This paper provides an experience report on the use of aspect-oriented technology as a means to modularize the implementation of business rules in an object-oriented, large scale case study. The goal of this refactori...
详细信息
This paper provides an experience report on the use of aspect-oriented technology as a means to modularize the implementation of business rules in an object-oriented, large scale case study. The goal of this refactoring of the system was to provide a proof-of-concept implementation of how such an aspect-oriented solution can improve the modularity and the extensibility of the business rule implementation. This paper focusses on the approach taken in refactoring the system and the difficulties of integrating the aspect solution into the build process.
Security in systems and networks has always been a major issue for IT administrators. When it comes to medical applications, this concern is much more important due to the sensitivity of data and the risks that may be...
详细信息
Software engineering is a growing part of computer science. Software engineering attempts to put measurements and metrics into the area of software programming. One of these metrics, Halstead's software science [1...
详细信息
In this work, we tackle the problem of Armenian named entity recognition, providing silverand gold-standard datasets as well as establishing baseline results on popular models. We present a 163000-token named entity c...
详细信息
ISBN:
(纸本)9781728112763;9781728112756
In this work, we tackle the problem of Armenian named entity recognition, providing silverand gold-standard datasets as well as establishing baseline results on popular models. We present a 163000-token named entity corpus automatically generated and annotated from Wikipedia, and another 53400token corpus of news sentences with manual annotation of people, organization and location named entities. The corpora were used to train and evaluate several popular named entity recognition models. Alongside the datasets, we release 50-, 100-, 200-, 300dimensional GloVe word embeddings trained on a collection of Armenian texts from Wikipedia, news, blogs, and encyclopedia.
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or preven...
详细信息
The development of wind turbine towards to larger-scale and floating type, leading to the significant impact on the aerodynamic performance and fatigue load of the wind turbine induced by the complex atmospheric inflo...
详细信息
Wake redirection via active yaw control is a promising strategy to improve the whole wind farm performance. To successfully apply such an operational control in the real-world engineering, it is necessary to have a pr...
详细信息
Microcode enables programmability of (micro) architectural structures to enhance functionality and to apply patches to an existing design. As more features get added to a CPU core, the area and power costs associated ...
详细信息
Microcode enables programmability of (micro) architectural structures to enhance functionality and to apply patches to an existing design. As more features get added to a CPU core, the area and power costs associated with microcode increase. A recent Intel internal design targeted at low power and small footprint has estimated the costs of the microcode ROM to approach 20% of the total die area (and associated power consumption). Therefore, it is desirable to apply compression techniques to microcode. Microcode poses unique challenges for compression due to the long instruction format, the hand-coded nature of the programs and the stringent performance requirements that require fast decompression. This paper describes techniques for microcode compression that achieve .significant area and power savings, while presenting a streamlined architecture that enables high throughput within the constraints of a high performance CPU. The paper presents results for microcode compression on several commercial CPU designs which demonstrates compression ratios ranging from 50% to 62%.
A numerical and experimental study has been conducted to explore the influence of vertical wall on the wake of the non/ducted propeller. The numerical simulation is achieved using a structured and transient sliding me...
详细信息
A numerical and experimental study has been conducted to explore the influence of vertical wall on the wake of the non/ducted propeller. The numerical simulation is achieved using a structured and transient sliding mesh approach. The control equations are closed by the Delayed Detached Eddy Simulation (DDES), and the computational results are compared with the available experimental data. By dividing the ducted propeller flow wake vortex shape into different behavior regions, the temporal vortex evolution near the wake of the propellers under the influence of different vertical walls are emphatically analysed. The results show that the jet flow wake reaches the wall, forming a conical low-speed area at the centre of the wall. The fluid circulates from the outer side to the inner side of the cone, forming a vortex whose size first increases and then decreases with the distance between the propellers and the wall. In addition, the change of propellers wake velocity profile is given. The wake velocity of propeller and ducted propeller decreases exponentially and linearly along the flow direction, respectively.
暂无评论