<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A model of an intelligent clustering system with an external module for the architecture of RTOS with intensive changes of states regarding their flexibility and balancing ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Kozelskiy</surname></persName>
							<email>oleksandr.kozelskiy@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Antonina</forename><surname>Kashtalian</surname></persName>
							<email>yantonina@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vasyl</forename><surname>Stetsyuk</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dmytro</forename><surname>Martiniuk</surname></persName>
							<email>martiniyuk.dim14@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<addrLine>Khmelnitsky, Instytutska street 11</addrLine>
									<postCode>29016</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anatoliy</forename><surname>Sachenko</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">Department of Informatics</orgName>
								<orgName type="institution">Kazimierz Pulaski University of Technology and Humanities</orgName>
								<address>
									<settlement>Radom</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="department">Research Institute for Intelligent Computer Systems</orgName>
								<orgName type="institution">West Ukrainian National University</orgName>
								<address>
									<settlement>Ternopil</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">International Workshop on Advanced Applied Information Technologies</orgName>
								<address>
									<addrLine>December 5</addrLine>
									<postCode>2024</postCode>
									<settlement>KhmelnytskyiZilina</settlement>
									<country>Ukraine -, Slovakia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A model of an intelligent clustering system with an external module for the architecture of RTOS with intensive changes of states regarding their flexibility and balancing ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F19E8102DDA791A435ADBD2116C7ADA7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>operating system, RTOS, flexibility enhancement, task scheduler, resource management 1 (A. Sachenko) 0009-0002-7157-6499 (О. Kozelskiy)</term>
					<term>0000-0002-4925-9713 (A. Kashtalian)</term>
					<term>0000-0001-9880-2666 (V. Stetsyuk)</term>
					<term>0009-0002-3524-872 (D. Martiniuk)</term>
					<term>0000-0002-0907-3682 (A. Sachenko)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article considers the creation of a model of a clustering system with an external module for the architecture of OSRCH with intensive changes of states, which concerns their flexibility and load. An overview of modern approaches to clustering and load balancing in real-time operating systems was performed, and their advantages and disadvantages were identified. The study is aimed at identifying the main problems that need to be solved in order to increase the efficiency of clustering and improve load balancing in the real conditions of the operation of real-time operating systems. The main challenges arising in the context of ensuring high performance of such systems are considered. The obtained results can be used to develop new methods that increase the efficiency of resource management and ensure the stability of real-time operating systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Real-time operating systems (RTOS) are essential in fields where precision and timely response are critical, such as avionics, automotive, healthcare, and telecommunications. They ensure system determinism and predictability, guaranteeing the completion of tasks within strictly defined time frames. However, modern RTOS face several challenges. Achieving full determinism is complicated by potential hardware and software failures, as well as the complexity of synchronizing parallel processes. Efficient resource management is not always accomplished, which can lead to system overload and delays in task execution. This is particularly critical in high-load environments, where the volume of data and the number of tasks exceed the system's capabilities.</p><p>The flexibility and scalability of RTOS also remain challenges. Developing architectures that can easily adapt to new tasks and conditions without significant resource expenditure is necessary to maintain the relevance and effectiveness of systems in a rapidly changing technological environment <ref type="bibr" target="#b27">[28]</ref>.</p><p>The purpose of this study is to analyze the existing methods of clustering and load balancing in RTOS, to identify their advantages and disadvantages, as well as to pinpoint the main issues that need to be addressed. This will contribute to the development of new approaches and algorithms that will enhance the efficiency, reliability, and flexibility of real-time operating systems in missioncritical applications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of existing clustering methods</head><p>Clustering in real-time operating systems (RTOS) is a method of grouping data or objects based on similar characteristics or properties. Various methods are used in this field, each with its own advantages and disadvantages. The main categories include time-based methods, machine learning methods, genetic algorithms, and graph-based approaches. Each of these approaches offers unique solutions for clustering tasks and has specific areas of application.