Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Modeling a session of subject-system interaction in a wireless communication infrastructure with a mixed resource

Abstract

The article examines the subject-system interaction session, where the system is understood as a base station, and the subject is understood as a mobile communication device. The peculiarity of the study is taking into account the phenomenon relevant to modern communication infrastructures, which is that the base station supports the division of information traffic into a subspace of guaranteed personalized traffic and a subspace of general-purpose traffic. The study considers a highly critical empirical emergency when the general-purpose traffic subspace may cease to be available at any time. The presented mathematical apparatus describes the impact of such an emergency on the active communication sessions supported by the system in receiving new incoming requests of increasing intensity. To characterize this emergency situation, expressions adapted for practical application are presented to calculate such qualitative parameters as the probability of stability, the probability of failure, and unavailability.

1 Introduction

In today’s world, the development of telecommunications technology is outpacing space technology due to the ever-growing audience of users of mobile communication systems and their growing expectations for the quality of services and resources of wireless communication [1,2]. To avoid the depletion of limited radio resources used by modern mobile communication technologies, international standardization committees are constantly developing existing and developing new specifications governing the operation of communication networks, especially the fifth generation (5G) [35]. To improve the quality of customer service, such wireless communication networks are increasingly becoming integrators of both existing and promising radio access technologies. This trend causes a constant update of the list of current research problems because prompt access to information is the primary need of modern humans.

In addition to mobile access services, which provide active traffic of information made by people for people, modern mobile technologies provide information support for many applications of the Internet of Things, based on the principle of machine-to-machine interaction, and implement software-oriented networks and cloud services. It should also be noted that within the Internet of Things concept, there is a growing gap between applications focused on serving specific people and social entities and applications focused on serving industrial scenarios of the Industrial Internet. Such a variety of services and applications makes it essential to ensure the efficient operation of fifth-generation communication networks. Improving the quality of service in modern mobile communication systems requires a coordinated interaction of cellular radio access technologies with a family of WiFi local access technologies that use an unlicensed frequency spectrum. This circumstance causes frequent failures and outages in active processes of information interaction based on such a multi-technological basis [68].

Thus, the study of the process of subject-system interaction, which is implemented in a multi-tech communication infrastructure, where personalized traffic intersects with general-purpose traffic, is an actual scientific problem.

2 State-of-the-Art

Known areas of research on the analysis of systems with different mixed types of traffic in a single technological and communication environment of generation 5G focus either on the hardware-technological approach to the description of the control mechanism [913] or on the software concept of implementation of the latter [714]. It should be noted that the second approach is much more popular. It is due to the representation of the studied process in a mathematical model. The initial parameters that researchers obtain simply result from censored monitoring of the existing equipment that is operated. Accordingly, there are simply no significant and a priori irreversible financial investments that are inevitable for the first approach if the second approach is chosen.

Among the many works that study the functioning of communication systems with different mixed types of traffic, special attention should be paid to the promising direction in which this process is modeled in the paradigm of queuing theory [712]. Important for the construction of such models is the choice of types and characteristics of the distribution laws of stochastic controlled parameters, which characterize the processes of receiving incoming requests and service of received requests, respectively. Much attention is also stressed to the need to ensure a rationally sufficient complexity of the resulting queuing model. Choosing an algorithm for calculating the parameters of complex models of this class, even in the form of their approximation, is a task of high computational complexity.

That is why the works [1013] describe the classic queuing systems, in which the received request is processed by precisely one service device. However, if the functioning of communication systems with different mixed types of traffic is studied, such an approximation is unacceptable. To correctly describe such a process, it is necessary to consider both the course of service of the received request and the resources allocated by the system to support it. Naturally, the volume of this resource is a random variable with some distribution law. However, in [1418], a multilinear queuing system with a similar structure is considered, but these studies ignore the fact that different levels of reliability characterize general-purpose resources and personalized resources shared to support the received request. This fact must be reflected in the state space of the queuing system [1923], which was not done in the above investigations.

