WiPiEC Journal - Works in Progress in Embedded Computing Journal
https://wipiec.digitalheritage.me/index.php/wipiecjournal
<p><strong>Works in Progress in Embedded Computing Journal, </strong>short <strong>WiPiEC Journal</strong> is a <strong>Fully Open Access Journal</strong> dedicated to the General Computing (hardware and software) with emphasis to Embedded System (ES), Cyber Physical Systems (CPS), Internet of Things (IoT), and Related Fields (RF). It originated from 2015 as an edition of Work in Progress (WiP) Session of traditional premier events<a href="https://mecoconference.me/"> Metirerranean Conference on Embedded Computing (MECO)</a>, <a href="https://mecoconference.me/cpsiot2023/">International Conference on Cyber-Physical Systems and Internet of Things (CPS&IoT)</a> and <a href="https://mecoconference.me/ss-cpsiot2023/">Summer School on Cyber Physical System and Internet of Things (SSCPS&IoT)</a>. Additionally, it provided the possibility of publishing solo articles.</p> <p>Initially, in the period of 2015-2022, WiPiEC Journal was running as a journal which was being distributed to the members of the MECO Consortium and participants of the MECO&CPSIoT Conferences. </p> <p>From the April 2023, it <strong>flipped to a fully open access model</strong> with <a href="https://portal.issn.org/resource/ISSN/2980-7298">ISSN: 2980-7298</a>. With all the archived material since 2015 made available in open access form, with the rights being transformed into an <a href="http://wipiec.digitalheritage.me/index.php/wipiecjournal/open_access">open license.</a> From August 2023 it includes Works in Progress (WiP) Sessions of <a href="https://www.euromicro.org/">Euromicro's</a> <a href="https://dsd-seaa.com/">DSD and SEAA</a> events.</p> <p>The goal of <strong>WiPiEC Journal</strong> was and remains fast and open publishing of ideas and results between researchers, academia, economy, services and society in this emerging field.</p> <p>More <a href="http://wipiec.digitalheritage.me/index.php/wipiecjournal/about">About the Journal (Aims & Scope)</a>, <a href="http://wipiec.digitalheritage.me/index.php/wipiecjournal/about/submissions">Submision</a>, <a href="http://wipiec.digitalheritage.me/index.php/wipiecjournal/about/editorialTeam">Editorial</a>, <a href="http://wipiec.digitalheritage.me/index.php/wipiecjournal/about/privacy">Privacy Statement</a> and <a href="https://wipiec.digitalheritage.me/index.php/wipiecjournal/about/contact">Contact</a>.</p>MECOnet - MANT en-USWiPiEC Journal - Works in Progress in Embedded Computing Journal2337-0343<p><strong>License Terms: </strong></p> <p>Except where otherwise noted, content on this website is lincesed under a <a href="https://creativecommons.org/licenses/by-nc/4.0/"><strong>Creative Commons Attribution Non-Commercial License (CC BY NC)</strong></a> </p> <p><img src="http://wipiec.digitalheritage.me/public/site/images/matija/ccbync-043af9903025a836b3541bf92946c507.png" alt="" width="107" height="38" /></p> <p>Use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes, is permitted.</p> <p>Copyright to any article published by WiPiEC retained by the author(s). Authors grant WiPiEC Journal a license to publish the article and identify itself as the original publisher. Authors also grant any third party the right to use the article freely as long as it is not used for commercial purposes and its original authors, citation details, and publisher are identified, in accordance with CC BY NC license. Fore more information on license terms, <a href="http://wipiec.digitalheritage.me/index.php/wipiecjournal/about/privacy">click here</a>. </p>Resistance of Radiation Tolerant TMR Shift Registers to Optical Fault Injections
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/56
<p>Protection of information is essential for IoT devices. They are often subject to lab analysis with the objective to reveal secret hidden information. One of the ways to reveal the cryptographic key is to perform optical Fault Injection attacks. In this work, we investigated the IHP radiation tolerant shift registers built of Triple Modular Redundant flip-flops. In our experiments, we were able to inject different transient faults into TMR registers using a single laser beam.</p>Dmytro PetrykPeter LangendörferZoya Dyka
Copyright (c) 2024 Dmytro Petryk, Peter Langendörfer, Zoya Dika
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Accelerating Cryptographic Algorithms on RISC-V cores using Carryless Multiplication
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/57
