Many applications need to meet diverse requirements of a large-scale distributed user *** challenges the current requirements engineering ***-based requirements engineering was proposed as an umbrella term for dealing...
详细信息
Many applications need to meet diverse requirements of a large-scale distributed user *** challenges the current requirements engineering ***-based requirements engineering was proposed as an umbrella term for dealing with the requirements development in the context of the large-scale user ***,there are still many *** others,a key issue is how to merge these requirements to produce the synthesized requirements description when a set of requirements descriptions from different participants are *** techniques are needed for supporting the requirements *** are widely used in industry to represent *** paper chooses the activity diagrams and proposes a novel approach for the activity diagram synthesis which adopts the genetic algorithm to repeatedly modify a population of individual solutions toward an optimal *** a result,it can automatically generate a resulting diagram which combines the commonalities as many as possible while leveraging the variabilities of a set of input *** approach is featured by:1)the labelled graph proposed as the representation of the candidate solutions during the iterative evolution;2)the generalized entropy proposed and defined as the measurement of the solutions;3)the genetic algorithm designed for sorting out the high-quality *** cases of different scales are used to evaluate the effectiveness of the *** experimental results show that not only the approach gets high precision and recall but also the resulting diagram satisfies the properties of minimization and information preservation and can support the requirements traceability.
Load balancing methods in networks aim to distribute traffic evenly between nodes to prevent overloading of individual routes and improve overall network performance. For instance, machine learning-based routing allow...
详细信息
ISBN:
(数字)9798331511241
ISBN:
(纸本)9798331511258
Load balancing methods in networks aim to distribute traffic evenly between nodes to prevent overloading of individual routes and improve overall network performance. For instance, machine learning-based routing allows you to analyze network behavior and predict optimal routes for data transmission, which is especially effective in complex dynamic networks. Another option is Pareto Optimization, which is used to consider multiple criteria, such as minimizing latency and energy consumption, simultaneously. The reliability of networks, especially wireless ones, is becoming an issue that requires solutions that can adapt to constantly changing conditions, creating stable communication systems. The article describes and tests a simulation model of a wireless network in which requests are sent from sources through towers to two different recipients simultaneously along several paths. The use of intermediate switching nodes allows using the AOMDV protocol to build different data transmission routes. The simulation results for various modifications of the model allow us to evaluate the advantages of using multipath routing.
The increasing adoption of Docker containers in modern software development requires effective monitoring and optimization to ensure high performance and efficient resource utilization. This paper provides an overview...
详细信息
ISBN:
(数字)9798331515799
ISBN:
(纸本)9798331515805
The increasing adoption of Docker containers in modern software development requires effective monitoring and optimization to ensure high performance and efficient resource utilization. This paper provides an overview of the various tools and technologies that leverage artificial intelligence (AI) to automate the monitoring and optimization of Docker containers. The authors explore the capabilities of AI-driven tools such as machine learning-based anomaly detection, predictive analytics, and automated resource management. By examining these tools, the authors highlight their benefits in enhancing container performance, scalability, and availability. Through comparative analysis, the strengths and limitations of each tool and their impact on container management are discussed. The findings underscore the potential of AI to revolutionize container monitoring and optimization, leading to more efficient and robust IT infrastructure.
The research is devoted to the problem of project- specific steep learning curve when designing complex hardware microarchitectures. To address this issue, it is proposed to use custom synthesizable kernels that provi...
详细信息
The Sequence-to-Sequence (Seq2Seq) of neural network (NN) method based on recurrent neural network (RNN) and attention mechanism plays an important role in information extraction and automatic summarization. However, ...
详细信息
The article considers the problem of designing a synthesis method for Coarse-Grained Reconfigurable Array (CGRA) architectures. The author observes several general problems of such architecture and demonstrates how th...
详细信息
Load balancing methods in networks aim to distribute traffic evenly between nodes to prevent overloading of individual routes and improve overall network performance. For instance, machine learning-based routing allow...
详细信息
Automatic Speech Recognition (ASR) systems are known to perform poorly in recognition of atypical speech, which certainly includes emotional speech. The labor-intensive nature of developing comprehensive speech databa...
详细信息
ISBN:
(数字)9798350391060
ISBN:
(纸本)9798350391077
Automatic Speech Recognition (ASR) systems are known to perform poorly in recognition of atypical speech, which certainly includes emotional speech. The labor-intensive nature of developing comprehensive speech databases for training purposes has led to the widespread adoption of synthetic speech data generation, utilizing existing natural speech, in numerous research studies. This paper examines the impact of standard data augmentation techniques, including pitch shifting, time stretching and volume adjustment on the accuracy of isolated-word recognizer of emotional speech. The experiments carried out indicate a significant increase in accuracy achieved through a single augmentation based on pitch-shifting for all emotional states.
Many universities today offer special courses or entire master programs for cyber-physical systems (CPS) developers training. A multi-aspect design route of the CPS creation is considered as the methodological vector,...
详细信息
Security plays an important role in many sectors and industries. Nowadays, scams and illegal movements are spreading around the world. Copyright protection for PDF documentation is one of the focus in digital watermar...
详细信息
暂无评论