4,381 results on '"Microservices"'
Search Results
2. A Service-Based Pipeline for Complex Linguistic Tasks Adopting LLMs and Knowledge Graphs
- Author
-
Bianchini, Filippo, Calamo, Marco, De Luzi, Francesca, Macrì, Mattia, Mecella, Massimo, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Aiello, Marco, editor, Barzen, Johanna, editor, Dustdar, Schahram, editor, and Leymann, Frank, editor
- Published
- 2025
- Full Text
- View/download PDF
3. An Optimized Approach Towards Malware Detection Using Java Microservices
- Author
-
Goel, Mandhar, Thakur, Subodh, Kumar, Nishant, Gupta, Nishant, Singh, Mayank, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Singh, Mayank, editor, Tyagi, Vipin, editor, Gupta, P. K., editor, Flusser, Jan, editor, Ören, Tuncer, editor, Cherif, Amar Ramdane, editor, and Tomar, Ravi, editor
- Published
- 2025
- Full Text
- View/download PDF
4. Hydraulic Engineering Safety Platform Under Microservice Architecture - a Case of Shanmei Reservoir Renovation Project
- Author
-
Lin, Yanyan, Ding, Wei, di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Cui, Zhen-Dong, Series Editor, Lu, Xinzheng, Series Editor, Zheng, Sheng’an, editor, Taylor, Richard M., editor, Wu, Wenhao, editor, Nilsen, Bjorn, editor, and Zhao, Gensheng, editor
- Published
- 2025
- Full Text
- View/download PDF
5. μXL: explainable lead generation with microservices and hypothetical answers.
- Author
-
Cruz-Filipe, Luís, Kostopoulou, Sofia, Montesi, Fabrizio, and Vistrup, Jonas
- Subjects
- *
LEAD , *ARCHITECTURAL design , *PROGRAMMING languages , *ARTIFICIAL intelligence , *JOURNALISTS - Abstract
Lead generation refers to the identification of potential topics (the 'leads') of importance for journalists to report on. In this article we present μ XL, a new lead generation tool based on a microservice architecture that includes a component of explainable AI. μ XL collects and stores historical and real-time data from web sources, like Google Trends, and generates current and future leads. Leads are produced by a novel engine for hypothetical reasoning based on temporal logical rules, which can identify propositions that may hold depending on the outcomes of future events. This engine also supports additional features that are relevant for lead generation, such as user-defined predicates (allowing useful custom atomic propositions to be defined as Java functions) and negation (needed to specify and reason about leads characterized by the absence of specific properties). Our microservice architecture is designed using state-of-the-art methods and tools for API design and implementation, namely API patterns and the Jolie programming language. Thus, our development provides an additional validation of their usefulness in a new application domain (journalism). We also carry out an empirical evaluation of our tool. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. High-performance microservice differentiated domain communication technology.
- Author
-
Zhang, Lei, Pang, Ke, and Xu, Jiangtao
- Subjects
- *
TELECOMMUNICATION , *TELECOMMUNICATION systems , *VERNACULAR architecture , *COMMUNICATION models , *PROGRAMMING languages - Abstract
Microservice architecture splits the traditional monolithic application into different small services. Differences in programming language and data structure make communication between each service difficult, and the communication performance between services directly affects the performance of the entire microservice architecture. Thus, communication performance improvement between services has become a challenge for microservice architectures. This study proposes a microservice service communication technique called remote procedure call multiple (RPCM), which uses different network communication models to achieve inter-service communication based on the domain in which the services are located. RPCM can be used to improve the communication performance between services. We conducted performance stress comparison experiments between RPCM and two other service communication technologies. We evaluated RPCM's performance by measuring the time spent processing requests and transaction performance stress metrics, such as transactions per second, using different threads and numbers of requests in both local and remote domains. The extensive experimental results showed that RPCM performs significantly better than the other techniques under local domain conditions. Furthermore, RPCM helps deploy different services based on the performance requirements to achieve the best microservice communication performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Maintenance architecture design of equipment operation and maintenance system based on digital twins.
- Author
-
Jingyu, Lu, Weixi, Ji, Chen, Chen, and Su, Xuan
- Abstract
The digital twins process of equipment operation and maintenance involves massive data and complex business logic. Through data awareness of equipment and workshop environment. According to the characteristics of equipment operation and maintenance, the data characteristics and requirements are analysed, an equipment operation and maintenance management system based on the micro-service framework is proposed, a set of equipment operation and maintenance digital twins are designed and a general reference software architecture is designed and by checking the underlying in-heap pattern reduces high-impact portions of memory to provide accurate follow-up complex digital twins modelling provides the architectural foundation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Exploring the Potential of Microservices in Internet of Things: A Systematic Review of Security and Prospects.
- Author
-
El Akhdar, Abir, Baidada, Chafik, Kartit, Ali, Hanine, Mohamed, García, Carlos Osorio, Lara, Roberto Garcia, and Ashraf, Imran
- Subjects
- *
EVIDENCE gaps , *INTERNET of things , *SECURITY systems , *MACHINE learning , *RESEARCH personnel - Abstract
With the rapid growth of Internet of Things (IoT) systems, ensuring robust security measures has become paramount. Microservices Architecture (MSA) has emerged as a promising approach for enhancing IoT systems security, yet its adoption in this context lacks comprehensive analysis. This systematic review addresses this research gap by examining the incorporation of MSA in IoT systems from 2010 to 2024. From an initial pool of 4388 studies, selected articles underwent thorough quality assessment with weighted critical appraisal questions and a defined inclusion threshold. This study represents the first comprehensive systematic review to investigate the potential of microservices in IoT, with a particular focus on security aspects. The review explores the merits of MSA, highlighting twelve benefits, eight key challenges, and eight security risks. Additionally, the eight best practices for implementing MSA in IoT systems are extracted. The findings underscore MSA's utility in fortifying IoT security while also acknowledging complexities and potential vulnerabilities. Moreover, the study calls attention to the importance of incorporating complementary technologies including blockchain and machine learning to address identified gaps effectively. Finally, we propose a taxonomic classification for Microservice-based IoT security patterns, facilitating the categorization and organization of security measures in this context. Such a review can help researchers and practitioners identify existing gaps, highlight potential research directions, and provide guidelines for designing secure and efficient microservice-based IoT systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. FloBP: a model-driven approach for developing and executing IoT-enhanced business processes.
