<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Experimental validation of a synthesis method for resilient AR/VR architectures⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Artem Kachur</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergii Lysenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tomas Sochor</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Kravchyk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Atamaniuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>European Research University</institution>
          ,
          <addr-line>Ostrava</addr-line>
          ,
          <country country="CZ">Czech Republic</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Khmelnytskyi National University</institution>
          ,
          <addr-line>Instytutska str., 11, Khmelnytskyi, 29016</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>This paper presents the experimental validation of an automated synthesis method for Augmented Reality (AR) and Virtual Reality (VR) architectures. Unlike traditional analysis methods that evaluate fixed designs, this approach utilizes a Genetic Algorithm (GA) within a Simulink environment to actively generate architectural configurations that maximize resilience. An experimental setup, a mapping of 20 distinct mitigation strategies to design variables, and the results of a simulation under severe operational conditions are described. The experiment demonstrates that the synthesized architecture achieves a significant improvement in overall resilience, with critical gains in availability and recovery time, proving the practical utility of automated design optimization for immersive systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Augmented reality</kwd>
        <kwd>virtual reality</kwd>
        <kwd>system resilience</kwd>
        <kwd>architecture synthesis</kwd>
        <kwd>system design1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        As Augmented Reality (AR) and Virtual Reality (VR) scale beyond niche applications into critical
infrastructure for healthcare, industrial manufacturing, and education, their reliability becomes
paramount [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ]. The functionality of these immersive platforms hinges on a precise, real-time
synchronization between computational hardware, software logic, data streams, and human
perception [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4-6</xref>
        ]. Consequently, these systems exhibit extreme sensitivity to operational
disruptions; even marginal latency or data degradation can shatter user immersion and trigger
immediate physiological rejection, such as cybersickness [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7-9</xref>
        ].
      </p>
      <p>
        In this context, resilience as the capacity to maintain acceptable functionality despite external
stress or internal failure, is not merely a feature but a fundamental requirement. However, current
engineering practices largely rely on passive analysis, evaluating how pre-determined, fixed
architectures behave under fault conditions [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10-12</xref>
        ]. This approach is insufficient for developing
robust systems. The critical engineering challenge lies in shifting from post-hoc analysis to active
synthesis: the algorithmic generation of architectures that are resilient by construction [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13-15</xref>
        ].
      </p>
      <p>
        Building upon our previous degradation analysis framework [
        <xref ref-type="bibr" rid="ref16 ref17">16-18</xref>
        ], this study experimentally
validates a method that inverts the traditional design process. We frame the architectural design as
a numerical optimization problem rather than a qualitative choice [19-21]. By defining a
parameterized design vector and linking mitigation strategies [22-24] to seven distinct resilience
metrics, we enable a computational approach to system hardening. A genetic algorithm is utilized
to navigate the high-dimensional design space, automatically identifying configuration strategies
that maximize system robustness [25-27].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>To construct the 20-dimensional design space for the synthesis engine, let us aggregate diverse
mitigation strategies from recent literature, mapping them to controllable simulation variables
across four architectural layers.</p>
      <p>
        At the hardware layer, the focus was on managing thermal and energy constraints to prevent
physical throttling. The cloud/edge offloading techniques proposed by Sun et al. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], parameterizing
the decision threshold to balance local thermal stress against bandwidth availability, can be
incorporated. This can be complemented by predictive thermal management algorithms [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], which
was modelled as a variable temperature limit that triggers redundancy paths. To address sensor
saturation, we integrated dynamic sampling rates and distributed on-sensor computing methods
described by Gomez et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], allowing the GA to tune motion sensitivity thresholds. Additionally,
hardware selection variables can be included to switch between display architectures based on
energy models from Xiong et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        For the software subsystem, mechanisms were selected that enhance recovery speed and
adaptability. The synthesis model utilizes checkpoint-restart frequencies based on the work of
Foerster et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] to maximise availability during high-load states. To mitigate network variance,
adaptive streaming middleware can be integrated [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] as a quality-threshold variable alongside
predictive input batching [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to smooth bursty user interactions. We also included software-level
compute offloading ratios [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and fallback precision modes for pose correction [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] to maintain
tracking reliability when environmental lighting degrades.
