THE RATIONAL USE OF COMPUTING POWER IN MODERN TRENDS IN THE DEVELOPMENT OF ELECTRONICS
Journal Title: Scientific Journal of Astana IT University - Year 2020, Vol 4, Issue 4
Abstract
This article considers methods and ways of automating software optimization using additional programs and analyzing their algorithms and the principle of operation. Since against the background of the rapid growth of computing power, the question arises about these resources’ rational use. With the development of technologies, software development is faced with the problem of degradation of the quality of created applications and the lack of search for new optimization methods. Initially, software development faced an insurmountable wall in the form of a brutal resource limit, which encouraged developers to look for new strategies and tricks to implement the conceived project. Currently, due to breakneck pace of development of computing power, developers have lost this wall as an incentive in search of new methods of implementation and optimization. The developers faced a new problem - the rational use of computing power. For many next-generation applications, I/O constraints limit the performance level that can be achieved. A large and important class of resource-intensive applications is irregular, contains complex data-dependent execution behavior, and dynamic, with resource requirements that change over time. Because the interactions between the application and system software vary between applications and at runtime, analysts are looking to optimize performance need runtime libraries and analysis tools to uncover application I/O behavior. A Developer can use both manual optimization methods and optimizing additional software or optimizing compilers. Optimizing other software and compilers will help reduce the time spent on the optimization stage.
Authors and Affiliations
I. Lazarev, I. Tomilova
SOLVING THE PROBLEM OF DETECTING PHISHING WEBSITES USING ENSEMBLE LEARNING MODELS
Due to the popularity of the easiest way to obtain personal information among attackers, phishing detection is becoming a popular area for research aimed at countering the implementation of such attacks. Malicious websit...
GESTURE RECOGNITION OF MACHINE LEARNING AND CONVOLUTIONAL NEURAL NETWORK METHODS FOR KAZAKH SIGN LANGUAGE
Recently, there has been a growing interest in machine learning and neural networks among the public, largely due to advancements in technology which have led to improved methods of computer recognition of objects, sound...
ASSESSING LTE TECHNOLOGY INTERFERENCE PARAMETERS
The article is devoted to experimental estimation of interference parameters. The article discusses LTE technology, the main parameters and services of LTE technology, and calculates the internal parameters. Introduction...
CONVERGENCE OF PROJECT MANAGERS COMPETENCIES IN HYBRID WORLD
Global trends that occur in various fields of knowledge with a significant acceleration affect the development of information technology and project management competencies, programs, and project portfolios. The paper...
MATHEMATICAL SUPPORT OF THE INFORMATION SYSTEM FOR DECISION SUPPORT IN THE SPHERE OF HEALTHCARE
The relevance of the topic is that currently modern medical information systems are aimed at providing management, economic and in some cases medical practice in the collection and processing of anamnestic data, includ...