Preprint
Article

Info- Geometric Analysis of the Stable Queue Manifold Dynamics With Queue Applications to E-health

Altmetrics

Downloads

108

Views

38

Comments

0

This version is not peer-reviewed

Submitted:

24 January 2024

Posted:

25 January 2024

You are already at the latest version

Alerts
Abstract
Information geometry is a mathematical framework that analyses the structure of statistical models using concepts from differential geometry. It treats families of probability distributions as manifolds, where the parameters of each model determine the coordinate charts. By applying info-geometric tools, we can gain insights into the characteristics of these models. The approach involves characterizing the queueing system's manifold using information geometry and presenting the exponential of the information matrix. This integration of information geometry with queueing theory provides a novel perspective for analyzing the dynamics of queueing systems, incorporating relativistic and Riemannian concepts. Some applications to E-health are highlighted. Finally, closing remarks and the next phase of research.
Keywords: 
Subject: Computer Science and Mathematics  -   Probability and Statistics

1. Introduction

Information geometry (IG) is a field that applies differential geometry techniques to statistics. It aims to use non-Euclidean geometry methods to analyze probability distributions and stochastic processes. IG is a cutting-edge geometric methodology that analyses models and visualizes geometry from an IG perspective. IG has wide applicability in various domains, including machine learning. This approach offers new insights and tools for understanding complex data and improving modeling techniques[1]. What's more interesting is that statistical manifolds (SMs) were studied with IG. In Figure 1, the probability p x θ is coined each point in S M ( θ ), θ R n [ 2 ]
A smooth statistical manifold is described mathematically by FIM from an info-geometric perspective. By quantifying the informative gap between measurements, FIM makes statistical data analysis and comparison possible.
Amari and Dodson investigated a few exponential distributions and provided geometric structures [3]. An analogue of the regular exponential function for square matrices is the matrix exponential. Systems of linear differential equations are solved with it. Furthermore, Lie groups are matrix exponential-based [4].
The geometry of M / D / 1 queues has only been the subject of one research work was a motivation behind starting this new to the knowledge analysis of queues, which connects information and matrix theories with differential geometry.
Following Euclidean space, geodesics are straight lines' analogues and share many of their characteristics, see Figure 2. Objects move on a geodesic in curved space-time according to General Relativity (GR), extremizing exact timing within locations. Thus, both space-time and curved spaces geometries are described by the same mathematics. Developing GR presented Einstein with its greatest mathematical challenge. In addition, a geodesic is a "straight line on a curved surface" that reduces the separation between two points.
In addition to measuring two distribution functions’ shape similarity, FIM also relates to how much information each distribution function has regarding the parameter of the statistical manifold's probability density function.
This paper contributes to i) Obtaining the stable G / G / 1   queue manifold FIM and its inverse. ii) e S t a b l e   G / G / 1   Q M is shown to solve d x   d t   = Ax.
This is how the remainder of the paper is structured: A preliminary set of definitions related to information geometry is presented in Section 2. Section 3 introduces FIM, its inverse for a stable G / G / 1 QM. In Section 4, one can derive e S t a b l e   G / G / 1   Q M . Some S G / G / 1 applications to E-health are overviewed in section 5. Finally, Section 6 includes conclusions, some proposed open problems, and recommendations for further study.