<p>Edge computing emerges as a critical paradigm in the wake of Internet of Things (IoT) and 5G New Radio (5GNR). It catalyzes the demand for energy-efficient devices that have resilient CPUs with lean physical footprints. Mitigating the security challenges in these networked devices necessitates Bit Manipulation Instruction (BMI) inclusive architectures to improve Galois Field (GF) arithmetic, which is a fundamental step for most cryptographic algorithms. All major Instruction Set Architectures (ISA), including RISC-V incorporate dedicated instructions for carryless multiplication, recognizing its significant contribution in cryptographic applications. Acknowledging the fact, this paper introduces a novel approach to enhance the performance of GF arithmetic using carryless multiplication. The approach presents a promising avenue by improving the execution cycle counts of a real-world cryptographic application like the Advanced Encryption Scheme (AES) and can be scaled to all GF-based cryptographic algorithms. The proposed GF algorithm effectively maps the Carryless Multiplication Instruction of the ratified RISC-V Zbc extension. Evaluations indicate about 4.5x performance improvement for multiple schemes of AES using an open-source RISC-V core (SweRV-EL2<sup>TM</sup> 1.3) without incurring any additional overhead in terms of area as well as compiler support.</p>Simi SukumaranTripti S WarrierBabu P SNeel Gala
Copyright (c) 2024 Simi Sukumaran, Tripti S Warrier, Babu P S, Neel Gala
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102opoSoM: A Modular Measurement Platform for Dynamic Power Consumption of SoCs
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/58
<p>Software can have a significant impact on the electrical characteristics of the executing integrated circuit. The analysis of minor current consumption changes in a System-on-Chip reveals details about the executed instructions or the hardware’s internal logic, potentially exposing sensible information. Despite careful design, glitches pose a further challenge that needs to be handled at hardware and software level.</p> <p>This paper introduces the concept of the open-source, modular <em>opoSoM</em> measurement platform that captures the dynamic power characteristics of System-on-Chips featuring external and on-chip measurement techniques. Due to the configurable measurement range and synchronous sampling at up to 250 MS/s, the platform provides valuable measurement data for investigating countermeasures against side-channel attacks and optimizing hardware and software towards lower dynamic power consumption.</p>Kristóf KanicsMeinhard KissichGerhard WirrerTobias ScheipelMarcel Baunach
Copyright (c) 2024 Kristóf Kanics, Meinhard Kissich, Gerhard Wirrer, Tobias Scheipel, Marcel Baunach
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102On Exploiting PSOP Decomposition for Quantum Synthesis
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/59
<p>The synthesis strategy for quantum oracles is based on a reversible logic synthesis and a quantum compilation step. In reversible logic synthesis it is important to obtain a compact reversible circuit in order to minimize the size of the final quantum circuit. Projected Sum Of Product, PSOP, decomposition is an EXOR based technique that can be applied to any Boolean function as a very fast pre-processing step for further minimizing the circuit area in standard logic synthesis. In this paper, we exploit PSOP decomposition in quantum synthesis. In particular, we describe a new technique for the quantum synthesis of PSOP decomposed functions. The experimental results validate the proposed pre-processing method in quantum synthesis, showing an interesting gain in area, within the same time limit.</p>Anna BernasconiValentina CirianiGianmarco CucinielloAsma Taheri Monfared
Copyright (c) 2024 Anna Bernasconi, Valentina Ciriani, Gianmarco Cuciniello, Asma Taheri Monfared
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102COSOI: True Random Number Generator Based on Coherent Sampling using the FD-SOI technology
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/60
<p>This work presents a proof of concept of the implementation of a Coherent Sampling Ring Oscillator TRNG (COSO-TRNG) using the Fully Depleted Silicon On Insulator (FD-SOI) technology. COSO-TRNG appears as one of the best structures optimizing the throughput per area trade-off and having a model for its entropy source. The back-biasing capability of the FD-SOI technology is proved here to be a very simple and efficient technique for the ring oscillator frequency calibration needed for the coherent sampling method. This is the first demonstration of feasibility of COSO-TRNG validated on ASIC FD22nm. A throughput of 3.36 Mbits/s was obtained, equivalent to results in the literature.True random number generator</p>Licinius BeneaFlorian Pebay-PeyroulaMikael CarmonaRomain Wacquez
Copyright (c) 2024 Licinius Benea, Florian Pebay-Peyroula, Mikael Carmona, Romain Wacquez
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Towards Sustainable Electronic Design Automation Flow: A Joint Approach Based on Complexity Metrics
