نتایج جستجو برای: black box modeling

تعداد نتایج: 599217  

2016
Theofilos A. Papadopoulos Andreas I. Chrysochos Angelos I. Nousdilis Grigoris K. Papagiannis

Modeling of power distribution transformers in the high-frequency range is of crucial importance in cases such as using power-line communication technology or investigating transient overvoltages at the transformer low-voltage side. This paper presents a simple black-box modeling methodology for distribution transformers using transfer functions defined by the recorded voltage ratios at the tra...

2007
Walter Willinger Vern Paxson

High-resolution traac measurements from modern communications networks provide unique opportunities for developing and validating mathematical models for aggregate traac. To exploit these opportunities, we emphasize the need for structural models that take into account spe-ciic physical features of the underlying communication network structure. This approach is in sharp contrast to the traditi...

2002
Stefan Droste Thomas Jansen Karsten Tinnefeld Ingo Wegener

Black-box optimization algorithms optimize a fitness function f without knowledge of the specific parameters of the problem instance. Their run time is measured as the number of f -evaluations. This implies that the usual algorithmic complexity of a problem cannot be applied in the black-box scenario. Therefore, a new framework for the valuation of algorithms for black-box optimization is prese...

Journal: :Modeling, Identification and Control: A Norwegian Research Bulletin 2015

Journal: :IEEE Access 2023

Many applications involving physical systems, such as system control or fault detection, call for a behavioral, black-box, digital twin of the real system. By observing input-output pairs, nonlinear system’s black-box twinning model can be built, thus enabling real-time accurate estimation health and status. We propose modeling approach that implemented with little hardware resources predicts o...

Journal: :IEEE Transactions on Electromagnetic Compatibility 2022

A procedure for the derivation of a black-box model electromagnetic interference (EMI) filters is proposed and discussed. The modeling approach assessed by resorting to real EMI filter. equivalent circuit filter directly obtained from rational approximation scattering-parameter matrix measured at ports. Therefore, does not require any information on internal structure (e.g., components, electri...

Journal: :Evolutionary computation 2017
Carola Doerr Johannes Lengler

Black-box complexity theory provides lower bounds for the runtime of black-box optimizers like evolutionary algorithms and other search heuristics and serves as an inspiration for the design of new genetic algorithms. Several black-box models covering different classes of algorithms exist, each highlighting a different aspect of the algorithms under considerations. In this work we add to the ex...

2002
Taner Eskil Jon Sticklen Clark Radcliffe

Modular distributed modeling is introduced as a novel Internet-based architecture enabling cooperative engineering design, distributed black-box modeling of engineered artifacts, and open, competitive e-commerce. The motivation for modular distributed modeling is that today’s engineering and manufacturing communities have been fundamentally altered by two factors: (a) the development of non-cap...

Journal: :Journal of Systems and Software 2011
Cesare Bartolini Antonia Bertolino Sebastian G. Elbaum Eda Marchetti

The attractive feature of Service Oriented Architecture (SOA) is that pieces of software conceived and developed by independent organizations can be dynamically composed to provide richer functionality. The same reasons that enable flexible compositions, however, also prevent the application of some traditional testing approaches, making SOA validation challenging and costly. Web services usual...

Journal: :I. J. Network Security 2006
Arslan Brömme

Current approaches for risk analysis of biometric authentication technology are limited to enrollment and identification/verification processes with biometric algorithms mainly considered as black-boxes, only. This paper presents a systematic approach for a holistic security risk analysis of biometric authentication technology based on the high-level component & process model for integrated sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید