Proceedings of International Conference on Applied Innovation in IT
2024/03/07, Volume 12, Issue 1, pp.89-95

Transient Phenomena in Information Technology for Branching Processes with an Infinite Set of Types


Sergii Degtyar, Oleh Kopiika and Yurii Shusharin


Abstract: Branching processes as a mathematical concept has applications in various fields, including information technology. In information technology, branching processes can be used to model and analyze various scenarios, such as the propagation of data or information in a network, the growth of computer viruses, the spread of software bugs, and more. Branching processes are particularly useful for understanding the dynamics of systems where events can lead to multiple new events in a probabilistic manner. Overall, branching processes provide a valuable mathematical framework for modeling and analyzing various aspects of information technology, helping to make informed decisions and optimize IT systems and networks. We have studied transient phenomena for branching processes with an infinite number of types close to critical. The analytical apparatus for this study is Markov renewal theorems. Branched processes were used to evaluate the performance of IT systems and predict their behavior under different conditions. This is important for capacity planning and resource allocation.

Keywords: Transient Phenomena, Branching Processes, Markov Renewal Equation, Information Technology

DOI: 10.25673/115646; PPN 1884680631

Download: PDF

References:

  1. B. Kamal, El F. Abdeslam, and E.E. Abdelbaki, "Software-defined networking (SDN): A survey", Security and Communication Networks, 2016, 9 (18), pp. 5803-5833, doi:10.1002/sec.1737.
  2. M. Ahmadreza, "Software-defined load-balanced data center: design, implementation and performance analysis", 2020, Cluster Computing, 24 (2), pp. 591-610, doi: 10.1007/s10586-020-03134-x. ISSN 1386-7857. S2CID 220490312.
  3. M. Ahmadreza, "Software-defined Internet of Multimedia Things: Energy-efficient and Load-balanced Resource Management, " IEEE Internet of Things Journal, 9 (3), pp. 2432-2442, doi: 10.1109/JIOT.2021.3095237. ISSN 2327-4662. S2CID 237801052.
  4. "Software-defined networking is not OpenFlow, companies proclaim," 2024, searchsdn.techtarget.com.
  5. "InCNTRE's OpenFlow SDN testing lab works toward certified SDN product," 2024, https://www.techtarget.com/news.
  6. M. Kimura, K. Saito, R. Nakano, and H. Motoda, "Extracting influential nodes on a social network for information diffusion. Data Min. Knowl. Discov. 2010, 20, рр. 70-97.
  7. M. Bastian, S. Heymann, and M. Jacomy, "Gephi: An open source software for exploring and manipulating networks, " In: International AAAI Conference on Weblogs and Social Media, 2009.
  8. F. Hartog, A. Raschella, F. Bouhafs, P. Kempker, B. Boltjes, and M. Seyedebrahimi, "A Pathway to solving the Wi-Fi Tragedy of the Commons in apartment blocks, " In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), 2017, pp. 1-6.
  9. J. Stuart, "Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance, ", John Wiley & Sons, 2015. ISBN 9781119104711.
  10. T. Fox-Brewster, "Netflix Is Dumping Anti-Virus, Presages Death Of An Industry," Forbes. Archived from the original on September 6, 2015.
  11. C. Claire, N. Holtschulte, E.K. Smith, Y. Brun, P. Devanbu, S. Forrest, and W. Weimer, "The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs". IEEE Transactions on Software Engineering. 2015, 41 (12), рр. 1236-1256, doi:10.1109/TSE.2015.2454513. ISSN 0098-5589.
  12. W. Chwan-Hwa, and D. Irwin, "Introduction to Computer Networks and Cybersecurity. CRC Press. 2016, p. 500. ISBN 978-1-4665-7214-0.
  13. S, Behzad, B. Morteza, and A. Masayoshi, "Efficient feature extraction model for validation performance improvement of duplicate bug report detection in software bug triage systems". Information and Software Technology, October 1, 2020, 126: 106344, doi:10.1016/j.infsof.2020.106344. S2CID 219733047.
  14. M. Rigger, D. Pekarek, and H. Mössenböck, "Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows", Network and System Security, Lecture Notes in Computer Science, Cham: Springer International Publishing, 2018, vol. 11058, pp. 376-390, arXiv: 1806.09026, doi: 10.1007/978-3-030-02744-528, ISBN 978-3-030-02743-8.
  15. A. Herzberg, and H. Shulman, "Oblivious and Fair Server-Aided Two-Party Computation". 2012 Seventh International Conference on Availability, Reliability and Security. IEEE. 2012. pp. 75-84, doi: 10.1109/ares.2012.28. ISBN 978-1-4673-2244-7. S2CID 6579295.
  16. B. Al-Shaikh and S.G. Stacey, "Essentials of Equipment in Anaesthesia, Critical Care, and Peri-Operative Medicine, p. 247, 2017.
  17. E. Dubrova, "Fault-Tolerant Design," Springer, 2013, ISBN 978-1-4614-2112-2.
  18. L. Globa, S. Dovgiy, O. Kopiika, and O. Kozlov, “Approach to building uniform information platform for the national automated ecological information and analytical system,” In: CEUR Workshop Proceedings, 2021, 3021, pp. 53-65.
  19. V. Sundarapandian,"7.Queueing Theory," Probability, Statistics and Queueing Theory. PHI Learning. ISBN 978-81-203-3844-9.
  20. L.W. Dowdy, A.F. Almeida, and D.A. Menasce, "Performance by Design: Computer Capacity Planning by Example," Archived from the original on 2016-05-06, [Accessed: 8 Dec 2023].
  21. K. Schlechter, "Hershey Medical Center to open redesigned emergency room," The Patriot-News. Archived from the original on June 29, 2016.
  22. "How to find the performance bottleneck in C# desktop application?" Stack Overflow, 2012.
  23. K. Kirk, "Performance Profiling with a Focus," (2017), Develop for Performance.
  24. "What is code profiling? Learn the 3 Types of Code Profilers," Stackify Developer Tips, Tricks and Resources. Disqus, 2016.
  25. E. Lawrence, "Getting Started with Profile Guided Optimization," testslashplain, 2016.
  26. K. Krauss, "Matching Wildcards: An Improved Algorithm for Big Data," Develop for Performance, 2018.
  27. "List of .Net Profilers: 3 Different Types and Why You Need All of Them," Stackify Developer Tips, Tricks and Resources, Disqus, 2016.
  28. S. Degtyar, "Markov renewal limit theorems, Theory of Probability and Mathematical Statistics," 76, pp. 33-40, 2008.
  29. S.V. Degtyar, Y.V. Shusharin, and Y.O. Zhuk, "Motion of Symmetric Gyroscope under Action of Gravity with Discrete Random Change of Parameters of System," International Applied Mechanics, November 2022, vol. 58, pp. 634-644.
  30. L. Zonenashvili, "Some remarks on the asymptotics of the mean number of particles in branching processes," Bulletin of the Georgian National Academy of Sciences, January 1986.
  31. P. Jagers, "Branching processes with biological applications," New York, Wiley, 1975, 20, pp. 848-851, 1975.
  32. V.M. Shurenkov, "Ergodic Theorems and Related Problems," “Nauka”, Moscow, 1989; English transl., VSP International Science Publishers, Utrecht, 1998. MR1690361 (2000i:60002).


    HOME

       - Call for Papers
       - For authors
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 12, Issue 1 (ICAIIT 2024)        - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

DOI: http://dx.doi.org/10.25673/115729


        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Anhalt University of Applied Sciences

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.