- Author
-
Fedeli, Arianna, Fornari, Fabrizio, Polini, Andrea, Re, Barbara, Torres, Victoria, and Valderas, Pedro
- Subjects
- *
BUSINESS process modeling , *BUSINESS licenses , *INTERNET of things , *INFORMATION sharing , *ENGINEERING - Abstract
The capability to integrate Internet of Things (IoT) technologies into business processes (BPs) has emerged as a transformative paradigm, offering unprecedented opportunities for organisations to enhance their operational efficiency and productivity. Interacting with the physical world and leveraging real-world data to make more informed business decisions is of greatest interest, and the idea of IoT-enhanced BPs promises to automate and improve business activities and permit them to adapt to the physical environment of execution. Nonetheless, combining these two domains is challenging, and it requires new modelling methods that do not increase notation complexity and provide independent execution between the process and the underlying device technology. In this work, we propose FloBP, a model-driven engineering approach separating concerns between the IoT and BPs, providing a structured and systematic approach to modelling and executing IoT-enhanced BPs. Applying the separation of concerns through an interdisciplinary team is needed to ensure that the approach covers all necessary process aspects, including technological and modelling ones. The FloBP approach is based on modelling tools and a microservices architecture to deploy BPMN models, and it facilitates integration with the physical world, providing flexibility to support multiple IoT device technologies and their evolution. A smart canteen scenario describes and evaluates the approach's feasibility and its possible adoption by various stakeholders. The performed evaluation concludes that the application of FloBP facilitates the modelling and development of IoT-enhanced BPs by sharing and reusing knowledge among IoT and BP experts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Efficient microservices offloading for cost optimization in diverse MEC cloud networks.
- Author
-
Mahesar, Abdul Rasheed, Li, Xiaoping, and Sajnani, Dileep Kumar
- Subjects
MOBILE computing ,EDGE computing ,ARCHITECTURAL style ,MOBILE apps ,CLOUD computing - Abstract
In recent years, mobile applications have proliferated across domains such as E-banking, Augmented Reality, E-Transportation, and E-Healthcare. These applications are often built using microservices, an architectural style where the application is composed of independently deployable services focusing on specific functionalities. Mobile devices cannot process these microservices locally, so traditionally, cloud-based frameworks using cost-efficient Virtual Machines (VMs) and edge servers have been used to offload these tasks. However, cloud frameworks suffer from extended boot times and high transmission overhead, while edge servers have limited computational resources. To overcome these challenges, this study introduces a Microservices Container-Based Mobile Edge Cloud Computing (MCBMEC) environment and proposes an innovative framework, Optimization Task Scheduling and Computational Offloading with Cost Awareness (OTSCOCA). This framework addresses Resource Matching, Task Sequencing, and Task Scheduling to enhance server utilization, reduce service latency, and improve service bootup times. Empirical results validate the efficacy of MCBMEC and OTSCOCA, demonstrating significant improvements in server efficiency, reduced service latency, faster service bootup times, and notable cost savings. These outcomes underscore the pivotal role of these methodologies in advancing mobile edge computing applications amidst the challenges of edge server limitations and traditional cloud-based approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Improving QoS Management Using Associative Memory and Event-Driven Transaction History.
- Author
-
Di Stefano, Antonella, Gollo, Massimo, and Morana, Giovanni
- Subjects
- *
RECURRENT neural networks , *INFORMATION theory , *THEORY of knowledge , *QUALITY of service , *GLOBAL optimization - Abstract
Managing modern, web-based, distributed applications effectively is a complex task that requires coordinating several aspects, including understanding the relationships among their components, the way they interact, the available hardware, the quality of network connections, and the providers hosting them. A distributed application consists of multiple independent and autonomous components. Managing the application involves overseeing each individual component with a focus on global optimization rather than local optimization. Furthermore, each component may be hosted by different resource providers, each offering its own monitoring and control interfaces. This diversity adds complexity to the management process. Lastly, the implementation, load profile, and internal status of an application or any of its components can evolve over time. This evolution makes it challenging for a Quality of Service (QoS) manager to adapt to the dynamics of the application's performance. This aspect, in particular, can significantly affect the QoS manager's ability to manage the application, as the controlling strategies often rely on the analysis of historical behavior. In this paper, the authors propose an extension to a previously introduced QoS manager through the addition of two new modules: (i) an associative memory module and (ii) an event forecast module. Specifically, the associative memory module, functioning as a cache, is designed to accelerate inference times. The event forecast module, which relies on a Weibull Time-to-Event Recurrent Neural Network (WTTE-RNN), aims to provide a more comprehensive view of the system's current status and, more importantly, to mitigate the limitations posed by the finite number of decision classes in the classification algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Uncertainty Calculation as a Service: Integrating Cloud-Based Microservices for Enhanced Calibration and DCC Generation †.
- Author
-
Cetinkaya, Anil, Kaya, M. Cagri, Danaci, Erkan, and Oguztuzun, Halit
- Subjects
- *
DIGITAL certificates , *ELECTRONIC data processing , *UNITS of measurement , *INTERNET of things , *SOFTWARE architecture - Abstract
The calibration industry is renowned for its diverse and sophisticated equipment and complex processes, which necessitate innovative solutions to keep pace with rapidly advancing technology. This paper introduces an enhancement to an existing microservice-based cloud architecture, aimed at effectively managing the inherent complexity within this field. The enhanced architecture seamlessly integrates various equipment types and communication technologies, aligning diverse stakeholder expectations into a unified system that ensures efficient and accurate calibration processes. It highlights the integration of microservices to facilitate various methods of uncertainty calculation and the generation of digital calibration certificates (DCCs). A case study on RF power measurement illustrates the practical application and benefits of the enhanced architecture. Although initially focused on RF power measurement, the flexible architecture allows for future expansions to accommodate new standards and measurement techniques. The enhanced system offers a comprehensive approach to managing data flow from calibration equipment to the final generation of DCCs, utilizing cloud-based services for efficient data processing. As a future direction, this extension sets the groundwork for broader applicability across multiple measurement types, ensuring readiness for upcoming advancements in metrology. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. 이기종 엣지 디바이스 상에서 AI 응용의 분산 실행을 위한 MEC 기반 AI 컴퓨팅 분할 모델.
- Author
-
김영주 and 전인걸
- Subjects
ARTIFICIAL intelligence ,DEEP learning - Abstract
Edge devices generate a lot of data, and the data is received and utilized according to each service cycle of applications. It is difficult to handle the amount of data in existing cloud environments. MEC environments can reduce network latency and eliminate performance bottlenecks so that attempts have been made to run DL services on various heterogeneous devices. However, due to limited computing resources, inference may fail to work or may be time-consuming. This paper proposes a MEC-based AI computing partitioning model that enables distributed execution of AI applications on heterogeneous edge devices. The suggested model allows users to determine the number of divisions of AI network models, and has partitioned models with uniform parameters. According to the experimental results, as the compute partitioning increases, the edge device's overhead decreases on average by 25.8%, 14.3%, and 3.27% in terms of execution time, CPU usage, and memory usage, respectively, making it possible to provide seamless AI application services through distributed execution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Self-Supervised Machine Learning Framework for Online Container Security Attack Detection.
