945 resultados para black-box modelling
Resumo:
I describe an approach to forming hypotheses about hidden mechanism configurations within devices given external observations and a vocabulary of primitive mechanisms. An implemented causal modelling system called JACK constructs explanations for why a second piece of toast comes out lighter, why the slide in a tire gauge does not slip back inside when the gauge is removed from the tire, and how in a refrigerator a single substance can serve as a heat sink for the interior and a heat source for the exterior. I report the number of hypotheses admitted for each device example, and provide empirical results which isolate the pruning power due to different constraint sources.
Resumo:
Garrett S.M. and Lee M.H., A Case-Based Approach to Black-Box Control Learning, Proc. Int. Conf. on Comutational Intelligence for Modelling, Control and Automation (CIMCA`99), 17-19 Feb. 1999. Vienna.
Resumo:
Due to the complexity and inherent instability in polymer extrusion there is a need for process models which can be run on-line to optimise settings and control disturbances. First-principle models demand computationally intensive solution, while ‘black box’ models lack generalisation ability and physical process insight. This work examines a novel ‘grey box’ modelling technique which incorporates both prior physical knowledge and empirical data in generating intuitive models of the process. The models can be related to the underlying physical mechanisms in the extruder and have been shown to capture unpredictable effects of the operating conditions on process instability. Furthermore, model parameters can be related to material properties available from laboratory analysis and as such, lend themselves to re-tuning for different materials without extensive remodelling work.
Resumo:
Over the last decade issues related to the financial viability of development have become increasingly important to the English planning system. As part of a wider shift towards the compartmentalisation of planning tasks, expert consultants are required to quantify, in an attempt to rationalise, planning decisions in terms of economic ‘viability’. Often with a particular focus on planning obligations, the results of development viability modelling have emerged as a key part of the evidence base used in site-specific negotiations and in planning policy formation. Focussing on the role of clients and other stakeholders, this paper investigates how development viability is tested in practice. It draws together literature on the role of calculative practices in policy formation, client feedback and influence in real estate appraisals and stakeholder engagement and consultation in the planning literature to critically evaluate the role of clients and other interest groups in influencing the production and use of development viability appraisal models. The paper draws upon semi-structured interviews with the main producers of development viability appraisals to conclude that, whilst appraisals have the potential to be biased by client and stakeholder interests, there are important controlling influences on potential opportunistic behaviour. One such control is local authorities’ weak understanding of development viability appraisal techniques which limits their capacity to question the outputs of appraisal models. However, this also is of concern given that viability is now a central feature of the town planning system.
Resumo:
This paper examines the role of powerful entities and coalitions in shaping international accounting standards. Specifically, the focus is on the process by which the International Accounting Standards Board (IASB) developed IFRS 6, Exploration for and Evaluation of Mineral Resources. In its Issues Paper, the IASB recommended that the successful efforts method be mandated for pre-production costs, eliminating the choice previously available between full cost and successful efforts methods. In spite of the endorsement of this view by a majority of the constituents who responded to the Issues Paper, the final outcome changed nothing, with choice being retained. A compelling explanation of this disparity between the visible inputs and outputs of the standard setting process is the existence of a “black box”, in which powerful extractive industries entities and coalitions covertly influenced the IASB to secure their own ends and ensure that the status quo was maintained
Resumo:
This paper seeks to investigate the link between the objective regional opportunity structure (captured by regional data) and individuals’ engagement in different stages in the venture creation process (intention to start a business and engagement in nascent entrepreneurship). We further investigate pathways through which a favourable regional environment could affect entrepreneurial intentions and the propensity to be a nascent entrepreneur. We combine individual level GEM-data for Western Germany with regional level data from the statistical office and use multi-level analysis to test our hypotheses. We find support for our contention that a favourable regional opportunity structure affects entrepreneurial intentions and engagement. As pathways between the region and individual behaviour serve the individual perception of founding opportunities and the individual social capital.
Resumo:
There is an intimate interconnectivity between policy guidelines defining reform and the delineation of what research methods would be subsequently applied to determine reform success. Research is guided as much by the metaphors describing it as by the ensuing empirical definition of actions of results obtained from it. In a call for different reform policy metaphors Lumby and English (2010) note, “The primary responsibility for the parlous state of education... lies with the policy makers that have racked our schools with reductive and dehumanizing processes, following the metaphors of market efficiency, and leadership models based on accounting and the characteristics of machine bureaucracy” (p. 127)
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
Issue addressed The paper examines the meanings of food safety among food businesses deemed non-compliant and considers the need for an ‘insider perspective’ to inform a more nuanced health promotion practice. Methods In-depth interviews were conducted with 29 food business operators who had been recently deemed ‘non-compliant’ through Council inspection. Result Paradoxically, these ‘non-compliers’ revealed a strong belief in the importance of food safety as well as a desire to comply with the regulations as communicated to them by Environmental Health Officers (EHOs). Conclusions The evidence base of food safety is largely informed by the science of food hazards, yet there is a very important need to illuminate the ‘insider’ experience of food businesses doing food safety on a daily basis. This requires a more socially nuanced appreciation of food businesses beyond the simple dichotomy of compliant/ non-compliant. So what? Armed with a deeper understanding of the social context surrounding food safety practice, it is anticipated that a more balanced, collaborative mode of food safety health promotion could develop which could add to the current signature model of regulation.
Resumo:
Among different methods, the transmission-line or the impedance tube method has been most popular for the experimental evaluation of the acoustical impedance of any termination. The current state of method involves extrapolation of the measured data to the reflecting surface or exact locations of the pressure maxima, both of which are known to be rather tricky. The present paper discusses a method which makes use of the positions of the pressure minima and the values of the standing-wave ratio at these points. Lippert's concept of enveloping curves has been extended. The use of Smith or Beranek charts, with their inherent inaccuracy, has been altogether avoided. The existing formulas for the impedance have been corrected. Incidentally, certain other errors in the current literature have also been brought to light.Subject Classification: 85.20.
Resumo:
For the experimental evaluation of the acoustical impedance of a termination by the impedance-tube method at low frequencies, the length of the impedance tube is a problem. In the present paper, the method of exact analysis of standing waves developed by the authors for the stationary medium as well as for mean flow, has been extended for measurement of the acoustical impedance of a termination at low frequencies. The values of the tube attenuation factor and the wave number at the low frequency of interest are established from the experiment conducted, with the given impedance tube, at a higher frequency. Then, exciting the tube at the desired low frequency it is sufficient to measure sound pressure at three differenct locations (not necessarily the minima) in order to evaluate reflection coefficient and hence the impedance of the termination at that frequency.