</p><p>Time Division Multiplexing (TDM) is used for efficient resource management in RTOS by allocating specific time intervals for different tasks <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4]</ref>. This ensures predictable and regular access to resources, which is critically important for maintaining the properties of real-time systems <ref type="bibr" target="#b0">[1]</ref>.</p><p>In TDM, each task or group of tasks receives exclusive access to processor resources during a predefined time slot in a cyclic order. This approach supports high system performance and reliability by guaranteeing the regular execution of tasks <ref type="bibr" target="#b3">[4]</ref>.</p><p>It is a positive feature that each task is executed at a defined time, ensuring regular system operation. For example, in manufacturing processes, TDM can allocate fixed time slots to different sensors and mechanisms, preventing conflicts and ensuring seamless operation. The simplicity of implementing this method makes it easy to deploy and configure, which is crucial in embedded systems. Moreover, TDM promotes efficient resource usage through controlled time-slot allocation, optimizing their use. However, if a task does not use the entire allocated time slot, the unused resource is wasted, leading to inefficiency.</p><p>In systems with variable loads, fixed time intervals may be inefficient because they do not adapt to current needs <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. Scalability also becomes an issue: in large systems with many tasks, it is difficult to provide sufficient time slots for each task. Optimizing resource usage is critical, and there arises a need for methods to dynamically redistribute unused resources among tasks. Considering task priorities is also important to ensure timely execution of critical tasks, especially in systems where this can affect safety or efficiency <ref type="bibr" target="#b6">[7]</ref>.</p><p>Machine Learning (ML) methods are increasingly applied for clustering and load balancing in RTOS due to their ability to automatically find optimal solutions and adapt to changing conditions <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>. They include clustering algorithms, reinforcement learning, and neural networks, which provide efficient resource allocation and task management in real-time. ML algorithms can automatically detect optimal patterns and solutions based on large datasets, aiding effective load distribution. They can dynamically change resource allocation strategies in response to system demands, ensuring optimal performance even under varying conditions. ML methods also help optimize resource use by predicting system load and dynamically adjusting resource distribution <ref type="bibr" target="#b10">[11]</ref>.</p><p>However, ML methods require large volumes of high-quality data for effective training, which can be challenging in many RTOS. The computational complexity of ML algorithms, especially neural networks, demands significant resources, which can be an issue for systems with limited capabilities. Implementing and tuning ML methods can be complex and require a high level of expertise <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>. The complexity of algorithms may hinder understanding and trust in their results, affecting their integration and monitoring in real systems.</p><p>Genetic Algorithms (GA), based on the principles of natural selection, are widely used to solve optimization problems, such as clustering and load balancing in RTOS <ref type="bibr" target="#b14">[15]</ref>. They employ processes of selection, crossover, and mutation to find optimal or near-optimal solutions to complex problems. GAs can efficiently handle various types of tasks and resource constraints, finding global optima and adapting to different problems without significant changes to the algorithm <ref type="bibr" target="#b16">[17]</ref>. They are also resilient to changes and uncertainties in the system, allowing stability and performance to be maintained under dynamic conditions. However, genetic algorithms have high computational complexity and require careful tuning of parameters, such as population size and crossover and mutation rates. Slow convergence can be an issue in real-time systems where timely decisions are critical. Scalability is also a concern because, as system size increases, computational requirements grow. Defining effective termination criteria and handling dynamic changes in the system remain challenges.</p><p>Graph-based methods use graph theory to model interactions between tasks and resources in RTOS. Tasks and resources are represented as graph nodes, and the connections between them as edges. This allows for effective task distribution and management using spectral clustering algorithms, minimum cut/maximum flow, and graph partitioning. These methods can model complex interactions and dependencies between tasks and resources, which contributes to more precise clustering and load balancing. They scale well and can work with large systems <ref type="bibr" target="#b18">[19]</ref>, which is essential for RTOS with numerous tasks. Flexibility in optimization allows these methods to be adapted to various goals, such as minimizing communication costs or evenly distributing the load. However, it is important to consider that these methods have high computational complexity, as building and processing large graphs require significant resources. This can be a problem for RTOS with limited capabilities and strict timing constraints.