- Author
-
Tunde-Onadele, Olufogorehan, Lin, Yuhang, Gu, Xiaohui, He, Jingzhu, and Latapie, Hugo
- Subjects
BLENDED learning ,FALSE alarms ,ONLINE education ,DEBUGGING ,PROTOTYPES - Abstract
Container security has received much research attention recently. Previous work has proposed to apply various machine learning techniques to detect security attacks in containerized applications. On one hand, supervised machine learning schemes require sufficient labeled training data to achieve good attack detection accuracy. On the other hand, unsupervised machine learning methods are more practical by avoiding training data labeling requirements, but they often suffer from high false alarm rates. In this article, we present a generic self-supervised hybrid learning (SHIL) framework for achieving efficient online security attack detection in containerized systems. SHIL can effectively combine both unsupervised and supervised learning algorithms but does not require any manual data labeling. We have implemented a prototype of SHIL and conducted experiments over 46 real-world security attacks in 29 commonly used server applications. Our experimental results show that SHIL can reduce false alarms by 33%–93% compared to existing supervised, unsupervised, or semi-supervised machine learning schemes while achieving a higher or similar detection rate. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Microservices Patterns Recommendation based on Information Retrieval
- Author
-
Álex dos Santos Moura, Fábio Gomes Rocha, and Michel S. Soares
- Subjects
Microservices ,Recommendation ,Design Patterns ,In ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Software developers encounter recurring problems during software development, which can be solved using proven solutions known as design patterns. Microservices architecture, a Service-Oriented Architecture (SOA) variant, presents common communication, deployment, and service definition challenges. However, selecting the appropriate design pattern from a vast pool of patterns to solve a problem is difficult for novice and experienced developers. This paper proposes a recommendation tool based on Information Retrieval (IR) to assist developers in choosing the suitable microservices pattern to solve a given problem. The tool leverages textual descriptions given by developers to provide relevant indications of microservices patterns. It has been evaluated using both toy and industrial problems, demonstrating promising results. The results showed that the tool was able to solve 60% of toy design problems, indicating that it can provide valuable and accurate recommendations. Furthermore, tests with industrial problems revealed that over 70% of the recommended patterns helped to address the problems at hand. Interviews with developers who work in the software industry corroborated the recommendation tool’s effectiveness and practicality.
- Published
- 2024
- Full Text
- View/download PDF
16. Efficient microservices offloading for cost optimization in diverse MEC cloud networks
- Author
-
Abdul Rasheed Mahesar, Xiaoping Li, and Dileep Kumar Sajnani
- Subjects
Mobile edge computing ,Cloud ,Task scheduling ,Microservices ,Optimization ,Container ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract In recent years, mobile applications have proliferated across domains such as E-banking, Augmented Reality, E-Transportation, and E-Healthcare. These applications are often built using microservices, an architectural style where the application is composed of independently deployable services focusing on specific functionalities. Mobile devices cannot process these microservices locally, so traditionally, cloud-based frameworks using cost-efficient Virtual Machines (VMs) and edge servers have been used to offload these tasks. However, cloud frameworks suffer from extended boot times and high transmission overhead, while edge servers have limited computational resources. To overcome these challenges, this study introduces a Microservices Container-Based Mobile Edge Cloud Computing (MCBMEC) environment and proposes an innovative framework, Optimization Task Scheduling and Computational Offloading with Cost Awareness (OTSCOCA). This framework addresses Resource Matching, Task Sequencing, and Task Scheduling to enhance server utilization, reduce service latency, and improve service bootup times. Empirical results validate the efficacy of MCBMEC and OTSCOCA, demonstrating significant improvements in server efficiency, reduced service latency, faster service bootup times, and notable cost savings. These outcomes underscore the pivotal role of these methodologies in advancing mobile edge computing applications amidst the challenges of edge server limitations and traditional cloud-based approaches.
- Published
- 2024
- Full Text
- View/download PDF
17. Mitigating interference of microservices with a scoring mechanism in large-scale clusters.
- Author
-
Yang, Dingyu, Zheng, Kangpeng, Qian, Shiyou, Hua, Qin, Zhang, Kaixuan, Cao, Jian, and Xue, Guangtao
- Abstract
Co-locating latency-critical services (LCSs) and best-effort jobs (BEJs) constitute the principal approach for enhancing resource utilization in production clusters. Nevertheless, the co-location practice hurts the performance of LCSs due to resource competition, even when employing isolation technology. Through an extensive analysis of voluminous real trace data derived from two production clusters, we observe that BEJs typically exhibit periodic execution patterns and serve as the primary sources of interference to LCSs. Furthermore, despite occupying the same level of resource consumption, the diverse compositions of BEJs can result in varying degrees of interference on LCSs. Subsequently, we propose PISM, a proactive Performance Interference Scoring and Mitigating framework for LCSs through the optimization of BEJ scheduling. Firstly, PISM adopts a data-driven approach to establish a characterization and classification methodology for BEJs. Secondly, PISM models the relationship between the composition of BEJs on servers and the response time (RT) of LCSs. Thirdly, PISM establishes an interference scoring mechanism in terms of RT, which serves as the foundation for BEJ scheduling. We assess the effectiveness of PISM on a small-scale cluster and through extensive data-driven simulations. The experiment results demonstrate that PISM can reduce cluster interference by up to 41.5%, and improve the throughput of long-tail LCSs by 76.4%. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
18. Saver: a proactive microservice resource scheduling strategy based on STGCN.
- Author
-
Jiang, Yi, Xue, Jin, Hu, Kun, Chen, Tianxiang, and Wu, Tong
- Subjects
- *
CLOUD computing , *PREDICTION models , *SCHEDULING , *CONTAINERS , *HEURISTIC algorithms - Abstract
As container technology and microservices mature, applications increasingly shift to microservices and cloud deployment. Growing microservices scale complicates resource scheduling. Traditional methods, based on fixed thresholds, are simple but lead to resource waste and poor adaptability to traffic spikes. To address this problem, we design a new resource scheduling strategy Saver based on the container cloud platform, which combines a microservice request prediction model with a microservice performance evaluation model that predicts SLO (Service Level Objective) violations and a heuristic algorithm to solve the optimal resource scheduling for the cluster. We deploy the microservices open-source project sock-shop in a Kubernetes cluster to evaluate Saver. Experimental results show that Saver saves 7.9% of CPU resources, 13% of the instances, and reduces the SLO violation rate by 31.2% compared to K8s autoscaler. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Guiding the implementation of data privacy with microservices.