2. IG Main Definitions

Definition 2.1 
[7,8]
1.We call M = { p ( x , θ ) | θ ϵ Θ } an SM and p ( x , θ ) is the probability density function.
2. The potential function Ψ is given by
C x + i F i Ψ θ = l n p x ; θ = L x ; θ  
M = { L x ; θ |   θ = θ 1 , θ 2 , , θ n ϵ R n } an n-dimensional distribution manifold, with a coordinate system, namely θ 1 , θ 2 , , θ n .
Definition 2.2 
[7,8]. Ψ θ   of (2.1) is the coordinates only part of ( L x ; θ )
Definition 2.3 
[7,8]. FIM, namely for i , j = 1,2 , , n [ g i j ], reads as:
g i j = 2 θ i θ j Ψ θ
Definition 2.4 
[7,8]. For FIM, the inverse matrix of [ g i j ] reads as
[ g i j ] = ( [ g   i j ] ) ) 1 = a d j g i j ,   = det g i j = I , j = 1,2 , , n .    
The FIM’s arc length representation reads as
( d s ) 2 = i , j = 1 n g i j ( d θ i ) ( d θ j )      
Definition 2.6 
[9]
(1) Observing
d x d t = A x
The matrix exponential
    e A     = i = 0 A i i ! = I + A + A 2 2 ! + + A k k ! +
(2) Let
Φ δ = det A δ I
Assuming that
Φ δ = δ = det A δ I = 0 ,
δ   of (2.17) are referred to eigen values that correspond to x , such that:
A x =   δ x    
Another way to represent     e A     will be:
    e A     = T     e D d i a g o n a l T 1      
D d i a g o n a l   defines δ matrix diagonalization and T is matrix with only the obtained δ as columns.

3. F I M G / G / 1 Q M

By [17], the stable G / G / 1 queue’s Shannonian optimization reads
p n = 1 ρ ,                                         n = 0 1 ρ g x n ,               n 1         ,  
g = ρ 2 L ρ 1 ρ ,   x =   L ρ L , and L = ρ 2 1 + C a 2 + ρ C s 2 1 ρ (Mean queue length of G / G / 1 queue, ρ defines SU and C s 2 denotes ST’s squared coefficient of variation ) .   p n (c.f., (3.1)) will re-write to:
      p n = 1 ρ ,                                         n = 0 2 ρ ( γ + ρ β 1 ρ 1 ) n 1 ( ( γ + ρ β 1 ρ + 1 ) n ,               n            
where   γ   = C a 2 ,   β =   C s 2 .
The reader should note that the case γ   = C a 2 = 1 in (3.2), reduces to the special case of M / G / 1 QM [18].
Theorem 3.1. 
G / G / 1 QM satisfies:
(i) [ g i j ] is
[ g i j ] = a b c b e d c d f
with
a = 1 ρ 2 γ + β ( γ + β + 2 2 ρ ( β + 1 ) ) ( ( 1 ρ ) ( γ 1 + ρ β + 1 ) 2
b = ( β + 1 ) ( γ 1 + ρ ( β + 1 ) 2
c = γ 1 ( γ 1 + ρ ( β + 1 ) 2
d = ( ρ ) ( γ 1 + ρ ( β + 1 ) 2
e = 1 ( γ 1 + ρ ( β + 1 ) 2
f = ρ 2 ( γ 1 + ρ ( β + 1 ) 2
where a , b , c , d , e , f   are as defined above and   = ( a e f + 2 c b d ( a d 2 + f b 2 + e c 2 ) ) 0 (3.10)
(ii) IFIM reads as:
[ g i j ]   = ( [ g i j ] ) ) 1 = a d j g i j   = A B C B E D C D F  
with
A = e f ( d ) 2
B = c d b f
C = b d e c
E = a f ( c ) 2
D = b c a d
F = a e ( b ) 2
Proof 
 