</p><p>The complexity of handling dynamic changes is also a challenge because these methods often assume a static graph structure. The need for accurate information on dependencies between tasks and resources can complicate their application in complex systems where such dependencies are not always clearly defined. Scalability remains an issue, as computational demands increase with system size and complexity. Developing more efficient algorithms and using parallel processing methods may help address these issues.</p><p>Thus, the analysis of existing clustering methods in RTOS shows that each has its advantages and disadvantages. The choice of the optimal method depends on the specific requirements of the system, its size, complexity, and resource constraints.</p><p>Further research is aimed at overcoming existing drawbacks and developing more efficient, adaptive, and scalable clustering methods for real-time operating systems <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b17">18]</ref>. This may include implementing hybrid approaches <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref> that combine the advantages of different methods <ref type="bibr" target="#b21">[22]</ref>, and developing new algorithms that can work effectively in dynamic and complex RTOS environments, as well as monitoring security against viruses, such as with BOTNET <ref type="bibr" target="#b24">[25,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b26">27]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Formulation of the problem</head><p>To create a new architecture for real-time operating systems (RTOS), it is essential to conduct a thorough analysis of the limitations and shortcomings of existing clustering methods. Understanding why current approaches do not provide the desired efficiency, flexibility, and scalability is crucial. Based on this analysis, innovative solutions should be developed that combine the strengths of various methods and include mechanisms to counter malware <ref type="bibr" target="#b23">[24]</ref>.</p><p>The focus should be on developing new algorithms capable of effectively operating under dynamic real-time conditions. This may involve integrating the adaptability of machine learning with the efficiency of genetic algorithms and the ability of graph-based methods to model complex interactions. Such an approach would help overcome the limitations of each individual method, resulting in a more universal and effective solution.</p><p>It is important to optimize the computational complexity of new algorithms to ensure their operation under resource-constrained environments with strict timing requirements <ref type="bibr" target="#b22">[23]</ref>. This can be achieved by utilizing parallel processing methods or developing lighter algorithms that do not require extensive computations.</p><p>Adaptation to dynamic changes within the system is critical. New approaches should include mechanisms that allow for rapid response to changes in load and resource availability, maintaining stable performance and reliability of the system in real-time. Additionally, addressing the issue of data availability and quality for training algorithms is essential.</p><p>In conclusion, creating a new architecture will require a comprehensive approach that combines innovative technologies, resource optimization, and a deep understanding of the specifics of realtime operating systems. This will enable the development of solutions that enhance the efficiency, flexibility, and reliability of such systems, meeting modern demands and challenges.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Main part</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Architecture model of a task scheduler with intelligent clustering on an external module</head><p>The architecture model of a task scheduler with intelligent clustering is based on the principle of collecting datasets that are sent to a separate system. This system analyzes the data and uses it to improve resource management efficiency in the future. The first step in developing a new approach is to collect data that includes information about tasks, resources, time parameters, and other important factors. This may involve metrics like task execution time, resource consumption, priorities, interdependencies between tasks, and other critical characteristics. Each task is linked to the corresponding parameters that reflect its requirements and behavior in the system.</p><p>Let 𝑋𝑋 = {𝑥𝑥 1 , 𝑥𝑥 2 , … , 𝑥𝑥 𝑛𝑛 } -be a set of tasks, and 𝑅𝑅 = {𝑟𝑟 1 , 𝑟𝑟 2 , … , 𝑟𝑟 𝑚𝑚 } -be a set of resources. Each task 𝑥𝑥 𝑖𝑖 ∈ 𝑋𝑋 is described by a set of characteristics 𝐹𝐹 𝑖𝑖 = {𝑓𝑓 1 , 𝑓𝑓 2 , … , 𝑓𝑓 𝑘𝑘 }, where 𝑓𝑓 𝑗𝑗 represents one of the parameters, such as execution time, resource consumption, priorities, and interdependencies. Thus, data is collected to determine the set of features 𝐹𝐹 𝑖𝑖 for each task 𝑥𝑥 𝑖𝑖 , meaning each task is linked to a set of characteristics.:</p><formula xml:id="formula_0">𝐹𝐹 𝑖𝑖 = {𝑓𝑓 1 (𝑥𝑥 𝑖𝑖 ), 𝑓𝑓 2 (𝑥𝑥 𝑖𝑖 ), … , 𝑓𝑓 𝑘𝑘 (𝑥𝑥 𝑖𝑖 )}, ∀𝑥𝑥 𝑖𝑖 ∈ 𝑋𝑋,<label>(1)</label></formula><p>where 𝑓𝑓 𝑗𝑗 (𝑥𝑥 𝑖𝑖 ), -is the value of the j-th characteristic for problem 𝑥𝑥 𝑖𝑖 .</p><p>For the correct functioning of machine learning algorithms, feature vectors 𝐹𝐹 𝑖𝑖 are normalized. Let 𝐹𝐹 � 𝑖𝑖 -be the normalized feature vector:</p><formula xml:id="formula_1">𝐹𝐹 � 𝑖𝑖 = � 𝑓𝑓 1 (𝑥𝑥 1 ) − 𝑚𝑚𝑖𝑖𝑚𝑚𝑓𝑓 1 𝑚𝑚𝑚𝑚𝑥𝑥 𝑓𝑓 1 − 𝑚𝑚𝑖𝑖𝑚𝑚𝑓𝑓 1 , … , 𝑓𝑓 𝑘𝑘 (𝑥𝑥 𝑖𝑖 ) − 𝑚𝑚𝑖𝑖𝑚𝑚𝑓𝑓 𝑘𝑘 𝑚𝑚𝑚𝑚𝑥𝑥 𝑓𝑓 𝑘𝑘 − 𝑚𝑚𝑖𝑖𝑚𝑚𝑓𝑓 𝑘𝑘 �<label>(2)</label></formula><p>This brings all features to a common scale for further analysis.