      </p>
      <p>
        The data and communication layer can be parameterised to optimise throughput and integrity.
Multipath scheduling strategies from Zhao et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] can be adopted to mask jitter, introducing a
variable for the number of parallel links. To anticipate user movements and prevent data stalls,
predictive pre-fetching algorithms [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] were modelled with adjustable buffer sizes. Further
strategies included edge-based localization fallbacks [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] to reduce latency, joint
communicationcomputing-caching architectures [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and adaptive modulation schemes [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] that adjust coding
levels in response to signal-to-noise ratio fluctuations.
      </p>
      <p>
        Finally, user-centric mitigations can be implemented to directly address safety and physiological
comfort. To combat cybersickness caused by latency, motion prediction and frame interpolation
techniques [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] controlled by an interpolation buffer variable can be employed. Environmental
adaptation can be handled through dynamic UI brightness and audio suppression thresholds based
on Park et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Adaptive locomotion modes (e.g., teleportation vs. sliding) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and dynamic
Level-of-Detail (LOD) scaling [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] to cap interaction rates and prevent rendering overloads that
could break immersion can be used as well.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Experimental setup and toolchain</title>
      <p>To validate the method, we constructed a high-fidelity simulation environment using
MATLAB/Simulink. The experimental setup was designed to replicate a "mission time" of 5000 time
units under dynamic stress.</p>
      <p>The core of the experiment is a Simulink model (Fig. 1) that simulates the VR system's behavior.
The model accepts five categories of dynamic inputs that represent real-world disruptors: network
conditions (bandwidth fluctuation, jitter), environmental variables (lighting changes, thermal
ambient conditions), user behaviour (erratic motion, lack of attention), system load (computational
spikes), and hardware constraints (battery droop, thermal throttling). These inputs feed into a
Failure Simulation Block, which triggers probabilistic degradation events based on defined hazard
rates.</p>
      <p>
        The "control knobs" for the experiment are represented by a parameterised vector of mitigation
approaches (Mvector). This vector consists of 20 discrete values, each corresponding to a specific
technical countermeasure derived from literature [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]-[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. these include hardware (dynamic
voltage/frequency scaling, thermal throttling limits), software (checkpoint-restart frequency,
adaptive resolution scaling), data (forward error correction (fec) levels, multi-path routing), user
(motion smoothing algorithms, safety boundary (guardian) sensitivity).
      </p>
      <p>The MATLAB Global Optimization Toolbox was utilised to drive the simulation. The synthesis
process is formulated as a single-objective optimization problem where the Genetic Algorithm
seeks to find the vector mopt that maximizes the aggregated resilience score Rsys.</p>
      <p>The evaluate_analytical function. It takes a candidate Mvector, applies it to the Simulink model,
computes the seven resulting resilience metrics, and returns a weighted global score.</p>
      <p>The GA iteratively refines the population of vectors, "breeding" superior designs by combining
mitigation strategies that successfully maintain high resilience scores [28].</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Case Study</title>
      <p>
        To validate the proposed synthesis method, we constructed a comprehensive experimental
framework utilising a MATLAB/Simulink environment, selected specifically for its capacity to
model both continuous-time dynamics and discrete-event failures. The experiment was defined by
a specific "mission time" duration of 5000 time units, during which the system was subjected to a
dynamic operational profile that fluctuated between idle, normal, and peak loading states. The
primary objective of this setup was to solve the inverse design problem: identifying the
architectural configuration that maximizes the aggregated resilience score under specific
constraints [
        <xref ref-type="bibr" rid="ref17">17-19</xref>
        ].
