Spelling suggestions: "subject:"datavetenskap"" "subject:"datvetenskap""
801 |
Application failure predictions from neural networks analyzing telemetry dataRylander, Max, Hultgren, Filip January 2021 (has links)
ith the revolution of the internet, new applications have emerged in our daily life. People are dependent on services for transportation, bank matters, and communication. Services availability is crucial for their survival and competition against other service providers. Achieving good availability is a challenging task. The latest trend is migrating systems to the cloud. The cloud provides numerous methods to prevent downtimes, such as auto-scaling, continuous deployment, continuous monitoring, and more. However, failures can still occur even though the preemptive techniques fulfill their purpose. Monitoring the system gives insights into the system's actual state, but it is up to the maintainer to interpret these insights. This thesis investigates how machine learning can predict future crashes of Kubernetes pods based on the metrics collected from them. At the start of the project, there was no available data on pod crashes, and the solution was to simulate a 10-tier microservice system in a Kubernetes cluster to create generic data. The project applies two different models, a Random Forest model and a Temporal Convolutional Networksmodel, where the first-mentioned acted as a baseline model. They predict if a failure will occur within a given prediction time window based upon a 15-minutes of data. The project evaluated three different prediction time windows. The five-minute prediction time window resulted in the best foresight based on the models' accuracy. The Random Forest model achieved an accuracy of 73.4 %, while the TCN model achieved an accuracy of 77.7 %. Predictions of the models can act as an early alert of incoming failure, which the system or a maintainer can act upon to improve the availability of its system.
|
802 |
Configuring and Analysing TSN Networks Considering Low-priority TrafficHoutan, Bahar January 2021 (has links)
The IEEE Time-Sensitive Networking (TSN) standards offer a promising solution to deal with the challenge of supporting high-bandwidth, low-latency, and predictable communication in distributed embedded systems. Although TSN provides a gate mechanism to support the low-jitter transmission of high-priority time-triggered traffic, it also brings complexity to the network design as the configuration of such mechanism together with support for low-priority transmission is non-trivial. Moreover, the combination of the gate mechanism and the Credit-based Shaper (CBS) mechanism in TSN deals with many configuration parameters, hence finding the most suitable configuration is complex. To avoid this complexity, the Best-effort (BE) class is sometimes used as an alternative channel to the classes that undergo the CBS mechanism, through which the real-time traffic without strict deadlines is transmitted with a minimum level of Quality of Service (QoS). On the other hand, the end stations that operate based on the legacy communication standards might not support the TSN's traffic shaping mechanisms, hence the designers need to assign the legacy traffic to use the BE class in a TSN network. To the extent of our knowledge, there is no implicit mechanism to support the QoS of BE in a TSN network. Hence, utilizing BE as an alternative to other classes must be guaranteed in terms of meeting the timing requirements, i.e., response times and end-to-end delays. Therefore, the work in this thesis aims at developing techniques and solutions to support the QoS of the lower-priority classes in TSN. In this regard, this work improves the scheduling solutions of high-priority time-triggered traffic to reduce the latency of BE traffic and develops techniques to verify the timing properties of BE traffic considering the impact of all other traffic classes in TSN. Furthermore, the work in this thesis extends the existing end-to-end data-propagation delay analysis for distributed real-time systems based on TSN networks. Finally, the applicability of the proposed techniques is verified and demonstrated by automotive application use cases.
|
803 |
Online graph based latency estimation of microservice applications in a FAAS environmentaf Geijerstam, Klas January 2021 (has links)
Function-as-a-Service (FaaS) is an increasingly common platform for many kinds of applications and services, replacing the need to maintain and setup hardware or virtual machines to host functionality in the cloud. The billing model for FaaS is commonly based on actual usage, which makes the ability to estimate the performance and latency of an application before invoking it valuable. This thesis evaluates if previously defined algorithms for offline latency estimation, can be adapted to work with online data. Performing online estimation of latency potentially enables cheaper estimations, as no extra executions are neccessary, and latency estimation of applications and functions that can not be executed spu- riously. The experiments show that for a set of test applications, the previously defined algorithms can achieve greater than 95% accuracy, and that a non-graph based estimation using exponential moving average can achieve greater than 98% accuracy.