</p><p>From the set of all features 𝐹𝐹 𝑖𝑖 , the most significant features 𝑆𝑆 ⊂ 𝐹𝐹, which have the greatest impact on system performance, are selected. Let 𝑆𝑆 = {𝑠𝑠 1 , 𝑠𝑠 2 , … , 𝑠𝑠 𝑝𝑝 }, where 𝑠𝑠 𝑗𝑗 -is a selected feature from the set 𝐹𝐹 𝑖𝑖 , with 𝑝𝑝 &lt; 𝑘𝑘.</p><p>Tasks are clustered based on their features. Algorithms such as k-means or hierarchical clustering are used for this <ref type="bibr" target="#b7">[8]</ref>. Clustering defines the function of task 𝑥𝑥 𝑖𝑖 belonging to cluster 𝐶𝐶 𝑗𝑗 :</p><formula xml:id="formula_2">∀𝑥𝑥 𝑖𝑖 ∈ 𝑋𝑋, 𝑥𝑥 𝑖𝑖 → 𝐶𝐶 𝑗𝑗 , where 𝑗𝑗 = 𝑚𝑚𝑟𝑟𝑎𝑎 𝑚𝑚𝑖𝑖𝑚𝑚 𝑗𝑗 𝑑𝑑 (𝐹𝐹 � 𝑖𝑖 , 𝜇𝜇 𝑗𝑗 ),<label>(3)</label></formula><p>where 𝑑𝑑(⋅,⋅) -is the distance between feature vectors, and 𝜇𝜇 𝑗𝑗 -is the center of cluster 𝐶𝐶 𝑗𝑗 .</p><p>After clustering, a machine learning model 𝑀𝑀 is built and trained on clusters 𝐶𝐶 1 , 𝐶𝐶 2 , … , 𝐶𝐶 𝑡𝑡 . The model uses the feature values 𝑆𝑆 to classify new tasks 𝑥𝑥 𝑛𝑛𝑛𝑛𝑛𝑛 :</p><formula xml:id="formula_3">𝑀𝑀(𝑥𝑥 𝑛𝑛𝑛𝑛𝑛𝑛 ) = 𝐶𝐶 𝑗𝑗 ,<label>(4)</label></formula><p>where 𝑥𝑥 𝑛𝑛𝑛𝑛𝑛𝑛 -is a new task, and 𝐶𝐶 𝑗𝑗 -is the cluster it belongs to.</p><p>The machine learning model predicts future resource needs based on the current system state. The prediction function 𝑃𝑃(𝑡𝑡)determines resource requirements at time 𝑡𝑡:</p><formula xml:id="formula_4">𝑃𝑃(𝑡𝑡) = {𝑟𝑟 1 (𝑡𝑡), 𝑟𝑟 2 (𝑡𝑡) , … , 𝑟𝑟 𝑚𝑚 (𝑡𝑡)},<label>(5)</label></formula><p>where 𝑟𝑟 𝑗𝑗 (𝑡𝑡) -is the predicted load on resource 𝑟𝑟 𝑗𝑗 at time 𝑡𝑡.</p><p>For optimal task distribution, a minimization function is used to reduce deviations between actual load 𝑟𝑟 𝑗𝑗 𝑓𝑓𝑓𝑓𝑓𝑓𝑡𝑡 (𝑡𝑡) and predicted 𝑟𝑟 𝑗𝑗 𝑜𝑜𝑝𝑝𝑡𝑡 (𝑡𝑡):</p><formula xml:id="formula_5">𝑚𝑚𝑖𝑖𝑚𝑚 ��𝑟𝑟 𝑗𝑗 𝑓𝑓𝑓𝑓𝑓𝑓𝑡𝑡 (𝑡𝑡) − 𝑟𝑟 𝑗𝑗 𝑜𝑜𝑝𝑝𝑡𝑡 (𝑡𝑡)� 2 𝑚𝑚 𝑗𝑗=1 ,<label>(6)</label></formula><p>This enables balanced load distribution and resource management, prioritizing the execution of the most critical tasks and improving the system's overall performance.</p><p>The model predicts future load and dynamically allocates tasks between processors or cores to achieve optimal balance. This helps prevent bottlenecks and ensures smooth system operation without failures.</p><p>In summary:</p><p>• The system collects data on tasks and resources in parallel with their execution in real time, without affecting its performance. • Data processing is offloaded to a separate module or service.</p><p>• Information analysis and machine learning model updates are performed periodically to keep the data current.</p><p>The results are used for decision-making regarding resource allocation and task scheduling in real-time mode.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Experimental research</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Prototype preparation</head><p>To implement the prototype, it is proposed to use the FreeRTOS operating system with modified tasks.c and main.c files. In tasks.c, which is the main file for the FreeRTOS scheduler and contains task management functions, the vTaskSwitchContext() function is modified to call a custom method for task distribution. In main.c, code is added to create data collection tasks and call a custom scheduler, which will be implemented in a new file custom_scheduler.c. This file will define functions for data collection, task classification, and optimization of their distribution.</p><p>The algorithm consists of the following steps:</p><p>1. Data Collection in FreeRTOS: Data is collected by recording parameters during system operation or through simulation. Key parameters to be used in the model are defined, such as task type, resource usage (CPU), task execution time, and task priority. Based on this, a software model is created. Task execution in the system is simulated, with parameters being recorded during execution. This can be implemented using loops and timers to simulate real-time operation. The collected data is analyzed and transformed into the required format for further use in training machine learning models. Data is sent from the microcontroller via a configured HTTP client to an online server built on C# .NET 8, which receives this data. 2. Data Preparation for Modeling: Based on the collected data, a dataset is formed containing information about tasks, their characteristics, and time parameters. An external mathematical library, Math.NET Numerics, is used to process and prepare data for sending to the TinyML service. 3. Sending Data for Training: Using the .NET service, the data is converted into a format compatible with TinyML, sent for training, and a trained model is obtained. 4. Model Analysis and Prediction: After successful model training on the server, the next step is to use it for predictions. In this case, the model will be applied for prediction to optimize task distribution. 5. Sending Results to the Microcontroller: After performing predictions, the results are sent back to the microcontroller to update decision-making processes in the custom_scheduler.c file.</p><p>The data collection process will occur at intervals defined in constants and will automatically repeat.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Conducting experiments and comparing efficiency</head><p>FreeRTOS uses a time management principle through its task scheduler, which is very similar to Time Division Multiplexing (TDM). We can compare the results of default FreeRTOS and the results of FreeRTOS with the modified task scheduler.