- Author
-
Antunes, Pedro and Guimarães, Nuno
- Subjects
- *
DATA privacy , *LITERATURE reviews , *ELECTRONIC voting , *SYSTEMS software , *ELECTRONIC systems - Abstract
Privacy by design is nowadays recognized as essential in bringing data privacy into software systems. However, developers still face many challenges in reconciling privacy and software requirements and implementing privacy protections in software systems. One emerging trend is the adoption of microservices architectures—they bring in some qualities that can benefit privacy by design. The main goal of this study is to adapt privacy by design to the qualities brought by microservices. The main focus is at the architectural level, where the main structural decisions are made. A systematic literature review is adopted to identify a set of privacy models that underscore significant differences in software systems' protection using microservices. From the literature review, a decision framework is developed. The decision framework provides guidance and supports design decisions in implementing data privacy using microservices. The framework helps select and integrate different privacy models. An illustration of using the framework, which considers the design of an electronic voting system, is provided. This study contributes to closing the gap between regulation and implementation through design, where decisions related to data privacy are integrated with decisions on architecting systems using microservices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Performance evaluation of microservices communication with REST, GraphQL, and gRPC
- Author
-
Muhammad Niswar, Reza Arisandy Safruddin, Anugrayani Bustamin, and Iqra Aswad
- Subjects
microservices ,api ,grpc ,rest ,graphql ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Telecommunication ,TK5101-6720 - Abstract
Microservice architecture has become the design paradigm for creating scalable and maintainable software systems. Selecting the proper communication protocol in microservices is critical to achieving optimal system performance. This study compares the performance of three commonly used API protocols: REST, GraphQL, and gRPC, in microservices architecture. In this study, we established three microservices implemented in three containers and each microservice contained a Redis and MySQL database. We evaluated the performance of these API protocols using two key performance metrics: response time and CPU Utilization. This study performs two distinct data retrieval: fetching flat data and fetching nested data, with a number of requests ranging from 100 to 500 requests. The experimental results indicate that gRPC has a faster response time, followed by REST and GraphQL. Moreover, GraphQL shows higher CPU Utilization compared to gRPC and REST. The experimental results provide insight for developers and architects seeking to optimize their microservices communication protocols for specific use cases and workloads.
- Published
- 2024
- Full Text
- View/download PDF
21. Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture.
- Author
-
Fé, Iure, Nguyen, Tuan Anh, Mauro, Mario Di, Postiglione, Fabio, Ramos, Alex, Soares, André, Choi, Eunmi, Min, Dugki, Lee, Jae Woo, and Silva, Francisco Airton
- Subjects
- *
SYSTEMS availability , *OPERATIONS research , *PETRI nets , *COMPUTER science , *COMPUTER systems - Abstract
Computer system resilience refers to the ability of a computer system to continue functioning even in the face of unexpected events or disruptions. These disruptions can be caused by a variety of factors, such as hardware failures, software glitches, cyber attacks, or even natural disasters. Modern computational environments need applications that can recover quickly from major disruptions while also being environmentally sustainable. Balancing system resilience with energy efficiency is challenging, as efforts to improve one can harm the other. This paper presents a method to enhance disaster survivability in microservice architectures, particularly those using Kubernetes in cloud-based environments, focusing on optimizing electrical energy use. Aiming to save energy, our work adopt the consolidation strategy that means grouping multiple microservices on a single host. Our aproach uses a widely adopted analytical model, the Generalized Stochastic Petri Net (GSPN). GSPN are a powerful modeling technique that is widely used in various fields, including engineering, computer science, and operations research. One of the primary advantages of GSPN is its ability to model complex systems with a high degree of accuracy. Additionally, GSPN allows for the modeling of both logical and stochastic behavior, making it ideal for systems that involve a combination of both. Our GSPN models compute a number of metrics such as: recovery time, system availability, reliability, Mean Time to Failure, and the configuration of cloud-based microservices. We compared our approach against others focusing on survivability or efficiency. Our approach aligns with Recovery Time Objectives during sudden disasters and offers the fastest recovery, requiring 9% less warning time to fully recover in cases of disaster with alert when compared to strategies with similar electrical consumption. It also saves about 27% energy compared to low consolidation strategies and 5% against high consolidation under static conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Migration aspects from monolith to distributed systems using software code build and deployment time and latency perspective.
- Author
-
Aggarwal, Alok and Singh, Vinay
- Subjects
- *
TIME perspective , *SYSTEMS software , *LEGACY systems - Abstract
The transition from an error-prone, slower, and extremely high-volume legacy system like monolithic system to a faster, lighter, and error-free microservices based system is not always so simple. Microservices are independently deployable and allow for a better team autonomy. In this work, several migration efforts to migrate from a legacy based monolithic system to a pure distributed microservicesbased system has been tested and deployed in keeping two DevOps principles, the software code build and deployment time and latency in monolithic and microservices. Some real-time projects are considered to measure the performance and the time taken to execute the experiments. To measure the total build and deployment time and latency, Jenkins, Prometheus, and JMeter are installed which are industryrecommended softwares. It is observed that there is a total of 7 seconds taken to build and deploy at containers for 10 microservices whereas 10 monolith applications took almost 260 seconds to be built and deployed to the application server. While increasing more requests per second it is observed that upto 3000 requests per second, it impacted the response time of monolith applications but microservices stays the same. The main conclusion is that microservices are rarely impacted in response time with respect to requests per second. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios.
- Author
-
Ramos-Ramos, Diego, González-Vegas, Alejandro, Berrocal, Javier, and Galán-Jiménez, Jaime
- Abstract
Yearly, the rates of Internet penetration are on the rise, surpassing 80% in developed nations. Despite this progress, over two billion individuals in rural and low-income regions face a complete absence of Internet access. This lack of connectivity hinders the implementation of vital services like remote healthcare, emergency assistance, distance learning, and personal communications. To bridge this gap and bring essential services to rural populations, this paper leverages Unmanned Aerial Vehicles (UAVs). The proposal introduces a UAV-based network architecture and an energy-efficient algorithm to deploy Internet of Things (IoT) applications. These applications are broken down into microservices, strategically distributed among a subset of UAVs. This approach addresses the limitations associated with running an entire IoT application on a single UAV, which could lead to suboptimal outcomes due to battery and computational constraints. Simulation results conducted in a realistic scenario underscore the effectiveness of the proposed solution. The evaluation includes assessing the percentage of IoT requests successfully served to users in the designated area and reducing the energy consumption required by UAVs during the handling of such requests. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees.
- Author
-
Gias, Alim Ul, Gao, Yicheng, Sheldon, Matthew, Perusquía, José A., O'Brien, Owen, and Casale, Giuliano
- Subjects
- *
OPERATING budgets , *TREES , *SERVER farms (Computer network management) , *SAMPLING (Process) - Abstract
The storage requirement for distributed tracing can be reduced significantly by sampling only the anomalous or interesting traces that occur rarely at runtime. In this paper, we introduce an unsupervised sampling pipeline for distributed tracing that ensures high sampling accuracy while reducing the storage requirement. The proposed method, SampleHST-X, extends our recent work SampleHST. It operates based on a budget which limits the percentage of traces to be sampled while adjusting the storage quota of normal and anomalous traces depending on the size of this budget. The sampling process relies on accurately defining clusters of normal and anomalous traces by leveraging the distribution of mass scores, which characterize the probability of observing different traces, obtained from a forest of Half Space Trees (HST). In our experiments, using traces from a cloud data center, SampleHST yields 2.3 × to 9.5 × better sampling performance. SampleHST-X further extends the SampleHST approach by incorporating a novel class of Half Space Trees, namely Approximate HST, that uses approximate counters to update the mass scores. These counters significantly reduces the space requirement for HST while the sampling performance remains similar. In addition to this extension, SampleHST-X includes a Family of Graph Spectral Distances (FGSD) based trace characterization component, which, in addition to point anomalies, enables it to sample traces with collective anomalies. For such traces, we observe that the SampleHST-X approach can yield 1.2 × to 19 × better sampling performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Enhancing Monitoring Performance: A Microservices Approach to Monitoring with Spyware Techniques and Prediction Models.