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/61
<p>This paper addresses sustainability criteria and Electronic Design Automation (EDA) needs. We aim to optimize the operational stages of an EDA Flow and address a series of investigations to reduce carbon footprint. Our main purpose is to optimize the design flow, considering sustainability criteria to reduce the environmental impact of EDA tools. First, metrics correlating sustainability and design project complexity are provided and implemented as part of an EDA design solution, which INNOVA Advanced Technologies proposes. Second, the INNOVA design solution provides job scheduling based on sustainability criteria. Typical case studies are provided in this paper.</p>Virginie DelalotChouki AktoufGilles FritzBastien GratreauxNermine AliLilia Zaourar
Copyright (c) 2024 Virginie Delalot, Chouki Aktouf, Gilles Fritz, Bastien Gratreaux, Nermine Ali, Lilia Zaourar
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102An Open-source HLS Fully Parameterizable Matrix Multiplication Library for AMD FPGAs
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/62
<p>One common characteristic of High-Performance Computing (HPC) and Cyber-Physical Systems (CPS) is their need for heterogeneous energy-efficient solutions. In this work we present a library for FPGA-accelerated dense matrix multiplication which is flexible, open-source, written in purely synthesizable C and has no dependencies on the actual hardware implementation tools. Our library is designed so as to support arbitrary array sizes and accuracy, making it a versatile and adaptable solution that meets the diverse computational requirements of applications all the way from CPS to HPC. Our approach provides an adaptable solution that efficiently exposes the flexibility and performance of the FPGAs to both novice and expert developers which is not the case with the black-box libraries provided by the FPGA manufacturers. Our approach has been evaluated in a number of state-of-the-art AMD FPGAs; the end results demonstrate that the presented implementations can achieve 9x, 34x and 3x gains, in terms of energy efficiency, when compared with embedded, high-end CPUs and GPUs respectively. Moreover, our solution matches or slightly outperforms the most advanced similar FPGA-tailored approach while also being much more flexible and designer-friendly while also library-independent.</p>Angelos AthanasiadisNikolaos TampouratzisIoannis Papaefstathiou
Copyright (c) 2024 Angelos Athanasiadis, Nikolaos Tampouratzis, Ioannis Papaefstathiou
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Immersive Environments with Haptic Technology for the Control of an Industrial Robotic Arm
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/63
<p>The technological advancement of Industry 4.0 and the Internet of Things has brought significant changes and benefits to the industry, allowing observation, control, and decision-making in industrial processes from anywhere in the world and in real-time. This article presents the power of a Mitsubishi RV-2AJ Industrial Robotic Arm using haptic technology "Senso Glove" and real-time 3D visualization, enabling users to interact and control the arm's movements. For the implementation, data is processed in Unity and sent to the "Firebase" cloud, where this data is requested by an embedded system to subsequently be converted into commands for arms control, specifically in the coordinates "X", "Y", "Z," and in the opening or closing of the gripper. The results demonstrated that the arm can be controlled from the gloves, opening various applications. Additionally, an accuracy of 87.8% was achieved in the conducted tests, with an average communication time of 815 milliseconds.</p>Wilman PaucarGustavo CaizaWilliam OñateMorelva Saeteros
Copyright (c) 2024 Wilman Paucar, Gustavo Caiza, William Oñate, Morelva Saeteros
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Culsans: An Efficient Snoop-based Coherency Unit for the CVA6 Open Source RISC-V application processor
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/64
<p>Symmetric Multi-Processing (SMP) based on cache coherency is crucial for high-end embedded systems like automotive applications. RISC-V is gaining traction, and open-source hardware (OSH) platforms offer solutions to issues such as IP costs and vendor dependency. Existing multi-core cache-coherent RISC-V platforms are complex and not efficient for small embedded core clusters. We propose an open-source SystemVerilog implementation of a lightweight snoop-based cache-coherent cluster of Linux-capable CVA6 cores. Our design uses the MOESI protocol via the Arm’s AMBA ACE protocol. Evaluated with Splash-3 benchmarks, our solution shows up to 32.87% faster performance in a dual-core setup and an average improvement of 15.8% over OpenPiton. Synthesized using GF 22nm FDSOI technology, the Cache Coherency Unit occupies only 1.6% of the system area.</p>Riccardo TedeschiLuca ValenteGianmarco OttaviEnrico ZelioliNils WistoffMassimiliano GiacomettiAbdul Basit SajjadLuca BeniniDavide Rossi