Separately, we note the research direction of analyzing the process of functioning communication systems with different mixed types of traffic [816]. The results of such studies are summarized in the form of analytically determined metrics of qualitative indicators, calculating which can assess the effectiveness of the profile application of specific instances of communication systems. Suppose we focus on works where the study of this process takes place in the paradigm of the mathematical apparatus of queuing systems [1422]. In that case, it can be argued that the authors either focus on different laws of distribution and service of incoming information requests or focus on formalizing the calculation algorithm’s characteristic parameters of the obtained stochastic models. Thus in the mentioned research, classical queuing systems in which the service of the accepted information request is carried out exclusively by one device with the allocation of the fixed volume of system resources act as the mathematical basis. These studies ignore the stochastic nature of the just mentioned parameter to simplify the resulting mathematical model analytically. The amount of system resources involved in servicing the information request in the information environment of modern base stations is dynamic rather than static, so this parameter should be part of the relevant mathematical model as a stochastic rather than deterministic characteristic. Moreover, considering that the focused channels of subject-system information interaction in the 5G infrastructure are affected by various types of interference, we, given the stochastic parameter of the system resources for information request service, should consider the queuing system to operate in failure and recovery modes according to a certain Markov process. Based on this assumption, we consider representative of the characteristics of the process of communication systems with different mixed types of compact traffic metrics in the parameter that characterizes the ability of the relevant queuing system to recover, the parameter that characterizes the probability of failure in such a system and the parameter that characterizes the availability of such a system.

Thus, the object of study is the process of functioning a communication system with different mixed types of traffic.

The subject of research is the mathematical apparatus of queuing systems for building a model of the object of study and the apparatus of mathematical statistics and probability theory to analyze the results of experiments.

The research aims to formalize symmetric metrics for evaluating the performance of a communication system that supports sessions of subject-system interaction, using both personalized guaranteed resources and general-purpose resources.

3 Materials and methods

3.1 Statement of research

We describe a balanced session of subject-system interaction in the mathematical apparatus of a multiline queuing system. Suppose that the processing of each received input request in such a system is carried out by the service apparatus, for the operation of which a resource is allocated, the volume of which is characterized by a stochastic parameter with a certain distribution law [24]. Let resource management be characterized by the Markov process of "Death and Recovery" X(t) [24,25]. Accordingly, the resource of the queuing system summarizes the stable and unstable components. In the context of the object of study, the stable component will mean the total pool of values of personal traffic volumes guaranteed to be reserved for each registered person/entity. Accordingly, an unstable component is the amount of general-purpose traffic that each registered person/entity can claim.

Let the presented in Fig 1 a C-line queuing system direct the Poisson flow of incoming requests with intensity λ. The operation of servicing received requests is characterized by the parameter μ, distributed exponentially. At any time, such a system can be in one of two states, characterized by the binary parameter s ∈ {0,1}.

thumbnail
Fig 1. Scheme of the queuing system as a model of a balanced session of subject-system interaction.

https://doi.org/10.1371/journal.pone.0271536.g001

The transition of type s = 1 → s = 0 corresponds to the readiness mode to receive an incoming request and is characterized by intensity α. The transition of type s = 0 → s = 1 corresponds to the mode of loss (unpreparedness to receive) of an incoming request and is characterized by intensity β. When the system is in the state s = 1, a resource of the volume of R1 is available to service the received requests, and when the system is in the state s = 0, a resource of the volume of R0, R0 < R1, is available to service the received requests.

If at the time of receipt of the incoming request in the system, there are no free service devices or no free resources, the volume of which is characterized by the distribution function F(x), the incoming request is lost. In addition, if the system transitions s = 1 → s = 0 and there are i = n requests in the system for which the reserved amount of resources is r > R0, the selected received requests will be lost. To choose which received request will be lost, two "exclusion rules" seem rational:

  • ER1. Exclude the last received request;
  • ER2. We exclude the one from the received requests for which the largest amount of resources is reserved.

We assume that by selecting one of the exclusion rules, the management mechanism will iteratively apply it, excluding the received requests, which will indicate the selected rule until the condition rR0 is not met. Note that when applying the rule ER1, the received request with the index n will always be lost n.

The same condition can be extended to the rule ER2, if at the beginning of each iteration of the procedure of exclusion of received request to re-index the set of received requests in ascending order of the value of . However, if the distribution function F(x) is not exponential, then the implementation of re-indexing will be accompanied by additional complications. Because of this circumstance, if the studied system will make the transition s = 1 → s = 0, the management mechanism for the implementation of the procedure of exclusion of received requests will apply the rule.

3.2 Mathematical model of the studied process

Define the Markov process of resource management in the studied queuing system as , where n(t) is a stochastic parameter that characterizes the number of received requests in the system; is the set of stochastic values that characterize the amount of resource reserved for the corresponding received the request; s(t) is a stochastic parameter that characterizes the state in which the system is at time t.