- Author
-
Rossetto, Anubis Graciela de Moraes, Noetzold, Darlan, Silva, Luis Augusto, and Leithardt, Valderi Reis Quietinho
- Subjects
- *
COMPUTER architecture , *SPYWARE (Computer software) , *PREDICTION models , *DATA security failures , *COMPUTER monitors , *AUTOMATIC speech recognition - Abstract
In today's digital landscape, organizations face significant challenges, including sensitive data leaks and the proliferation of hate speech, both of which can lead to severe consequences such as financial losses, reputational damage, and psychological impacts on employees. This work considers a comprehensive solution using a microservices architecture to monitor computer usage within organizations effectively. The approach incorporates spyware techniques to capture data from employee computers and a web application for alert management. The system detects data leaks, suspicious behaviors, and hate speech through efficient data capture and predictive modeling. Therefore, this paper presents a comparative performance analysis between Spring Boot and Quarkus, focusing on objective metrics and quantitative statistics. By utilizing recognized tools and benchmarks in the computer science community, the study provides an in-depth understanding of the performance differences between these two platforms. The implementation of Quarkus over Spring Boot demonstrated substantial improvements: memory usage was reduced by up to 80% and CPU usage by 95%, and system uptime decreased by 119%. This solution offers a robust framework for enhancing organizational security and mitigating potential threats through proactive monitoring and predictive analysis while also guiding developers and software architects in making informed technological choices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Benchmarking Micro2Micro transformation: an approach with GNN and VAE.
- Author
-
Chy, Md Showkat Hossain, Sooksatra, Korn, Yero, Jorge, and Cerny, Tomas
- Subjects
- *
GRAPH neural networks , *SOFTWARE architecture , *MACHINE learning , *LANDSCAPE architecture - Abstract
In the evolving landscape of software architecture, the shift from monolithic structures to agile, scalable microservices has revolutionized cloud-native application development. However, the inherent dynamism of microservices can lead to the inadvertent creation of unnecessary microservices, introducing complexity and inefficiency. Moreover, with a lack of control mechanisms in evolution, systems can lead to what is known as architecture degradation. This research ventures into the emerging domain of microservice-to-microservice transformation, a concept focused on optimizing existing cloud-native systems. We experiment with a machine learning methodology initially designed for monolith-to-microservices migration, adapting it to the complex microservices landscape, with a specific focus on the train-ticket application (Zhou in Association for Computing Machinery, https://doi.org/10.1145/3183440.3194991), which is an established system benchmark in the community. To identify the optimal microservice distribution, we employ a combination of the Variational Autoencoder and fuzzy c-means clustering. Our results demonstrate a close resemblance to the original application in terms of structural modularity. Though they fall short of achieving the ideal interface number exhibited by the original microservices, our findings highlight the potential of automated microservice composition, effectively narrowing the gap between human-designed and machine-generated microservices and advancing the field of software architecture. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. From static code analysis to visual models of microservice architecture.
- Author
-
Cerny, Tomas, Abdelfattah, Amr S., Yero, Jorge, and Taibi, Davide
- Subjects
- *
SOFTWARE architecture , *AUGMENTED reality , *SCALABILITY , *SOFTWARE visualization , *QUALITY assurance - Abstract
Microservice architecture is the mainstream driver for cloud-native systems. It brings various benefits to the development process, such as enabling decentralized development and evolution of self-contained system parts, facilitating their selective scalability. However, new challenges emerge in such systems as the system-holistic quality assurance becomes difficult. It becomes hard to maintain the desired system architecture since many teams are involved in the development process and have greater autonomy. Without instruments and practices to coordinate teams and assess the system as a whole, the system is prone to architectural degradation. To face such challenges, various architectural aspects of the system should be accessible to practitioners. It would give them a better understanding of interconnections and dependencies among the microservice they manage and the context of the entire system. This manuscript provides the perspective on uncovering selected system architectural views using static code analysis. It demonstrates that holistic architectural views can be effectively derived from the system codebase(s), highlighting dependencies across microservices. Such new perspectives will aid practitioners in making informed decisions when intending to change and evolve the system. Moreover, with such a new instrument for system holistic assessment, we quickly realize that human experts must cope with another problem, the evergrowing scales of cloud-native systems. To elaborate on the topic, this manuscript examines how static analysis outcomes can be transformed into interactive architectural visualizations to assist practitioners in handling large-scale complexities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices.
- Author
-
Shafi, Numan, Abdullah, Muhammad, Iqbal, Waheed, Erradi, Abdelkarim, and Bukhari, Faisal
- Subjects
- *
WEB-based user interfaces , *STIMULUS & response (Psychology) , *MACHINE learning , *CONTAINERS , *COST - Abstract
Microservices are containerized, loosely coupled, interactive smaller units of the application that can be deployed, reused, and maintained independently. In a microservices-based application, allocating the right computing resources for each containerized microservice is important to meet the specific performance requirements while minimizing the infrastructure cost. Microservices-based applications are easy to scale automatically based on incoming workload and resource demand automatically. However, it is challenging to identify the right amount of resources for containers hosting microservices and then allocate them dynamically during the auto-scaling. Existing auto-scaling solutions for microservices focus on identifying the appropriate time and number of containers to be added/removed dynamically for an application. However, they do not address the issue of selecting the right amount of resources, such as CPU cores, for individual containers during each scaling event. This paper presents a novel approach to dynamically allocate the CPU resources to the containerized microservice during the autoscaling events. Our proposed approach is based on the machine learning method, which can identify the right amount of CPU resources for each container, dynamically spawning for the microservices over time to satisfy the application's response time requirements. The proposed solution is evaluated using a benchmark microservices-based application based on real-world workloads on the Kubernetes cluster. The experimental results show that the proposed solution outperforms by yielding a 40% to 60% reduction in violating the response time requirements with 0.5 × to 1.5 × less cost compared to the state-of-art baseline methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. A general and modular framework for dark web analysis.
- Author
-
Ruiz Ródenas, José Manuel, Pastor-Galindo, Javier, and Gómez Mármol, Félix
- Subjects
- *
DARKNETS (File sharing) , *DATABASES , *STEVEDORES , *ONIONS , *LOGIC - Abstract
The dark web, often linked with illegal activities, can be monitored with different solutions. However, these tools are typically purpose-specific and designed for unique use cases. In this study, we propose a flexible and scalable framework that facilitates the easy integration of new workflows for dark web analysis. The design is based on the control, logic and operations layers, supplemented by a tools module, logs management, asynchronous message-based communication and a database. The implementation maps the features into a microservice approach, utilizing the open-source technologies Docker Swarm, Kafka, ELK Stack (Elastic Search, Logstash and Kibana), and PostgreSQL. A workflow to scrape web elements of Tor onion services is deployed and validated, demonstrating considerable framework performance despite the time-consuming task of navigating the dark web. Over 16 h, the framework collected over half million onion domains (84,371 unique ones) and made 78,555 accesses to them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles.