Copyright (c) 2024 Riccardo Tedeschi, Luca Valente, Gianmarco Ottavi, Enrico Zelioli, Nils Wistoff, Massimiliano Giacometti, Abdul Basit Sajjad, Luca Benini, Davide Rossi
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Development of a Firearms and Target Weapons Recognition and Alerting System Applying Artificial Intelligence
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/65
<p>Nowadays, surveillance systems that make use of security cameras are indispensable to ensure the protection and security of companies and organizational entities. These systems operate through monitoring by trained individuals. The progress of a system that uses artificial intelligence to identify and recognize firearms and knives is based on the implementation of machine learning techniques and real-time image and video analysis. The main goal is to increase public safety by accurately and quickly detecting the presence of weapons in various environments. The purpose of this research is to improve public safety through the early detection of threats and more effective responses by security forces. To achieve this, convolutional neural networks have been used. During the development of the system, a database has been created using images and videos containing firearms or knives, based on the "You Only Look Once" (YOLO) algorithm, particularly YOLOv5s.</p>Jhonny JimenezJhonatan ToscanoWilliam OñateGustavo Caiza
Copyright (c) 2024 Jhonny Jimenez, Jhonatan Toscano, William Oñate, Gustavo Caiza
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Comparing Approaches for Prioritizing and Selecting Scenarios in Simulation-based Safety Testing of Automated Driving Systems
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/66
<p>Simulation-based safety testing provides a cost-effective method for testing Automated Driving Systems (ADS) across diverse scenarios. However, prioritizing or selecting test scenarios for simulation-based safety testing remains challenging due to the infinite variety of scenarios that ADS may encounter. In this study, we conducted a literature review to identify approaches for selecting or prioritizing scenarios for ADS safety testing. We compare the six identified approaches in a tabular form across various aspects. We discuss one approach in detail, illustrating how it could complement the other selected approaches through an example. Our ongoing work involves extending the comparative analysis to cover all approaches comprehensively.</p>Fauzia KhanHina AnwarDietmar Pfahl
Copyright (c) 2024 Fauzia Khan, Hina Anwar, Dietmar Pfahl
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Log Frequency Analysis for Anomaly Detection in Cloud Environments at Ericsson
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/67
<p>Log analysis monitors system behavior, detects er- rors and anomalies, and predicts future trends in systems and applications. However, with the continuous evolution and growth of systems and applications, the amount of log data generated on a timely basis is increasing rapidly. This causes an increase in the manual effort invested in log analysis for error detection and root cause analysis. The current automated log analysis techniques mainly concentrate on the messages displayed by the logs as one of the main features. However, the timestamps of the logs are often ignored, which can be used to identify temporal patterns between the logs which can form a key aspect of log analysis in itself. In this paper, we share our experiences of combining log frequency based analysis with log message based analysis, which thereby helped in reducing the volume of logs which are sent for manual analysis for anomaly detection and root cause analysis.</p>Prathyusha BendapudiVera SimonDeepika Badampudi
Copyright (c) 2024 Prathyusha Bendapudi, Vera Simon, Deepika Badampudi
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Many a Little Makes a Mickle: On Micro-Optimisation of Containerised Microservices
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/68
