Research article Special Issues

Performance analysis of a two-level polling control system based on LSTM and attention mechanism for wireless sensor networks


  • A continuous-time exhaustive-limited (K = 2) two-level polling control system is proposed to address the needs of increasing network scale, service volume and network performance prediction in the Internet of Things (IoT) and the Long Short-Term Memory (LSTM) network and an attention mechanism is used for its predictive analysis. First, the central site uses the exhaustive service policy and the common site uses the Limited K = 2 service policy to establish a continuous-time exhaustive-limited (K = 2) two-level polling control system. Second, the exact expressions for the average queue length, average delay and cycle period are derived using probability generating functions and Markov chains and the MATLAB simulation experiment. Finally, the LSTM neural network and an attention mechanism model is constructed for prediction. The experimental results show that the theoretical and simulated values basically match, verifying the rationality of the theoretical analysis. Not only does it differentiate priorities to ensure that the central site receives a quality service and to ensure fairness to the common site, but it also improves performance by 7.3 and 12.2%, respectively, compared with the one-level exhaustive service and the one-level limited K = 2 service; compared with the two-level gated- exhaustive service model, the central site length and delay of this model are smaller than the length and delay of the gated- exhaustive service, indicating a higher priority for this model. Compared with the exhaustive-limited K = 1 two-level model, it increases the number of information packets sent at once and has better latency performance, providing a stable and reliable guarantee for wireless network services with high latency requirements. Following on from this, a fast evaluation method is proposed: Neural network prediction, which can accurately predict system performance as the system size increases and simplify calculations.

    Citation: Zhijun Yang, Wenjie Huang, Hongwei Ding, Zheng Guan, Zongshan Wang. Performance analysis of a two-level polling control system based on LSTM and attention mechanism for wireless sensor networks[J]. Mathematical Biosciences and Engineering, 2023, 20(11): 20155-20187. doi: 10.3934/mbe.2023893

    Related Papers:

    [1] Tingting Yang, Yi He . Design of intelligent robots for tourism management service based on green computing. Mathematical Biosciences and Engineering, 2023, 20(3): 4798-4815. doi: 10.3934/mbe.2023222
    [2] Hao Yuan, Qiang Chen, Hongbing Li, Die Zeng, Tianwen Wu, Yuning Wang, Wei Zhang . Improved beluga whale optimization algorithm based cluster routing in wireless sensor networks. Mathematical Biosciences and Engineering, 2024, 21(3): 4587-4625. doi: 10.3934/mbe.2024202
    [3] Chongyi Tian, Longlong Lin, Yi Yan, Ruiqi Wang, Fan Wang, Qingqing Chi . Photovoltaic power prediction based on dilated causal convolutional network and stacked LSTM. Mathematical Biosciences and Engineering, 2024, 21(1): 1167-1185. doi: 10.3934/mbe.2024049
    [4] Noman Zahid, Ali Hassan Sodhro, Usman Rauf Kamboh, Ahmed Alkhayyat, Lei Wang . AI-driven adaptive reliable and sustainable approach for internet of things enabled healthcare system. Mathematical Biosciences and Engineering, 2022, 19(4): 3953-3971. doi: 10.3934/mbe.2022182
    [5] Ying Chang, Lan Wang, Yunmin Zhao, Ming Liu, Jing Zhang . Research on two-class and four-class action recognition based on EEG signals. Mathematical Biosciences and Engineering, 2023, 20(6): 10376-10391. doi: 10.3934/mbe.2023455
    [6] Angel Martin-del Rey . A novel model for malware propagation on wireless sensor networks. Mathematical Biosciences and Engineering, 2024, 21(3): 3967-3998. doi: 10.3934/mbe.2024176
    [7] Wenbo Yang, Wei Liu, Qun Gao . Prediction of dissolved oxygen concentration in aquaculture based on attention mechanism and combined neural network. Mathematical Biosciences and Engineering, 2023, 20(1): 998-1017. doi: 10.3934/mbe.2023046
    [8] Mingming Zhang, Huiyuan Jin, Ying Yang . ECG classification efficient modeling with artificial bee colony optimization data augmentation and attention mechanism. Mathematical Biosciences and Engineering, 2024, 21(3): 4626-4647. doi: 10.3934/mbe.2024203
    [9] Keruo Jiang, Zhen Huang, Xinyan Zhou, Chudong Tong, Minjie Zhu, Heshan Wang . Deep belief improved bidirectional LSTM for multivariate time series forecasting. Mathematical Biosciences and Engineering, 2023, 20(9): 16596-16627. doi: 10.3934/mbe.2023739
    [10] Jing Zhou, Ze Chen, Xinhan Huang . Weakly perceived object detection based on an improved CenterNet. Mathematical Biosciences and Engineering, 2022, 19(12): 12833-12851. doi: 10.3934/mbe.2022599
  • A continuous-time exhaustive-limited (K = 2) two-level polling control system is proposed to address the needs of increasing network scale, service volume and network performance prediction in the Internet of Things (IoT) and the Long Short-Term Memory (LSTM) network and an attention mechanism is used for its predictive analysis. First, the central site uses the exhaustive service policy and the common site uses the Limited K = 2 service policy to establish a continuous-time exhaustive-limited (K = 2) two-level polling control system. Second, the exact expressions for the average queue length, average delay and cycle period are derived using probability generating functions and Markov chains and the MATLAB simulation experiment. Finally, the LSTM neural network and an attention mechanism model is constructed for prediction. The experimental results show that the theoretical and simulated values basically match, verifying the rationality of the theoretical analysis. Not only does it differentiate priorities to ensure that the central site receives a quality service and to ensure fairness to the common site, but it also improves performance by 7.3 and 12.2%, respectively, compared with the one-level exhaustive service and the one-level limited K = 2 service; compared with the two-level gated- exhaustive service model, the central site length and delay of this model are smaller than the length and delay of the gated- exhaustive service, indicating a higher priority for this model. Compared with the exhaustive-limited K = 1 two-level model, it increases the number of information packets sent at once and has better latency performance, providing a stable and reliable guarantee for wireless network services with high latency requirements. Following on from this, a fast evaluation method is proposed: Neural network prediction, which can accurately predict system performance as the system size increases and simplify calculations.