(i) By (3.2), one gets
(I) p 0 = 1 ρ . Thus,
L x ; θ = l n 1 ρ ,   θ = θ 1 = ρ      
Ψ θ = l n 1 ρ
Hence,
1 = Ψ ρ = 1 1 ρ
1 1 = 2 Ψ ρ 2 = 1 ( 1 ρ ) 2      
Therefore, FIM reads:
[ g i j ]   =   2 Ψ ρ 2 =   1 ( 1 ρ ) 2    
IFIM is:
g i j = [ g i j ] 1 = ( 1 ρ ) 2
Case II: when n 1   , it follows that:
L x ; θ = ( l n 2 + l n ρ + ( n 1 ) l n γ + ρ β 1 ρ 1 nln γ + ρ β 1 ρ + 1 ,  
  θ = ( θ 1 , θ 2 ,   θ 3 ) = ( ρ , γ , β )  
Ψ θ = l n γ + ρ β 1 ρ 1 l n 2 l n ρ  
Therefore,
1 = Ψ ρ = 1 ρ +   γ + β ( 1 ρ ) ( γ 1 + ρ β + 1
2 = Ψ γ = 1 ( γ 1 + ρ ( β + 1 )
3 = Ψ β = ρ ( γ 1 + ρ ( β + 1 )
1 2 = ( β + 1 ) ( γ 1 + ρ ( β + 1 ) 2 = 2 1
1 3 = ( γ 1 ) ( γ 1 + ρ ( β + 1 ) 2 = 3 1
1 1 = 1 ρ 2 γ + β ( γ + β + 2 2 ρ ( β + 1 ) ) ( ( 1 ρ ) ( γ 1 + ρ β + 1 ) 2
2 2 = 1 ( γ 1 + ρ ( β + 1 ) 2
2 3 = ( ρ ) ( γ 1 + ρ ( β + 1 ) 2 = 3 2
3 3 = ρ 2 ( γ 1 + ρ ( β + 1 ) 2
Hence, (i) follows.
As γ = 1 , we have
a = 1 ( 1 ρ ) 2 , b =   1 ρ 2 ( β + 1 , c =   0 ,   d =   1 ρ ( β + 1 ) 2   , e = 1 ( ρ ( β + 1 ) 2   , f =   1 ( β + 1 ) 2 .
(ii) The FIM’s determinant reads
=   det g i j =   = ( a e f + 2 c b d ( a d 2 + f b 2 + e c 2 ) ) 0 . Hence, IFIM exists.
The corresponding IFIM reads as
[ g i j ] = ( [ g i j ] ) ) 1 = a d j g i j = = A B C B E D C D F  
where A , B , C , D , E , F are given above. This proves (ii).

4. e S t a b l e G / G / 1 Q M

Preliminary Theorem 4.1 
[10]
The solution of the cubic equation
a ' w 3 + b ' w 2 + c ' w + d ' = 0
is characterized arbitrarily by
y = z σ z
w = y b ' 3 a '
z = ( ε 1 2 ) ± ε 2 3 ,
ε 1 = 2 ( b ' ) 3 27 + d ' a ' b ' c ' 3 ( a ' ) 2
ε 2 = ( ε 1 ) 2 4 + ( ε 3 ) 3 27 ,  
where   ε 3   is   given   by   ε 3 = ( b ' ) 2 3 ( a ' ) 2 + c ' a '
ε 2 is called the discriminant of the cubic equation.
Theorem 4.2. 
e S t a b l e G / G / 1 Q M solves d x d t   =Ax.
Proof 
 
