Recognize, assess, reduce, and manage technical debtJim Bethancourt
Presents strategies for identifying, assessing, reducing, and managing technical debt at a structural level. Provides both technical and strategic business solutions.
This document summarizes and evaluates three building performance analysis software tools - Ecotect, Green Building Studio, and Virtual Environment - for their suitability in BIM-based sustainability analysis. It presents the benefits of using BIM to perform complex building performance analyses early in the design process to optimize sustainable building design. The objectives are to explore BIM's suitability for sustainability analysis and develop a framework for how construction companies can use BIM to evaluate a building's LEED rating. The scope is limited to commercial and healthcare projects. Key findings from literature review and industry interviews are discussed.
The document discusses architectural analysis, which involves discovering important system properties using architectural models. It covers the goals of analysis including completeness, consistency, compatibility, and correctness. Additionally, it examines the scope of analysis, level of formality, type of analysis, and stakeholders involved in the analysis process.
Presentation at the BIM (BIM In Motion) Workshop organized by Bouygues Construction, at their Challenger site outside Paris. The BIM Workshop took place on Wednesday October the 23rd 2019.
8 th International Conference on Cybernetics & Informatics (CYBI 2021)ijcsity
8
th International Conference on Cybernetics & Informatics (CYBI 2021) is a forum for
presenting new advances and research results in the fields of information, control and system
theory, understands the design and function of any system and the relationship among these
applications. The conference will bring together leading researchers, engineers and scientists
in the domain of interest from around the world. This conference aims to provide a platform
for exchanging ideas in new emerging trends that needs more focus and exposure and will
attempt to publish proposals that strengthen our goals.
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Universita della Calabria,
Doctoral Defence in ICT (Università della Calabria, Italy). Ph.D. candidate Claudio Savaglio. Thesis title: A Methodology for the Development of Autonomic and Cognitive Internet of Things Ecosystems.
The document discusses object-oriented design and its role in software development. It describes how design builds upon analysis to provide implementation details. Key aspects of object-oriented design include defining a multilayered architecture, specifying subsystems and components, describing classes and objects, and defining communication mechanisms. The input to design comes from artifacts created in analysis like use cases and class models. The output of design serves as a blueprint to guide construction.
This document discusses the landscape of patterns for Internet of Things (IoT) and machine learning (ML). It analyzes 33 papers on IoT patterns to classify them by abstraction level, domain specificity, and quality characteristics addressed. It also identifies common issues in ML system development by analyzing 9 papers and categorizes ML practices. Finally, it summarizes the publication trends of ML architecture and design patterns based on 10 papers and 28 gray documents.
This document discusses defect and architectural metrics for assessing the quality of C language software. It presents research goals to determine the distribution of dependency and social network metrics in projects, their relationship to defects, and how metrics and defects evolve over time. Methodologies for generating dependency graphs and calculating metrics are described. Results show correlations between fixing commits and certain metrics, and that metrics change at points of refactoring or major bugs. The research aims to help localize architectural problems through metrics-based analysis.
The document discusses concepts related to software engineering and modeling object-oriented systems. It covers perspectives on software quality and communication problems. It provides an overview of object-oriented analysis and design techniques using the Unified Modeling Language (UML). The document discusses modeling concepts like objects, classes, relationships, associations, and aggregation. It also discusses functional modeling using data flow diagrams and process specification. State-based modeling techniques like statecharts and state diagrams are also introduced.
This document summarizes an open discussion session on design principles for the future internet architecture. Participants were given cards to write their answers to questions about their vision of the future internet and their opinions on the proposed design principles. The questions addressed what the future internet is, whether it should offer common solutions for identity across layers and applications, if it should guarantee user privacy, and if internet neutrality is only a political issue or if technical choices are needed. Participants' responses would then be collected and discussed with invited experts.
