The current research work addresses the problem of automating the delivery of machine learning models from MLflow to Kubernetes infrastructure. To solve the mentioned problem, a Kubernetes operator has been developed ...
详细信息
ISBN:
(数字)9798331511241
ISBN:
(纸本)9798331511258
The current research work addresses the problem of automating the delivery of machine learning models from MLflow to Kubernetes infrastructure. To solve the mentioned problem, a Kubernetes operator has been developed to automate the delivery of machine learning models to production by integrating MLflow for model tracking and Seldon Core for model serving. The developed operator allows data scientists to deploy models while maintaining the familiar MLflow environment. The operator's automatic deployment triggers upon tagging models in MLflow, greatly simplifying engineers' tasks and minimizing the need for manual infrastructure configuration. By automating configuration tasks and optimizing deployment workflows, the solution achieves a 40-50% reduction in model time to deployment (TTD) metric compared to manual processes and decreases error rates from 15% to around 3%. The practical relevance of the work is that it simplifies collaboration between data and infrastructure teams by providing a unified deployment framework, resulting in faster, more reliable, and automated integration of machine learning models into an organisation's business processes.
Acoustic emission (AE) is one of the most relevant and cost-effective non-destructive testing methods for identifying defects in industrial objects. This paper addresses two primary tasks in defectoscopy: locating haz...
详细信息
ISBN:
(数字)9798331511241
ISBN:
(纸本)9798331511258
Acoustic emission (AE) is one of the most relevant and cost-effective non-destructive testing methods for identifying defects in industrial objects. This paper addresses two primary tasks in defectoscopy: locating hazardous AE zones and classifying signals according to the presumed defect type. Through our research, we have determined and experimentally confirmed that the most suitable machine learning method for localization is a modified DBSCAN, while Agglomerative Clustering is optimal for typification. This paper details the specific tuning and modifications applied to these methods for AE. The resulting models were successfully tested on real-world data. The accuracy of the localization results was assessed using statistical analysis and consultations with AE experts, while typification was validated probabilistically and tested on sample data.
Concepts and ideas are presented that should characterize an advanced Ada programming support environment. These concepts include: 1. conceptual simplicity, 2. tight coupling of tools, and 3. effective support of host...
详细信息
Concepts and ideas are presented that should characterize an advanced Ada programming support environment. These concepts include: 1. conceptual simplicity, 2. tight coupling of tools, and 3. effective support of host-target software development. Several important principles - including template-assisted Ada editing, command completion employing Ada as a command language, and combining the advantages of interpretation and compilation - have been demonstrated in the Arcturus system. Of particular concern is the expansion of Arcturus to support the analysis, testing, and debugging of real-time tasking programs. A strategy is proposed for applying the individual standalone techniques developed to facilitate those activities in an integrated manner, making them even more valuable as they are mutually reinforcing and complementary in vital ways. The strategy provides a disciplined approach to the problem of analyzing errors disclosed during real-time target machine testing.
The use of complex electronic systems in medical technology applications is constantly increasing. These systems are becoming increasingly important, particularly in the area of analyzing the progress of treatment, as...
详细信息
In real-life problems, information collected from multiple agents often exhibits "multipolar information," which cannot be accurately modeled by existing graph models. This paper introduces the m-polar pictu...
详细信息
For decades, speed sensors based on the spatial frequency filter method have successfully proven themselves in a wide range of applications. This makes the sensor concept particularly suitable for the area of function...
详细信息
ISBN:
(数字)9798331528010
ISBN:
(纸本)9798331528027
For decades, speed sensors based on the spatial frequency filter method have successfully proven themselves in a wide range of applications. This makes the sensor concept particularly suitable for the area of functional safety. New filter variants extend the previous measuring range to very low speeds up to standstill detection. By combining the sensor with a safety system on chip for recording and analysing measured values, a functionally safe measuring chain can be established. In order to demonstrate the variability and performance of the new filters, an optical application-specific integrated circuit was designed, which forms the basis for further extensive tests. The core components are a large number of freely configurable photodiode channels, which were realised via a redundant structure, as well as two different transimpedance amplifier concepts. In the further course of the project, the ASIC will be analysed with regard to its desired performance parameters and its robustness.
We analyse two translations from the synchronous into the asynchronous π-calculus, both without choice, that are often quoted as standard examples of valid encodings, showing that the asynchronous π-calculus is just...
详细信息
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ...
详细信息
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods also exist,such as peer-to-peer networks and distributed hash *** technology,which is decentralized,anonymous,non-tamperable and anti-attack,can be applied to covert communication to solve the problems of traditional methods and improve the quality of communication.
Although precedences are often used to resolve ambiguities in programming language descriptions, there has been no parser-independent definition of languages which are generated by grammars with precedence rules. This...
Although precedences are often used to resolve ambiguities in programming language descriptions, there has been no parser-independent definition of languages which are generated by grammars with precedence rules. This paper gives such a definition for a subclass of context-free grammars. The definition is shown to be equivalent to the implicit definition an operator precedence parser gives. A problem with a language containing infix, prefix and postfix operators of different precedences is that the well-known algorithm, which transforms a grammar with infix operator precedences to an ordinary unambiguous context-free grammar, does not work. This paper gives an algorithm that works also for prefix and postfix operators, and the correctness of it is proved. An application of the algorithm is also presented.
This paper describes an experimental message-driven programming system for fine-grain multicomputers. The initial target architecture is the J-machine designed at MIT. This machine combines a unique collection of arch...
详细信息
This paper describes an experimental message-driven programming system for fine-grain multicomputers. The initial target architecture is the J-machine designed at MIT. This machine combines a unique collection of architectural features that include fine-grain processes, on-chip associative memory;and hardware support for process synchronization. The programming system uses these mechanisms via a simple message-driven process model that blurs the distinction between processes and messages: messages correspond to processes that are executed elsewhere in the network. This model allows code and data to be distributed across the computers in the machine, and is supported at every stage of the program development cycle. The prototype system we have developed includes a basic set of programming tools to support the model;these include a compiler, linker, archiver, loader and microkernel. Although the concepts are language independent, our prototype system is based on GNU-C.
暂无评论