- Author
-
Zarie, Mira M., Ateya, Abdelhamied A., Sayed, Mohammed S., ElAffendi, Mohammed, and Abdellatif, Mohammad Mahmoud
- Subjects
COMPUTER network traffic ,TECHNOLOGICAL innovations ,MOBILE computing ,SOFTWARE-defined networking ,DISTRIBUTED computing - Abstract
The fifth-generation (5G) cellular infrastructure is expected to bring about the widespread use of connected vehicles. This technological progress marks the beginning of a new era in vehicular networks, which includes a range of different types and services of self-driving cars and the smooth sharing of information between vehicles. Connected vehicles have also been announced as a main use case of the sixth-generation (6G) cellular, with ultimate requirements beyond the 5G (B5G) and 6G eras. These networks require full coverage, extremely high reliability and availability, very low latency, and significant system adaptability. The significant specifications set for vehicular networks pose considerable design and development challenges. The goals of establishing a latency of 1 millisecond, effectively handling large amounts of data traffic, and facilitating high-speed mobility are of utmost importance. To address these difficulties and meet the demands of upcoming networks, e.g., 6G, it is necessary to improve the performance of vehicle networks by incorporating innovative technology into existing network structures. This work presents significant enhancements to vehicular networks to fulfill the demanding specifications by utilizing state-of-the-art technologies, including distributed edge computing, e.g., mobile edge computing (MEC) and fog computing, software-defined networking (SDN), and microservice. The work provides a novel vehicular network structure based on micro-services architecture that meets the requirements of 6G networks. The required offloading scheme is introduced, and a handover algorithm is presented to provide seamless communication over the network. Moreover, a migration scheme for migrating data between edge servers was developed. The work was evaluated in terms of latency, availability, and reliability. The results outperformed existing traditional approaches, demonstrating the potential of our approach to meet the demanding requirements of next-generation vehicular networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Towards a security‐optimized approach for the microservice‐oriented decomposition.
- Author
-
Liu, Xiaodong, Chen, Zhikun, Qian, Yu, Zhong, Chenxing, Huang, Huang, Li, Shanshan, and Shao, Dong
- Subjects
- *
OPTIMIZATION algorithms , *DATA security , *ARCHITECTURAL style , *EVIDENCE gaps , *COMPUTER software security , *SERVICE-oriented architecture (Computer science) - Abstract
Microservice architecture (MSA) is a mainstream architectural style due to its high maintainability and scalability. In practice, an appropriate microservice‐oriented decomposition is the foundation to make a system enjoy the benefits of MSA. In terms of decomposing monolithic systems into microservices, researchers have been exploring many optimization objectives, of which modularity is a predominantly focused quality attribute. Security is also a critical quality attribute, that measures the extent to which a system protects data from malicious access or use by attackers. Considering security in microservices‐oriented decomposition can help avoid the risk of leaking critical data and other unexpected software security issues. However, few researchers consider the security objective during microservice‐oriented decomposition, because the measurement of security and the trade‐off with other objectives are challenging in reality. To bridge this research gap, we propose a security‐optimized approach for microservice‐oriented decomposition (So4MoD). In this approach, we adapt five metrics from previous studies for the measurement of the data security of candidate microservices. A multi‐objective optimization algorithm based on NSGA‐II is designed to search for microservices with optimized security and modularity. To validate the effectiveness of the proposed So4MoD, we perform several experiments on eight open‐source projects and compare the decomposition results to other three state‐of‐the‐art approaches, that is, FoSCI, CO‐GCN, and MSExtractor. The experiment results show that our approach can achieve at least an 11.5% improvement in terms of security metrics. Moreover, the decomposition results of So4MoD outperform other approaches in four modularity metrics, demonstrating that So4MoD can optimize data security while pursuing a well‐modularized MSA. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Design Procedure for Real-Time Cyber–Physical Systems Tolerant to Cyberattacks.
- Author
-
Paredes, Carlos M., Martínez Castro, Diego, González Potes, Apolinar, Rey Piedrahita, Andrés, and Ibarra Junquera, Vrani
- Subjects
- *
INDUSTRIAL robots , *CYBERTERRORISM , *INDUSTRIALISM , *CYBER physical systems , *SECURITY systems , *SYMMETRY - Abstract
Modern industrial automation supported by Cyber–Physical Systems (CPSs) requires high flexibility, which is achieved through increased interconnection between modules. This interconnection introduces a layer of symmetry into the design and operation of CPSs, balancing the distribution of tasks and resources across the system and streamlining the flow of information. However, this adaptability also exposes control systems to security threats, particularly through novel communication links that are vulnerable to cyberattacks. Traditional strategies may have limitations in these applications. This research proposes a design approach for control applications supported by CPSs that incorporates cyberattack detection and tolerance strategies. Using a modular and adaptive approach, the system is partitioned into microservices for scalability and resilience, allowing structural symmetry to be maintained. Schedulability assessments ensure that critical timing constraints are met, improving overall system symmetry and performance. Advanced cyberattack detection and isolation systems generate alarms and facilitate rapid response with replicas of affected components. These replicas enable the system to recover from and tolerate cyberattacks, maintaining uninterrupted operation and preserving the balanced structure of the system. In conclusion, the proposed approach addresses the security challenges in CPS-based control applications and provides an integrated and robust approach to protect industrial automation systems from cyber threats. A case study conducted at a juice production facility in Colima, México, demonstrated how the architecture can be applied to complex processes such as pH control, from simulation to industrial implementation. The study highlighted a plug-and-play approach, starting with component definitions and relationships, and extending to technology integration, thereby reinforcing symmetry and efficiency within the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Detecting Structured Query Language Injections in Web Microservices Using Machine Learning.
- Author
-
Peralta-Garcia, Edwin, Quevedo-Monsalbe, Juan, Tuesta-Monteza, Victor, and Arcila-Diaz, Juan
- Subjects
LITERATURE reviews ,SUPPORT vector machines ,RANDOM forest algorithms ,WEB-based user interfaces ,DECISION trees ,MACHINE learning ,SOFTWARE architecture - Abstract
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservices trained using a public dataset of 22,764 records. Additionally, a software architecture based on the microservices approach was implemented, in which trained models and the web application were deployed to validate requests and detect attacks. A literature review was conducted to identify types of SQL injections and machine learning algorithms. The results of random forest, decision tree, and support vector machine were compared for detecting SQL injections. The findings show that random forest outperforms with a precision and accuracy of 99%, a recall of 97%, and an F1 score of 98%. In contrast, decision tree achieved a precision of 92%, a recall of 86%, and an F1 score of 97%. Support Vector Machine (SVM) presented an accuracy, precision, and F1 score of 98%, with a recall of 97%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Micro Frontend Based Performance Improvement and Prediction for Microservices Using Machine Learning.