</p><p>To compare the efficiency of standard FreeRTOS and FreeRTOS with the modified architecture, several key metrics will be used:</p><p>• Task: This could be a data processing task, input/output, computational task, or simply a background task. • Resource Usage (CPU): Measurement of CPU usage during task execution.</p><p>• Task Execution Time: Measurement of the time required to complete a task.</p><p>First, we will run the program using the standard task scheduler and collect data on task execution time, resource usage, throughput, and latency through logging. After this, we will analyze the performance of the task scheduler in FreeRTOS with the modified architecture. For statistical purposes, we will set the number of tasks to 4. We will connect the DSView program, which typically works with the DS Logic logic analyzer.</p><p>Based on the results of the standard FreeRTOS task scheduler and the modified one (Figure <ref type="figure" target="#fig_1">2</ref>, figure <ref type="figure" target="#fig_2">3</ref>), several conclusions can be drawn.</p><p>Standard Scheduler:</p><p>• Tasks 1, 2, and 4 have equal priority, as seen from their even distribution on the graph. They run in parallel or take turns, but without clear prioritization. • Task 3 has high priority and is executed first after every interrupt generated by the system timer "tick". • The idle process does not run often because the processor is continuously occupied with task execution.  Modified Scheduler:</p><p>• Priority-based task allocation: This graph shows that the modified scheduler implements task distribution based on their priority and execution time. There is a clear division of time between tasks. More controlled and structured use of CPU time is observed.</p><p>• Preemptive scheduling: Tasks are interrupted by other higher-priority tasks, demonstrating preemptive scheduler behavior where lower-priority tasks are paused to allow more important tasks to execute. • Idle process: The idle process now runs more actively when other tasks finish their execution time or are in a waiting state. This indicates that the system operates more efficiently as CPU power is used more evenly.</p><p>In the standard scheduler, resources are not fully optimized because tasks with equal priorities can interrupt each other, and the high-priority task completely occupies the CPU time.</p><p>In the modified scheduler, priority-based preemptive scheduling is clearly implemented, allowing the system to dynamically allocate task execution time and use CPU power more efficiently, enabling the system to respond faster to changes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>This work conducted a detailed analysis of existing clustering methods in real-time operating systems (RTOS), including time-based methods, machine learning methods, genetic algorithms, and graph-based approaches. It was found that each of these methods has its advantages and disadvantages, which limit their effectiveness, flexibility, and scalability in modern dynamic systems.</p><p>To overcome the identified limitations, intelligent clustering based on the use of machine learning methods on external modules was considered. This approach involves collecting and analyzing data on system tasks and resources, classifying tasks based on their characteristics, and optimizing resource allocation based on machine learning model predictions.</p><p>Experimental results show improved performance, including reduced CPU usage and decreased task execution time compared to the classic FreeRTOS scheduler.</p><p>Thus, intelligent clustering demonstrates the potential of using machine learning methods, and shifting the analysis logic to external modules for resource management and load balancing in realtime operating systems does not burden already limited resources.</p><p>Further research may focus on improving machine learning models, optimizing the computational complexity of algorithms, and adapting the system to dynamic changes and scaling for operation in more complex and demanding environments. Efforts to increase the efficiency of CPU time distribution are ongoing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Declaration on Generative AI</head><p>During the preparation of this work, the authors used Grammarly in order to: grammar and spelling check; DeepL Translate in order to: some phrases translation into English. After using these tools/services, the authors reviewed and edited the content as needed and take full responsibility for the publication's content.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The architecture model of an intelligent clustering system with an external module.</figDesc><graphic coords="4,132.03,402.70,336.60,200.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Graph of CPU time distribution between tasks in the standard FreeRTOS scheduler and the modified scheduler.</figDesc><graphic coords="7,76.55,163.79,454.70,224.34" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Graph of CPU time distribution between tasks in the standard FreeRTOS scheduler and the modified scheduler.</figDesc><graphic coords="7,76.55,438.63,459.10,187.84" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Layered-Division-Multiplexing: Theory and Practice</title>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Broadcasting</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="216" to="232" />
			<date type="published" when="2016-03">March 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Towards High-Resolution Imaging With Photonics-Based Time Division Multiplexing MIMO Radar</title>
		<author>