      </p>
      <p>To rigorously test the efficacy of the synthesis method, we defined a "severe operational
scenario" rather than a standard use case, introducing high-frequency disturbances across five
distinct categories. The simulation introduced network instability characterized by high jitter and
bandwidth throttling to mimic poor edge conditions, alongside environmental stresses such as
rapid changes in ambient lighting and temperature These external factors were compounded by
erratic user behaviour, including intense motion and high interaction rates, as well as internal
system load spikes that threatened computational saturation. Finally, the scenario accounted for
hardware constraints by simulating battery degradation and thermal throttling events. This harsh
baseline was intentional, ensuring that a system without active resilience mechanisms would fail
significantly, thereby highlighting the specific gains provided by the synthesized architecture.</p>
      <p>The core of the experiment relied on a closed-loop integration between the Genetic Algorithm
(GA) and the Simulink model. The process begins with the GA generating a candidate
20dimensional mitigation vector which represents specific engineering decisions such as redundancy
levels or throttling thresholds. These abstract values are then mapped to concrete Simulink
parameters that govern the system's physical behaviour during execution. As the model runs, 20
degradation functions compute how well the specific configuration withstands the external
stressors. The system subsequently calculates the seven key resilience metrics – reliability,
availability, fault tolerance, integrity, recovery time, performance stability, and user safety – and
aggregates them into a final fitness score. This score is utilised by the GA to iteratively refine the
population, effectively breeding better architectural configurations over successive generations.</p>
      <p>Two distinct architectural states were evaluated to provide a clear comparison of the method's
effectiveness. First, a baseline architecture was established with minimal active mitigations to
represent a standard, static AR/VR system design. This was compared against the synthesised,
optimal architecture output by the Genetic Algorithm after convergence, representing a system
"hardened" by the automated synthesis process. This comparative setup allowed for the
quantification of the exact value added by the synthesis method, enabling us to observe how the
algorithm traded off different design variables to survive the severe operational scenario.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Results and analysis</title>
      <p>The Genetic Algorithm successfully navigated the 20-dimensional design space to identify a
configuration that significantly outperformed the baseline. The convergence of the algorithm is
visualized in the penalty plot (Fig. 2), showing a steady improvement in the fitness function over 30
generations. The most significant finding of this experiment is the magnitude of improvement in
time-critical metrics. Table 1 details the comparative scores.</p>
      <p>Availability (+82.2%): This massive increase indicates that the synthesized architecture
prioritized mechanisms like checkpoint/restart and redundant hardware paths. In a severe scenario
where failures are frequent, the ability to keep the system "up" is the primary differentiator.
Recovery Time (+39.9%): The optimization heavily favored strategies that reduce Mean Time To
Repair (MTTR). By tuning software checkpoints and automated reset triggers, the system returns to
a functional state much faster after a crash. Reliability (+31.1%): The increase in reliability suggests
the effective use of thermal management and load balancing to prevent the occurrence of faults,
rather than just managing them after they happen. The real-time behaviour of the optimized
system (Fig. 3) showed that the analytical score successfully tracked changing environmental
parameters, providing a responsive measure of resilience.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Practical application</title>
      <p>The synthesis framework presented in this study offers a significant methodological shift for
systems engineers, moving the design process from manual, heuristic-based configuration to a
calculated, automated optimization workflow. By translating qualitative mitigation strategies –such
as dynamic voltage scaling, checkpoint-restart frequencies, or forward-error correction levels –
into a quantifiable 20-dimensional mitigation vector, the method allows designers to