- Author
-
Kaushik, Neha, Kumar, Harish, and Raj, Vinay
- Abstract
Microservices has become a buzzword in industry as many large IT giants such as Amazon, Twitter, Uber, etc have started migrating their existing applications to this new style and few of them have started building their new applications with this style. Due to increasing user requirements and the need to add more business functionalities to the existing applications, the web applications designed using the microservices style also face a few performance challenges. Though this style has been successfully adopted in the design of large enterprise applications, still the applications face performance related issues. It is clear from the literature that most of the articles focus only on the backend microservices. To the best of our knowledge, there has been no solution proposed considering micro frontends along with the backend microservices. To improve the performance of the microservices based web applications, in this paper, a new framework for the design of web applications with micro frontends for frontend and microservices in the backend of the application is presented. To assess the proposed framework, an empirical investigation is performed to analyze the performance and it is found that the applications designed with micro frontends with microservices have performed better than the applications with monolithic frontends. Additionally, to predict the performance of microservices based applications, a machine learning model is proposed as machine learning has wide applications in software engineering related activities. The accuracy of the proposed model using different metrics is also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Technical Support System for High Concurrent Power Trading Platforms Based on Microservice Load Balancing.
- Author
-
Shao, Ping, Huang, Longda, Weng, Liguo, and Liu, Ziheng
- Subjects
EXCLUSIVE & concurrent legislative powers ,ELECTRICITY markets ,PROBLEM solving ,SECURITY systems - Abstract
With the booming development of the electricity market, market factors such as electricity trading varieties are growing rapidly. The frequency of transactions has become increasingly real-time, and transaction clearing and settlement tasks have become more complex. The increasing demands for concurrent access and carrying capacity in trading systems have made it increasingly difficult for existing systems to support business. This article proposes a transaction support system for large-scale electricity trading market entities, which solves the problems of high concurrency access and massive access data calculation while ensuring system security through business isolation measures. The system uses microservices to treat various functional modules as independent service modules, thus making service segmentation and composition more flexible. By using read–write separation, caching mechanisms, and several data reliability assurance measures, data can be stored and accessed quickly and securely. The use of a three-layer load balancing module consisting of an OpenResty access entry layer, a gateway routing gateway layer, and a WebClient service inter-resource invocation layer can effectively improve the system's ability to handle concurrent access. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. 三峡电站检修计划安排 平台数字化建设与优化研究.
- Author
-
江 雨, 邹 毅, 蔡 伟, 吴礼贵, 曹 欢, and 杨 荣
- Abstract
Copyright of China Rural Water & Hydropower is the property of China Rural Water & Hydropower Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
37. A distributed tracing pipeline for improving locality awareness of microservices applications.
- Author
-
Colarusso, Carmine, De Caro, Assunta, Falco, Ida, Goglia, Lorenzo, and Zimeo, Eugenio
- Subjects
ARCHITECTURAL style ,SOFTWARE maintenance ,BIG data ,AWARENESS ,TIMEKEEPING - Abstract
The microservices architectural style aims at improving software maintenance and scalability by decomposing applications into independently deployable components. A common criticism about this style is the risk of increasing response times due to communication, especially with very granular entities. Locality‐aware placement of microservices onto the underlying hardware can contribute to keeping response times low. However, the complex graphs of invocations originating from users' calls largely depend on the specific workload (e.g., the length of an invocation chain could depend on the input parameters). Therefore, many existing approaches are not suitable for modern infrastructures where application components can be dynamically redeployed to take into account user expectations. This paper contributes to overcoming the limitations of static or off‐line techniques by presenting a big data pipeline to dynamically collect tracing data from running applications that are used to identify a given number k$$ k $$ of microservices groups whose deployment allows keeping low the response times of the most critical operations under a defined workload. The results, obtained in different working conditions and with different infrastructure configurations, are presented and discussed to draw the main considerations about the general problem of defining boundary, granularity, and optimal placement of microservices on the underlying execution environment. In particular, they show that knowing how a specific workload impacts the constituent microservices of an application, helps achieve better performance, by effectively lowering response time (e.g., up to a 61%$$ 61\% $$ reduction), through the exploitation of locality‐driven clustering strategies for deploying groups of services. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Microservices’ libraries enabling server-side business logic visual programming for digital twins
- Author
-
Marco Fanfani, Luciano Alessandro Ipsaro Palesi, and Paolo Nesi
- Subjects
Microservices ,Digital twin ,Server-side business logic ,Node-RED, Business Intelligence ,Computer software ,QA76.75-76.765 - Abstract
Digital twins are evermore adopted for planning activities in smart city and industrial contexts, thus requiring platforms able to handle their complexity, continuously adapting and improving data flow business logic behind to the user needs. To respond to such needs microservice architecture paradigm and business logic scripting solutions can be exploited. They should include facilities for data ingestion, transformation, visualization & event driven user interaction, formal definition of functional aspects, exploitation and management of data analytics and simulation, interoperability with external services of any kind, etc. To provide an easy and quick development tools, a large number of microservice has been formalized in a suite of new Nodes for the Node-RED framework and distributed in terms of Libraries via JS Foundation. The proposed suites of nodes (e.g., Snap4City libraries on Node-RED) are widely adopted by academic and industrial groups and fully integrated into Snap4City, an open-source platform for digital twins realization which can be used on cloud and on premise.
- Published
- 2024
- Full Text
- View/download PDF
39. Ambience: an operating system for IoT microservices
- Author
-
Fatih Bakir, Sierra Wang, Tyler Ekaireb, Jack Pearson, Chandra Krintz, and Rich Wolski
- Subjects
Internet of Things ,operating systems ,edge-cloud continuum ,microservices ,Electronic computers. Computer science ,QA75.5-76.95 ,Computer engineering. Computer hardware ,TK7885-7895 - Abstract
Increasingly, the heterogeneity of devices and software that comprise the Internet of Things (IoT) is impeding innovation. IoT deployments amalgamate compute, storage, networking capabilities provisioned at multiple resource scales, from low-cost, resource constrained microcontrollers to resource rich public cloud servers. To support these different resource scales and capabilities, the operating systems (OSs) that manage them have also diverged significantly. Because the OS is the “API” for the hardware, this proliferation is causing a lack of portability across devices and systems, complicating development, deployment, management, and optimization of IoT applications. To address these impediments, we investigate a new, “clean slate” OS design and implementation that hides this heterogeneity via a new set of abstractions specifically for supporting microservices as a universal application programming model in IoT contexts. The operating system, called Ambience, supports IoT applications structured as microservices and facilitates their portability, isolation, and deployment time optimization. We discuss the design and implementation of Ambience, evaluate its performance, and demonstrate its portability using both microbenchmarks and end-to-end IoT deployments. Our results show that Ambience can scale down to 64MHz microcontrollers and up to modern x86_64 servers, while providing similar or better performance than comparable commodity operating systems on the same range of hardware platforms.