The document discusses software architecture, where it comes from, and what it is. Architectures are influenced by system stakeholders and their requirements, the developing organization, and the architects' experience. An architecture defines elements, their relationships, and properties. It is important because it represents early design decisions, dictates implementation, organizational structure, and quality attributes. Architectural patterns, reference models, and reference architectures capture common architectural elements but are not full architectures themselves.
IT 510 Final Project Guidelines and Rubric Overview .docxvrickens
IT 510 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of a System Proposal Document.
In any modern enterprise, it is crucial that all of the different stakeholders, users, inputs, and outputs that relate to the business’s IT systems coalesce in a logical
and cohesive way for the systems to be effective. As a member of an IT team, your overarching goal is to ensure that the IT systems ultimately do what the
business needs them to do. In this course, you have learned about the key principles and practices underlying the analysis, design, implementation, and
management of IT systems. In this final project, you will apply this knowledge by creating a systems proposal document.
The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Module Two, Module Four, Module Six, and Module Eight. The final submission will occur in Module Nine.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Assess the relationship of systems analysis, design, implementation, and development processes as they relate to the management of information
technology systems
Communicate the paradigms, processes, and activities of systems development to diverse audiences
Apply structure and object oriented analysis modeling techniques to analyze, design, and manage information technology systems
Construct written and visual representations of the analysis, design, implementation, and management of information technology systems based on the
systems development life cycle
Prompt
You will select your own case study and will apply the content provided, describing the business process to complete the final project. Alternate sources for case
studies include the case studies found in the textbook with the exception of the Personal Trainer Case. You can additionally search the internet for business case
ideas.
You will complete an analysis of an existing information technology system and make recommendations for updates to meet business goals based on your chosen
case study. Your final submission will include an introduction, systems requirements, systems design specifications, and an implementation plan. All of the
components listed below should be submitted as a single, organized systems proposal document and include screenshots of all relevant diagrams, charts, and
tables.
I. Introduction: Provide an overview of your selected case. Be sure to provide appropriate citations and reference to the case study you have selected.
a) Background: Establish a context for understanding your systems proposal. Specifically, explain any essential paradigms, processes, and activities
of the existing information technology systems.
b) Problem Statement: What is the problem that needs to be solved? Wh ...
The document provides an overview of software architecture in an agile world. It discusses the need for speed in software development driven by factors like scaling, heterogeneous systems, and reduced infrastructure costs. It then covers foundations of software architecture including definitions, skills, deliverables, and examples of great reference architectures. The remainder outlines an agile approach to software architecture, including preparing an architecture vision, early decisions, decomposition, identifying significant elements, a risk-based roadmap, measuring progress, and communicating. The summary emphasizes that architects now play a continuous role on development teams.
Knowledge mechanisms in IEEE 1471/ISO 42010Rich Hilliard
Here are the key points about architectural knowledge:
- It distinguishes knowledge (what architects know) from practice (what architects do). Knowledge is a precondition for good practice.
- It involves both competence (knowing concepts, principles, patterns) and performance (ability to apply knowledge successfully).
- Architectural knowledge encompasses things like architectural styles, patterns, principles, quality attributes, domain models, heuristics, processes, methods, tools, documentation standards, and rationale for design decisions. It's the body of knowledge architects draw on to perform their work.
So in summary, architectural knowledge refers to the concepts, facts, and expertise that architects possess and apply in their work of conceiving, designing, documenting,
7th International Conference on Software Engineering (SEC 2021) ijfcstjournal
The 7th International Conference on Software Engineering (SEC 2021) will be held March 27-28, 2021 in Sydney, Australia. The conference aims to bring together researchers and practitioners to share knowledge and results in software engineering theory, methodology, and applications. Authors are invited to submit papers by January 16, 2021 on topics related to software engineering, languages and formal methods, software projects, quality management, and more. Selected papers will be published in the conference proceedings and may also be published in related journals.
