[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (265)

Search Parameters:
Keywords = microservices

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 4248 KiB  
Article
OOSP: Opportunistic Optimization Scheme for Pod Deployment Enhanced with Multilayered Sensing
by Joo-Young Roh, Sang-Hoon Choi and Ki-Woong Park
Sensors 2024, 24(19), 6244; https://doi.org/10.3390/s24196244 - 26 Sep 2024
Viewed by 377
Abstract
In modern cloud environments, container orchestration tools are essential for effectively managing diverse workloads and services, and Kubernetes has become the de facto standard tool for automating the deployment, scaling, and operation of containerized applications. While Kubernetes plays an important role in optimizing [...] Read more.
In modern cloud environments, container orchestration tools are essential for effectively managing diverse workloads and services, and Kubernetes has become the de facto standard tool for automating the deployment, scaling, and operation of containerized applications. While Kubernetes plays an important role in optimizing and managing the deployment of diverse services and applications, its default scheduling approach, which is not optimized for all types of workloads, can often result in poor performance and wasted resources. This is particularly true in environments with complex interactions between services, such as microservice architectures. The traditional Kubernetes scheduler makes scheduling decisions based on CPU and memory usage, but the limitation of this arrangement is that it does not fully account for the performance and resource efficiency of the application. As a result, the communication latency between services increases, and the overall system performance suffers. Therefore, a more sophisticated and adaptive scheduling method is required. In this work, we propose an adaptive pod placement optimization technique using multi-tier inspection to address these issues. The proposed technique collects and analyzes multi-tier data to improve application performance and resource efficiency, which are overlooked by the default Kubernetes scheduler. It derives optimal placements based on the coupling and dependencies between pods, resulting in more efficient resource usage and better performance. To validate the performance of the proposed method, we configured a Kubernetes cluster in a virtualized environment and conducted experiments using a benchmark application with a microservice architecture. The experimental results show that the proposed method outperforms the existing Kubernetes scheduler, reducing the average response time by up to 11.5% and increasing the number of requests processed per second by up to 10.04%. This indicates that the proposed method minimizes the inter-pod communication delay and improves the system-wide resource utilization. This research aims to optimize application performance and increase resource efficiency in cloud-native environments, and the proposed technique can be applied to different cloud environments and workloads in the future to provide more generalized optimizations. This is expected to contribute to increasing the operational efficiency of cloud infrastructure and improving the quality of service. Full article
Show Figures

Figure 1

Figure 1
<p>Overall system architecture.</p>
Full article ">Figure 2
<p>Overall System process flow.</p>
Full article ">Figure 3
<p>Cluster Level data collection structure.</p>
Full article ">Figure 4
<p>Application Level data collection structure.</p>
Full article ">Figure 5
<p>Cohesion Inference Process Flowchart.</p>
Full article ">Figure 6
<p>Dependency inference process flowchart.</p>
Full article ">Figure 7
<p>Teastore architecture.</p>
Full article ">Figure 8
<p>Robot-shop.</p>
Full article ">Figure 9
<p>Example of pod placement using a Kubernetes scheduler.</p>
Full article ">Figure 10
<p>Changes in <span class="html-italic">Teastore</span> pod placement by the algorithm.</p>
Full article ">Figure 11
<p>Changes in <span class="html-italic">Robot-shop</span> pod placement by the algorithm.</p>
Full article ">Figure 12
<p>Average response time by pod placement in <span class="html-italic">Teastore</span>.</p>
Full article ">Figure 13
<p>Requests per second by pod placement in <span class="html-italic">Teastore</span>.</p>
Full article ">Figure 14
<p>Average response time by pod placement in <span class="html-italic">Robot-shop</span>.</p>
Full article ">Figure 15
<p>Requests per second by pod placement in <span class="html-italic">Robot-shop</span>.</p>
Full article ">
15 pages, 460 KiB  
Article
Improving QoS Management Using Associative Memory and Event-Driven Transaction History
by Antonella Di Stefano, Massimo Gollo and Giovanni Morana
Information 2024, 15(9), 569; https://doi.org/10.3390/info15090569 - 18 Sep 2024
Viewed by 526
Abstract
Managing modern, web-based, distributed applications effectively is a complex task that requires coordinating several aspects, including understanding the relationships among their components, the way they interact, the available hardware, the quality of network connections, and the providers hosting them. A distributed application consists [...] Read more.
Managing modern, web-based, distributed applications effectively is a complex task that requires coordinating several aspects, including understanding the relationships among their components, the way they interact, the available hardware, the quality of network connections, and the providers hosting them. A distributed application consists of multiple independent and autonomous components. Managing the application involves overseeing each individual component with a focus on global optimization rather than local optimization. Furthermore, each component may be hosted by different resource providers, each offering its own monitoring and control interfaces. This diversity adds complexity to the management process. Lastly, the implementation, load profile, and internal status of an application or any of its components can evolve over time. This evolution makes it challenging for a Quality of Service (QoS) manager to adapt to the dynamics of the application’s performance. This aspect, in particular, can significantly affect the QoS manager’s ability to manage the application, as the controlling strategies often rely on the analysis of historical behavior. In this paper, the authors propose an extension to a previously introduced QoS manager through the addition of two new modules: (i) an associative memory module and (ii) an event forecast module. Specifically, the associative memory module, functioning as a cache, is designed to accelerate inference times. The event forecast module, which relies on a Weibull Time-to-Event Recurrent Neural Network (WTTE-RNN), aims to provide a more comprehensive view of the system’s current status and, more importantly, to mitigate the limitations posed by the finite number of decision classes in the classification algorithm. Full article
(This article belongs to the Special Issue Fundamental Problems of Information Studies)
Show Figures