- Published
- 2024
- Full Text
- View/download PDF
40. Microservices-based cloud-edge collaborative condition monitoring platform for smart manufacturing systems.
- Author
-
Yang, Hanbo, Ong, S. K., Nee, A. Y. C., Jiang, Gedong, and Mei, Xuesong
- Subjects
MANUFACTURING processes ,INTERNET of things ,DATA transmission systems ,SCALABILITY ,CLOUD storage ,MANUFACTURING industries - Abstract
In the context of the Industrial Internet of things (IIoT), large-scale IIoT data is generated, which can be effectively mined to provide valuable information for condition monitoring (CM). However, traditional CM methods cannot meet unprecedented challenges concerning large-scale IIoT data transmission, storage and analysis. Therefore, manufacturers have begun to shift from the traditional manufacturing paradigm to smart manufacturing, which integrates the encapsulated manufacturing services and the enabling cloud-edge computing technology to handle large-scale IIoT data. To enhance the agility, scalability and portability of traditional manufacturing services, a microservices-based cloud-edge collaborative CM platform for smart manufacturing systems is proposed. First, leveraging the microservices management system, the lightweight edge and cloud services are constructed from the microservices level, which enables flexible deployment and upgrade of services. Next, the proposed platform architecture effectively integrates the computing and storage capabilities of the cloud layer and the real-time nature of the edge layer, where the cloud-edge collaborative mechanism is introduced to achieve real-time diagnosis and enhance prognosis accuracy. Finally, based on the proposed system, the diagnosis and prognosis tasks are implemented on a manufacturing line, and the results show that the diagnostic accuracy is 90% and the prediction error is 50%. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
41. Building Blocks to Empower Cognitive Internet with Hybrid Edge Cloud
- Author
-
Arjomandi, Fay, Alamouti, Siavash, Burger, Michel, Altakrouri, Bashar, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2024
- Full Text
- View/download PDF
42. Enhancing Performance and Scalability of a Flutter-Based Food Ordering Application through Microservices on AWS
- Author
-
Pangarkar, Vaibhav, Savant, Vivek, Kapase, Vaibhav, Patil, Avishkar, Warpe, Santosh, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Illés, Zoltán, editor, Verma, Chaman, editor, Gonçalves, Paulo J. Sequeira, editor, and Singh, Pradeep Kumar, editor
- Published
- 2024
- Full Text
- View/download PDF
43. Implement a System Based on Hybrid Databases that Expedites Documentary Management for the Development of the Urban Area of the Municipality of Breña
- Author
-
Inche, Daniel, Rios, Alexander, Ballon, Joseph, Ticona, Wilfredo, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Silhavy, Radek, editor, and Silhavy, Petr, editor
- Published
- 2024
- Full Text
- View/download PDF
44. Towards Decomposing Monolithic Applications into Microservices: Dynamic Analysis
- Author
-
Nassima, Ait Manssour, Hanae, Sbai, Karim, Baïna, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Mejdoub, Youssef, editor, and Elamri, Abdelkebir, editor
- Published
- 2024
- Full Text
- View/download PDF
45. Design of Chongqing Inspection Data Center Based on Cloud Native Technology Architecture
- Author
-
Tang, Rong, Zhang, Huadong, Xia, Yuyi, Jiang, Ling, Zhao, Fei, Chan, Albert P. C., Series Editor, Hong, Wei-Chiang, Series Editor, Mellal, Mohamed Arezki, Series Editor, Narayanan, Ramadas, Series Editor, Nguyen, Quang Ngoc, Series Editor, Ong, Hwai Chyuan, Series Editor, Sachsenmeier, Peter, Series Editor, Sun, Zaicheng, Series Editor, Ullah, Sharif, Series Editor, Wu, Junwei, Series Editor, Zhang, Wei, Series Editor, Chen, Colin W. K., editor, Malik, Tariq H., editor, Fu, Qiufang, editor, and Xuan, Haiyan, editor
- Published
- 2024
- Full Text
- View/download PDF
46. A Cloud-Native Adoption of Classical DBMS Performance Benchmarks and Tools
- Author
-
Erdelt, Patrick K., Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Nambiar, Raghunath, editor, and Poess, Meikel, editor
- Published
- 2024
- Full Text
- View/download PDF
47. A Design for Expanding Non-safety DCS Server Based on Microservices in Nuclear Power Plants
- Author
-
Deng, Ze-fan, Dong, Xiao-feng, Wang, Gui-lan, Peng, Li, Shi, Gui-lian, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Gu, Pengfei, editor, Xu, Yang, editor, Chen, Weihua, editor, Wang, Zhongqiu, editor, Sun, Yongbin, editor, and Liu, Zheming, editor
- Published
- 2024
- Full Text
- View/download PDF
48. A Multi-variant Benchmark for Microservice Systems in Software Engineering Research
- Author
-
Cerny, Tomas, Chy, Md Showkat Hossain, Arju, Muhmmad Ashfakur Rahman, Sooksatra, Korn, Abdelfattah, Amr S., Lenarduzzi, Valentina, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ampatzoglou, Apostolos, editor, Pérez, Jennifer, editor, Buhnova, Barbora, editor, Lenarduzzi, Valentina, editor, Venters, Colin C., editor, Zdun, Uwe, editor, Drira, Khalil, editor, Rebelo, Luciana, editor, Di Pompeo, Daniele, editor, Tucci, Michele, editor, Nakagawa, Elisa Yumi, editor, and Navarro, Elena, editor
- Published
- 2024
- Full Text
- View/download PDF
49. Technical Debt and Software Quality in Cloud-Native Applications
- Author
-
Su, Ruoyu, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ampatzoglou, Apostolos, editor, Pérez, Jennifer, editor, Buhnova, Barbora, editor, Lenarduzzi, Valentina, editor, Venters, Colin C., editor, Zdun, Uwe, editor, Drira, Khalil, editor, Rebelo, Luciana, editor, Di Pompeo, Daniele, editor, Tucci, Michele, editor, Nakagawa, Elisa Yumi, editor, and Navarro, Elena, editor
- Published
- 2024
- Full Text
- View/download PDF
50. Evaluating the Effect of Team Ownership of Microservices: Strategies for Balancing Decoupling, Coordination, and System Cohesion
- Author
-
Ahmad, Noman, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ampatzoglou, Apostolos, editor, Pérez, Jennifer, editor, Buhnova, Barbora, editor, Lenarduzzi, Valentina, editor, Venters, Colin C., editor, Zdun, Uwe, editor, Drira, Khalil, editor, Rebelo, Luciana, editor, Di Pompeo, Daniele, editor, Tucci, Michele, editor, Nakagawa, Elisa Yumi, editor, and Navarro, Elena, editor
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.