7 th International Conference on Software Engineering (SEC 2021)ijcsity
7
th International Conference on Software Engineering (SEC 2021) will provide an excellent
international forum for sharing knowledge and results in theory, methodology and applications of Software
Engineering and Techniques. The goal of this Conference is to bring together researchers and practitioners
from academia and industry to focus on understanding Modern software engineering concepts and
establishing new collaborations in these areas.
Authors are solicited to contribute to the Conference by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the areas of
software engineering & Techniques
EMMM: A Unified Meta-Model for Tracking Machine Learning ExperimentsSEAA 2022
The document proposes a unified meta-model (EMMM) to track machine learning experiments across different tools. It analyzed existing ML experiment management tools to extract common asset types and relationships. The meta-model was designed in three phases and validated with example experiments. EMMM is formalized using Ecore and can enable interoperability between tools by providing a common representation. The meta-model could also serve as a blueprint for developing new ML experiment tools and connecting ML asset management to model-driven engineering practices. Future work includes extending EMMM's configurability and unifying more proposed academic tools.
This document discusses object-oriented design and architectural design. It begins by outlining topics related to determining how to build a system using object-oriented design, including design goals, architectural designs, class modeling, design patterns, state chart modeling, collaboration modeling, and more. It then discusses what software design is, including that it is a problem-solving process to implement functional requirements while meeting non-functional constraints. Design involves making decisions to resolve issues while choosing from design alternatives. The document also discusses top-down and bottom-up design approaches, software design principles, and the object-oriented design process.
Similar to NGIoT Sustainability Workshop 2023_ Hans-Martin Heyn presentation (20)
IoT Tech Expo 2023_Micha vor dem Berge presentationVEDLIoT Project
VEDLIoT Next Generation AIoT Applications. Micha vor dem Berge. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
Next generation accelerated AIoT systems and applications. Pedro Trancoso. Special Session on EU Projects, co-located with Computing Frontiers 2023, Bologna, Italy, May 2023
The document outlines an agenda for a presentation on the VEDLIoT project. The agenda includes an introduction to VEDLIoT by Pedro Trancoso, a presentation on VEDLIoT Hardware Platforms by Kevin Mika, and a discussion of Performance Evaluation and Benchmarking in VEDLIoT by Mario Pormann. The VEDLIoT project aims to develop very efficient deep learning techniques for IoT applications through the use of heterogeneous hardware platforms and accelerators.
IoT Week 2022-NGIoT session_Micha vor dem Berge presentationVEDLIoT Project
This document discusses optimizing a smart home system using edge computing and machine learning. It describes using embedded accelerators like the Nvidia Jetson AGX and Xavier to distribute neural networks and machine learning models to devices around the home. These include a smart mirror, kitchen, door, and other devices. The goal is to optimize the models to increase energy efficiency and distribute the workloads across the edge devices. One focus is developing a smart mirror prototype that can recognize faces, objects and gestures using embedded accelerators like the t.RECS and u.RECS boards to analyze camera input and interact with users through voice and a virtual display.
Next Generation IoT Architectures_Hans SalomonssonVEDLIoT Project
VEDLIoT Toolchain for Efficient Deep Learning on heterogeneous hardware, Hans Salomonsson, EU-IoT Training Workshops Series – "Next Generation IoT Architectures”, November 2021
The document discusses hardware platforms and accelerators for VEDLIoT. It describes the VEDLIoT Hardware Platform as a heterogeneous, modular, and scalable microserver system that supports the IoT spectrum from embedded to edge to cloud. It then provides details on several platforms: the RECS|Box platform which uses Computer-on-Module standards to achieve flexibility and performance; the t.RECS platform optimized for local edge applications; and the uRECS embedded device platform that supports machine learning acceleration and communication interfaces. Diagrams and specifications are given for the architectures of these platforms.