Figure 1

Figure 1
<p>Associative memory.</p>
Full article ">Figure 2
<p>Event Forecasting Module architecture.</p>
Full article ">Figure 3
<p>SpeedUp using cache.</p>
Full article ">
43 pages, 13601 KiB  
Article
Real-Time Document Collaboration—System Architecture and Design
by Daniel Iovescu and Cătălin Tudose
Appl. Sci. 2024, 14(18), 8356; https://doi.org/10.3390/app14188356 - 17 Sep 2024
Viewed by 929
Abstract
This article explores the world of dependable systems, specifically focusing on system design, software solutions, and architectural decisions that facilitate collaborative work on shared text documents across multiple users in near real time. It aims to dive into the intricacies of designing robust [...] Read more.
This article explores the world of dependable systems, specifically focusing on system design, software solutions, and architectural decisions that facilitate collaborative work on shared text documents across multiple users in near real time. It aims to dive into the intricacies of designing robust and effective document collaboration software focusing on understanding the requirements of such a system, the working principle of collaborative text editing, software architecture, technology stack selection, and tooling that can sustain such a system. To examine the pros and cons of the proposed system, the paper will detail how collaborative text editing software can benefit from such an architecture regarding availability, elasticity, and scaling. The intricate nature of this system renders this paper a valuable resource for prospective investigations within the domain of dependable systems and distributed systems. This research first examines the requirements of a real-time collaboration system and the necessary core features. Then, it analyzes the design, the application structure, and the system organization while also considering key architectural requirements as the necessity of scaling, the usage of microservices, cross-service communications, and client–server communication. For the technology stack of the implementation, this research considers the alternatives at each layer, from client to server. Once these decisions are made, it follows system development while examining possible improvements for the issues previously encountered. To validate the architecture, a testing strategy is developed, to examine the key capabilities of the system, such as resource consumption and throughput. The conclusions review the combination of modern and conventional application development principles needed to address the challenges of conflict-free document replication, decoupled and stateless event-driven architecture, idempotency, and data consistency. This paper not only showcases the design and implementation process but also sets a foundation for future research and innovation in dependable systems, collaborative technologies, sustainable solutions, and distributed system architecture. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Development methodology: from requirements to architecture validation.</p>
Full article ">Figure 2
<p>Initial application diagram.</p>
Full article ">Figure 3
<p>Example of an event-driven messaging system.</p>
Full article ">Figure 4
<p>SSE interaction between the client and server.</p>
Full article ">Figure 5
<p>Application diagram with a messaging layer.</p>
Full article ">Figure 6
<p>Application diagram with storage layer.</p>
Full article ">Figure 7
<p>Kubernetes cluster diagram.</p>
Full article ">Figure 8
<p>Producer–consumer queue.</p>
Full article ">Figure 9
<p>Distributed queue system.</p>
Full article ">Figure 10
<p>Sample of Kafka topics for a collaborative system design.</p>
Full article ">Figure 11
<p>Group consumer.</p>
Full article ">Figure 12
<p>Multiple group consumer.</p>
Full article ">Figure 13
<p>The structure of a JWT token.</p>
Full article ">Figure 14
<p>Executing a transaction between clients.</p>
Full article ">Figure 15
<p>Multi-client consumers on a single server.</p>
Full article ">Figure 16
<p>Forwarding events between services.</p>
Full article ">Figure 17
<p>Introducing a bridge for physically isolated services.</p>
Full article ">Figure 18
<p>JVM Test 1—resource comparison.</p>
Full article ">Figure 19
<p>JVM Test 1—CPU consumption evolution.</p>
Full article ">Figure 20
<p>JVM Test 1—RAM consumption evolution.</p>
Full article ">Figure 21
<p>JVM Test 2—resource comparison.</p>
Full article ">Figure 22
<p>JVM Test 2—CPU consumption evolution.</p>
Full article ">Figure 23
<p>JVM Test 2—RAM consumption evolution.</p>
Full article ">Figure 24
<p>JVM Test 3—resource comparison.</p>
Full article ">Figure 25
<p>JVM Test 3—CPU consumption evolution.</p>
Full article ">Figure 26
<p>JVM Test 3—RAM consumption evolution.</p>
Full article ">Figure 27
<p>GraalVM Test 1—resource comparison.</p>
Full article ">Figure 28
<p>GraalVM Test 1—CPU consumption evolution.</p>
Full article ">Figure 29
<p>GraalVM Test 1—RAM consumption evolution.</p>
Full article ">Figure 30
<p>GraalVM Test 2—resource comparison.</p>
Full article ">Figure 31
<p>GraalVM Test 2—CPU consumption evolution.</p>
Full article ">Figure 32
<p>GraalVM Test 2—RAM consumption evolution.</p>
Full article ">Figure 33
<p>GraalVM Test 3—resource comparison.</p>
Full article ">Figure 34
<p>GraalVM Test 3—CPU consumption evolution.</p>
Full article ">Figure 35
<p>GraalVM Test 3—RAM consumption evolution.</p>
Full article ">Figure 36
<p>Example of percentile on response time histogram.</p>
Full article ">Figure 37
<p>JVM response time histogram.</p>
Full article ">Figure 38
<p>GraalVM response time histogram.</p>
Full article ">
17 pages, 11753 KiB  
Article
An Industrial Internet-of-Things (IIoT) Open Architecture for Information and Decision Support Systems in Scientific Field Campaigns
by Yehuda Arav, Ziv Klausner, Hadas David-Sarrousi, Gadi Eidelheit and Eyal Fattal
Sensors 2024, 24(18), 5916; https://doi.org/10.3390/s24185916 - 12 Sep 2024
Viewed by 396
Abstract
Information and decision support systems are essential to conducting scientific field campaigns in the atmospheric sciences. However, their development is costly and time-consuming since each field campaign has its own research goals, which result in using a unique set of sensors and various [...] Read more.
Information and decision support systems are essential to conducting scientific field campaigns in the atmospheric sciences. However, their development is costly and time-consuming since each field campaign has its own research goals, which result in using a unique set of sensors and various analysis procedures. To reduce development costs, we present a software framework that is based on the Industrial Internet of Things (IIoT) and an implementation using well-established and newly developed open-source components. This framework architecture and these components allow developers to customize the software to a campaign’s specific needs while keeping the coding to a minimum. The framework’s applicability was tested in two scientific field campaigns that dealt with questions regarding air quality by developing specialized IIoT applications for each one. Each application provided the online monitoring of the acquired data and an intuitive interface for the scientific team to perform the analysis. The framework presented in this study is sufficiently robust and adaptable to meet the diverse requirements of field campaigns. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>(<b>A</b>) The location of release points A and B on the concourse floor. The entrances from the street level are marked. (<b>B</b>) The location of NDIR sensors in the concourse at trials A1–A4, and B1–B4. The red cross marks the release point, and the blue circles mark the location of the NDIR.</p>
Full article ">Figure 2