mathematically evaluate the impact of architectural choices before physical prototyping. This is
particularly valuable in the context of modern AR/VR systems, where the sheer complexity of the
interaction between hardware, software, and user behaviour makes it nearly impossible for human
designers to intuitively predict how a specific change (e.g., throttling GPU performance) will
cascade through the system to affect end-user metrics like motion-to-photon latency or
cybersickness.</p>
      <p>Furthermore, the integration of this analytical block into a real-time Simulink environment
demonstrates its utility as a dynamic runtime monitor, rather than just a static design tool. The
experiment confirmed that the instantaneous analytical score successfully tracked changing
environmental parameters in real-time. This capability suggests that the proposed model can be
deployed as a "digital twin" or a runtime supervisor within the final product. In such a deployment,
the system could dynamically adjust its own mitigation vector in response to detected
environmental stress—automatically shifting from high-fidelity rendering to high-reliability modes
when network jitter or thermal throttling is detected—thereby maintaining the aggregated
resilience score above the minimal acceptance gates defined during the verification phase.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions and future work</title>
      <p>This paper has presented and experimentally validated a formally grounded method for the
automated synthesis of resilient AR/VR architectures. By establishing a rigorous mathematical link
between low-level architectural design choices and high-level emergent resilience properties, we
transformed the complex, qualitative challenge of system design into a solvable multi-objective
optimization problem. The experimental results provided a clear validation of this approach; the
genetic algorithm successfully navigated a high-dimensional design space to identify a
configuration that achieved a 19.4% improvement in the overall resilience score compared to a
standard baseline. Most notably, the synthesis process prioritized critical operational metrics,
yielding massive relative gains in Availability (+82.2%) and Recovery Time (+39.9%). These results
confirm that automated synthesis can identify non-intuitive combinations of mitigation strategies
that significantly enhance robustness without requiring manual trial-and-error.</p>
      <p>Future research will focus on expanding the scope of this framework to address the increasingly
hostile threat landscape facing interconnected immersive systems. While the current model
effectively manages environmental and operational faults, the next iteration will incorporate
defences against advanced security threats. Specifically, we aim to adapt the resilience model to
account for malicious actors, including the impact of botnets and polymorphic malware on system
integrity. This expanded focus will also address the unique privacy and security challenges
inherent to immersive environments, such as protecting user authentication data and preventing
non-immersive attacks that exploit the tight coupling between the user and the virtual
environment. Additionally, we plan to refine the sensitivity models with empirical data gathered
from physical testbeds and explore the application of this synthesis method to other distinct classes
of cyber-physical systems.</p>
      <p>Declaration on Generative AI
The authors have not employed any Generative AI tools.
[18] L. Di Geronimo, L. Braz, E. Fregnan, F. Palomba, and A. Bacchelli, “UI Dark Patterns and
Where to Find Them: A Study on Mobile Applications and User Perception,” in Proc. CHI, 2020,
pp. 1–14. doi: 10.1145/3313831.3376600.
[19] A. Alshehri, K. Alrehili, F. Alhumaid, and A. Alessa, “Exploring the Privacy Concerns of
Bystanders in Smart Homes,” Proc. Priv. Enhancing Technol. (PoPETs), vol. 2022, no. 4, pp. 253–
270, 2022. doi: 10.56553/popets-2022-0064. (Open PDF available.)
[20] H. Lin and N. W. Bergmann, “IoT Privacy and Security Challenges for Smart Home</p>
      <p>Environments,” Information, vol. 7, no. 3, art. 44, 2016. doi: 10.3390/info7030044.
[21] Q. Wang, Z. Cai, R. Li, and X. Fang, “A Comprehensive Survey on Local Differential Privacy
toward Data Statistics and Analysis,” Sensors, vol. 20, no. 24, art. 7030, 2020. doi:
10.3390/s20247030.
[22] Y. Yao, T. Zimmermann, A. Chin, and F. Schaub, “Privacy Perceptions and Designs of
Bystanders in Smart Homes,” Proc. ACM Hum.–Comput. Interact. (CSCW), vol. 3, no. CSCW,
pp. 1–24, 2019. doi: 10.1145/3359161.
