{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T04:45:54Z","timestamp":1761108354475,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>In this article, for the first time, a new mathematical model of the schemes for organizing a session of person\u2013system interactions between the registration center server of the information system for critical use (ISCU) and the terminal of the person-user in a wireless communication environment are presented. In contrast to the existing literature, this article uses the mathematical apparatus of queuing systems to describe the schemes of organizing the stochastic process of a session of person\u2013system interaction in discrete or continuous time, namely, models of the type Geo\/Geo\/1 with group arrival and ordinary service for the case of discrete representation of time and models of the type M\/G\/1 for the case of continuous time representation. The use of the mathematical apparatus of queuing systems in the studies made it possible to obtain analytical expressions for comparing formalized schemes for organizing the person\u2013system interaction according to such functional characteristics as the average time of downloading a finite number of data blocks into the terminal of the target person-user (average time that the request spent the server of the information system).<\/jats:p>","DOI":"10.3390\/sym13030391","type":"journal-article","created":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T20:55:44Z","timestamp":1614459344000},"page":"391","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modeling of the Schemes for Organizing a Session of Person\u2013System Interactions in the Information System for Critical Use Which Operates in a Wireless Communication Environment"],"prefix":"10.3390","volume":"13","author":[{"given":"Mohammed","family":"Al-Ma\u2019aitah","sequence":"first","affiliation":[{"name":"Computer Science Department, Community College, King Saud University, Riyadh 11564, Saudi Arabia"}]},{"given":"Aldosary","family":"Saad","sequence":"additional","affiliation":[{"name":"Computer Science Department, Community College, King Saud University, Riyadh 11564, Saudi Arabia"}]},{"given":"Ayed","family":"Alwadain","sequence":"additional","affiliation":[{"name":"Computer Science Department, Community College, King Saud University, Riyadh 11564, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,2,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Bisikalo, O.V., Kovtun, V.V., and Sholota, V.V. (2019, January 5\u20137). The Information System for Critical Use Access Process Dependability Modeling. Proceedings of the 9th International Conference on Advanced Computer Information Technologies (ACIT), Ceske Budejovice, Czech Republic.","DOI":"10.1109\/ACITT.2019.8780013"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bisikalo, O.V., Kovtun, V.V., and Yukhimchuk, M.S. (2019). Modeling the security policy of the information system for critical use. Radio Electronics, Computer Science, Control, National University \u201cZaporizhzhia Polytechnic\u201d.","DOI":"10.15588\/1607-3274-2019-1-13"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Bisikalo, O.V., Kovtun, V.V., Kovtun, O.V., and Romanenko, V.B. (2020, January 14\u201318). Research of safety and survivability models of the information system for critical use. Proceedings of the 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine.","DOI":"10.1109\/DESSERT50317.2020.9125061"},{"key":"ref_4","unstructured":"Maglogiannis, I., and Zafiropoulos, E. (September, January 30). Modeling Risk in Distributed Healthcare Information Systems. Proceedings of the International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, USA."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Guo, Q., Xie, P., Li, F., Guo, X., Li, Y., and Ma, L. (2019, January 15\u201317). Research on Linkage Model of Network Resource Survey and Vulnerability Detection in Power Information System. Proceedings of the 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China.","DOI":"10.1109\/ITNEC.2019.8729064"},{"key":"ref_6","unstructured":"Maslyanko, P., and Riabushenko, A. (2010, January 23\u201327). Modeling information-communication system of financial investment management. Proceedings of the International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv-Slavske, Ukraine."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Rogozov, Y., Sviridov, A., and Degtyarev, A. (2014, January 15\u201317). The information environment for the integrated life cycle model of configurable information system. Proceedings of the 8th International Conference on Application of Information and Communication Technologies (AICT), Astana, Kazakhstan.","DOI":"10.1109\/ICAICT.2014.7035918"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Lugovi\u0107, S., Dun\u0111er, I., and Horvat, M. (2017, January 22\u201326). Primary and secondary experience in developing adaptive information systems supporting knowledge transfer. Proceedings of the 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia.","DOI":"10.23919\/MIPRO.2017.7973607"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Ongkasae, K., Nakazato, H., Koga, T., and Lu, X. (2015, January 25\u201327). QoS Implementation in System Wide Information Management (SWIM) Network Model. Proceedings of the Twelfth International Symposium on Autonomous Decentralized Systems, Taichung, Taiwan.","DOI":"10.1109\/ISADS.2015.57"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lopes RR, F., Balaraju, P.H., and Sevenich, P. (2019, January 14\u201315). Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exploratory Study. Proceedings of the International Conference on Military Communications and Information Systems (ICMCIS), Budva, Montenegro.","DOI":"10.1109\/ICMCIS.2019.8842732"},{"key":"ref_11","unstructured":"Mendes, P., Andres-Colas, J., and Pinho, C. (2005, January 11\u201314). Information model for the specification of QoS agreements among ambient networks. Proceedings of the 16th International Symposium on Personal, Indoor and Mobile Radio Communications, Berlin, Germany."