<p>The location of the Kaijo anemometers and the release points in trials A1–A4, and B1–B4. The red cross marks the release point, and the blue circles mark the location of the ultrasonic wind anemometers (KAIJO). Note that, in trials A1–A4, the three Kaijo anemometers were located at the same point but at different heights above ground.</p>
Full article ">Figure 3
<p>The location of the Petri dishes in the outdoor field campaign. A black dot indicates each Petri dish.</p>
Full article ">Figure 4
<p>The ArgosWeb interface allows the user to define the field campaign (experiment). That is, the user defines the trials and their properties, as well as the devices and their properties. The deployment of the devices on the map is also determined with this interface (see <a href="#sensors-24-05916-f005" class="html-fig">Figure 5</a>). See the text for a description of the functionality of each box.</p>
Full article ">Figure 5
<p>Deploying the device in ArgosWeb interface (<b>A</b>). The graphical interface allows the user to select the devices to deploy from the devices that were defined in the campaign (<b>B</b>). The devices are deployed in a point, line, arc, or rectangle (the icons on the lower left side of the screen). The interface allows the user to set the trial-dependent properties.</p>
Full article ">Figure 6
<p>The functional layers of the server domain.</p>
Full article ">Figure 7
<p>A microservice implementation of the IIoT architecture of <a href="#sensors-24-05916-f006" class="html-fig">Figure 6</a> using open-source components.</p>
Full article ">Figure 8
<p>The Node-RED workflow manages real-time data acquisition, parsing and sending the data to a Kafka topic. The parsing procedure is device-specific.</p>
Full article ">Figure 9
<p>The dataflow in the indoor field campaign.</p>
Full article ">Figure 10
<p>The Thingsboard dashboard that shows the status of the NDIR sensors. (<b>Left</b>) The distribution of the NDIR in the concourse and the platform. Green indicates more than 70% messages in the last minute; red indicates less than <math display="inline"><semantics> <mrow> <mn>30</mn> <mo>%</mo> </mrow> </semantics></math>. (<b>Right</b>) The frequency during the last 30 min. Each color indicates a different device.</p>
Full article ">Figure 11
<p>The data flow in the outdoor field campaign.</p>
Full article ">
27 pages, 3641 KiB  
Article
Application of Attribute-Based Encryption in Military Internet of Things Environment
by Łukasz Pióro, Jakub Sychowiec, Krzysztof Kanciak and Zbigniew Zieliński
Sensors 2024, 24(18), 5863; https://doi.org/10.3390/s24185863 - 10 Sep 2024
Viewed by 508
Abstract
The Military Internet of Things (MIoT) has emerged as a new research area in military intelligence. The MIoT frequently has to constitute a federation-capable IoT environment when the military needs to interact with other institutions and organizations or carry out joint missions as [...] Read more.
The Military Internet of Things (MIoT) has emerged as a new research area in military intelligence. The MIoT frequently has to constitute a federation-capable IoT environment when the military needs to interact with other institutions and organizations or carry out joint missions as part of a coalition such as in NATO. One of the main challenges of deploying the MIoT in such an environment is to acquire, analyze, and merge vast amounts of data from many different IoT devices and disseminate them in a secure, reliable, and context-dependent manner. This challenge is one of the main challenges in a federated environment and forms the basis for establishing trusting relationships and secure communication between IoT devices belonging to different partners. In this work, we focus on the problem of fulfillment of the data-centric security paradigm, i.e., ensuring the secure management of data along the path from its origin to the recipients and implementing fine-grained access control mechanisms. This problem can be solved using innovative solutions such as applying attribute-based encryption (ABE). In this work, we present a comprehensive solution for secure data dissemination in a federated MIoT environment, enabling the use of distributed registry technology (Hyperledger Fabric), a message broker (Apache Kafka), and data processing microservices implemented using the Kafka Streams API library. We designed and implemented ABE cryptography data access control methods using a combination of pairings-based elliptic curve cryptography and lightweight cryptography and confirmed their suitability for the federations of military networks. Experimental studies indicate that the proposed cryptographic scheme is viable for the number of attributes typically assumed to be used in battlefield networks, offering a good trade-off between security and performance for modern cryptographic applications. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>High-level scheme of MIoT main components.</p>
Full article ">Figure 2
<p>The MIoT layered architecture.</p>
Full article ">Figure 3
<p>General overview of the experimental environment.</p>
Full article ">Figure 4
<p>Detailed overview of the experimental environment.</p>
Full article ">Figure 5
<p>Diagram of data flow in proposed system.</p>
Full article ">Figure 6
<p>Sequence diagram illustrating the ABE system setup steps.</p>
Full article ">Figure 7
<p>Sequence diagram illustrating the ABE attribute revocation steps.</p>
Full article ">Figure 8
<p>Sequence diagram of requesting new permissions.</p>
Full article ">Figure 9
<p>Deployment of data exchange system within 5G.</p>
Full article ">Figure 10
<p>Scheme of experimental setup.</p>
Full article ">
24 pages, 1691 KiB  
Article
Uncertainty Calculation as a Service: Integrating Cloud-Based Microservices for Enhanced Calibration and DCC Generation
by Anil Cetinkaya, M. Cagri Kaya, Erkan Danaci and Halit Oguztuzun
Sensors 2024, 24(17), 5651; https://doi.org/10.3390/s24175651 - 30 Aug 2024
Viewed by 383
Abstract
The calibration industry is renowned for its diverse and sophisticated equipment and complex processes, which necessitate innovative solutions to keep pace with rapidly advancing technology. This paper introduces an enhancement to an existing microservice-based cloud architecture, aimed at effectively managing the inherent complexity [...] Read more.
The calibration industry is renowned for its diverse and sophisticated equipment and complex processes, which necessitate innovative solutions to keep pace with rapidly advancing technology. This paper introduces an enhancement to an existing microservice-based cloud architecture, aimed at effectively managing the inherent complexity within this field. The enhanced architecture seamlessly integrates various equipment types and communication technologies, aligning diverse stakeholder expectations into a unified system that ensures efficient and accurate calibration processes. It highlights the integration of microservices to facilitate various methods of uncertainty calculation and the generation of digital calibration certificates (DCCs). A case study on RF power measurement illustrates the practical application and benefits of the enhanced architecture. Although initially focused on RF power measurement, the flexible architecture allows for future expansions to accommodate new standards and measurement techniques. The enhanced system offers a comprehensive approach to managing data flow from calibration equipment to the final generation of DCCs, utilizing cloud-based services for efficient data processing. As a future direction, this extension sets the groundwork for broader applicability across multiple measurement types, ensuring readiness for upcoming advancements in metrology. Full article
(This article belongs to the Section Industrial Sensors)
Show Figures