|
804 |
Predicting security vulnerabilities using software code metricsGanesh, Sundarakrishnan January 2021 (has links)
The use of open-source systems in software development is more of a general practice in firms, institutions and large enterprises. Such systems produce and oper- ate on a large amount of enterprise data. Thus the protection of the access, integrity and confidentiality of enterprise information assets is of high importance. Equally so is avoiding cyber attacks and reducing their impact in case of such occurrence. This study, "Predicting Security Vulnerabilities in open-source systems", is to use mod- ern methods such as machine learning, to predict potential security vulnerabilities by analysing the source code of the system. The project uses a five-stage approach, viz., Data Collection, Data cleansing, feature selection, Building ML models and Cross Validation. Data collected from the public domains of open-source systems such as Apache Tomcat. The source code of all Apache Tomcat versions were collected and were used to derive individual code metrics using aniche-ck’s tool. The tool resulted in a grand total of 43 metrics including the quantities of various components in a class, coupling between objects and many more. This project makes use of tradi- tional machine learning models to report which among them would prove effective to predict security vulnerabilities. Models are generated using different algorithms such as Naive Bayes Classifier, Logistic Regression, Decision Tree. In further ex- perimentation, K-fold cross validation is introduced with a value of 10, making it 10-fold validation. It is noted that the models have a higher precision and recall val- ues for predicting security vulnerabilities using source code metrics features. Finally, the KNN classifier proved to be the most efficient of all the models that were taken in to account. The decision tree classifier also performed well but failed when it came to multi-class classification
|
805 |
Latency and Traffic Aware Container Placement in Distributed CloudJohansson, Lenny January 2019 (has links)
Distributed cloud is a key technology for 5G networks and is emerging as an alternative cloud infrastructure for hosting latency critical and traffic-intense applications. Placing computational resources on the edge of networks allows applications to be hosted closer to end users and traffic generating sources, which will reduce latency and traffic deeper in the network. This thesis presents a two-phase approach to solve the combinatorial op-timization problem of latency and traffic aware container placement in distributed cloud. Each phase is evaluated using a phase-specific simulated environment. The first phase involves placing containers in data centers and is solved using an integer programming model. Three different objective functions are presented and evaluated using acceptance ratio and average cost as performance metrics. In the second phase, containers are placed in servers. A traffic-aware heuristic is presented and evaluated against traditional bin packing heuristics. The traffic-aware heuristic managed to drastically reduce all traffic-related metrics at the cost of a few additional active servers in comparison to the bin packing heuristics. The traffic-aware heuristic can therefore be a good approach when placing traffic-intense applications in data centers in order to avoid network congestion.
|
806 |
Development of a remote control application for a set-top box on a Windows 8 tablet PCPersson, Patrick January 2014 (has links)
This report describes the development of a Windows Store application which runs on a Windows 8 tablet PC. The application was developed for a company that targets television based services and have the requirements of displaying a television guide based on data from a device connected to the television. Both the application and the device communicates with each other via an intermediary web based service. Established design patterns for object-oriented programming languages were used along with a method called test-driven development in order to accomplish this. Furthermore a comparison between mocking frameworks will be presented for choosing a suitable framework when developing Windows Store applications. The communication model between application and the device is also discussed and evaluated for whether or not it is a suitable method of communication.
|
807 |
A systematic mapping study on Quality of Service in industrial cloud computingLatifaj, Malvina January 2020 (has links)
Context -- The rapid development of Industry 4.0 and Industrial Cyber-Physical Systems is leading to the exponential growth of unprocessed volumes of data. Industrial cloud computing has shown great potential as a solution that can provide the necessary resources for processing these data. However, in order to be widely adopted, it must provide satisfactory levels of QoS. The lack of a standardized model of quality attributes to be used for assessing QoS raises significant concerns. Objective -- This study aims to provide a map of current research on QoS in industrial cloud computing, focusing on identifying and classifying the quality attributes that are currently most commonly used to evaluate QoS. Method -- To achieve our objective, we conducted a systematic mapping study of the state-of-the-art of QoS in industrial cloud computing. Our search yielded 1063 potentially relevant studies that were subject to a rigorous selection process, resulting in a final set of 42 primary studies. Key information from the primary studies was extracted according to the categories of a well-defined classification framework. Results -- The analysis of the extracted data highlighted the following main findings: (i) research largely focuses on providing solution proposals that require a more solid validation, (ii) the adoption of cloud technologies is closely related to performance indicators, while research on other quality attributes is quite limited, (iii) there is a lack of research on security in industrial cloud computing, (iv) approaches are in most cases not targeting explicitly a specific industrial domain, (v) there is a strong focus on the impact of virtualization solutions on QoS, and (vi) research efforts are oriented towards the improvement of QoS through scheduling. Conclusion -- These results can help the research community identify trends, limitations, and research gaps on QoS in industrial cloud computing, and reveal possible directions for future research.