			<persName><forename type="first">F</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pan</surname></persName>
		</author>
		<idno type="DOI">10.1109/JSTQE.2022.3146862</idno>
	</analytic>
	<monogr>
		<title level="m">Lidars and Photonic Radars</title>
				<imprint>
			<date type="published" when="2022-10">Sept.-Oct. 2022</date>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page">6000310</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Flexible Satellite Direct-to-Home Services With Layered-Division Multiplexing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gelgor</surname></persName>
		</author>
		<idno type="DOI">10.1109/TBC.2020.3031733</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Broadcasting</title>
		<imprint>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="83" to="95" />
			<date type="published" when="2021-03">March 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Wideband and Channel Switchable Mode Division Multiplexing (MDM)</title>
		<author>
			<persName><forename type="first">T.-Y</forename><surname>Hung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G.-H</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-Z</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-W</forename><surname>Chow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-H</forename><surname>Jian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P.-C</forename><surname>Kuo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-W</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-F</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-H</forename><surname>Yeh</surname></persName>
		</author>
		<idno type="DOI">10.3390/s23020711</idno>
		<ptr target="https://doi.org/10.3390/s23020711" />
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page">711</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Fixed-Priority Memory-Centric Scheduler for COTS-Based Multiprocessors</title>
		<author>
			<persName><forename type="first">G</forename><surname>Schwäricke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kloda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gracioli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bertogna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Caccamo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Leibniz International Proceedings in Informatics (LIPIcs)</title>
				<imprint>
			<publisher>Schloss Leibniz-Zentrum für Informatik</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">165</biblScope>
			<biblScope unit="page">24</biblScope>
		</imprint>
	</monogr>
	<note>Euromicro Conference on Real-Time Systems (ECRTS 2020)</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Network on Chip(NoC) Mesh Topology FPGA Verification: Real Time Operating System Emulation Framework</title>
		<author>
			<persName><forename type="first">U</forename><forename type="middle">V</forename><surname>Rane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Panem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Abhyankar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Gad</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICAECT60202.2024.10468944</idno>
	</analytic>
	<monogr>
		<title level="m">Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)</title>
				<meeting><address><addrLine>Bhilai, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024. 2024</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Extending the coverage of userdiversified IM-DD PON by FDM: a mathematical model with experimental verification</title>
		<author>
			<persName><forename type="first">Peiji</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yuan</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zhouyi</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chun-Kit</forename><surname>Chan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Di</forename><surname>Che</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Opt. Lett</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page" from="2457" to="2460" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">K-Means algorithm-based detection for wavelength division multiplexed OOK PD-NOMA system over turbulent optical channel</title>
		<author>
			<persName><forename type="first">Debi</forename><surname>Pada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jana</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Abhishek</forename><forename type="middle">M</forename><surname>Shukla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sumanta</forename><surname>Gupta</surname></persName>
		</author>
		<idno type="DOI">10.1117/1.OE.61.3.036111</idno>
		<ptr target="https://doi.org/10.1117/1.OE.61.3.036111" />
	</analytic>
	<monogr>
		<title level="j">Opt. Eng</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">36111</biblScope>
			<date type="published" when="2022-03-29">29 March 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Applying Machine Learning to Minimize the Impact of Sensor Failures to RTOS Based Internet of Things Systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Chmaj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Selvaraj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Seong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Won</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-40579</idno>
		<ptr target="https://doi.org/10.1007/978-3-031-40579" />
	</analytic>
	<monogr>
		<title level="m">Mandatory Access Control Method for Windows Embedded OS Security \ Electronics</title>