    The Internet of Things (IoT), as an "interconnected network of things", involves a variety of different businesses, often with different priorities. For security surveillance, facial data is more important than human data; for smart homes, infrared sensing data is more important than temperature and humidity; and the differentiation of different data by importance in the process of collecting data is an issue that must be considered in wireless sensor networks. The MAC protocol defines how the node occupies the wireless channel to send data during data collection and enables differentiated priority services by setting the MAC. Polling control systems, as a reservation-based scheduling control model, are widely used in wireless sensor networks for their fairness, non-competition, reliability, efficiency and high quality of service [1,2,3]. Depending on the service strategy, they are usually classified as gated, exhaustive and limited services. The gated service system is where the server services the information groupings reached before accessing the site; the exhaustive service system is where the server services all the information groupings in the site; and the limited services system is where the server services up to K information groupings. Each of the three service strategies has its own advantages, with limited services fairness being the best, exhaustive service latency being the lowest and gated service being moderate. In recent years, with the rapid development of the Internet of Things, the need for differentiated priority and high quality of multiple services has become increasingly important. The traditional one-level polling control system is unable to differentiate priorities [4,5]. Therefore, many researchers have improved it, breaking away from the idea of a single polling control strategy and proposing a hybrid service strategy, which allows the system to be more optimized, more flexible and more targeted.

    Lv et al. [6] divided each service cycle into a polling period and a contention period. Polling is performed according to the latest access time in the polling period, and backoff counts are assigned to each site in each contention period, thus reducing the waste of resources caused by polling idle sites and conflicts, and reducing latency. The literature [7,8] set the polling priority by packets and energy packets to adjust the packet delivery rate. Siddiqui et al. [9] used adaptive and dynamic polling MAC to integrate two cross-layer schemes: dynamic channel polling and packet concatenation, which enables synchronization between the management source and receiver and greatly improves the packet delivery rate. Yang et al. [10] investigated a two-level hybrid polling control strategy based on a combination of discrete-time symmetric and asymmetric, with an exhaustive service policy for the central site and an asymmetric gated service for the ordinary sites. The system, although well differentiated in terms of priority, failed to guarantee fairness for the ordinary sites. Han et al. [11] introduced a multi-priority mechanism and reduced the length of the time slot occupied by the collision of information packets to meet the service quality requirements of different priority services and improve the system throughput rate, effectively alleviating the channel congestion phenomenon and improving the system performance of wireless Ad Hoc networks. Yang et al. [12] combined polling order with access policies including gated and exhaustive service and proposed a new priority-based parallel scheduling polling MAC protocol in WSN to implement a priority-based scheme while reducing overhead time through parallel scheduling. Mercian A et al. [13] introduced two gated traffic control protocols to adapt the service policy. Ding et al. [14] proposed a multi-level priority polling MAC protocol for the practical requirements of multi-priority transmission control for multiple users in tactical data chain systems, and controls the arrival rate of user messages at all levels by means of a priority weight matrix P. The demand for multi-priority transmission control of each user in the system is satisfied, and the feature of diversified control functions of the polling MAC protocol is realized. Guan et al. [15] proposed a two-level polling control system relying on the site state based on a two-level polling model for hybrid services, which satisfies both differentiated priorities and avoids idle queries. Jiang et al. [16] analyzed the strategic services of customers of different priority levels under the join or reject dilemma at two information levels. Mu et al. [17] proposed a two-level polling system with multi-level gated services, which is controlled using the number of levels of gated services and provides for the development needs of service diversity and elastic services in resource allocation.

