using the migration base constructed. The SEIR model is used to estimate the basic reproduction number in each city since the simulate results show that it can emulate the transmission trend of this epidemic accurately, and the retrospective matrix analysis of the work resumption intensity is combined with the manpower gap to summarize the anti-epidemic …


Research Overview On Modeling And Solution Of Aerospace Tt&C Scheduling Problem, Qingqing Yan, Huairong Shen, Qiongling Shao Sep 2020

Research Overview On Modeling And Solution Of Aerospace Tt&C Scheduling Problem, Qingqing Yan, Huairong Shen, Qiongling Shao

Journal of System Simulation

Abstract: The research of Aerospace TT&C Scheduling (ATT&CS) is very important, because of its support for TT&C scheme decision-making and TT&C resource net constructing. The classification and resolution flow of the ATT&CS problem were introduced. Then, the modeling methods and related key techniques, such as designing of object function, analysis of constraints, and priority determining, were analyzed. The solving algorithms and conflict resolution methods were summed up, and the major categories of algorithm were evaluated. The main content of scheduling evaluation research was summarized. The possible future researches for related techniques were discussed based on the analysis of development and …


Point Cloud Modeling Based On Compactly Supported Radial Basis Function Under Kd Tree Index Strategy, Li Jia, Duan Ping, Yehua Sheng, Haiyang Lü, Siyang Zhang Aug 2020

Point Cloud Modeling Based On Compactly Supported Radial Basis Function Under Kd Tree Index Strategy, Li Jia, Duan Ping, Yehua Sheng, Haiyang Lü, Siyang Zhang

Journal of System Simulation

Abstract: Modeling constructed by Compactly Supported Radial Basis Function (CSRBF) and visualization will fail. The main reason is that exhaustive search results in out of memory. KD tree can void exhaustive search due to the advantage of quickly searching. CSRBF combined KD tree was used to construct point cloud model. Modeling approach of CSRBF based on KD tree was proposed. KD tree index of the point cloud was constructed. CSRBF interpolation method was used to construct implicit function model of point cloud. Marching Cubes algorithm was to display model in 3D manner. The experimental results with rabbit point cloud show …


Modeling And Simulation Of Boiler Superheated Steam Temperature System Based On System Dynamics, Le Wei, Yuanyuan Yan Aug 2020

Modeling And Simulation Of Boiler Superheated Steam Temperature System Based On System Dynamics, Le Wei, Yuanyuan Yan

Journal of System Simulation

Abstract: Based on the principle of system dynamics, from the perspective of mass and energy conservation, taking the causal loop diagrams and the stock and flow diagrams as the carriers, and starting from the running mechanism of the system, the system dynamics model for the boiler superheated steam temperature system was established. This model has clear structure and reasonable complexity. By using the high temperature super-heater of the 300 MW boiler-turbine unit of Hebei Qingyuan Power Plant as the research object, simulation studies were carried out in Vensim PLE environment. The simulation curves were compared with the curves of …


Modeling And Simulation On Dynamics Of Epidemic Disease Based On Social Division Of Labor, Haibin Li Aug 2020

Modeling And Simulation On Dynamics Of Epidemic Disease Based On Social Division Of Labor, Haibin Li

Journal of System Simulation

Abstract: Prediction is an essential part of the epidemic prevention and control system, and it is of great significance to accurately establish a dynamic model of epidemiological evolution. The existing epidemiological modeling methods rarely consider the social division of labor of different groups. The entire group is divided into three subgroups, the ordinary residents, the social service personnel, and the front-line medical workers. Based on the heterogeneous uniform mixing theory, the subgroup adjacency matrix is used to represent the contact relationship between individuals, and a time-lapse dynamic model of epidemic spread and evolution is established. The simulation results show that …


Review On Modeling And Simulation Of Critical Infrastructures, Baoliang Xiao, Mingzhi Zhang, Xiaoyuan He Jul 2020

Review On Modeling And Simulation Of Critical Infrastructures, Baoliang Xiao, Mingzhi Zhang, Xiaoyuan He

Journal of System Simulation

Abstract: Economic prosperity, national security and society well-being have long depended on the important services that some critical infrastructures are provided. The safety of the critical infrastructures is vital for the normal operation of the country. On the basis of research on the connotation of critical infrastructure to different nation in different historical period, the definition, classification and model of interdependencies among critical infrastructures were analyzed. The principal modeling and simulation techniques of critical infrastructure and their merits and drawbacks were summarized. The significant protection projection s and tools were analyzed and researched. Depending on all above studies, knowing …