		<title level="s">Lecture Notes in Networks and Systems</title>
		<editor>
			<persName><forename type="first">H</forename><surname>Selvaraj</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Chmaj</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Zydek</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2023. 2021</date>
			<biblScope unit="volume">761</biblScope>
			<biblScope unit="page">12</biblScope>
		</imprint>
	</monogr>
	<note>Advances in Systems Engineering. ICSEng 2023</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Real-time Operating Systems (RTOS) for Embedded Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mohammad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Islam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Mahjabeen</surname></persName>
		</author>
		<idno type="DOI">10.55927/ajmee.v2i2.7761</idno>
		<ptr target="https://doi.org/10.55927/ajmee.v2i2.7761" />
	</analytic>
	<monogr>
		<title level="j">Asian Journal of Mechatronics and Electrical Engineering</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="95" to="104" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Check for Applying Machine Learning to Minimize the Impact of Sensor Failures to RTOS Based Internet of Things Systems Saugat Sharma</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sharma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Systems Engineering: Proceedings of the 30th International Conference on Systems Engineering, ICSEng 2023</title>
				<editor>
			<persName><forename type="first">Henry</forename><surname>Selvaraj</surname></persName>
		</editor>
		<meeting><address><addrLine>Las Vegas, Nevada, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature</publisher>
			<date type="published" when="2023">August 22-24, 2023. 2023</date>
			<biblScope unit="page">135</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Prototype Development for Water Leakage Monitoring System with RTOS Implementation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Pradhani</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICDCOT61034.2024.10515556</idno>
	</analytic>
	<monogr>
		<title level="m">2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT)</title>
				<meeting><address><addrLine>Bengaluru, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Real-time MLton: A Standard ML runtime for real-time functional programs</title>
		<author>
			<persName><forename type="first">B</forename><surname>Shivkumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Murphy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ziarek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Functional Programming</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page">e19</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">An Architecture to Enable Machine-Learning-Based Task Migration for Multi-Core Real-Time Systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Delgadillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Blieninger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kuhn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Baumgarten</surname></persName>
		</author>
		<idno type="DOI">10.1109/MCSoC51149.2021.00066</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 14th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC)</title>
				<meeting><address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="405" to="412" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">An Effective Implementation of Vehicle Document Verification Using Genetic Algorithm</title>
		<author>
			<persName><forename type="first">G</forename><surname>Premalatha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Abinaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2021 International Conference on System, Computation, Automation and Networking (ICSCAN)</title>
				<meeting><address><addrLine>Puducherry, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Execution Model to Reduce the Interference of Shared Memory in ARINC 653 Compliant Multicore RTOS</title>
		<author>
			<persName><forename type="first">S</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M-Y</forename><surname>Kwon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H-K</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page">2464</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Resemblance of Real Time Scheduling Algorithms for Real Time Embedded Systems</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Kabilesh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Optoelectronics and Communication</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">3</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Reliability Optimization of Real-Time Satellite Embedded System Under Temperature Variations</title>
		<author>
			<persName><forename type="first">B</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="224549" to="224564" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Evaluating Path-Finding Algorithms for Real-Time Route Recommendation System Built using FreeRTOS</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Y</forename><surname>Liew</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">H</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">C</forename><surname>Khor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">Y</forename><surname>Tee</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-66965-1_17</idno>
		<ptr target="https://doi.org/10.1007/978-3-031-66965-1_17" />
	</analytic>
	<monogr>