    In the above polling control systems, discrete-time analysis is used to analyze the polling system, which is computationally complex and difficult. Therefore, in order to reduce the computational difficulty and simplify the solution process, the Laplace transform is used to analyze the first-order and second-order characteristics. Mao et al. [18] proposed a continuous-time two-level exhaustive polling access MAC protocol for priority services and real-time requirements in the IoT, with an exhaustive service policy for both priority and normal users. Yang et al. [19] proposed a two-level polling service model with differentiated priorities. In this model, gated service is used for low priority sites and exhaustive service is used for high priority sites. In the case of high priority to low priority, the transfer service is processed in parallel with the transfer query to reduce the time spent by the server during the query transition and improve the efficiency of the polling system. This guarantees the quality of service for the low priority sites and provides high-quality service for the high priority sites. In order to ensure the fairness of ordinary sites, we propose a two-level priority polling system controlled by an exhaustive-limited services policy, which optimizes the polling system scheduling mechanism to accommodate the service quality requirements of services of different priority levels in the system under certain resources, providing guaranteed services to high priority central sites and more fair limited services to low priority ordinary sites.

    In the above study, the system properties were solved using traditional mathematical calculations and iterative simulations were performed. This method is less efficient, more difficult to calculate and more time-consuming. With the rapid development of society and economy, the scale of the network is gradually expanding, which puts higher requirements on the deployment and maintenance of the network. Traditional methods no longer meet the real-time deployment requirements.

    Nowadays, with the increasing volume of data and rising complexity of data access. Researchers work to integrate machine learning and artificial intelligence algorithms more closely with computer networks. Machine learning is the process of using computer programming to learn from historical data and make predictions about new data. Gupta et al. [20] discussed the most advanced methods based on federated learning models for game theory applications in wireless communication. Research on maximization of benefits, authentication, privacy management, trust management and threat detection are discussed. Boobalan et al. [21] proposed the combination of federated learning and industrial internet for resource, privacy and data management. Guarino et al. [22] investigated the capability of state-of-art single-modal and multimodal Deep Learning-based classifiers in telling the specific app, the activity performed by the user, or both. On this basis, a novel multimodal solution for early traffic classification is newly proposed, using contextual inputs as additional modes. It is demonstrated that the training time is shorter using a variant where the contextual input does not depend on the payload information. Liu et al. [23] proposed AR-GAIL, an adaptive routing protocol based on generative adversarial imitation learning, which can select the route with the lowest end-to-end delay according to the network conditions. It can be seen that machine learning has been widely applied in computer networks. Thus, we use neural networks to predict the two-level polling control system.

    The methods such as support vector machine (SVM) [24,25,26], linear regression [27,28,29], deep neural networks (DNN) [30,31,32], boosting [33], bagging [34], recurrent neural network (RNN) [35,36,37], long short-term memory (LSTM) [38,39,40], artificial neural network (ANN) [41,42,43] and back propagation (BP) neural networks [44,45,46] are commonly used in predictive analysis to make use of historical data to make predictions on new data. LSTM, as a special type of RNN network, is able to transfer the characteristics of the previous node to the current node, has better performance advantages and is widely used in predictive analysis. Hou et al. [47] constructed a deep convolutional neural network with long and short-term memory (CNN-LSTM) in order to extract the spatio-temporal characteristics of temperature and the correlation between meteorological elements, and used kriging interpolation to spatially visualize the simulated and predicted temperatures. It is demonstrated that CNN-LSTM has higher temperature simulation, prediction accuracy and generalization ability. Zhang et al. [48] improved the quality of service of IoT by analyzing the large amount of data generated by industrial IoT and designing LSTM network models to predict the operation of devices. Shu et al. [49] used LSTM to learn individual-level actions and then integrated individual-level actions into group activities, proposing a LSTM-in-LSTM model that also enables group activity recognition by modelling person-level actions and group-level activities. Shu et al. [50] predicted data transmission in wireless sensing networks through a combination of LMS filters and LSTM, thus reducing energy consumption.

