Data-driven models for crashworthiness optimisation: intrusive and non-intrusive model order reduction techniques
نویسندگان
چکیده
Abstract To enable multi-query analyses, such as optimisations of large-scale crashworthiness problems, a numerically efficient model is crucial for the development process. Therefore, data-driven Model Order Reduction (MOR) aims at generating low-fidelity models that approximate solution while strongly reducing computational cost. MOR methods became only available in recent years; detailed and comparative assessment their potential still lacking. Hence, this work evaluates advantages drawbacks intrusive non-intrusive projection based framework non-linear structural transient analysis. Both schemes rely on collection full-order training simulations subsequent subspace construction via Singular Value Decomposition. The Galerkin consecutive hyper-reduction step. In work, its inter-and extrapolation abilities are compared to technique, which combines approach with machine learning methods. Moreover, an optimisation analysis incorporating proposed discussed example.
منابع مشابه
Intrusive and non-intrusive watermarking
“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.
متن کاملNon-Intrusive Assessment of Organizational Data Quality
Many organisations are becoming increasingly aware that the usefulness of their data is limited by its poor quality. Surprising (and sometimes alarming) proportions of data in databases are inaccurate, incomplete, inconsistent or out of date. One-off data cleaning methods can help the situation in the short term, but they are costly and do little to improve data quality in the long term. Howeve...
متن کاملIntrusive and Non-intrusive Evaluation of Ambient Displays
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?” Inspired by concepts in the social and behavioral science, we categorize the evaluation of ambient displays into two styles: intrusive and nonintrusive. Furthermore, two case studies are used to illustrate these two evaluati...
متن کاملNon-Intrusive Identity Management
This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...
متن کاملNon-intrusive authentication
Available security solutions often are not widely used because the associated secure applications are awkward to use or they lack functionality when compared to standard insecure tools. To avoid this dicothomy, we developed a non-intrusive (or external) clientserver authentication framework which requires no modi cation to both the clients and the servers. In this way, full featured clients can...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Structural and Multidisciplinary Optimization
سال: 2022
ISSN: ['1615-1488', '1615-147X']
DOI: https://doi.org/10.1007/s00158-022-03282-1