We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy ap...
详细信息
To overcome the limitations of examining blood cells under a microscope, several investigations have been carried out using artificial intelligence techniques. These investigations aim to automate the processes of det...
详细信息
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability ***-adaptive systems(SASs)are ca...
详细信息
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability ***-adaptive systems(SASs)are capable of reconfiguring themselves during the run time to satisfy the scenarios of the requisite ***,reconfiguration of SASs corresponding to each adaptation of the system requires significant computational time and *** process of configuration reuse can be a better alternative to some contexts to reduce computational time,effort and ***,systems’complexity can be reduced while the development process of systems by reusing elements or *** are considered one of the new ways of reuse process that are able to introduce new opportunities for the reuse process beyond the conventional system *** current FM-based modelling techniques represent,manage,and reuse elementary features to model SASs concepts,modeling and reusing configurations have not yet been *** this context,this study presents an extension to FMs by introducing and managing configuration features and their reuse *** results demonstrate that reusing configuration features reduces the effort and time required by a reconfiguration process during the run time to meet the required scenario according to the current context.
Online misinformation poses a significant challenge due to its rapid spread and limited supervision. To address this issue, automated rumour detection techniques are essential for countering the negative impact of fal...
详细信息
The metaverse is a developing field that crosses several areas of multimedia research. In this paper, we introduce the 256-MetaverseRecords dataset, a novel and extensive collection of annotated screen recordings in t...
详细信息
Hardware Verification of Deep Learning Accelerators (DLAs) has become critically important for testing the reliability and trustworthiness of Learning Enabled Autonomous Systems (LEAS). In this paper, we introduce a s...
详细信息
Local rough set models are efficient rough data analysis methods for weakly labeled data in the rough set field. However, the existing local models do not distinguish the importance of different attributes to decision...
详细信息
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems requir...
详细信息
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems require the drivers to search for an empty parking space with no guaran-tee of finding any wasting time,resources,and causing unnecessary *** address these issues,this paper proposes a digitized parking system with a proof-of-concept implementation that combines multiple technological concepts into one solution with the advantages of using IoT for real-time tracking of park-ing *** authentication and automated payments are handled using a quick response(QR)code on entry and *** experiments were done on real data collected for six different locations in Cairo via a live popular times *** machine learning models were investigated in order to estimate the occu-pancy rate of certain ***,a clear analysis of the differences in per-formance is illustrated with the final model deployed being *** has achieved the most efficient results with a R^(2) score of 85.7%.
Recently, Internet of Underwater Things (IoUT) is a new technology used by researchers to explore underwater phenomena. Information is collected by underwater sensors and sent to the Ocean of Things (OoT) network, whi...
详细信息
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha...
详细信息
暂无评论