Recall that FIM of the stable G / G / 1 QM g i j ,   i , j =   1,2 , 3 is given by
  [ g i j ] = a b c b e d c d f   ,  
where
a = 1 ρ 2 γ + β ( γ + β + 2 2 ρ ( β + 1 ) ) ( ( 1 ρ ) ( γ 1 + ρ β + 1 ) 2
b = ( β + 1 ) ( γ 1 + ρ ( β + 1 ) 2
c = γ 1 ( γ 1 + ρ ( β + 1 ) 2
d = ( ρ ) ( γ 1 + ρ ( β + 1 ) 2
e = 1 ( γ 1 + ρ ( β + 1 ) 2
f = ρ 2 ( γ 1 + ρ ( β + 1 ) 2
Now, we have
Φ δ = δ = det [ g i j ] δ I = d e t a δ b c b e δ d c d f δ = 0 . Hence, it holds that:
a δ e δ f δ d 2 b b f δ c d + c b d c e δ = 0     (4.15). Thus, it holds that
    δ 3 a + a e + f d 2 δ 2 + a ( e + f b 2 c 2 ) δ + ( b 2 f + c 2 e + a d 2 2 b c d ) = 0
We have
a ' = 1 ,   b ' = a + a e + f d 2 ,   c ' = a ( e + f b 2 c 2 ) ,   d ' = ( b 2 f + c 2 e + a d 2 2 b c d )
By the preliminary theorem (4.1), it is implied that
y = z ε 3 z , δ = y b ' 3 a ' , z = ( ε 1 2 ) ± ε 2 3 , ε 1 =   2 ( b ' ) 3 27 + d ' a ' b ' c ' 3 ( a ' ) 2 , ε 2 =   ( ε 1 ) 2 4 + ( ε 3 ) 3 27 , ε 3 =   ( b ' ) 2 3 ( a ' ) 2 + c ' a ' We have
ε 3 = ( a + a e + f d 2 ) 2 3 + a ( e + f b 2 c 2
ε 1 = 2 a + a e + f d 2 3 27 + b 2 f + c 2 e + a d 2 2 b c d + a + a e + f d 2 a ( e + f b 2 c 2 )   3
ε 2 = ( ε 1 ) 2 4 + ( ε 3 ) 3 27 = (   ( 2 a + a e + f d 2 3 27 + b 2 f + c 2 e + a d 2 2 b c d + a + a e + f d 2 a ( e + f b 2 c 2 ) ,   3 ) 2 4 + ( ( a + a e + f d 2 ) 2 3 + a ( e + f b 2 c 2 ) ) 3 27 )
implies that we can obtain the required values eigen values     δ 1,2 , 3 for (4.16). Therefore, the diagonal matrix D d i a g o n a l is given by
D d i a g o n a l =     δ 1 0 0 0     δ 2 0 0 0     δ 3
The eigen vector x   δ 1 = c corresponding to     δ 1 satisfies
a     δ 1 b c b e     δ 1 d c d f     δ 1 x 1 x 2 x 3 = 0 0 0
This implies
a       δ 1 + b       δ 1 x 2 + c x 3 = 0
b x 1 + e       δ 1 x 2 + d x 3 = 0
c x 1 + d x 2 + ( f     δ 1 ) x 3 = 0
By (4.24), x 1 =         δ 1 e x 2 d x 3 b (4.26). Consequently, by (4.25) and (4.23), it is implied that:
c (     δ 1 e x 2 d x 3 b ) + d x 2 + ( f     δ 1 ) x 3 = 0 (4.27). Therefore, x 2 =     (     δ 1 f + c d b ) x 3 ( d + c     δ 1 e b ) (4.28). Similarly, we have
x 1 =   ( b f     δ 1 c ( d + 1 ) d + c b (   δ 1 f ) c ) x 3 ( a     δ 1 )
Hence, it is implied that
x   δ 1 = ( b f     δ 1 c ( d + 1 ) d + c b (   δ 1 f ) c ) ( a     δ 1 ) (     δ 1 f + c d b ) ( d + c     δ 1 e b ) 1 x 3   ,   x 3 0
Also, x   δ 2 corresponding to δ 2 reads
x   δ 2 = ( b f     δ 2 c ( d + 1 ) d + c b (   δ 2 f ) c ) ( a     δ 2 ) (     δ 2 f + c d b ) ( d + c     δ 2 e b ) 1 x 3 ,   x 3 0
And   x   δ 3 = ( b f     δ 3 c ( d + 1 ) d + c b (   δ 3 f ) c ) ( a     δ 3 ) (     δ 3 f + c d b ) ( d + c     δ 3 e b ) 1 x 3 ,   x 3 0
Hence, the matrix T is determined by
T =     a 1     a 2     a 3     b 1     b 2     b 3 1 1 1
    a 1 = ( b f     δ 1 c ( d + 1 ) d + c b (   δ 1 f ) c ) ( a     δ 1 )   ,   a 2 = ( b f     δ 2 c ( d + 1 ) d + c b (   δ 2 f ) c ) ( a     δ 2 ) ,       a 3 = b f     δ 3 c d + 1 d + c b   δ 3 f c ( a     δ 3 ) ,       b 1 = (     δ 1 f + c d b ) ( d + c     δ 1 e b ) ,       b 2 =     δ 2 f + c d b d + c     δ 2 e b   ,       b 3 = (     δ 3 f + c d b ) ( d + c     δ 3 e b )
After some manipulation, it is implied that:
T =   det ( T )   =     [   a 1     b 2     b 3     a 2     b 1     b 3 +     a 3     b 1     b 2 ]   0
As a necessity that T 1 should exist.
After some mathematical manipulation:
  T 1 =   1 T     b 2     b 3     a 3     a 2     a 2   b 3     a 3     b 2     b 3     b 1     a 1     a 3     a 3   b 1     a 1     b 3     b 1     b 2     a 2     a 1     a 1   b 2     a 2     b 1
Therefore, e S t a b l e   G / G / 1   Q M reads
e A   =   T e D T 1 =   T 1 e   δ 1 0 0 0 e   δ 2 0 0 0 e   δ 3 T
The achieved result in (4.37) presents a novel contribution , that is e S t a b l e   G / G / 1   Q M is a solution to d x d t   = Ax.

