Data-driven models for crashworthiness optimisation: intrusive and non-intrusive model order reduction techniques

نویسندگان

چکیده

Abstract To enable multi-query analyses, such as optimisations of large-scale crashworthiness problems, a numerically efficient model is crucial for the development process. Therefore, data-driven Model Order Reduction (MOR) aims at generating low-fidelity models that approximate solution while strongly reducing computational cost. MOR methods became only available in recent years; detailed and comparative assessment their potential still lacking. Hence, this work evaluates advantages drawbacks intrusive non-intrusive projection based framework non-linear structural transient analysis. Both schemes rely on collection full-order training simulations subsequent subspace construction via Singular Value Decomposition. The Galerkin consecutive hyper-reduction step. In work, its inter-and extrapolation abilities are compared to technique, which combines approach with machine learning methods. Moreover, an optimisation analysis incorporating proposed discussed example.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusive and non-intrusive watermarking

“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.

متن کامل

Non-Intrusive Assessment of Organizational Data Quality

Many organisations are becoming increasingly aware that the usefulness of their data is limited by its poor quality. Surprising (and sometimes alarming) proportions of data in databases are inaccurate, incomplete, inconsistent or out of date. One-off data cleaning methods can help the situation in the short term, but they are costly and do little to improve data quality in the long term. Howeve...

متن کامل

Intrusive and Non-intrusive Evaluation of Ambient Displays

This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?” Inspired by concepts in the social and behavioral science, we categorize the evaluation of ambient displays into two styles: intrusive and nonintrusive. Furthermore, two case studies are used to illustrate these two evaluati...

متن کامل

Non-Intrusive Identity Management

This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...

متن کامل

Non-intrusive authentication

Available security solutions often are not widely used because the associated secure applications are awkward to use or they lack functionality when compared to standard insecure tools. To avoid this dicothomy, we developed a non-intrusive (or external) clientserver authentication framework which requires no modi cation to both the clients and the servers. In this way, full featured clients can...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Structural and Multidisciplinary Optimization

سال: 2022

ISSN: ['1615-1488', '1615-147X']

DOI: https://doi.org/10.1007/s00158-022-03282-1