[23] E. Saqib, S. He, J. Choy, R. Abu-Salma, J. Such, J. Bernd, and M. Javed, “Bystander Privacy in
Smart Homes: A Systematic Review of Concerns and Solutions,” ACM Trans. Comput.–Hum.</p>
      <p>Interact. (TOCHI), pp. 1–?, 2025. doi: 10.1145/3731755.
[24] K. Marky, S. Prange, F. Krell, M. Mühlhäuser, and F. Alt, “‘You Just Can’t Know About
Everything’: Privacy Perceptions of Smart Home Visitors,” in Proc. MUM, 2020, pp. 1–13. doi:
10.1145/3428361.3428464. (Open PDF available.)
[25] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android Permissions: User
Attention, Comprehension, and Behavior,” in Proc. SOUPS@CHI, 2012, pp. 3–14. doi:
10.1145/2335356.2335360.
[26] V. Zimmermann, P. Gerber, K. Marky, L. Böck, and F. Kirchbuchner, “Assessing Users’ Privacy
and Security Concerns of Smart Home Technologies,” i-com, vol. 18, no. 3, pp. 197–216, 2019.
doi: 10.1515/icom-2019-0015.
[27] O. Alshamsi, K. Shaalan, and U. Butt, “Towards Securing Smart Homes: A Systematic
Literature Review of Malware Detection Techniques and Recommended Prevention
Approach,” Information, vol. 15, no. 10, art. 631, 2024. doi: 10.3390/info15100631.
[28] M. M. Ogonji, G. Okeyo, and J. M. Wafula, “A Survey on Privacy and Security of Internet of
Things,” Computer Science Review, vol. 38, art. 100312, 2020. doi: 10.1016/j.cosrev.2020.100312.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] "Exploring Metaphorical Transformations of a Safety Boundary Wall for VR,"</article-title>
          <source>Applied Sciences. [Online]</source>
          . Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283/
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Niu</surname>
          </string-name>
          , “Communication,
          <article-title>Computing and Caching for Mobile VR Delivery: Modeling and Trade-off</article-title>
          ,” arXiv preprint arXiv:
          <year>1804</year>
          .10335,
          <year>2018</year>
          . [Online]. Available: https://arxiv.org/abs/
          <year>1804</year>
          .10335
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xia</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ali</surname>
          </string-name>
          , “
          <article-title>A Smartphone Thermal Temperature Analysis for Virtual and Augmented Reality,”</article-title>
          <source>National Science Foundation Technical Report</source>
          ,
          <year>2020</year>
          . [Online]. Available: https://par.nsf.gov/servlets/purl/10219090
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gomez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Raghunathan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Chowdhury</surname>
          </string-name>
          , “
          <article-title>Distributed On-Sensor Compute System for AR/VR Devices: A Semi-Analytical Simulation Framework for Power Estimation</article-title>
          ,” arXiv preprint arXiv:
          <volume>2203</volume>
          .07474,
          <year>2022</year>
          . [Online]. Available: https://arxiv.org/abs/2203.07474
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          , “
          <article-title>Augmented Reality and Virtual Reality Displays: Emerging Technologies and Future Perspectives,”</article-title>
          <source>Light: Science &amp; Applications</source>
          , vol.
          <volume>10</volume>
          , no.
          <issue>1</issue>
          ,
          <issue>2021</issue>
          , Art. no.
          <issue>215</issue>
          . [Online]. Available: https://www.nature.com/articles/s41377-021-00658-8
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hazarika</surname>
          </string-name>
          , “
          <source>Towards an Evolved Immersive Experience: Exploring 5G,” Sensors</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>7</issue>
          , p.
