• Title/Summary/Keyword: Black-Box method

Search Result 125, Processing Time 0.024 seconds

A Method for RBF-based Approximate Optimization of Expensive Black Box Functions (고비용 블랙박스 함수의 RBF기반 근사 최적화 기법)

  • Park, Sangkun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.4
    • /
    • pp.443-452
    • /
    • 2016
  • This paper proposes a method for expensive black box optimization using radial basis functions (RBFs). The proposed algorithm is a computational strategy that uses a RBF model approximating the expensive black box function to predict an optimum. First, a RBF-based approximation technique is introduced and a sampling plan for estimation of the black box function is described. Then the proposed algorithm is explained, which presents the pseudo-codes for implementation and the detailed description of each step performed in the optimization process. In addition, numerical experiments will be given to analyze the performance of the proposed algorithm, by investigating computation accuracy, number of function evaluations, and convergence history. Finally, geometric distance problem as application example will be also presented for showing the algorithm applicability to different engineering problems.

Application of black box model for height prediction of the fractured zone in coal mining

  • Zhang, Shichuan;Li, Yangyang;Xu, Cuicui
    • Geomechanics and Engineering
    • /
    • v.13 no.6
    • /
    • pp.997-1010
    • /
    • 2017
  • The black box model is a relatively new option for nonlinear dynamic system identification. It can be used for prediction problems just based on analyzing the input and output data without considering the changes of the internal structure. In this paper, a black box model was presented to solve unconstrained overlying strata movement problems in coal mine production. Based on the black box theory, the overlying strata regional system was viewed as a "black box", and the black box model on overburden strata movement was established. Then, the rock mechanical properties and the mining thickness and mined-out section area were selected as the subject and object respectively, and the influences of coal mining on the overburden regional system were discussed. Finally, a corrected method for height prediction of the fractured zone was obtained. According to actual mine geological conditions, the measured geological data were introduced into the black box model of overlying strata movement for height calculation, and the fractured zone height was determined as 40.36 m, which was comparable to the actual height value (43.91 m) of the fractured zone detected by Double-block Leak Hunting in Drill. By comparing the calculation result and actual surface subsidence value, it can be concluded that the proposed model is adaptable for height prediction of the fractured zone.

Integrity Verification in Vehicle Black Box Video Files with Hashing Method (차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법)

  • Choi, Jin-young;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.241-249
    • /
    • 2017
  • Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.

A study of the efficiency comparison of the Black-Box method with the randomized response technique (Black-Box 방법과 RR 기법의 효율성 비교 연구)

  • 이화영;홍기학
    • The Korean Journal of Applied Statistics
    • /
    • v.8 no.2
    • /
    • pp.27-41
    • /
    • 1995
  • In this paper, the proportion of durg-abuse and gas/bond-inhalation among the high school students in Kwangju and Chonnam has been estimated using the survey of the Black-Box method and randomized response technique. We have analyzed empirically the effects of both methods for the surveys of sensitive characters.

  • PDF

Black-Box Classifier Interpretation Using Decision Tree and Fuzzy Logic-Based Classifier Implementation

  • Lee, Hansoo;Kim, Sungshin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.27-35
    • /
    • 2016
  • Black-box classifiers, such as artificial neural network and support vector machine, are a popular classifier because of its remarkable performance. They are applied in various fields such as inductive inferences, classifications, or regressions. However, by its characteristics, they cannot provide appropriate explanations how the classification results are derived. Therefore, there are plenty of actively discussed researches about interpreting trained black-box classifiers. In this paper, we propose a method to make a fuzzy logic-based classifier using extracted rules from the artificial neural network and support vector machine in order to interpret internal structures. As an object of classification, an anomalous propagation echo is selected which occurs frequently in radar data and becomes the problem in a precipitation estimation process. After applying a clustering method, learning dataset is generated from clusters. Using the learning dataset, artificial neural network and support vector machine are implemented. After that, decision trees for each classifier are generated. And they are used to implement simplified fuzzy logic-based classifiers by rule extraction and input selection. Finally, we can verify and compare performances. With actual occurrence cased of the anomalous propagation echo, we can determine the inner structures of the black-box classifiers.