<p>Performance optimisation is a key to the success of microservices architecture. Correspondingly, many studies have been conducted on optimising orchestration or composition of multiple microservices within different application contexts. Unlike the existing efforts on the global optimisation, we are concerned with the internal optimisation of individual microservices. Considering the loosely coupled nature of individual microservices, their performance improvements could be independent of each other and thus would naturally bring benefits to their composite applications. Driven by such intuitive ideas together with the de facto tech stack, we have been working on micro-optimisation of containerised microservices at the Operation side (i.e., Ops-side optimisation) against the Development side. Based on both theoretical discussions and empirical investigations, our most recent work delivered three micro-optimisation principles, namely <em>just-enough containerisation</em>, <em>just-for-me configuration</em>, and <em>just-in-time compilation (during containerisation)</em>. Our current research outcomes have not only offered new ideas and practical strategies for optimising microservices, but they have also expanded the conceptual scope and the research field of software micro-optimisation.</p>Zheng Li
Copyright (c) 2024 Zheng Li
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Towards Real-time Object Detection for Safety Analysis in an ML-Enabled System Simulation
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/69
<p>Machine learning (ML)-equipped critical systems such as collaborative artificial intelligence systems (CAISs), where humans and intelligent robots work together in a shared space are increasingly being studied and implemented in different domains. The complexities of these systems raise major concerns for safety risks because decisions for controlling the dynamics of the robot during the interaction with humans must be done quickly driving the detection of potential risks in form of collision between a robot and a human operator using information obtained from sensors such as camera or LIDAR. In this work, we explore and compare the performance of two You Only Look Once (YOLO) models - YOLOv3 and YOLOv8 - which rely on convolutional neural networks (CNNs) for real-time object detection in a case study collaborative robot system simulation example. The preliminary results show that both models achieve high accuracy (≥ 98%) and real-time performance albeit requiring a GPU to run at such speed as 40FPS. The results indicate the feasibility of real-time object detection in a CAIS simulation implemented with CoppeliaSim software.</p>Jubril Gbolahan AdigunPatrick AschenbrennerMichael Felderer
Copyright (c) 2024 Jubril Gbolahan Adigun, Patrick Aschenbrenner, Michael Felderer
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Tapping in a Remote Vehicle’s onboard LLM to Complement the Ego Vehicle’s Field-of-View
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/70
<p>Today’s advanced automotive systems are turning into intelligent Cyber-Physical Systems (CPS), bringing com- putational intelligence to their cyber-physical context. Such systems power advanced driver assistance systems (ADAS) that observe a vehicle’s surroundings for their functionality. However, such ADAS have clear limitations in scenarios when the direct line-of-sight to surrounding objects is occluded, like in urban areas. Imagine now automated driving (AD) systems that ideally could benefit from other vehicles’ field-of-view in such occluded situations to increase traffic safety if, for example, locations about pedestrians can be shared across vehicles. Current litera- ture suggests vehicle-to-infrastructure (V2I) via roadside units (RSUs) or vehicle-to-vehicle (V2V) communication to address such issues that stream sensor or object data between vehicles. When considering the ongoing revolution in vehicle system architectures towards powerful, centralized processing units with hardware accelerators, foreseeing the onboard presence of large language models (LLMs) to improve the passengers’ comfort when using voice assistants becomes a reality. We are suggesting and evaluating a concept to complement the ego vehicle’s field- of-view (FOV) with another vehicle’s FOV by tapping into their onboard LLM to let the machines have a dialogue about what the other vehicle “sees”. Our results show that very recent versions of LLMs, such as GPT-4V and GPT-4o, understand a traffic situation to an impressive level of detail, and hence, they can be used even to spot traffic participants. However, better prompts are needed to improve the detection quality and future work is needed towards a standardised message interchange format between vehicles.</p>Malsha Ashani Mahawatta DonaBeatriz Cabrero-DanielYinan YuChristian Berger
Copyright (c) 2024 Malsha Ashani Mahawatta Dona, Beatriz Cabrero-Daniel, Yinan Yu, Christian Berger
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Optimizing End-to-End test execution: Unleashing the Resource Dispatcher - WiP
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/71