5. How can G / G / 1 queue advance E-health.

The advancementsin e-health applications bring about new challenges for designers and maintainers. These challenges include ensuring timely transmission of health information, addressing limitations in model building and training, navigating regulatory issues related to data sharing, and safeguarding the privacy and security of medical data. Additionally, the current COVID pandemic emphasizes the need for safety in both virtual and physical environments. In [11], the authors have developed a framework for creating secure, responsive, and intelligent e-health applications. The framework focuses on three main components: Analyze, Acquire, and Authenticate, which cover the entire data lifecycle in e-health applications. The goal is to address the challenges related to data security, privacy, and the need for reliable medical decision support in the context of e-health. This can be visualized by Figure 4 (c.f., [11]).
Regarding unrelated topics, discussed the traffic patterns of an IP network with multiple services, each of which has its distribution law. Specifically, it mentions the G / G / 1   analysis system, which is a mathematical model used to analyze single-server systems with arbitrary inter-arrival times and unspecified service time distributions. The analysis of such systems is considered complex due to the incomplete understanding of the process dispersion. However, the standard G / G / 1 model does not provide such solutions, except for certain distributions like the exponential distribution. The authors have also noted the necessity for additional study to look into effective systems that may be utilized to take this research a step ahead.
Systems service’s arrival process descriptions are usually constrained to a small number of significant moments that define their distributions. Statistical metrics such as the coefficient of random variation or the root-mean-square deviation are used to express these moments, which are often the first two. Nonetheless, the irregular flow of incoming requests alters the working characteristics and makes it difficult to determine the precise result of the system's performance. Although the influence of higher-order moments decreases with increasing order number, the average delay is still dependent on the first two moments.The variabilityof the request service duration and the variability of the intervals between requests are represented by the squared coefficient of variation (CV). In these computations, the average values of the service rate, service time distribution mean, and request flow intensity (arrival rate) are used.
Figure 3 provides a visual representation of the relationships involved in estimating the quality and time parameters of network traffic service units. As demonstrated in [12], the variation coefficient—which is established by the root-mean-square deviation—determines the system’s perceived time delay. This suggests that online traffic, like video-on-demand and Internet Protocol Television (IPTV), which have high variation coefficients, should be buffered to mitigate delays. During the transfer of data in communication networks for E-health applications, small packet losses are considered acceptable. Packet losses due to errors in communication channels with FOCL (Fibre Optic Cable Lines) deployment are possible, however they are not very significant. Figure 5's results demonstrate that the communication network data's properties are thought to be appropriate for use in e-health applications.
Figure 6 (c.f., [12]) illustrates the relationship between CPU overloading and packet loss likelihood. In E-health applications, where load capacity is usually not substantial and seldom reaches its maximum, the figure shows that lowering the load capacity improves packet loss performance.
The proposed work of conducted a comprehensive analysis of the MSSN (Multi-Service Switched Network) for its application in E-health. The analysis focuses on using the G / G / 1 mathematical model to evaluate the system's capacity, considering a single-channel system with general flow and request characteristics. The goal is to understand the system's performance and suitability for E-health applications based on factors like service duration and distribution.
The authors address the likelihood of packet loss (Ploss) in a network in the context of [12], which is based on the quantity of dropped packets over a particular amount of time. The total of the waiting time in the buffer, packet processing time, and other variables is known as the packet service delay. Using the G / G / 1 mathematical model, the authors hope to analyse a multi-service network for E-health applications while taking into account variables such as packet loss probability, latency, and jitter. In this instance, the authorsmeasured the network development qualitatively for their suggested model and contrasted it with methods that are frequently employed in E-health applications. In accordance with the Norros methodology, they also assessed the buffer space size to provide adequate service quality[13]. Additionally, they formulated a service quality algorithm for multi-service telecommunication networks, considering various mechanisms for queue formation and overloading control.