Figure 1

Figure 1
<p>The IoMT-compliant architecture of the system and its components.</p>
Full article ">Figure 2
<p>The system architecture on the Google Cloud platform and the CI/CD pipeline (adapted from [<a href="#B32-sensors-24-05651" class="html-bibr">32</a>]).</p>
Full article ">Figure 3
<p>Dockerized containers in the cloud environment.</p>
Full article ">Figure 4
<p>The measurement setup and its connections.</p>
Full article ">Figure 5
<p>User authentication and client configuration based on variability resolution.</p>
Full article ">Figure 6
<p>The process for the uncertainty calculation and DCC generation.</p>
Full article ">Figure 7
<p>Monte Carlo Simulation process for uncertainty calculations.</p>
Full article ">Figure 8
<p>Sequence diagram for the Monte Carlo Simulation.</p>
Full article ">Figure 9
<p>The device management user interface of the client application.</p>
Full article ">Figure 10
<p>An excerpt of the generated DCC.</p>
Full article ">
27 pages, 9570 KiB  
Article
A Unified Knowledge Model for Managing Smart City/IoT Platform Entities for Multitenant Scenarios
by Pierfrancesco Bellini, Daniele Bologna, Paolo Nesi and Gianni Pantaleo
Smart Cities 2024, 7(5), 2339-2365; https://doi.org/10.3390/smartcities7050092 - 27 Aug 2024
Viewed by 1222
Abstract
Smart city/IoT frameworks are becoming more complex for the needs regarding multi-tenancy, data streams, real-time event-driven processing, data, and visual analytics. The infrastructures also need to support multiple organizations and optimizations in terms of data, processes/services, and tools cross-exploited by multiple applications and [...] Read more.
Smart city/IoT frameworks are becoming more complex for the needs regarding multi-tenancy, data streams, real-time event-driven processing, data, and visual analytics. The infrastructures also need to support multiple organizations and optimizations in terms of data, processes/services, and tools cross-exploited by multiple applications and developers. In this paper, we addressed these needs to provide platform operators and developers effective models and tools to: (i) identify the causes of problems and dysfunctions at their inception; (ii) identify references to data, processes, and APIs to add/develop new scenarios in the infrastructure, minimizing effort; (iii) monitor resources and the work performed by developers to exploit the complex multi-application platform. To this end, we developed a semantic unified knowledge model, UKM, and a number of tools for its implementation and exploitation. The UKM, with its inferences, allows to browse and extract information from complex relationships among entities. The proposed solution has been designed, implemented, and validated in the context of the open source Snap4City.org platform and applied in many geographical areas with 18 organizations, 40 cities, thousands of operators and developers, and free trials to keep platform complexity under control, as in the interconnected scenarios of the Herit-Data Interreg Project, which is a lighthouse project of the European Commission. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Conceptual architecture, from simple to advanced smart city solutions. Letters are used to identify the different connections, numbers are used to identify the direction of the communication.</p>
Full article ">Figure 2
<p>Scenario 1 with two solutions—Smart Parking.</p>
Full article ">Figure 3
<p>Scenario 2: what-if analysis for dynamic routing scenario. Colors and numbers on labels are used to simply the identification of the subscenarios.</p>
Full article ">Figure 4
<p>Snap4City platform architecture. The orange blocks are those typically developed to add new functionalities, applications and/or services to the platform.</p>
Full article ">Figure 5
<p>Knowledge graph representation of the UKM, exploiting the Linked Open Graph (LOG) tool. The graph is showing UKM classes, relations, data properties, and also an overview of instances for dashboards, widgets, and Data used. <a href="https://www.snap4city.org/ldgraph/?graph=7298d9910a65a76cfea328b5be7c9918" target="_blank">https://www.snap4city.org/ldgraph/?graph=7298d9910a65a76cfea328b5be7c9918</a>, accessed on 20 August 2024. The circles represent the relationships in the triples, while the rounded box are Objects or Subjects in the triples.</p>
Full article ">Figure 6
<p>UKM of <a href="#smartcities-07-00092-f003" class="html-fig">Figure 3</a> Scenario 2—interactive control room for simulation and what-if analysis in mobility and environment. <a href="https://www.snap4city.org/ldgraph/?graph=624a69652d90a451ef4347788dc50487" target="_blank">https://www.snap4city.org/ldgraph/?graph=624a69652d90a451ef4347788dc50487</a> (accessed on 20 August 2024). The circles represent the relationships in the triples, while the rounded box are Objects or Subjects in the triples.</p>
Full article ">Figure 7
<p>Snap4City Data Inspector with advanced views to navigate data properties, entities, and relations defined in the UKM. The explanation of the letters is reported in the text.</p>
Full article ">Figure 8
<p>SPARQL query and results showing all the dashboards, widgets, and IoT apps using data from the traffic sensor with ID “METRO11”.</p>
Full article ">
20 pages, 2570 KiB  
Article
A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge
by Jinpeng Miao, Dasari Rajasekhar, Shivakant Mishra, Sanjeet Kumar Nayak and Ramanarayan Yadav
Future Internet 2024, 16(8), 296; https://doi.org/10.3390/fi16080296 - 16 Aug 2024
Viewed by 557
Abstract
Smart agriculture stands as a promising domain for IoT-enabled technologies, with the potential to elevate crop quality, quantity, and operational efficiency. However, implementing a smart agriculture system encounters challenges such as the high latency and bandwidth consumption linked to cloud computing, Internet disconnections [...] Read more.
Smart agriculture stands as a promising domain for IoT-enabled technologies, with the potential to elevate crop quality, quantity, and operational efficiency. However, implementing a smart agriculture system encounters challenges such as the high latency and bandwidth consumption linked to cloud computing, Internet disconnections in rural locales, and the imperative of cost efficiency for farmers. Addressing these hurdles, this paper advocates a fog-based smart agriculture infrastructure integrating edge computing and LoRa communication. We tackle farmers’ prime concern of animal intrusion by presenting a solution leveraging low-cost PIR sensors, cameras, and computer vision to detect intrusions and predict animal locations using an innovative algorithm. Our system detects intrusions pre-emptively, identifies intruders, forecasts their movements, and promptly alerts farmers. Additionally, we compare our proposed strategy with other approaches and measure their power consumptions, demonstrating significant energy savings afforded by our strategy. Experimental results highlight the effectiveness, energy efficiency, and cost-effectiveness of our system compared to state-of-the-art systems. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed system architecture.</p>
Full article ">Figure 2
<p>System architecture for animal intrusion detection.</p>
Full article ">Figure 3
<p>Virtual coordinate systems built upon the farm.</p>
Full article ">Figure 4
<p>Layout A: vertical placement.</p>
Full article ">Figure 5
<p>Layout B: horizontal placement.</p>
Full article ">Figure 6
<p>Layout C: hybrid placement.</p>
Full article ">Figure 7
<p>Experimental setup architecture.</p>
Full article ">Figure 8
<p>Movement trajectories.</p>
Full article ">Figure 9
<p>Average distance offset between predicted and actual positions for different types of movements in the three layouts.</p>
Full article ">Figure 10
<p>Camera placement.</p>
Full article ">Figure 11
<p>Power meter connection.</p>
Full article ">Figure 12
<p>Placement of cameras.</p>
Full article ">Figure 13
<p>Placement of cameras in an all-camera strategy.</p>
Full article ">
21 pages, 2246 KiB  
Article
A Novel Rational Medicine Use System Based on Domain Knowledge Graph
by Chaoping Qin, Zhanxiang Wang, Jingran Zhao, Luyi Liu, Feng Xiao and Yi Han
Electronics 2024, 13(16), 3156; https://doi.org/10.3390/electronics13163156 - 9 Aug 2024
Viewed by 735
Abstract
Medication errors, which could often be detected in advance, are a significant cause of patient deaths each year, highlighting the critical importance of medication safety. The rapid advancement of data analysis technologies has made intelligent medication assistance applications possible, and these applications rely [...] Read more.
Medication errors, which could often be detected in advance, are a significant cause of patient deaths each year, highlighting the critical importance of medication safety. The rapid advancement of data analysis technologies has made intelligent medication assistance applications possible, and these applications rely heavily on medical knowledge graphs. However, current knowledge graph construction techniques are predominantly focused on general domains, leaving a gap in specialized fields, particularly in the medical domain for medication assistance. The specialized nature of medical knowledge and the distinct distribution of vocabulary between general and biomedical texts pose challenges. Applying general natural language processing techniques directly to the medical domain often results in lower accuracy due to the inadequate utilization of contextual semantics and entity information. To address these issues and enhance knowledge graph production, this paper proposes an optimized model for named entity recognition and relationship extraction in the Chinese medical domain. Key innovations include utilizing Medical Bidirectional Encoder Representations from Transformers (MCBERT) for character-level embeddings pre-trained on Chinese biomedical corpora, employing Bi-directional Gated Recurrent Unit (BiGRU) networks for extracting enriched contextual features, integrating a Conditional Random Field (CRF) layer for optimal label sequence output, using the Piecewise Convolutional Neural Network (PCNN) to capture comprehensive semantic information and fusing it with entity features for better classification accuracy, and implementing a microservices architecture for the medication assistance review system. These enhancements significantly improve the accuracy of entity relationship classification in Chinese medical texts. The model achieved good performance in recognizing most entity types, with an accuracy of 88.3%, a recall rate of 85.8%, and an F1 score of 87.0%. In the relationship extraction stage, the accuracy reached 85.7%, the recall rate 82.5%, and the F1 score 84.0%. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>Overall design of Rational Medicine Use System.</p>
Full article ">Figure 2
<p>Candidate entries.</p>
Full article ">Figure 3
<p>Knowledge graph ontology structure.</p>
Full article ">Figure 4
<p>Knowledge graph medicine structure.</p>
Full article ">Figure 5
<p>Schematic of MCB-CRF model structure.</p>
Full article ">Figure 6
<p>Relationship extraction model structure diagram.</p>
Full article ">Figure 7
<p>Character and position vector representation.</p>
Full article ">Figure 8
<p>Schematic diagram of PCNN model.</p>
Full article ">Figure 9
<p>Comparison of experimental results.</p>
Full article ">Figure 10
<p>Prescribing information page.</p>
Full article ">
22 pages, 3408 KiB  
Article
Microservices-Based Resource Provisioning for Multi-User Cloud VR in Edge Networks
by Ho-Jin Choi, Nobuyoshi Komuro and Won-Suk Kim
Electronics 2024, 13(15), 3077; https://doi.org/10.3390/electronics13153077 - 3 Aug 2024
Viewed by 584
Abstract
Cloud virtual reality (VR) is attracting attention in terms of its lightweight head-mounted display (HMD), providing telepresence and mobility. However, it is still in the research stages due to motion-to-photon (MTP) latency, the need for high-speed network infrastructure, and large-scale traffic processing problems. [...] Read more.
Cloud virtual reality (VR) is attracting attention in terms of its lightweight head-mounted display (HMD), providing telepresence and mobility. However, it is still in the research stages due to motion-to-photon (MTP) latency, the need for high-speed network infrastructure, and large-scale traffic processing problems. These problems are expected to be partially solved through edge computing, but the limited computing resource capacity of the infrastructure presents new challenges. In particular, in order to efficiently provide multi-user content such as remote meetings on edge devices, resource provisioning is needed that considers the application’s traffic patterns and computing resource requirements at the same time. In this study, we present a microservice architecture (MSA)-based application to provide multi-user cloud VR in edge computing and propose a scheme for planning an efficient service deployment considering the characteristics of each service. The proposed scheme not only guarantees the MTP latency threshold for all users but also aims to reduce networking and computing resource waste. The proposed scheme was evaluated by simulating various scenarios, and the results were compared to several studies. It was confirmed that the proposed scheme represents better performance metrics than the comparison schemes in most cases from the perspectives of networking, computing, and MTP latency. Full article
(This article belongs to the Special Issue Recent Advances of Cloud, Edge, and Parallel Computing)
Show Figures