Taking into account the material of Subsection 3.1, we present the stochastic process in terms of the theory of Markov chains as (1)

Next, we will use the following notation: (2) (3)

Let the distribution function F(x), which characterizes the distribution of the stochastic parameter of the volume of resources reserved for received requests, be continuous with a probability density f(x). Taking into account this, as well as the fact that in the transition, s = 1 → s = 0 the management mechanism works by the rule ER1, based on expressions (2), (3), we form a system of equilibrium equations for the Markov process defined by expression (1): (4)

We will introduce a metric of indicators to assess the quality of a balanced session of subject-system interaction: {P,Q,B}, where:

  1. - parameter P, or the probability of stability, which characterizes the probability that, as a result of the transition s = 0 → s = 1 no received request will be lost: :
(5)
  1. - parameter Q, or the probability of failure, which characterizes the probability that as a result of the transition s = 0 → s = 1 at least one received request will be lost: :
(6)
  1. - parameter B, or the probability of unavailability, which describes the probability of termination for non-acceptance of the service from the pool of subscribers with guaranteed personalized traffic due to an emergency:

The system of equilibrium Eq (4) and the metric of qualitative indicators (5), and (6) unambiguously characterize the studied process in a continuous-time. However, obtaining an analytical solution to the system of equilibrium equations of the form (4) for an arbitrary distribution function F(x) seems doubtful. This fact leads to the continuation of the investigation of the stochastic process in a discrete distribution of resources.

Let the parameter p(x) characterize the probability that the input request sent to the system will be received with the allocation to maintain the number of resources equal to x. Considering the parameter p(x), we rewrite the system of equilibrium Eq (4). As a result, we will receive: (7)

The lack of description of the process X(t) by the system of equilibrium equations of the form (7) is the inherent large dimension of the latter. To prevent this shortcoming, we move from the process X(t) to the Markov process Y(t) = (n(t), r(t), s(t)) with the state space (8)

The parameter r used in expression (8) characterizes the total amount of reserved resources for all n received requests. Under this approach, the number of resources is released at the end of the service or the loss of the received request in the system is released, which is determined by the formula of conditional probability [2629]. Considering this assumption, redefine expressions (2) and (3): (9) (10)

Taking into account expressions (9), and (10), we proceed to the corresponding stochastic process (8) of the representation of the system of equilibrium Eq (7). As a result, we will receive: (11) (12) (13) (14) (15) (16) where (p(r))(n) is a n-fold convolution, which characterizes the probability that to service n received requests in the system will be reserved amount of resources equal to r.

4 Results

To apply computational methods to solve the system of equilibrium Eqs (11)–(16), the latter must be presented in matrix form. To do this, we present the state space of the stochastic process Y(t) in the form of disjoint subsets: where

Taking into account the recorded, we define the matrix of intensities of transitions of the stochastic process Y(t) in the block-diagonal form: (17) where

The system of equilibrium Eqs (11)–(16) presented in form (17) can be solved by known computational methods, for example, iterative [2628,30].

Consider the application of the mathematical apparatus presented in Section 3, adapted to the form represented by expression (17). We will experiment with the Huawei 5G base station. The resource in the experiment was understood as the speed of the session of the subject-system information interaction, where the system was considered a base station, and the subjects–smartphones iPhone 13 Pro. To ensure the statistical reliability of the calculation results, 1000 sessions were performed in the conditions of agglomeration of a modern metropolis at a distance of about 1 km from the base station.

For the experiment, a bandwidth of personalized use C0 with a width of 10 MHz was allocated. With the help of the LSA service, a 5 MHz wide bandwidth of general-purpose use C1C0 was additionally allocated. Accordingly, the session speed for these frequency bands was calculated by the expression Rs = CsVs, where Vs is the spectral efficiency, which for the experiments, taking into account the equipment, its settings, and operating conditions were 4 bps/Hz. Accordingly, the amount of guaranteed personalized traffic was R0 = 40 Mbps, and the amount of general-purpose traffic was R1R0 = 20 Mbps. The total amount of traffic R1, as a result, was 60 Mbps. Under the conditions of the experiment, one session of subject-system interaction utilizes 2 Mbps of traffic, i.e. F(x) = {0∀x≤2,1x>2}. The other average values of the characteristic parameters of the sessions of the subject-system interaction are as follows: 1/α = 120 c, 1/β = 60 c, 1/μ = 15 c.