VEDLIoT Cognitive IoT Hardware Platform. René Griessl. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentationVEDLIoT Project
VEDLIoT – Accelerated AIoT. Kevin Mika and Piotr Zierhoffer. CPS&IoT’2023 Summer School on Cyber-Physical Systems and Internet-of-Things, Budva, Montenegro, June 2023
VEDLIOT – Accelerated AIoT. Jens Hagemeyer. 2nd Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2023, Toulouse, France, January 2023
VEDLIoT – A heterogeneous hardware platform for next-gen AIoT applications, Jens Hagemeyer, EU-IoT Training Session on “Machine Learning at the Edge and the FarEdge”, IoT Week (online event), August 2021
Security for VEDLIoT Components, from Cloud through Edge to IoT. Marcelo Pasin. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
Security and Robustness for VEDLIoT Components, from Cloud through Edge. Marcelo Pasin. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
Reconfigurable ML Accelerators in VEDLIoT. Marco Tassemeier. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...VEDLIoT Project
IoT - Accelerated Deep Learning for Cognitive Edge Computing, Jens Hagemeyer, EU-IoT Training Workshops Series – “AIoT and Edge Machine Learning”, May 2021
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
just download it to see!
CULEX MOSQUITOES, SYSTEMATIC CLASSIFICATION, MORPHOLOGY, LIFE CYCLE , CLINICA...DhakeshworShougrakpa
showing Culex mosquitoes' systematic classification, a completed life cycle i.e. egg, larva, pupa and adult mosquitoes also known as imago, also this slide showed the morphology of culex mosquitoes including head, thorax, abdomen, wing, egg larval stage, resting position,etc. by comparing with anopheles' mosquitoes. it's also showed the transmission of wuchereria bancrofti transmitted by vector Culex quinquefasciatus. Host: W. bancrofti completes its life cycle in
two hosts.
1. Definitive host: Man
2. Intermediate host: Mosquito named
Culex quinquefasciatus is the principle
vector worldwide. Rarely Anopheles
(rural Africa) or Aedes (Pacific Island)
can serve as a vector.
Infective form: Third stage filariform larvae
are the infective form found in the proboscis
of the mosquito.
Mode of transmission: L3
filariform larvae get
deposited in skin by the insect bite. Residents living in the endemic areas are exposed to
about 50–300 L3
larvae every year.Human cycle
z Develop into adults: Larvae penetrate
the skin, enter into lymphatic vessels and
migrate to the local lymph nodes where they
molt twice to develop into adult worms in
few months (4–6 weeks for B. malayi)
z Adults lay L1
larvae (microfilariae): Adult
worms reside in the afferent lymphatics or
cortical sinuses of the lymph nodes where
they mate and start laying the first stage
larvae (microfilariae). Male worms die after
mating where as the female worms live for
5–10 years. A gravid female can discharge
50,000 microfilariae/day
z Prepatent period: It is the time period
between the infection (entry of L3
larvae)
and diagnosis (detection of microfilariae
in blood). This is variable ranging from 80
days to 150 days
Mosquito cycle
z Transmission: When the mosquito bites
an infected man, the microfilariae are
ingested. Culex bites in night where as Aedes
bites in daytime
z Exsheathing: Microfilariae come out of the
sheath within 1–2 hours of ingestion
z Migration to thoracic muscle: L1
larvae
penetrate the stomach wall and migrate to
thoracic muscle in 6–12 hours where they
become sausage shaped (short and thick)
z Develop to infective L3
larvae: L1
larvae
molt twice to develop L2
(long and thick
form) followed by L3
(long and thin form).