Figure 1

Figure 1
<p>Entire process from motion input to playback in cloud VR.</p>
Full article ">Figure 2
<p>Conceptual diagram of the MSA-based cloud VR applications at the network edge.</p>
Full article ">Figure 3
<p>Configuration and operation of MSA in multi-user cloud VR applications.</p>
Full article ">Figure 4
<p>Changes in key network metrics with the increase in the number of users per application. (<b>a</b>) Traffic load per user; (<b>b</b>) Stdev of computing resource usage per node; (<b>c</b>) network distance per user.</p>
Full article ">Figure 5
<p>Changes in key network metrics based on resource usage types of applications. (<b>a</b>) Traffic load per user; (<b>b</b>) Stdev of computing resource usage per node; (<b>c</b>) network distance per user.</p>
Full article ">Figure 6
<p>Changes in key network metrics with the increase in computing resource capacity. (<b>a</b>) Traffic load per user; (<b>b</b>) Stdev of computing resource usage per node; (<b>c</b>) network distance per user.</p>
Full article ">Figure 7
<p>Changes in key network metrics based on client locality. (<b>a</b>) Traffic load per user; (<b>b</b>) Stdev of computing resource usage per node; (<b>c</b>) network distance per user.</p>
Full article ">Figure 7 Cont.
<p>Changes in key network metrics based on client locality. (<b>a</b>) Traffic load per user; (<b>b</b>) Stdev of computing resource usage per node; (<b>c</b>) network distance per user.</p>
Full article ">Figure 8
<p>Changes in key network metrics based on computing resource locality. (<b>a</b>) Traffic load per user; (<b>b</b>) Stdev of computing resource usage per node; (<b>c</b>) network distance per user.</p>
Full article ">Figure 8 Cont.
<p>Changes in key network metrics based on computing resource locality. (<b>a</b>) Traffic load per user; (<b>b</b>) Stdev of computing resource usage per node; (<b>c</b>) network distance per user.</p>
Full article ">
29 pages, 1654 KiB  
Review
A Systematic Literature Review on the Strategic Shift to Cloud ERP: Leveraging Microservice Architecture and MSPs for Resilience and Agility
by Chulhyung Lee, Hayoung Fiona Kim and Bong Gyou Lee
Electronics 2024, 13(14), 2885; https://doi.org/10.3390/electronics13142885 - 22 Jul 2024
Viewed by 1402
Abstract
The COVID-19 pandemic has necessitated profound changes in the business and technology landscapes, compelling organizations to reassess their Enterprise Resource Planning (ERP) systems. Traditional ERP systems have demonstrated significant limitations in agility, scalability, and resilience, prompting a strategic shift towards cloud-based ERP solutions. [...] Read more.
The COVID-19 pandemic has necessitated profound changes in the business and technology landscapes, compelling organizations to reassess their Enterprise Resource Planning (ERP) systems. Traditional ERP systems have demonstrated significant limitations in agility, scalability, and resilience, prompting a strategic shift towards cloud-based ERP solutions. This systematic literature review (SLR) aims to critically evaluate the transformation of ERP systems through the adoption of Microservice Architecture (MSA) and the integration of Managed Service Providers (MSPs), highlighting their role in enhancing system flexibility and operational continuity in a post-pandemic world. We conducted a systematic analysis of 124 scholarly articles published since 2010 to compare traditional ERP systems with MSA-based Cloud ERP solutions. Key insights reveal that MSA significantly improves system modularity and adaptability, addressing the shortcomings of monolithic architectures. Additionally, MSPs offer crucial support in managing the complexities of cloud transitions, ensuring security and efficiency. Our findings underscore the importance of a holistic approach to ERP modernization, integrating technological advancements with strategic business objectives. This study not only fills a critical gap in the literature but also provides actionable recommendations for practitioners and policymakers aiming to enhance ERP systems’ resilience and agility. Future research directions are proposed to further explore the synergistic potential of cloud ERP, MSA, and MSPs in fostering innovative and sustainable business practices. Full article
Show Figures