		<title level="m">Recent Advances on Soft Computing and Data Mining. SCDM 2024</title>
		<title level="s">Lecture Notes in Networks and Systems</title>
		<editor>
			<persName><forename type="first">R</forename><surname>Ghazali</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Nawi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Deris</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Abawajy</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Arbaiy</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">1078</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A framework for static analysis and verification of lowlevel RTOS code</title>
		<author>
			<persName><forename type="first">Vignesh</forename><surname>Manjunath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marcel</forename><surname>Baunach</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.sysarc.2024.103220</idno>
		<ptr target="https://doi.org/10.1016/j.sysarc.2024.103220" />
	</analytic>
	<monogr>
		<title level="j">Journal of Systems Architecture</title>
		<idno type="ISSN">1383-7621</idno>
		<imprint>
			<biblScope unit="volume">154</biblScope>
			<biblScope unit="page">103220</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Formal Verification of the Inter-core Synchronization of a Multi-core RTOS Kernel</title>
		<author>
			<persName><forename type="first">I</forename><surname>Haur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Béchennec</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">H</forename><surname>Roux</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-17244-1_9</idno>
		<ptr target="https://doi.org/10.1007/978-3-031-17244-1_9" />
	</analytic>
	<monogr>
		<title level="m">Formal Methods and Software Engineering. ICFEM 2022</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">A</forename><surname>Riesco</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Zhang</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">13478</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">An efficient scheduler of RTOS for multi/many-core system</title>
		<author>
			<persName><forename type="first">Xiongli</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peng</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mei</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jie</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cheng</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Qingdong</forename><surname>Yao</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.compeleceng.2011.09.009</idno>
		<ptr target="https://doi.org/10.1016/j.compeleceng.2011.09.009" />
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Electrical Engineering</title>
		<idno type="ISSN">0045-7906</idno>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="785" to="800" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Performance comparison of rtos</title>
		<author>
			<persName><forename type="first">S</forename><surname>Merchant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Dedhia</surname></persName>
		</author>
		<imprint/>
		<respStmt>
			<orgName>Dept of Computer Science Columbia University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Malware Detection By Distributed Systems with Partial Centralization</title>
		<author>
			<persName><forename type="first">B</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kashtalian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAACS58523.2023</idno>
		<idno>.10348773</idno>
		<ptr target="https://doi.org/10.1109/IDAACS58523.2023" />
	</analytic>
	<monogr>
		<title level="m">IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</title>
				<meeting><address><addrLine>Dortmund, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023. 2023</date>
			<biblScope unit="page" from="265" to="270" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Botnet detection approach based on the distributed systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Markowsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Vasylkiv</surname></persName>
		</author>
		<idno type="DOI">10.47839/ijc.19.2.1761</idno>
		<ptr target="https://doi.org/10.47839/ijc.19.2.176143" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Computing</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="190" to="198" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<title level="m">Proceedings of the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 7-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Berlin; Berlin</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">September 12-14, 2013. 2013</date>
			<biblScope unit="page" from="363" to="368" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<idno type="ISSN">1865-0929</idno>
		<imprint>
			<biblScope unit="volume">370</biblScope>
			<biblScope unit="page" from="243" to="254" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Optimization of cyber-physical system parameters based on intelligent IoT sensors data</title>
		<author>
			<persName><forename type="first">I</forename><surname>Zasornova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fedula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rudyi</surname></persName>
		</author>
		<idno type="DOI">10.31891/csit-2024-2-7</idno>
		<ptr target="https://doi.org/10.31891/csit-2024-2-7" />
	</analytic>
	<monogr>
		<title level="j">Computer systems and information technologies</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="53" to="58" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