The highly active L3
larvae migrate to the
labella (distal part of proboscis) of the
mosquito and serve as the infective stage
to man
z Extrinsic incubation period: Under
optimum conditions, the mosquito cycle
takes around 10–14 days
Clinical symptoms:
The clinical symptoms and signs are mainly determined by the duration of the infection. The
adult worms, which live in the lymphatic vessels, can cause severe inflammation of the
lymphatic system and acute recurrent fever. Secondary bacterial infections are a major factor in
the progression towards lymphoedema and elephantiasis, the characteristic swelling of the limbs,
genitalia and breasts.
treatment like using larvicide like fenthion can spray on water
This an presentation about electrostatic force. This topic is from class 8 Force and Pressure lesson from ncert . I think this might be helpful for you. In this presentation there are 4 content they are Introduction, types, examples and demonstration. The demonstration should be done by yourself
Prototype Implementation of Non-Volatile Memory Support for RISC-V Keystone E...LenaYu2
Handling confidential information has become an increasingly important concern among many areas of society. However, current computing environments have been still vulnerable to various threats, and we should think they are untrusted.
Trusted Execution Environments (TEEs) have attracted attention because they can execute a program in a trusted environment constructed on an untrusted platform.
Particularly, the RISC-V Keystone is one of the interesting TEEs since it is a flexibly customizable and fully open-source platform. On the other hand, as same as other TEEs, it must also delegate I/O processing, such as file accesses, to a host OS, resulting in the expensive overhead. For this problem, we thought utilizing byte-addressable non-volatile memory (NVM) modules is a useful solution to handle persistent data objects for TEEs.
In this paper, we introduce a prototype implementation of NVM support for the Keystone. Additionally, we evaluate it on the Freedom U500 built on a VC707 FPGA dev kit.
https://ken.ieice.org/ken/paper/20210720TC4K/
Ethical considerations play a crucial role in research, ensuring the protection of participants and the integrity of the study. Here are some subject-specific ethical issues that researchers need
The extremotolerant desert moss Syntrichia caninervis is a promising pioneer ...Sérgio Sacani
Many plans to establish human settlements on other planets focus on
adapting crops to growth in controlled environments. However, these settlements will also require pioneer plants that can grow in the soils and
harsh conditions found in extraterrestrial environments, such as those
on Mars. Here, we report the extraordinary environmental resilience of Syntrichia caninervis, a desert moss that thrives in various extreme environments. S. caninervis has remarkable desiccation tolerance; even after
losing >98% of its cellular water content, it can recover photosynthetic
and physiological activities within seconds after rehydration. Intact plants
can tolerate ultra-low temperatures and regenerate even after being stored
in a freezer at 80C for 5 years or in liquid nitrogen for 1 month.
S. caninervis also has super-resistance to gamma irradiation and can survive and maintain vitality in simulated Mars conditions; i.e., when simultaneously exposed to an anoxic atmosphere, extreme desiccation, low temperatures, and intense UV radiation. Our study shows that S. caninervis is
among the most stress tolerant organisms. This work provides fundamental insights into the multi-stress tolerance of the desert moss
S. caninervis, a promising candidate pioneer plant for colonizing extraterrestrial environments, laying the foundation for building biologically sustainable human habitats beyond Earth.
national learning camp 1&2 grade 08.pptxJoanaBanasen1
Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component 4C? Why? Which questions were easy to answer – the ones in Component 4B or Component
ScieNCE grade 08 Lesson 1 and 2 NLC.pptxJoanaBanasen1
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it................
just download it..............
Cause and solution of Water hyacinth (Terror of Bengal)saloniswain225
Water hyacinth is a buoyant plant that has a clump of leaves with squishy stalks arising from the lower feathery roots and it is an invasive species came from South America
Science-9-Lesson-1 ang lesson 2-NLC-pptx.pptxJoanaBanasen1
just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it! just check it!
3. 3
Problem definition
• We needed to define an architectural
framework, that supports both aspects of co-
design.
• The framework must support explicitly aspects
of distributed systems (IoT) and AI system
development.
– Learning and data management
• The framework also needed to be flexible
enough to cover all current use cases, and new
future use cases.
– A special focus therefore lies on the support of
non-functional requirements / quality views
– Traceability of design decisions
• A single reference architecture would have been
too limiting for allowing the variety of (open call)
use cases in VEDLIoT and beyond.