6. Conclusions and Future Work

In summary, this study reveals both FIM and IFIM for the   G / G / 1   QM. Finally, it has been proven that F I M   G / G / 1 Q M solves
d x   d t = Ax. Notably, the strength of G / G / 1   queue to advance E-health is highlighted. Next phase of research includes the determination of the IG structure of the Service Model manifold (c.f., [14]), the derivation of the information geometric structure of the Generalized Feller Pareto manifold(c.f., [15]), and IG powerful tools to geometrically interpret photon statistics and other unexplored phenomena in physics.

References

  1. Mageed, I. A., & Zhang, K. Q. (2022). Information Geometry? Exercises de Styles. electronic Journal of Computer Science and Information Technology, 8(1), 9-14.
  2. I.A. Mageed.(2023). Info-Geometric Analysis of Gamma Distribution Manifold with Gamma Distribution Impact to Advance Satellite Earth Observations. The 2nd International Conference on Applied Mathematics, Informatics, and Computing Sciences (AMICS 2023).
  3. Mageed, I. A., & Kouvatsos, D. D. (2021, February). The Impact of Information Geometry on the Analysis of the Stable M/G/1 Queue Manifold. In ICORES (pp. 153-160).
  4. B.C. Hall, The Matrix Exponential. In: Lie Groups, Lie Algebras, and Representations. Graduate Texts in Mathematics, vol 222. Springer, Cham, 2014.
  5. K.Nakagawa, The geometry of M/D/1 queues and Large Deviation, International Transactions of Operational Research, Volume 9, Issue 2, 2002. [CrossRef]
  6. [6]R.Kondor, S.Trivedi, On the Generalization of Equivariance and Convolution in Neural Networks to the action of Compact Groups, Proceedings of the 35th International Conference on Machine Learning, Stockholm, Sweden, PMLR 80, 2018.
  7. Mageed, I. A., Zhou, Y., Liu, Y., & Zhang, Q. (2023, August). Towards a Revolutionary Info-Geometric Control Theory with Potential Applications of Fokker Planck Kolmogorov (FPK) Equation to System Control, Modelling and Simulation. In 2023 28th International Conference on Automation and Computing (ICAC) (pp. 1-6). IEEE.
  8. Mageed, I. A., Yin, X., Liu, Y., & Zhang, Q. (2023, August). Z(a,b) of the Stable Five-Dimensional $ M/G/1$ Queue Manifold Formalism's Info-Geometric Structure with Potential Info-Geometric Applications to Human Computer Collaborations and Digital Twins. In 2023 28th International Conference on Automation and Computing (ICAC) (pp. 1-6). IEEE.
  9. I.A. Mageed , D.D.Kouvatsos, Information Geometric Structure of Stable M/G/1 Queue Manifold and its Matrix Exponential, Proceedings of the 35th UK Performance Engineering Workshop, School of Computing, University of Leeds, Edited by Karim Djemame, p.123-135,16 December 2019.
  10. J.T.Smith, Cubic and Quartic Formulas, San Francisco State University, 25 Aug 2013. [Online] Available on http://Cubic&Quartic.pdf.
  11. Lu, Z. (2022). Towards a Progressive E-health Application Framework (Doctoral dissertation).
  12. Attar, H., Khosravi, M. R., Igorovich, S. S., Georgievan, K. N., & Alhihi, M. (2021). E-health communication system with multiservice data traffic evaluation based on a G/G/1 analysis method. Current Signal Transduction Therapy, 16(2), 115-121. [CrossRef]
  13. Mageed, I. A. (2023, July). Rényi’s Maximum Entropy Formalism of Heavy-Tailed Queues with Hurst Exponent Heuristic Mean Queue Length Combined With Potential Applications of Hurst Exponent to Engineering. In 39 th Annual UK Performance Engineering Workshop (p. 21).