    Media access control protocols for wireless sensor networks mainly consist of traditional competitive and non-competitive protocols. The two types of protocols correspond to the distributed function DCF and the point coordinated function PCF, respectively. DCF provides distributed contention-based channel access for asynchronous data transmission through a carrier listening multiple access/conflict avoidance (CSMA/CA) control strategy; PCF provides contention-free service for real-time services through a polling control strategy. In IEEE802.11, the PCF protocol uses the limited K = 1 polling control method, but this method is not flexible for the case of load burst and load with priority. Therefore, in order to solve the shortcomings of PCF in wireless sensor networks and the problems of multi-service transmission and improving fairness in the Internet of Things, a continuous-time exhaustive-limited (K = 2) two-level polling control system is proposed. First, a mathematical model is developed using probabilistic generating functions and Markov chains to derive the first-order and second-order characteristics. Second, simulation experiments are carried out using MATLAB. Third, performance prediction using LSTM neural network with attention mechanism is performed to verify the feasibility of the method.

    As shown in Figure 1, the two-level polling control system consists of a relay node (server) and N + 1 collection nodes (sites), where the first level is a central site and the second level is N ordinary sites. The first level central site uses exhaustive service policy to serve users, denoted by the subscript h, while the second level ordinary site uses limited K = 2 service policy to serve low priority service users, denoted by the serial number i(i=1,2,...,N). Usually the sensor nodes in a wireless sensor network collect the required physical information depending on their functionality, and then the relay nodes receive the information from each node according to a pre-agreed MAC protocol, and finally send it to the end nodes. The system service principle: The server gives priority to the central site h in accordance with the exhaustive service strategy, until all the information in the central site is sent in groups, and then transfers to the low-priority i common site for service according to the limited K = 2 strategy. When the service is over, the server transfers to the central site again, and then starts to serve the i + 1 common site after the service is over. Server from the central site to the common site conversion, piggyback query common site, improve system efficiency. The order of enquiry services is shown in Figure 2. The mathematical method is expressed as h1h2...ihi+1...Nh1. Average queue length, average delay and average cycle time are commonly used to measure the performance of a system. Under the same conditions, the smaller the average queue length and average delay, the better the system performance, the faster it runs and the more efficient it is.

    Figure 1.  Model of a two-level polling system.
    Figure 2.  Order of enquiry services.

    It is assumed that the data transfer between the sites is normal and that the server's memory does not overflow with data, etc. Based on the system model, combined with the control mechanism and transmission characteristics of the polling system, the following system operating conditions are defined:

    (1) The arrival process of message groupings into each site within any time slot is to satisfy a Poisson distribution independent of each other, with the arrival rate of the ordinary site being λi, and the arrival rate of the central site being λh.

    (2) The time at which the server transmits the grouping of messages in the common site i of the service satisfies a mutually independent, identically distributed probability distribution. The Laplace transform (LST) of the random variable is Bi(s), the mean is β=B(0) and the second order origin moment is vβ=B"(0). The LST of the packet from service central site h is Bh(s), the mean is βh=Bh(0) and the second order origin moment is vh=B"h(0).

    (3) The time taken by the server to send data from the ordinary site i to the time taken to move to the central site to send data satisfies a mutually independent and identically distributed probability distribution. The LST of its random variable is Ri(s), the mean is γ=R(0) and the second-order origin moment is vγ=R"i(0).

    (4) The sites in the service system have a large capacity and do not suffer from packet loss.

    (5) The server serves groups of information in the site on a first-come, first-served (FCFS) basis.

    In order to analyze the system model, the following random variables are defined, as shown in Table 1.