|
808 |
Virtual Driving Academy : ViDAKarlsson, Anja, Spens, Jacob January 2020 (has links)
Taking a driver license is an expensive and time consuming process. This process can be facilitated by the use of modern technology. This report will address how it is possible to take driving lessons to the next level by practicing in a virtual environment. The goal of this project is to create a driving school simulator with modern virtual reality technology which will put the driver in realistic traffic situations for an educational purpose. / Att ta körlektioner har länge varit en kostsam och tidskrävande process. Den här processen kan underlättas med användning av ny teknik. Denna rapport kommer gå in på hur man kan ta körlektioner till nästa nivå genom att öva i en virtuel miljö. Målet med projektet är att skapa en körskolesimulator med hjälp av dagens virtual reality teknik som kan sätta föraren i realistiska trafiksituationer i utbildningssyfte.
|
809 |
Kunderbjudande i molnet : Projektarbete för Byggvarulistan AB / Customer offer in the cloud : Project for Byggvarulistan ABEvaldsson, Mattias, Grahn, Fredrik, Karlsson, Simon, Johansson, Lenny, Thunberg, Oscar, Wigren, Richard, Sääf, Alexander January 2017 (has links)
Målet med denna rapport är att beskriva hur erbjudandesystemet i kandidatprojektet Kunderbjudande i molnet kan implementeras så att man skapar värde för kunden. Utöver detta behandlas erfarenheter från projektet, vilket stöd man kan få genom att skapa och följa upp en systemanatomi samt vilken effekt verktyget Slack har haft på gruppens kommunikation. Vidare tas följande ämnen upp i individuella bidrag till rapporten: Xamarin test recorder Lättviktig kodgranskning med GitHub pull requests Utveckling av mobilapplikation till flera plattformar i Xamarin Kvalitetsplanens roll i programutveckling Kanban med Trello i kandidatprojekt Reacts koddelning mellan webb och mobilapplikationer Tidsbudgetering och estimering inom projektet Kunden Byggvarulistan AB var i behov av en prototyp till ett system där användare kan sparasina kvitton direkt i mobilen och sedan använda dessa för att ta del av erbjudanden. Metoden för att åstadkomma detta var att utveckla ett system som möjliggör hantering av kvitton. Via detta system skulle det även gå att erbjuda cashbacks och kampanjer tillanvändaren. Under utvecklingen användes Slack för kommunikation och en systemanatomi togs fram och användes. Utvecklingen delades upp i fyra iterationer och baserades på agila arbetsmetoder. Systemet är uppdelat i tre moduler: en mobilapplikation, en molntjänst och ett webbgränssnitt. Mobilapplikationen är utvecklad för Android med verktyget Xamarin. Molntjänsten består av ett webb-API som har utvecklats med webbramverket ASP.NET och en databas som implementerades med ORM-ramverket Entity framework core. Webbgränssnittet utvecklades i JavaScript och biblioteket React. Dessa tre delar samverkar och ger en användare möjlighet att genom applikationen hitta och utnyttja erbjudanden från Byggvarulistan och en administratör möjlighet att modifiera erbjudanden och användardata genom webbgränssnit-tet. Slutsatser från de erfarenheter som har observerats under projektets gång är att det är effektivare att arbeta tillsammans inom teamet än att arbeta individuellt samt att valet av utvecklingsmiljö hade större effekt på utvecklingen än man först trodde. Slutsatser kunde även dras om att skapandet av en systemanatomi var fördelaktigt då alla gruppmedlem-mar fick en gemensam bild över systemet. Till sist så drogs även en slutsats om att Slackunderlättade kommunikationen väsentligt både generellt för hela gruppen och för de olika utvecklingsteamen.
|
810 |
Implementing WebRTC to VISIARC CoffeeHedman, Adrian, Nasim, Warhell January 2017 (has links)
WebRTC, Web Real-Time Communications, är en samlingprotokoll och format för säker realtidskommunikation med inbyggda möjligheter för strömning av ljud- och bild. WebRTC finns idag inbyggt i ledande webbläsare som exempelvis Google Chrome. Tekniken är patent-och licensfri, och det finns flera implementationer som är av öppen källkod. Studien utvärderar två av dessa källkodsimplementationer från Ericsson och Google. Implementationen används sedan som grund för att bygga in en infrastruktur med WebRTC till företagets VISIARCs ramverk Coffee. En exempelapplikation från den färdiga implementationen av WebRTC jämförs sedan gentemot Skype om bild- och ljudkvalitet i videosamtal.
|
Page generated in 0.0821 seconds