Co-Design
Integrated
design
Collaborative
design
Task 2.1
Heyn, H. M., Knauss, E., Muhammad, A. P., Eriksson, O.,
Linder, J., Subbiah, P., ... & Tungal, S. (2021, May).
Requirement engineering challenges for ai-intense systems
development. In 2021 IEEE/ACM 1st Workshop on AI
Engineering-Software Engineering for AI (WAIN) (pp. 89-96).
IEEE
14. 14
Why?
Task 2.1
• The architectural framework helps connecting
different aspects of a system together.
• It allows for “middle-out” development, i.e.,
existing design decisions are explicitly
considered.
• It allows to keep an overview over the necessary
quality aspects, such as safety, security, ethical,
or privacy aspects of the use case.
• The traceability of design decisions allows for
compliance with upcoming AI regulations.
Heyn, H. M., Knauss E., & Pelliccione P. (2023). A Compositional Approach to Architecture Frameworks for distributed AI Systems. In Elsevier Journal of Systems
and Software (JSS).
16. 16
Co-Design of a system
• Designing a complex and distributed
system is a hierarchical process.
– Several, sometimes highly specialized views
allow for decomposition of the design task.
– Requirements and architecture often co-
evolve (Twin Peaks).
• Developing complex system is a highly
collaborative act between many
stakeholders.
Task 2.1
17. 17
Current approaches to architecture did not help
• Providing the right learning setting / training data
– No explicit views on the learning perspective of an AI system in common architecture approaches (Bosch et al.,
2020, Muccini et al., 2021).
• Monitoring solutions must be represented explicitly in the architecture
– Some flaws can only be detected after deployment
– Therefore, monitoring is needed to ensure functional, and non-functional aspects of an AI system (Bernadri et al.,
2019).
• New quality aspects arise, such as “explainability”, or “data privacy”
– Depending on the use case certain a wide set of quality aspects can be relevant (Habibullah and Horkoff, 2019)
– New stakeholders need to be included with their own views on the system (Vogelsang and Borg, 2019)
Bosch, J., Olsson, H. H., & Crnkovic, I. (2021). Engineering ai systems: A research agenda. In Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (pp. 1-19). IGI global.
Muccini, H., & Vaidhyanathan, K. (2021, May). Software architecture for ml-based systems: what exists and what lies ahead. In 2021 IEEE/ACM 1st Workshop on AI Engineering-Software
Engineering for AI (WAIN) (pp. 121-128). IEEE.
Bernardi, L., Mavridis, T., & Estevez, P. (2019, July). 150 successful machine learning models: 6 lessons learned at booking. com. In Proceedings of the 25th ACM SIGKDD international
conference on knowledge discovery & data mining (pp. 1743-1751).
Habibullah, K. M., & Horkoff, J. (2021, September). Non-functional requirements for machine learning: understanding current use and challenges in industry. In 2021 IEEE 29th International
Requirements Engineering Conference (RE) (pp. 13-23). IEEE.
Vogelsang, A., & Borg, M. (2019, September). Requirements engineering for machine learning: Perspectives from data scientists. In 2019 IEEE 27th International Requirements Engineering
Conference Workshops (REW) (pp. 245-251). IEEE.
Task 2.1
18. 18
A compositional architecture framework
Rule 1: Clusters of concern shall contain architectural
views with different levels of details of a certain aspect.
Rule 2: Architectural views shall be sorted into levels of
abstractions, according to their level of details.
Rule 3: By using correspondence rules, it shall be
possible to arrive at different architectural views of the
system without encountering inconsistencies.
Rule 4: Architectural views, and relations between
them, shall be mapped to the next lower level of
abstraction.
Task 2.1
Heyn, H. M., Knauss E., & Pelliccione P. (2022, under review). A Compositional Approach to Architecture Frameworks for distributed AI Systems. In Elsevier
Journal of Systems and Software (JSS).