The results of the experiment allowed us to calculate the functional dependencies {P,Q} = f(ρ), where the parameters P and Q are the probability of stability and the probability of failure, which are analytically characterized by expressions (5) and (6), respectively, and ρ is the parameter of the intensity of load determined by expression ρ = λ/μ. The functional dependences calculated based on the mathematical model generalized by expression (17) and the received experimental data are presented in Fig 2.

thumbnail
Fig 2. Functional dependences {P,Q} = f(ρ) calculated based on model (17) for the obtained experimental data.

https://doi.org/10.1371/journal.pone.0271536.g002

A derivative of the qualitative indicators (5) and (6) calculated on the basic models (17) is the probability of unavailability. This qualitative characteristic is calculated based on parameters (9) and (10) determined as a result of solving the system of equilibrium Eqs (11)–(16). In the context of the study of the subject-system interaction session in a centralized wireless communication system with a mixed resource, the unavailability parameter is a significant empirical characteristic. This parameter describes the probability of termination for non-acceptance of the service from the pool of subscribers with guaranteed personalized traffic due to an emergency. Suppose the qualitative parameters describe the impact of the emergency on the already active sessions of the subject-system interaction (internal characteristics). In that case, the quality parameter describes the impact of the emergency on the ability of the base station to accept new incoming requests (external characteristics). The empirical dependence B = f(ρ) calculated for the studied system is presented in Fig 3.

thumbnail
Fig 3. Functional dependencies B = f(ρ) calculated based on model (17) for the obtained experimental data.

https://doi.org/10.1371/journal.pone.0271536.g003

5 Discussion

As shown in Fig 2, calculated functional dependencies {P,Q} = f(ρ) can draw several conclusions. First, the mathematical model (17) adequately describes the course of sessions of subject-system interaction in a properly functioning network infrastructure under study. It is seen that with increasing load, i.e., with increasing intensity of the flow of incoming requests, the probability of stability P begins to decrease, and the probability of failure Q begins to increase.

To move on to the second thesis, let’s make a small preamble. Recall that the indicator P(Q) characterizes the probability that as a result of the transition, s = 0 → s = 1 none (at least one) received request will be lost. The event when the studied network infrastructure makes the transition s = 0 → s = 1 corresponds to a situation when, for some reason, the resource of public-purpose traffic becomes unavailable, but the resource of personalized guaranteed traffic remains relevant. Returning to the calculated dependencies {P,Q} = f(ρ), we can see that even in the conditions of instantaneous transition s = 0 → s = 1, which is characteristic of Markov processes and correlates with the situation of an emergency shutdown of additional communication capacities, the probability of stability P and the probability of failure Q does not change abruptly. These dynamics indicate that until the load ρ reaches a certain limit load level, the base station provides support for received requests within the guaranteed traffic volume (nonlinear part of curves {P,Q} = f(ρ)), and only after crossing the load value of this level (linear part of curves {P,Q} = f(ρ)) general-purpose resource begins to be used. Based on these facts, it can be argued that the proposed metric {P,Q} is simple and effective in the task of assessing the survivability or functional safety of modern centralized wireless info-communication systems.

Third, in favor of the adequacy of the mathematical model presented in Section 3 speaks of the correctness of the modeling task statement, the rationality of the choice of the basic mathematical apparatus, and the logic of the mathematical transformations. The author foresaw the possibility of an accurate (expression (7)) or approximate (expressions (11)-(16)) description of the studied process. Representation of the original data in the obtained mathematical apparatus, embodied in the graphs in Fig 2, corresponds to the actual operation of the test equipment.

Interpreting the presented a Fig 3 behavior of the studied system with the generalized structure presented in Fig 1, we can draw the following conclusion: if the distribution function of the mixed resource is deterministic, then the model in Fig 1 can be reduced to the form shown in Fig 4.

thumbnail
Fig 4. Promising scheme of improving the system presented in Fig 1.

https://doi.org/10.1371/journal.pone.0271536.g004

Two sets of service devices form such a system without resources (reliable: ; unreliable: ). Proving this thesis is a promising area of further research.

6 Conclusions

The article examines the subject-system interaction session, where the system is understood as a base station, and the subject is understood as a mobile communication device. The peculiarity of the study is taking into account the phenomenon relevant to modern communication infrastructures, which is that the base station supports the division of information traffic into a subspace of guaranteed personalized traffic and a subspace of general-purpose traffic. The study considers a highly critical empirical emergency situation when the general-purpose traffic subspace may cease to be available at any time.