          <fpage>3682</fpage>
          ,
          <year>2023</year>
          . [Online]. Available: https://www.mdpi.com/1424-8220/23/7/3682
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K. T.</given-names>
            <surname>Foerster</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          , and
          <string-name>
            <surname>D. P. van der Meer</surname>
          </string-name>
          , “
          <article-title>Transparent Fault Tolerance for Stateful Applications in Kubernetes with Checkpoint/Restore,”</article-title>
          <source>in Proc. IEEE SRDS</source>
          <year>2023</year>
          . [Online]. Available: https://ktfoerster.github.io/paper/2023-srds.pdf
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Guo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          , “
          <article-title>A Multipath Scheduler Based on Cross-Layer Information for Cloud VR in 5G Edge Networks,” Computer Networks</article-title>
          , vol.
          <volume>244</volume>
          , p.
          <fpage>110333</fpage>
          ,
          <year>2024</year>
          . [Online]. Available: https://doi.org/10.1016/j.comnet.
          <year>2024</year>
          .110333
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kelkkanen</surname>
          </string-name>
          , “
          <article-title>Evaluation and Reduction of Temporal Issues in Remote VR,” Master's Thesis</article-title>
          , Univ. of Oulu, Oulu, Finland,
          <year>2023</year>
          . [Online]. Available: https://www.diva-portal.org/smash/get/diva2:1744902/FULLTEXT02.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , “
          <article-title>Feeling of Presence Maximization: mmWave-Enabled Virtual Reality Meets Deep Reinforcement Learning</article-title>
          ,
          <source>” arXiv preprint arXiv:2107.01001</source>
          ,
          <year>2021</year>
          . [Online]. Available: https://arxiv.org/abs/2107.01001
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>H.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yao</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , “
          <article-title>Exploring Metaphorical Transformations of a Safety Boundary Wall for VR,”</article-title>
          <source>Applied Sciences</source>
          , vol.
          <volume>14</volume>
          , no.
          <issue>6</issue>
          ,
          <issue>2024</issue>
          , Art. no.
          <issue>2520</issue>
          . [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Kang</surname>
          </string-name>
          , “
          <article-title>Recent Advances in Wearable Thermal Devices for Virtual and</article-title>
          Augmented Reality,” Micromachines, vol.
          <volume>16</volume>
          , no.
          <issue>3</issue>
          ,
          <issue>2025</issue>
          , Art. no.
          <issue>338</issue>
          . [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC12029164
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Weech</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kenny</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Barnett-Cowan</surname>
          </string-name>
          , “
          <article-title>Presence and Cybersickness in Virtual Reality Are Negatively Related: A Review,” Frontiers in Psychology</article-title>
          , vol.
          <volume>10</volume>
          , p.
          <fpage>158</fpage>
          ,
          <year>2019</year>
          . [Online]. Available: https://www.frontiersin.org/articles/10.3389/fpsyg.
          <year>2019</year>
          .00158/full
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryschuk</surname>
          </string-name>
          <article-title>, Multi-agent based approach of botnet detection in computer systems</article-title>
          , CCIS,
          <volume>291</volume>
          (
          <year>2012</year>
          )
          <fpage>171</fpage>
          -
          <lpage>180</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -31217-5_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          <article-title>, Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          ,
          <volume>370</volume>
          (
          <year>2013</year>
          )
          <fpage>243</fpage>
          -
          <lpage>254</lpage>
          , ISSN:
          <fpage>1865</fpage>
          -
          <lpage>0929</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>642</fpage>
          - 38865-1_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bobrovnikova</surname>
          </string-name>
          ,
          <article-title>A technique for the botnet detection based on DNS-traffic analysis</article-title>
          ,
          <source>in Proc. 22nd Int. Conf. Computer Networks</source>
          , Brunów, Poland (
          <year>2015</year>
          )
          <fpage>127</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lysenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Pomorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Savenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kryshchuk</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Bobrovnikova</surname>
          </string-name>
          ,
          <article-title>DNS-based Antievasion Technique for Botnets Detection</article-title>
          ,
          <source>in Proceedings of the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , Warsaw (Poland),
          <source>September 24-26</source>
          ,
          <year>2015</year>
          . Warsaw. Pp.
          <volume>453</volume>
          -
          <fpage>458</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>