Scalable Front-End Architecture: Building for Growth and Sustainability
Abstract
The aim of the research is to develop strategies for building scalable interface architectures that ensure stability and protection of user data. The research identified the key characteristics of scalable interface architectures, such as ReactJS, GraphQL, and SSR. Within the scope of the research, principles for constructing scalable front-end architectures have been developed and described. These principles, such as modularity, componentisation, microservices architecture, adaptive and responsive design, as well as load management and scalability, data security, and fault tolerance, aim to ensure flexibility, efficiency, and user convenience across various devices and under different conditions. These principles enable the creation of architectures capable of adapting to changing requirements and scaling to ensure high performance and reliability when dealing with various types of data and workloads. The practical significance of the study is determined by the creation of a pragmatic guide for developers and architects of front-end systems who seek to create scalable applications.References
Blessing, E., Klaus, H. 2023. Ensuring the security and privacy of data collected through face covering detection. https://www.researchgate.net/publication/377159729_Ensuring_the_security_and_privacy_of_data_collected_through_face_covering_detection
Chamari, L., Petrova, E., Pauwels, P. 2023. An end-to-end implementation of a service-oriented architecture for data-driven smart buildings. IEEE Access, 11, 117261-117281.
Davis, R. 2022. A deep learning and signal processing architecture using frequency-encoded RF photonics. Cambridge: Massachusetts Institute of Technology.
Degawa, Y., Kolzumi, T., Nakamura, T., Shioya, R., Kadomoto, J., Irie, H., Sakai, S. 2023. A principal factor of performance in decoupled front-end. IEICE Transactions on Information and Systems, 106(12), 1960-1968.
Dimitrov, W., Ostrovska, T. 2020. Overview of virtual and augmented reality application development tools. https://doi.org/10.13140/RG.2.2.29293.82407/1
Dinev, D.Zh. 2021. LoRaWAN technology – The necessary solution to the challenges of wireless IoT networks. Computer Science and Technologies, 19(1), 23-30.
Khan, K. 2023. Unlocking cloud-native potential: Building scalable, resilient apps. Berlin: Kindle Direct Publishing.
Krishnappa, T. 2023. User awareness of security and privacy in social networking sites. International Journal of Engineering Applied Sciences and Technology, 8(5), 38-54.
Lawal, K., Olaniyi, T., Gibson, R. 2023. Leveraging real-world data from IoT devices in a fog-cloud architecture for resource optimisation within a smart building. Applied Sciences, 14(1), 316.
Mwiinga, P. 2023. Privacy-preserving technologies: Balancing security and user privacy in the digital age. International Journal of Scientific and Research Publication. https://zenodo.org/records/10406538
Naqvi, S., Mohsin, A. 2023. Using Direct Acyclic Graph (DAG) based Distributed Ledger for a secure and scalable Internet of Things (IoT) architecture. https://uow.edu.pk/ORIC/MDSRIC/Publications/8th%20MDSRIC-148.pdf
Nikulina, O., Khatsko, K. 2023. Method of converting the monolithic architecture of a front-end application to microfrontends. Bulletin of the National Technical University “KhPI” Series: System Analysis, Management and Information Technologies, 10(2), 79-84.
Orozova, D.A. 2018. Challenges of big data and big data analytics. Annual of Burgas Free University, 28, 47-52.
Pant, A. 2023. Importance of data security and privacy compliance. International Journal for Research in Applied Science and Engineering Technology, 11(11), 1561-1565.
Paraskevopoulos, N., Sebastiano, F., Almudever, C., Feld, S. 2023. SpinQ: Compilation strategies for scalable spin-qubit architectures. ACM Transactions on Quantum Computing, 5(1), 4.
Perera, Y., Jayasuriya, D. 2023. Enhancing the front end web applications performance using design patterns and microservices based architecture. https://doi.org/10.13140/RG.2.2.36067.53286
Petkova, M. 2019. Approaches for creating infrastructures for network and Internet innovations. Yearbook Telecommunications, 6, 147-160.
Recupero, D., Dessì, D., Concas, E. 2019. A flexible and scalable architecture for human-robot interaction. In: Proceedings of the 15th European Conference Ambient Intelligence (pp. 311-317). Cham: Springer.
Tsenov, A. 2021. Management architectures in modern telecommunication and information systems. http://telecom.tu-sofia.bg/pdfs/Monograph%20Alexander%20Tsenov.pdf
Urilski, A., Malinova, A., Rahnev, A. 2021. Security threats and protection in E-Learning systems. In: Anniversary International Scientific Conference “Computer Technologies and Applications” (pp. 115-129). Pamporovo: CTA
DOI:
https://doi.org/10.31449/inf.v49i1.6304Downloads
Additional Files
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