The presented mathematical apparatus (based on a multilinear queuing system) describes the impact of such an emergency on the active communication sessions supported by the system in the conditions of receiving new incoming requests of increasing intensity. To characterize this emergency situation, expressions adapted for practical application are presented to calculate such qualitative parameters as the probability of stability, the probability of failure, and unavailability. The first /second/ indicator characterizes the probability that as a result of disabling the subspace of public traffic, no one (at least one) who received the request will not be /will be/ lost. The third quality parameter describes the emergency’s impact on the base station’s ability to accept new incoming requests /external characteristics/. The adequacy of the proposed mathematical apparatus and the rationality of the presented metrics of qualitative parameters are proved empirically. The obtained results indicate that such a metric will be especially relevant in the operational assessment of survivability or functional safety of wireless centralized network infrastructure.

In Fig 2, we can see that even in the conditions of instantaneous transition s = 0 → s = 1, which is characteristic of Markov processes and correlates with an emergency shutdown of additional communication capacities, the probability of stability P and the probability of failure Q does not change abruptly. These dynamics indicate that until the load ρ reaches a certain limit load level, the base station provides support for received requests within the guaranteed traffic volume (nonlinear part of curves {P,Q} = f(ρ)), and only after crossing the load value of this level (linear part of curves {P,Q} = f(ρ)) general-purpose resource begins to be used.

Further research is proposed to focus on developing the mathematical apparatus presented in the article by taking into account the different options for the resource allocation function between the system-supported sessions of information interaction.

Acknowledgments

The authors would like to thank the Armed Forces of Ukraine for providing security to perform this work. This work has become possible only because of the resilience and courage of the Ukrainian Army.