Figure 1

Figure 1
<p>The type of repository selected in this study.</p>
Full article ">Figure 2
<p>Number of papers published per year.</p>
Full article ">Figure 3
<p>Clustering the selected studies regarding Cloud ERP, MSA, and MSP.</p>
Full article ">
34 pages, 14611 KiB  
Article
Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles
by Mira M. Zarie, Abdelhamied A. Ateya, Mohammed S. Sayed, Mohammed ElAffendi and Mohammad Mahmoud Abdellatif
Future Internet 2024, 16(7), 257; https://doi.org/10.3390/fi16070257 - 19 Jul 2024
Viewed by 917
Abstract
The fifth-generation (5G) cellular infrastructure is expected to bring about the widespread use of connected vehicles. This technological progress marks the beginning of a new era in vehicular networks, which includes a range of different types and services of self-driving cars and the [...] Read more.
The fifth-generation (5G) cellular infrastructure is expected to bring about the widespread use of connected vehicles. This technological progress marks the beginning of a new era in vehicular networks, which includes a range of different types and services of self-driving cars and the smooth sharing of information between vehicles. Connected vehicles have also been announced as a main use case of the sixth-generation (6G) cellular, with ultimate requirements beyond the 5G (B5G) and 6G eras. These networks require full coverage, extremely high reliability and availability, very low latency, and significant system adaptability. The significant specifications set for vehicular networks pose considerable design and development challenges. The goals of establishing a latency of 1 millisecond, effectively handling large amounts of data traffic, and facilitating high-speed mobility are of utmost importance. To address these difficulties and meet the demands of upcoming networks, e.g., 6G, it is necessary to improve the performance of vehicle networks by incorporating innovative technology into existing network structures. This work presents significant enhancements to vehicular networks to fulfill the demanding specifications by utilizing state-of-the-art technologies, including distributed edge computing, e.g., mobile edge computing (MEC) and fog computing, software-defined networking (SDN), and microservice. The work provides a novel vehicular network structure based on micro-services architecture that meets the requirements of 6G networks. The required offloading scheme is introduced, and a handover algorithm is presented to provide seamless communication over the network. Moreover, a migration scheme for migrating data between edge servers was developed. The work was evaluated in terms of latency, availability, and reliability. The results outperformed existing traditional approaches, demonstrating the potential of our approach to meet the demanding requirements of next-generation vehicular networks. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies)
Show Figures