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Juniang, Y., Xiaoyuan, J., Zhanwei, L., and Jia, D. (2009, January 10\u201311). Design and Implementation of Information Supporting System Model. Proceedings of the WASE International Conference on Information Engineering, Taiyuan, Chanxi.","DOI":"10.1109\/ICIE.2009.183"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Sollfrank, M., Trunzer, E., and Vogel-Heuser, B. (2019, January 14\u201317). Graphical Modeling of Communication Architectures in Network Control Systems with Traceability to Requirements. Proceedings of the 45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal.","DOI":"10.1109\/IECON.2019.8927246"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Heo, J., Shin, J.W., Kim, H.S., Shin, D.H., Lee, G.S., and Lee, J.I. (2007, January 25\u201331). A Study for a New IT Service Information Protection Framework. Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), Cap Esterel, France.","DOI":"10.1109\/ICSNC.2007.10"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2960","DOI":"10.1109\/JSYST.2015.2427338","article-title":"An Infrastructure Service Recommendation System for Cloud Applications with Real-time QoS Requirement Constraints","volume":"11","author":"Zhang","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_16","unstructured":"Gossett, J., Noll, D., and Corman, D. (2002, January 7). Experiences in a distributed, real-time avionics domain-Weapons System Open Architecture. Proceedings of the Fifth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing. ISIRC-2002, Washington, DC, USA."},{"key":"ref_17","unstructured":"Airy, M., Bhadra, S., Heath, R.W., and Shakkottai, S. (2006, January 7\u201310). Transmit Precoding for the Multiple Antenna Broadcast Channel. Proceedings of the IEEE 63rd Vehicular Technology Conference, Melbourne, Australia."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Bhadra, S., and Gupta P: Shakkottai, S. (2006, January 9\u201314). On Network Coding for Interference Networks. Proceedings of the International Symposium on In Information Theory, Seattle, WA, USA.","DOI":"10.1109\/ISIT.2006.261834"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bisikalo, O.V., Kovtun, V.V., and Kovtun, O.V. (2020, January 13\u201315). Modeling of the Estimation of the Time to Failure of the Information System for Critical Use. Proceedings of the 10th International Conference on Advanced Computer Information Technologies (ACIT), Deggendorf, Germany.","DOI":"10.1109\/ACIT49673.2020.9208883"},{"key":"ref_20","first-page":"174","article-title":"Research of pareto-optimal schemes of control of availability of the information system for critical use","volume":"2623","author":"Bisikalo","year":"2020","journal-title":"CEUR Workshop Proc."},{"key":"ref_21","unstructured":"Bisikalo, O.V., Kovtun, V.V., Kovtun, O.V., and Danylchuk, O.M. (2020). Mathematical modeling of the availability of the information system for critical use to optimize control of its communication capabilities. Int. J. Sens., 10."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Gibson, J. (2013). Information Theory and Rate Distortion Theory for Communications and Compression. Morgan Claypool.","DOI":"10.1007\/978-3-031-01680-6"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Rong, L., Baiping, L., and Xinrong, M. (2012, January 21\u201323). The application of modern information technology in communication theory teaching. Proceedings of the 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, China.","DOI":"10.1109\/CECNet.2012.6201513"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Razavi, S.M., and Zamiri-Jafarian, H. (2009, January 12\u201314). Joint subspace beamforming and space-time coding in wireless MIMO systems. Proceedings of the International Conference on Advanced Technologies for Communications, Hai Phong, Vietnam.","DOI":"10.1109\/ATC.2009.5349325"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Fasano, A., and Barbarossa, S. (2007;, January 15\u201320). Information Lossless Space-Time Coding for Multiple Access Systems. Proceedings of the International Conference on Acoustics, Speech and Signal Processing\u2014ICASSP \u201907, Honolulu, HI, USA.","DOI":"10.1109\/ICASSP.2007.366468"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Tang, L., Jing, X., and Zhang, Z. (2013, January 16\u201318). Adaptive switching based on Markov model for multiuser MIMO-OFDM systems. Proceedings of the 22nd Wireless and Optical Communication Conference, Chongqing, China.","DOI":"10.1109\/WOCC.2013.6676349"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, C., Liu, W., and Zeng, X. (2017, January 28\u201330). Wireless channel modeling and performance analysis based on Markov chain. Proceedings of the 29th Chinese Control And Decision Conference (CCDC), Chongqing, China.","DOI":"10.1109\/CCDC.2017.7978890"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mo, J. (2010). Performance Modeling of Communication Networks with Markov Chains. Morgan Claypool.","DOI":"10.1007\/978-3-031-79989-1"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/CC.2018.8438274","article-title":"Performance analysis for multimedia communication systems with a multilayer queuing network model","volume":"15","author":"Tang","year":"2018","journal-title":"China Commun."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Basukala, R.K., Han, K., Choi, D., Kim, Y., and Han, S. (2009, January 16\u201317). QoS Assurance of Multimedia Traffic in Residential Network with Hybrid Co-ordination Function and Queuing Disciplines. Proceedings of the Pacific-Asia Conference on Circuits, Communications and Systems, Chengdu, China.","DOI":"10.1109\/PACCS.2009.199"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TCSI.2005.854291","article-title":"A note on impulse response for continuous, linear, time-invariant, continuous-time systems","volume":"53","author":"Ciampa","year":"2006","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/3\/391\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:30:09Z","timestamp":1760160609000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/3\/391"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":31,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["sym13030391"],"URL":"https:\/\/doi.org\/10.3390\/sym13030391","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2021,2,27]]}}}