  14. S.M. Prado1, F. Louzada,J.G. S. Rinaldi and B.G. Benze,A Distribution for The Service Model, esquisa Operacional (2015) 35(3): 555-576© 2015 Brazilian Operations Research Society, 2014.
  15. M.R.Mahmoud, A.S. Abd El Ghafour, Shannon Entropy for the Generalized Feller Pareto (GFP) Family and Order Statistics of (GFP) Family and Order Statistics of (GFP) Subfamilies, Applied Mathematical Sciences, Vol. 7, 2013, no. 65, 3247-3253.
Figure 1. SM’s parametrization (c.f., [2]).
Figure 1. SM’s parametrization (c.f., [2]).
Preprints 97258 g001
Figure 2. How curved surfaces’ geodesics are geometrically represented (c.f., [6]).
Figure 2. How curved surfaces’ geodesics are geometrically represented (c.f., [6]).
Preprints 97258 g002
Figure 4. The framework overview refers to a comprehensive approach for developing secure, responsive, and intelligent e-health applications. It addresses challenges related to data protection, regulatory compliance, and the evolving nature of hybrid systems. The framework focuses on three key components: Analyze, Acquire, and Authenticate, covering the entire data lifecycle in e-health applications, and offers flexibility by accommodating different paradigms and stages of application development.
Figure 4. The framework overview refers to a comprehensive approach for developing secure, responsive, and intelligent e-health applications. It addresses challenges related to data protection, regulatory compliance, and the evolving nature of hybrid systems. The framework focuses on three key components: Analyze, Acquire, and Authenticate, covering the entire data lifecycle in e-health applications, and offers flexibility by accommodating different paradigms and stages of application development.
Preprints 97258 g003
Figure 3. A Stable G/G/1 queue.
Figure 3. A Stable G/G/1 queue.
Preprints 97258 g004
Figure 5. The correlation between packet arrival intensity and delay time in a network. It shows that the delay time grows together with the intensity of packet arrival. In terms of qualitative and temporal aspects, this information is critical for comprehending and calculating the network traffic service unit.
Figure 5. The correlation between packet arrival intensity and delay time in a network. It shows that the delay time grows together with the intensity of packet arrival. In terms of qualitative and temporal aspects, this information is critical for comprehending and calculating the network traffic service unit.
Preprints 97258 g005
Figure 6. The relationship between packet loss probability and processor overloading in a communication network. It states that as the load capacity applied to the processor decreases, the packet loss probability improves. This information is relevant for applications like E-health, where low packet loss is desirable, as the load capacity in medical applications is typically not significant.
Figure 6. The relationship between packet loss probability and processor overloading in a communication network. It states that as the load capacity applied to the processor decreases, the packet loss probability improves. This information is relevant for applications like E-health, where low packet loss is desirable, as the load capacity in medical applications is typically not significant.
Preprints 97258 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated