This study deals with the development of a new geoprocessing tool useful for wet gap crossing during military operations. At present, there is no software in the Czech Armed Forces that an engineer staff officer can c...
详细信息
ISBN:
(纸本)9783031713965;9783031713972
This study deals with the development of a new geoprocessing tool useful for wet gap crossing during military operations. At present, there is no software in the Czech Armed Forces that an engineer staff officer can comprehensively use to analyse wet gaps. The use of this geoprocessing tool will allow a faster and more efficient task analysis in the planning process. Members of the staffs of individual battalions of the 7th Mechanized Brigade, the 151st and 153rd Engineer Battalions and students of the University of Defence experimentally verified the usability of the geoprocessing tool. The advantage of own development is the possibility of updating the geoprocessing tool and admin options. The proposed geoprocessing tool can also be used as an interoperable element in the planning process of international task forces. The issue of wet gap crossing also confirms its importance from the conflict in Ukraine (e.g. of crossing the North Donetsk, Dnieper River) and also by the acquisition processes for newly acquired combat vehicles and support assets (military bridge vehicles, pontoon bridge set).
software maintenance and support efforts consume a significant amount of the software project budget to operate the software system in its expected quality. Manually estimating the total hours required for this phase ...
详细信息
With the continuous development and innovation of computer hardware and software, computer communication networks have become an important part of people's daily life and work. Especially all walks of life are con...
详细信息
The proceedings contain 20 papers. The special focus in this conference is on Grid, Cloud, and Cluster Computing. The topics include: Scientific Workflow Provenance Management: System Requirements and a Refe...
ISBN:
(纸本)9783031858833
The proceedings contain 20 papers. The special focus in this conference is on Grid, Cloud, and Cluster Computing. The topics include: Scientific Workflow Provenance Management: System Requirements and a Reference Architecture;Enhancing Data Security with Decentralized Cloud Storage: An IPFS Approach;learning Robust Observable to Address Noise in Quantum Machine Learning;evaluating Cost-Effective Reconfigurable Hardware for Quantum Simulation;an Efficient Quantum Solver for Multidimensional Partial Differential Equations;explaining the Design of the Quantum Fourier Transform;Optimizing Depth of Quantum Circuit for Generating GHZ States;a Comparative Analysis of Hybrid-Quantum Classical Neural Networks;NRQNN: The Role of Observable Selection in Noise-Resilient Quantum Neural Networks;studying the Impact of Quantum-Specific Hyperparameters on Hybrid Quantum-Classical Neural Networks;Eclipse Qrisp QAOA: Description and Preliminary Comparison with Qiskit Counterparts;federal Cloud Computing Adoption Case Study: A Retrospective Analysis as a Precursor to Optimized Quantum Adoption Methodologies;integrating Secure Quantum Digital Signature into Quantum Communications;methodology to Accelerate Federal Agency Adoption of Quantum Technologies;understanding Public Policy Effects on Alcohol-Related Behaviors and Outcomes Using System Dynamics;Performance Investigation of Small UAV Attitude Control Based on Optimized Nonlinear Dynamic Inversion;Prediction of 1st Year Registration Renewal of General-Use JP Domain Names with the Use of Machine Learning;data Clustering and Visualization with Recursive Max k-Cut Algorithm.
Airborne display software WCET assessment relies on actual scenario and traditional static analysis and dynamic test methods can not reflect actual scenario requirements. To achieve WCET value closing to actual scenar...
详细信息
software Process Improvement (SPI) aims to achieve quality in software products for software organizations, as it helps to manage and improve the development processes. The success of software products highly depends ...
详细信息
Fear, nervousness, and social phobia all contribute to anxiety episodes reaching their peak in seconds. Using data collected from patient questionnaires, this study seeks to anticipate and diagnose anxiety disorders e...
详细信息
Genetic algorithm is an optimization method based on biological evolution and genetics, which has been widely used in computer mathematical modeling. This paper studies how to improve genetic algorithm to improve its ...
详细信息
The paper discusses the integration and use of generative artificial intelligence technologies in education. Generative AI, such as OpenAI, in particular the GPT model, has fundamentally changed the way humans interac...
详细信息
While third-party libraries (TPLs) are extensively reused to enhance productivity during software development, they can also introduce potential security risks such as vulnerability propagation. software composition a...
详细信息
暂无评论