Figure 1

Figure 1
<p>End-to-end structure of the proposed VANET.</p>
Full article ">Figure 2
<p>Main components of the lower level of the proposed VANET.</p>
Full article ">Figure 3
<p>Considered offloading levels of the proposed microservice-based VANET.</p>
Full article ">Figure 4
<p>PDR at different TDs.</p>
Full article ">Figure 5
<p>PDR at different vehicle mobility.</p>
Full article ">Figure 6
<p>Average resource utilization efficiency at different vehicle mobility for Category (I) tasks.</p>
Full article ">Figure 7
<p>Average resource utilization efficiency at different vehicle mobility for Category (II) tasks.</p>
Full article ">Figure 8
<p>Average resource utilization efficiency at different vehicle mobility, for Category (III) tasks.</p>
Full article ">Figure 9
<p>Average resource utilization efficiency at different vehicle mobility for Category (IV) tasks.</p>
Full article ">Figure 10
<p>Average resource utilization efficiency at different numbers of vehicles for Category (I) tasks.</p>
Full article ">Figure 11
<p>Average resource utilization efficiency at different numbers of vehicles for Category (II) tasks.</p>
Full article ">Figure 12
<p>Average resource utilization efficiency at different numbers of vehicles for Category (III) tasks.</p>
Full article ">Figure 13
<p>Average resource utilization efficiency at different numbers of vehicles for Category (IV) tasks.</p>
Full article ">Figure 14
<p>Average resource utilization efficiency at different TDs for Category (I) tasks.</p>
Full article ">Figure 15
<p>Average resource utilization efficiency at different TDs for Category (II) tasks.</p>
Full article ">Figure 16
<p>Average resource utilization efficiency at different TDs for Category (III) tasks.</p>
Full article ">Figure 17
<p>Average resource utilization efficiency at different TDs for Category (IV) tasks.</p>
Full article ">Figure 18
<p>%BTs at different vehicle mobility for Category (III) tasks.</p>
Full article ">Figure 19
<p>%BTs at different vehicle mobility for Category (IV) tasks.</p>
Full article ">Figure 20
<p>%BTs at different numbers of vehicles for Category (III) tasks.</p>
Full article ">Figure 21
<p>BTs at different numbers of vehicles for Category (IV) tasks.</p>
Full article ">Figure 22
<p>BTs at different TDs for Category (III) tasks.</p>
Full article ">Figure 23
<p>BTs at different TDs for Category (IV) tasks.</p>
Full article ">Figure 24
<p>Latency performance improvement at different numbers of vehicles for Category (III) tasks.</p>
Full article ">Figure 25
<p>Latency performance improvement at different numbers of vehicles for Category (IV) tasks.</p>
Full article ">
25 pages, 19736 KiB  
Article
Enhancing Autonomous Driving Robot Systems with Edge Computing and LDM Platforms
by Jeongmin Moon, Dongwon Hong, Jungseok Kim, Suhong Kim, Soomin Woo, Hyeongju Choi and Changjoo Moon
Electronics 2024, 13(14), 2740; https://doi.org/10.3390/electronics13142740 - 12 Jul 2024
Cited by 2 | Viewed by 1089
Abstract
The efficient operation and interaction of autonomous robots play crucial roles in various fields, e.g., security, environmental monitoring, and disaster response. For these purposes, processing large volumes of sensor data and sharing data between robots is essential; however, processing such large data in [...] Read more.
The efficient operation and interaction of autonomous robots play crucial roles in various fields, e.g., security, environmental monitoring, and disaster response. For these purposes, processing large volumes of sensor data and sharing data between robots is essential; however, processing such large data in an on-device environment for robots results in substantial computational resource demands, causing high battery consumption and heat issues. Thus, this study addresses challenges related to processing large volumes of sensor data and the lack of dynamic object information sharing among autonomous robots and other mobility systems. To this end, we propose an Edge-Driving Robotics Platform (EDRP) and a Local Dynamic Map Platform (LDMP) based on 5G mobile edge computing and Kubernetes. The proposed EDRP implements the functions of autonomous robots based on a microservice architecture and offloads these functions to an edge cloud computing environment. The LDMP collects and shares information about dynamic objects based on the ETSI TR 103 324 standard, ensuring cooperation among robots in a cluster and compatibility with various Cooperative-Intelligent Transport System (C-ITS) components. The feasibility of operating a large-scale autonomous robot offloading system was verified in experimental scenarios involving robot autonomy, dynamic object collection, and distribution by integrating real-world robots with an edge computing–based offloading platform. Experimental results confirmed the potential of dynamic object collection and dynamic object information sharing with C-ITS environment components based on LDMP. Full article
(This article belongs to the Special Issue Fog/Edge/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Edge-Driving Robotics Platform (EDRP) and Local Dynamic Map Platform (LDMP).</p>
Full article ">Figure 2
<p>EDRP and LDMP environments.</p>
Full article ">Figure 3
<p>Data flow in the proposed platform.</p>
Full article ">Figure 4
<p>Autonomous robot architecture and data flow.</p>
Full article ">Figure 5
<p>EDRP Kubernetes architecture.</p>
Full article ">Figure 6
<p>Logical flow of the overall system.</p>
Full article ">Figure 7
<p>EDRP scalability.</p>
Full article ">Figure 8
<p>Logical flow of LDMP.</p>
Full article ">Figure 9
<p>Driving robot system.</p>
Full article ">Figure 10
<p>EDRP environment.</p>
Full article ">Figure 11
<p>LDMP environment.</p>
Full article ">Figure 12
<p>Driving route.</p>
Full article ">Figure 13
<p>Example of the Kubernetes environment before and after robot registration.</p>
Full article ">Figure 14
<p>Photograph of the test robot and its sample movement route.</p>
Full article ">Figure 15
<p>Sample obstacle avoidance.</p>
Full article ">Figure 16
<p>EDRP multirobot operation and GPU usage graph.</p>
Full article ">Figure 17
<p>Object detection and a CPM example.</p>
Full article ">Figure 18
<p>Example of a map with dynamic object and PostgreSQL table.</p>
Full article ">Figure 19
<p>Comparison of resource usage graph.</p>
Full article ">Figure 20
<p>Edge-driving robotics round trip time (RTT) graph.</p>
Full article ">Figure 21
<p>Offloading only in 5G MEC RTT graph.</p>
Full article ">Figure 22
<p>Kafka messages latency graph.</p>
Full article ">
21 pages, 2574 KiB  
Article
ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Medical Errors in the Era of Generative AI and Cloud-Based Health Information Ecosystems
by Khalid Al-hammuri, Fayez Gebali and Awos Kanan
AI 2024, 5(3), 1111-1131; https://doi.org/10.3390/ai5030055 - 8 Jul 2024
Viewed by 969
Abstract
Managing access between large numbers of distributed medical devices has become a crucial aspect of modern healthcare systems, enabling the establishment of smart hospitals and telehealth infrastructure. However, as telehealth technology continues to evolve and Internet of Things (IoT) devices become more widely [...] Read more.
Managing access between large numbers of distributed medical devices has become a crucial aspect of modern healthcare systems, enabling the establishment of smart hospitals and telehealth infrastructure. However, as telehealth technology continues to evolve and Internet of Things (IoT) devices become more widely used, they are also increasingly exposed to various types of vulnerabilities and medical errors. In healthcare information systems, about 90% of vulnerabilities emerge from medical error and human error. As a result, there is a need for additional research and development of security tools to prevent such attacks. This article proposes a zero-trust-based context-aware framework for managing access to the main components of the cloud ecosystem, including users, devices, and output data. The main goal and benefit of the proposed framework is to build a scoring system to prevent or alleviate medical errors while using distributed medical devices in cloud-based healthcare information systems. The framework has two main scoring criteria to maintain the chain of trust. First, it proposes a critical trust score based on cloud-native microservices for authentication, encryption, logging, and authorizations. Second, a bond trust scoring system is created to assess the real-time semantic and syntactic analysis of attributes stored in a healthcare information system. The analysis is based on a pre-trained machine learning model that generates the semantic and syntactic scores. The framework also takes into account regulatory compliance and user consent in the creation of the scoring system. The advantage of this method is that it applies to any language and adapts to all attributes, as it relies on a language model, not just a set of predefined and limited attributes. The results show a high F1 score of 93.5%, which proves that it is valid for detecting medical errors. Full article
Show Figures

