Abstract
In this and the following chapters, the ‘modelling’ part of the model making is assumed to have been concluded, and interest is focussed on the ‘identification’ part. This means that 𝒳, ℳ, and 𝔤 are given (and should satisfy the conditions on proper experimentation and modelling), and the computer takes over from there. The purpose of the following is therefore to review some principles that can be used for designing algorithms for different tasks in identification, in particular validation, falsification, and structure identification.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin, Heidelberg
About this chapter
Cite this chapter
Bohlin, T. (1991). Validation techniques. In: Interactive System Identification: Prospects and Pitfalls. Communications and Control Engineering Series. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-48618-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-48618-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-48620-3
Online ISBN: 978-3-642-48618-0
eBook Packages: Springer Book Archive