Metaheuristics are optimization techniques that can be adapted to different problem domains. They are considered general algorithms that have been successful in solving various problems. However, the increase in redun...
详细信息
This work introduces the software tool Comprehensive Particle Identification (CPID). It is a modular approach to combined PID for future Higgs factories and implemented in the Key4hep framework. Its structure is expla...
详细信息
Hybrid agile is one of the recent softwareengineering process model used by a softwareengineering team in a software development project. A hybrid agile model is used by softwareengineering team to meet the require...
详细信息
The importance of roads in the life of almost every modern person is quite huge. One of the key characteristics of the road surface is its quality. To assess the quality of roads, there are many systems, most of which...
详细信息
Emerging cloud-native technologies, such as container-runtime and container-orchestrator offer unprecedented agility in developing and running applications, especially when combined with microservice-style architectur...
详细信息
Emerging cloud-native technologies, such as container-runtime and container-orchestrator offer unprecedented agility in developing and running applications, especially when combined with microservice-style architecture. Several existing 5G-Telecom network products such as element Management System (e-MS), 5G-Core and 5G-Access are being redesigned to fit the microservice paradigm. Cloud environment allows enterprises to scale their application on-demand with minimum cost;however, it is often difficult to use containers without sacrificing many benefits that cloud-native technology offers. The e-MS is characterized to orchestrate 5G network elements (5GNEs) deployed nationwide, and systematically store terabytes of stateful data per second. Containers are characterized to have an ephemeral state, hence 'stateful-ness' aspect of e-MS makes orchestration complex. In this paper, different challenges around stateful storage selection, content placement and content retrieval operations within e-MS microservices are described. To overcome these challenges, to this end, we propose CASE - A Context-Aware Storage placement and retrieval Ecosystem - which enables context-based operations to be intrinsically supported by the underlying e-MS application. Our approach has been designed to maintain the location-independent philosophy of cloud-native by associating context information directly to 5GNE rather than fixed storage entities, thereby ensuring scalability. Through simulation with real data-set obtained from one of the world's largest terrestrial telecom operator, we show that based on such location-independent context information, CASE with e-MS can facilitate high performance despite dynamic 5GNE count agility, stateless e-MS replication and stateful storage scaling, while not posing a significant signaling burden on the cloud environment.
Dual active bridge (DAB) converter has been widely used in distributed power supply, new energy vehicles, energy storage systems, etc. Their modulation strategy is an important research direction. At present, the rese...
详细信息
Dual active bridge (DAB) converter has been widely used in distributed power supply, new energy vehicles, energy storage systems, etc. Their modulation strategy is an important research direction. At present, the research on modulation strategy is basically symmetric phase shift, but it is not enough to generalize modulation strategy comprehensively. In this article, an asymmetric phase-shifting (APS) strategy is proposed to control the power flow by simultaneously adjusting the asymmetric duty cycle and the phase-shifting angle. With this modulation scheme, the current stress and cyclic power loss can be reduced by adjusting the modulation ratio of the inductor current waveform. As a result, the light-load efficiency can be improved compared with the conventional symmetric modulation scheme. The power characteristic, current stress, soft switching characteristic, and backflow power of this modulation strategy are analyzed and calculated comprehensively. Then, based on this asymmetric strategy, a hybrid modulation strategy that can achieve ZVS over the entire power range with low current stress, low return power, and minimum rms current at light load is proposed. Finally, a 100-50 V/300 W prototype is built to verify the analysis.
Safety procedures are the fundamental criteria to ensure the safety of personnel and equipment, and their proficiency and the rigor of the application are crucial. According to the actual existing training technology ...
详细信息
With growing numbers of cores, the memory subsystem of manycore architectures increases in complexity. Many modern multicores are designed in a hierarchical fashion, with multiple clusters of processing elements. Howe...
详细信息
With growing numbers of cores, the memory subsystem of manycore architectures increases in complexity. Many modern multicores are designed in a hierarchical fashion, with multiple clusters of processing elements. However, most algorithms for design-space exploration (DSE) of resource allocation in multicores do not consider these complex topologies, which results in poor scaling, or worse, nonfunctioning algorithms. In this article, we present mpsym, a C++ library designed to alleviate this problem in an algorithm-agnostic fashion. Using methods from the computational group theory, we present domain-specific algorithms to improve DSE in hierarchical architecture topologies. We evaluate mpsym on multiple DSE algorithms from the literature. Without modifying the algorithm, our methods improve the execution time by a factor up to 8.6 x on the embedded system synthesis benchmark suite benchmark suite for complex, clustered architecture topologies. Similarly, by pruning the design space, our methods consistently improve the result of the exploration. In particular, the results from a simulated annealing heuristic on the Kalray MPPA3 Coolidge topology are over 30x better on average, while requiring less time to explore.
The article explores the potential for exchanging information between software tools using the KNIME program. It provides recommendations on utilizing data preprocessing models, methods, and algorithms for data sharin...
详细信息
Recent studies show that requirements analysts struggle with interpreting the LGPD to obtain privacy requirements. In this paper, we propose a method to transform LGPD's legal requirements into a software requirem...
详细信息
暂无评论