Figure 1

Figure 1
<p>Visualization of the main sources of healthcare-related information within the cloud-based system.</p>
Full article ">Figure 2
<p>Representative image of the proposed access control functional diagram within the healthcare cloud–AI ecosystem.</p>
Full article ">Figure 3
<p>Trust cycle of the proposed access control framework.</p>
Full article ">Figure 4
<p>Proposed framework for a continuous chain of trust based on the accumulated trust score of each zero-trust access management component.</p>
Full article ">Figure 5
<p>Semantic trust assessment using Attribute2Vec, based on the Word2Vec model; here, <math display="inline"><semantics> <mrow> <mi>B</mi> <msub> <mi>T</mi> <mrow> <mi>A</mi> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </msub> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>B</mi> <msub> <mi>T</mi> <mrow> <mi>A</mi> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </msub> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>B</mi> <msub> <mi>T</mi> <mrow> <mi>A</mi> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </msub> </mrow> </semantics></math> are the set of bond trust between the three input sources, respectively <span class="html-italic">x</span>, <span class="html-italic">y</span>, and <span class="html-italic">z</span>, while <math display="inline"><semantics> <mrow> <mi>B</mi> <mi>T</mi> </mrow> </semantics></math> is the final bond trust score.</p>
Full article ">Figure 6
<p>Representative image of the access control engine’s decision hierarchy and the related encoding.</p>
Full article ">Figure 7
<p>Example of access control encoding: (<b>A</b>) user encoding, (<b>B</b>) device encoding, and (<b>C</b>) output encoding. PC stands for patient consent. The different colors used in the tables are only used for arbitrary categories classes but are not scaled for measurable assessment.</p>
Full article ">Figure 8
<p>Example of selected attributes from the generated data using Synthea and fine-tuned Word2Vec pre-trained model. The figure is a snapshot from a multi-dimensional representation of a large language model data that is represented in latent space. Each attribute is defined as a scalar vector and the distance between each vector is measured by the cosine function.</p>
Full article ">Figure 9
<p>Arbitrary example of generated text prompt from patient history record. The mentioned names are arbitrary examples, and do not refer to any true identities.</p>
Full article ">Figure 10
<p>Confusion matrix for the ablation study on the accuracy of detecting medical errors by identifying the relationship between selected attributes. TP is true positive, FP is false positive, FN is false negative, and TN is true negative.</p>
Full article ">
29 pages, 10171 KiB  
Article
The Diagnosis-Effective Sampling of Application Traces
by Arnak Poghosyan, Ashot Harutyunyan, Edgar Davtyan, Karen Petrosyan and Nelson Baloian
Appl. Sci. 2024, 14(13), 5779; https://doi.org/10.3390/app14135779 - 2 Jul 2024
Viewed by 773
Abstract
Distributed tracing is cutting-edge technology used for monitoring, managing, and troubleshooting native cloud applications. It offers a more comprehensive and continuous observability, surpassing traditional logging methods, and is indispensable for navigating modern complex software architectures. However, the sheer volume of generated traces is [...] Read more.
Distributed tracing is cutting-edge technology used for monitoring, managing, and troubleshooting native cloud applications. It offers a more comprehensive and continuous observability, surpassing traditional logging methods, and is indispensable for navigating modern complex software architectures. However, the sheer volume of generated traces is staggering in distributed applications, and the direct storage and utilization of every trace is impractical due to associated operational costs. This entails a sampling strategy to select which traces warrant storage and analysis. Historically, sampling methods have included a rate-based approach, often relying heavily on a manual configuration. There is a need for a more intelligent approach, and we propose a hierarchical sampling methodology to address multiple requirements concurrently. Initial rate-based sampling mitigates the overwhelming volume of traces, as no further analysis can be performed on this level. In the next stage, more nuanced analysis is facilitated based on the previous foundation, incorporating information regarding trace properties and ensuring the preservation of vital process details even under extreme conditions. This comprehensive approach not only aids in the visualization and conceptualization of applications but also enables more targeted analysis in later stages. As we delve deeper into the sampling hierarchy, the technique becomes tailored to specific purposes, such as the simplification of application troubleshooting. In this context, the sampling strategy prioritizes the retention of erroneous traces from dominant processes, thus facilitating the identification and resolution of underlying issues. The focus of this paper is to reveal the impact of sampling on troubleshooting efficiency. Leveraging intelligent and explainable artificial intelligence solutions enables the detection of malfunctioning microservices and provides transparent insights into root causes. We advocate for using rule-induction systems, which offer explainability and efficacy in decision-making processes. By integrating advanced sampling techniques with machine-learning-driven intelligence, we empower organizations to navigate the complexities of large-scale distributed cloud environments effectively. Full article
(This article belongs to the Special Issue Trustworthy Artificial Intelligence (AI) and Robotics)
Show Figures

Figure 1

Figure 1
<p>Trace sampling multi-layer design.</p>
Full article ">Figure 2
<p>The distribution of traces across different types for a specific application.</p>
Full article ">Figure 3
<p>The sampling of traces of <a href="#applsci-14-05779-f002" class="html-fig">Figure 2</a> for different values of the parameter <math display="inline"><semantics> <mi>α</mi> </semantics></math>.</p>
Full article ">Figure 4
<p>The values of <math display="inline"><semantics> <mrow> <msub> <mi>G</mi> <mrow> <mi>t</mi> <mi>y</mi> <mi>p</mi> <mi>e</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>α</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> show the final sampling rates for different <math display="inline"><semantics> <mi>α</mi> </semantics></math>. The red-cross corresponds to <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.044</mn> </mrow> </semantics></math> with the final sampling rate <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>=</mo> <mn>0.099</mn> </mrow> </semantics></math> (around <math display="inline"><semantics> <mrow> <mn>10</mn> <mo>%</mo> </mrow> </semantics></math>).</p>
Full article ">Figure 5
<p>The distribution of traces with different durations (in milliseconds).</p>
Full article ">Figure 6
<p>The sampling of traces of <a href="#applsci-14-05779-f005" class="html-fig">Figure 5</a> for different values of the parameter <math display="inline"><semantics> <mi>β</mi> </semantics></math>.</p>
Full article ">Figure 7
<p>The values of <math display="inline"><semantics> <mrow> <msub> <mi>G</mi> <mrow> <mi>d</mi> <mi>u</mi> <mi>r</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>β</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> show the sampling rates for the different parameter values <math display="inline"><semantics> <mi>β</mi> </semantics></math>. The red cross corresponds to <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.083</mn> </mrow> </semantics></math> with a total sampling rate of <math display="inline"><semantics> <mrow> <mn>0.0996</mn> </mrow> </semantics></math> (around <math display="inline"><semantics> <mrow> <mn>10</mn> <mo>%</mo> </mrow> </semantics></math>).</p>
Full article ">Figure 8
<p>The hybrid approach for a specific trace type (N2 in <a href="#applsci-14-05779-f010" class="html-fig">Figure 10</a>). The left figure shows the plot of durations. The right figure shows the counts of traces in different bins before and after sampling corresponding to different values of <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mi>β</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>The hybrid approach for a specific trace type (N17 in <a href="#applsci-14-05779-f010" class="html-fig">Figure 10</a>). The left figure shows the plot of durations. The right figure shows the counts of traces for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mi>β</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 10
<p>The hybrid sampling approach for <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mi>β</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 11
<p>The sampling rates corresponding to different values <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mi>β</mi> </mrow> </semantics></math>. The red cross corresponds to <math display="inline"><semantics> <mrow> <mn>10</mn> <mo>%</mo> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.03</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 12
<p>The sampling rates that correspond to different values of <math display="inline"><semantics> <mi>α</mi> </semantics></math> and <math display="inline"><semantics> <mi>β</mi> </semantics></math>. The colors correspond to the different ranges of sampling rates for a better visualization.</p>
Full article ">Figure 13
<p>The sampling of two trace types without counting the errors.</p>
Full article ">Figure 14
<p>The sampling of two trace types also counts the errors.</p>
Full article ">Figure 15
<p>The sampling of two trace types with stricter requirements on the percentage of erroneous traces. Now, we preserve <math display="inline"><semantics> <mrow> <mn>10</mn> <mo>%</mo> </mrow> </semantics></math> of normal traces and <math display="inline"><semantics> <mrow> <mn>60</mn> <mo>%</mo> </mrow> </semantics></math> of erroneous ones. The final sampling rate is <math display="inline"><semantics> <mrow> <mn>30</mn> <mo>%</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 16
<p>JRip rules before the sampling.</p>
Full article ">Figure 17
<p>The distribution of normal traces across the types before and after the sampling.</p>
Full article ">Figure 18
<p>The distribution of erroneous traces across the types before and after the sampling.</p>
Full article ">Figure 19
<p>JRip rules after the sampling.</p>
Full article ">Figure 20
<p>The uncertainties of rules before and after the sampling.</p>
Full article ">
Back to TopTop