A Combined Randomized Response Technique Using Stratified Two-Phase Sampling (층화이중추출을 이용한 결합 확률화응답기법)

  • 홍기학
    • The Korean Journal of Applied Statistics
    • /
    • v.17 no.2
    • /
    • pp.303-310
    • /
    • 2004
  • We suggest a method to procure information from the sensitive population which combine a direct survey method, BB and an indirect survey one, RRT, and a combined estimator that uses the stratified double sampling to estimate the sensitive parameter. We compare the efficiency of our estimator with that of Mangat and Singh model.

A Car Black Box Video Data Integrity Assurance Scheme Using Cyclic Data Block Chaining (순환형 데이터 블록 체이닝을 이용한 차량용 블랙박스의 영상 데이터 무결성 보장 기법)

  • Yi, Kang;Kim, Kyung-Mi;Cho, Yong Jun
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.982-991
    • /
    • 2014
  • The integrity assurance of recorded video by car black boxes are necessary as the car black box is becoming more popular. In this paper, we propose a video data integrity assurance scheme reflecting the features of car black box. The proposed method can detect any kind of deletion, insertion, modification of frames by cyclic chaining using inter block relation. And, it provides the integrity assurance function consistently even in cases of file overwriting because of no more free space in storage, partial file data lost. And non-repudiation is supported. Experimental results with a car black box embedded system with A8 application processor show that our method has a feasible computational overhead to process full HD resolution video at 30 frames per second in a real time.

A Black-Box based Testing for GUI Bug Detection (GUI 버그 검출을 위한 블랙박스 기반의 시험)

  • Lee, Jemin;Kim, Hyungshin
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1013-1017
    • /
    • 2014
  • A variety of applications that are accessible through app markets provide useful features and functions. However, those applications can present many GUI bugs due to the deficiency of testing processes. Even though various approaches have been developed for mobile app testing, GUI bugs in applications are still difficult to be identified due to the absence of efficiency, lack of automation, and necessity of access to the source code. In this paper, we propose an automated black-box testing method for efficient GUI bug detection. Our experimental results show that the proposed method achieves better code coverage and uncovers GUI bugs when compared with existing black-box testing called Monkey.

Mulching Cultivation Method and Harvesting Implement of Pleurotus ostreatus (느타리버섯 멀칭재배 방법과 수확도구)

    • Korean Journal of Plant Resources
    • /
    • v.12 no.3
    • /
    • pp.179-185
    • /
    • 1999
  • The study which was conducted to determine the effects of the polyethylene film on the culture of Pleurotus ostreatus is summarized in the following: 1) The fresh weight of Pleurotus ostreatus cultured by the box culture method mulching with black polyethylene film was 2,237g/box and, 2,028g/box by white polyethylene film mulching, and 1,695g/box at the conventional culture which was by 24.2% and 16.4% higher than that of the conventional culture.2) The fresh weight of P. ostreatus cultured by the shelf culture method mulching with the black polyethylene film was 17.4kg/m$^2$ at the white polyethylene film culture, 14.6kg/m$^2$ at the conventional culture which was by 16.2%, 7.5% higher than that of the conventional culture. 3) The best shape appearance in terms of the diameter in P. ostreatus was 5~30mm and the intervals were 10cm respectively. 4) The black polyethylene film mulching in P. ostreatus observed in good protection against Pseudomonas spp., Trichoderma, or mushroom flies. 5) The black polyethylene film mulching method for the culture of P. ostreatus was much better than that of the shelf-culture, box-culture or the sack culture in terms of total yield and quality. 6) The length of harvesting implement of P. ostreatus was suitable for 45~120cm in order to use on the harvest of the mulching.

  • PDF

Model Type Inference Attack Using Output of Black-Box AI Model (블랙 박스 모델의 출력값을 이용한 AI 모델 종류 추론 공격)

  • An, Yoonsoo;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.817-826
    • /
    • 2022
  • AI technology is being successfully introduced in many fields, and models deployed as a service are deployed with black box environment that does not expose the model's information to protect intellectual property rights and data. In a black box environment, attackers try to steal data or parameters used during training by using model output. This paper proposes a method of inferring the type of model to directly find out the composition of layer of the target model, based on the fact that there is no attack to infer the information about the type of model from the deep learning model. With ResNet, VGGNet, AlexNet, and simple convolutional neural network models trained with MNIST datasets, we show that the types of models can be inferred using the output values in the gray box and black box environments of the each model. In addition, we inferred the type of model with approximately 83% accuracy in the black box environment if we train the big and small relationship feature that proposed in this paper together, the results show that the model type can be infrerred even in situations where only partial information is given to attackers, not raw probability vectors.