References

  1. 1. Obelovska K, Panova O, Karovič V. Performance Analysis of Wireless Local Area Network for a High-/Low-Priority Traffic Ratio at Different Numbers of Access Categories. Symmetry. 2021 Apr 15;13(4):693. DOI: https://doi.org/10.3390/sym13040693.
  2. 2. Droniuk I, Fedevych O. Forecasting of the trend of traffic based on Ateb-functions theory. In: 2015 Xth International Scientific and Technical Conference ‘Computer Sciences and Information Technologies’ (CSIT). 2015. p. 139–41.
  3. 3. Yaqoob M, Gemikonakli O, Ever E. Modelling heterogeneous future wireless cellular networks: An analytical study for interaction of 5G femtocells and macro-cells. Future Generation Computer Systems. 2021 Jan;114:82–95. DOI: https://doi.org/10.1016/j.future.2020.07.049.
  4. 4. Tang L, Zhao G, Wang C, Zhao P, Chen Q. Queue-aware reliable embedding algorithm for 5G network slicing. Computer Networks. 2018 Dec;146:138–50.
  5. 5. Boutiba K, Ksentini A, Brik B, Challal Y, Balla A. NRflex: Enforcing network slicing in 5G New Radio. Computer Communications. 2022 Jan;181:284–92.
  6. 6. Xie Y, Wang S, Wang B, Xu S, Wang X, Ren J. Online algorithm for migration aware Virtualized Network Function placing and routing in dynamic 5G networks. Computer Networks. 2021 Jul;194:108115.
  7. 7. Slalmi A, Chaibi H, Saadane R, Chehri A. Call Admission Control Optimization in 5G in Downlink Single-Cell MISO System. Procedia Computer Science. 2021;192:2502–11.
  8. 8. Bilen T, Canberk B. Overcoming 5G ultra-density with game theory: Alpha-beta pruning aided conflict detection. Pervasive and Mobile Computing. 2020 Mar;63:101133. DOI: https://doi.org/10.1016/j.pmcj.2020.101133.
  9. 9. Qiao L, Li Y, Chen D, Serikawa S, Guizani M, Lv Z. A survey on 5G/6G, AI, and Robotics. Computers & Electrical Engineering. 2021 Oct;95:107372.
  10. 10. Hovorushchenko TO. Methodology of Evaluating the Sufficiency of Information for Software Quality Assessment According to ISO 25010. J inf organ sci (Online). 2018 Jun 26;42(1):63–85.
  11. 11. Zhou Y, Li L. The 5G communication technology-oriented intelligent building system planning and design. Computer Communications. 2020 Jul;160:402–10.
  12. 12. Li B, Hou P, Wu H, Hou F. Optimal edge server deployment and allocation strategy in 5G ultra-dense networking environments. Pervasive and Mobile Computing. 2021 Apr;72:101312.
  13. 13. Haile H, Grinnemo K-J, Ferlin S, Hurtig P, Brunstrom A. End-to-end congestion control approaches for high throughput and low delay in 4G/5G cellular networks. Computer Networks. 2021 Feb;186:107692.
  14. 14. Muhammad M, Safdar GA. 5G-based V2V broadcast communications: A security perspective. Array. 2021 Sep;11:100084.
  15. 15. Al-Ma’aitah M, Saad A, Alwadain A. Modeling of the Schemes for Organizing a Session of Person–System Interactions in the Information System for Critical Use Which Operates in a Wireless Communication Environment. Symmetry. 2021 Feb 27;13(3):391.
  16. 16. Kovtun V, Izonin I. Study of the Operation Process of the E-Commerce Oriented Ecosystem of 5Ge Base Station, Which Supports the Functioning of Independent Virtual Network Segments. JTAER. 2021 Oct 23;16(7):2883–97.
  17. 17. Han S. Congestion-aware WiFi offload algorithm for 5G heterogeneous wireless networks. Computer Communications. 2020 Dec;164:69–76.
  18. 18. Bruschi R, Pajo JF, Davoli F, Lombardo C. Managing 5G network slicing and edge computing with the MATILDA telecom layer platform. Computer Networks. 2021 Jul;194:108090.
  19. 19. Ali Z, Naz F, Javed , Qurban M, Yasir M, Jehangir S. Analysis of VoIP over Wired & Wireless Network with Implementation of QoS CBWFQ & 802.11e. IJCNIS. 2020 Feb 8;12(1):43–9.
  20. 20. M P B, Mahadeva Swamy UB, Shrynik Jain MB. Inter Integrated WSN for Crude Oil Pipeline Monitoring. IJCNIS. 2018 Mar 8;10(3):37–51.
  21. 21. Rao AS. Improving the Serviceability of a Prepaid Autorickshaw Counter using Queuing Model: An Optimization Approach. IJITCS. 2017 Dec 8;9(12):19–27.
  22. 22. Randa Hammami, Kacem Yossra H, Senda Souissi, Hatem Bellaaj, Kacem Ahmed H. Weighted Priority Queuing: A New Scheduling Strategy for Web Services. IJITCS. 2017 Feb 8;9(2):11–7.
  23. 23. Das I, Lobiyal DK, Katti CP. Queuing Effect on Multipath Routing in Mobile Ad Hoc Networks. IJIEEB. 2016 Jan 8;8(1):62–8.
  24. 24. Alakbarov RG, Pashaev FH, Hashimov MA. Development of the Model of Dynamic Storage Distribution in Data Processing Centers. IJITCS. 2015 Apr 8;7(5):18–24. DOI: https://doi.org/10.5815/ijitcs.2015.05.03.
  25. 25. Dalkani H, Mojarad M, Arfaeinia H. Modelling Electricity Consumption Forecasting Using the Markov Process and Hybrid Features Selection. IJISA. 2021 Oct 8;13(5):14–23.
  26. 26. Michael Chuma F, Godson Mwanga G. Stability Analysis of Equilibrium Points of Newcastle Disease Model of Village Chicken in the Presence of Wild Birds Reservoir. IJMSC. 2019 Apr 8;5(2):1–18.
  27. 27. Umar Y, Bashir Ibrahim M, Department of Pure and Industrial Chemistry, Bayero University. Equilibrium and Thermodynamic Studies on Adsorption of Hexavalent Chromium from Aqueous Solution onto Low Cost Activated Carbon. IJEM. 2020 Apr 8;10(2):52–70.
  28. 28. Hu Z, Ivashchenko M, Lyushenko L, Klyushnyk D. Artificial Neural Network Training Criterion Formulation Using Error Continuous Domain. IJMECS. 2021 Jun 8;13(3):13–22.
  29. 29. Izonin I, Tkachenko R, Ryvak L, Zub K, Rashkevych M, Pavliuk O. Addressing Medical Diagnostics Issues: Essential Aspects of the PNN-based Approach. CEUR. 2020 Jan 12; 2753:209–218.
  30. 30. Hu Z, Odarchenko R, Gnatyuk S, Zaliskyi M, Chaplits A, Bondar S, et al. Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior. IJCNIS. 2021 Dec 8;12(6):1–13.