<p>Continuous integration practices have transformed software development, but executing test suites of modern software developments addresses new challenges due to its complexity and its huge number of test cases. Certain test levels, like End-to-end testing, are even more challenging due to long execution times and resource-intensive requirements, moreover when we have many End-to-end test suites. Those E2E test suites are executed sequentially and in parallel over the same infrastructure and can be executed several times (e.g., due to some tester consecutive contributions, or version changes performed by automation engines). In previous works, we presented a framework that optimizes E2E test execution by characterizing Resources and grouping/scheduling test cases, based on their compatible usage. However, the approach only optimizes a single test suite execution and neglects other executions or test suites that can share Resources and lead to savings in terms of time and number of Resource redeployments. In this work, we present a new Resource allocation strategy, materialized through a Resource Dispatcher entity. The Resource Dispatcher centralizes the Resource management and allocates the test Resources to the different test suites executed in the continuous integration system, according to their compatible usage. Our approach seeks efficient Resource sharing among test cases, test suites, and suite executions, reducing the need for Resource redeployments and improving the execution time. We have conducted a proof of concept, based on real-world continuous integration data, that shows savings in both Resource redeployments and execution time.</p>Cristian AugustoJesús MoránClaudio de la RivaJavier Tuya
Copyright (c) 2024 Cristian Augusto, Jesús Morán, Claudio de la Riva, Javier Tuya
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Project Security Using Analytical Time Evaluation Techniques
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/72
<p>Time planning of IT Projects is difficult due to a large number of uncertainties in the software development process. Mistakes in software development planning open ways to architectural, functional, and integrative deficiencies of the product and surrounding processes. Using a simple synthetic project, we compare three analytic techniques to evaluate project duration. These three techniques can work with uncertain input parameters, represent projects as stochastic activity networks, and use simple computations to approximate distributions of the start time and end time of all tasks. Most importantly, they address the problem of merge event bias. We observe that a method with most relaxed assumptions performs better than others in comparison with a simulated ideal solution.</p>Maksim Goman
Copyright (c) 2024 Maksim Goman
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102A Systematic Analysis of MLOps Features and Platforms
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/73
<p class="Abstract">While many companies aim to use Machine Learning (ML) models, transitioning to deployment and practical application of such models can be very time-consuming and technically challenging. To address this, MLOps (ML Operations) offers processes, tools, practices, and patterns to bring ML models into operation. A large number of tools and platforms have been created to support developers in creating practical solutions. However, specific needs vary strongly in a situation-dependent manner, and a good overview of their characteristics is missing, making the architect’s task very challenging. We conducted a systematic literature review (SLR) of MLOps platforms, describing their qualities, features, tactics, and patterns. In this paper, we want to map the design space of MLOps platforms. We are guided by the Attribute-Driven Design (ADD) methodology. In this way, we want to provide software architects with a tool to support their work in the platform area.</p>Leonhard FaubelKlaus Schmid
Copyright (c) 2024 Leonhard Faubel, Klaus Schmid
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102Using GPT-4 for Source Code Documentation
https://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/74
<p>Writing good software documentation imposes significant effort. Large Language Models (LLMs) could potentially streamline that process, though. So, the question arises whether current LLMs are able to generate valid code documentation for classes and methods on basis of the bare code. According to literature, various such models have the capability to generate documentation that is on par with or even superior to reference documentation. In our experimental study using zero-shot prompting, we found that the model GPT-4 by OpenAI leads to poor results when measuring similarity to the reference documentation on class level. Thus, GPT-4 is not yet usable for generating class documentation. On method level, however, the model achieved higher similarity ratings and can be considered applicable for the use case.</p>Magdalena KneidingerMarkus FenebergerReinhold Plösch
Copyright (c) 2024 Magdalena Kneidinger, Markus Feneberger, Reinhold Plösch
https://creativecommons.org/licenses/by-nc/4.0
2024-08-202024-08-20102