    Table 1.  Random variables.
    Variable Definition
    ξi(n) Number of message groups stored at common site i at time tn
    ξh(n) Number of message groups stored at the system central site at time tn
    ξh(n) Number of messages grouped in the central site at time tn
    vi Time for the server to perform transmission services for the grouping of messages in common site i
    vh Time for the server to perform transmission services for the grouping of messages in the central site h
    ui Query conversion time from site i to query central site h
    ηj(vi) Number of message groupings entering within site j in time vi
    ηj(vh) Number of message groupings entering within site j in time vh
    μj(ui) Number of message groupings entering within site j in time ui

     | Show Table
    DownLoad: CSV

    Set the server to poll common site i(i=1,2,...,N) at time tn. The number of message packets waiting to be sent in common site i is ξi(n), and the number of message packets defining the central site h is ξh(n). The random variable for the whole system is {ξ1(n),ξ2(n),...,ξi(n),....,ξN(n),ξh(n)}. The server provides a transfer service for the common site i according to limited K = 2 service policy. The server ends service to site i after a transfer time ui to start the service central site, and the number of message packets entering site j during time ui is μj(ui). At time tn, the server queries the central site for the number of message groupings and the random variable of the system is {ξ1(n),ξ2(n),...,ξi(n),....,ξN(n),ξh(n)}. At time tn+1, after the central site has finished serving, the server moves again to the common site i + 1 for service, where the state variable is {ξ1(n+1),ξ2(n+1),...,ξi(n+1),....,ξN(n+1),ξh(n+1)}.

    According to the above analysis, the relationship between the three moments is tn < tn < tn+1. The state of the model at the moment tn+1 does not depend on the state at the moment tn and is only related to the state at the moment tn. That is, this system state variable has the same essential properties as the state variable in the basic model of polling system. Under stable conditions of the system, this Markov process is homogeneous, aperiodic, irreducible and ergodic and has a unique steady-state distribution [51,52]. After analysis, the system is an N-dimensional Markov chain. Assume that when the system is stable, the server state is (a, b), with probability pab, a and b can take the values 0, 1; and since the system is a single-server system, it cannot take a value of 1 at the same time. Here, a value of 1 for a indicates that the server is serving the central site and a value of 0 for a indicates that the server is serving an ordinary site or not performing service; conversely, a value of 0 for b indicates that the server services or does not service the central site, and a value of 1 for b indicates that the server services the common site. That is, when the state (0, 1) becomes (1, 0), it means that the server has changed from servicing the normal site to the service central site. If when the state is (1, 0) becomes (0, 1) it means that the server changes from serving the service central site to serving the ordinary site. The state transition process is shown in Figure 3.

    Figure 3.  State transition process.

    According to the above operating conditions and variable definitions of the system, the system reaches stability under condition Ni=1λiβ+λhβh=Ni=1ρi+ρh<1 [53]. Define the probability generating function Gi(z1,z2,...,zN,zh) of the system state variables at time tn, expressed in Eq (1).

    Gi(z1,z2,...,zi,...,zN,zh)=x1=0x2=0...xi=0...xN=0xh=0πi(x1,x2,...,xi,...,xN,xh) zx11zx22...zxii...zxNNzxhh,i=1,2,...,N  (1)

    Similarly define the probability generating function Gih(z1,z2,...,zN,zh) of the state variables of the system at time tn, expressed in Eq (2).

    Gih(z1,z2,...,zi,...,zN,zh)=x1=0x2=0...xi=0...xN=0xh=0πih(x1,x2,...,xi,...,xN,xh)zx11zx22...zxii...zxNNzxhh,i=1,2,...,N  (2)

    According to tn and tn+1 moments, the server according to the corresponding service policy service central site and ordinary site i + 1, resulting in the relationship of Eq (3).

    {ξih(n)=ξh(n)+μh(ui)+ηh(vi)ξj(n)=ξj(n)+μj(ui)+ηj(vi),j=1,2,N,iξi(n)=ξi(n)+μi(ui)+ηi(vi)2 ,ξi(n)2ξi(n)=ξi(n)+μi(ui)+ηi(vi),ξi(n) = 0,1ξj(n+1)=ξj(n)+ηj(vh),j=1,2,Nξh(n+1)=0 (3)

    The server polls the service central site at time tn. The probability generating function of the system state variable is represented by Eq (4).

    Gih(z1,z2,,zN,zh)=limnE[Nj=1zjξj(n)zhξih(n)]=limnE[Nj=1zjξj(n)zhξih(n)|ξi(n)=0]P(ξi(n)=0)+limnE[Nj=1zjξj(n)zhξih(n)|ξi(n)=1]P(ξi(n)=1)+limnk=2E[Nj=1zjξj(n)zhξih(n)|ξi(n)=k]P(ξi(n)=k)=R[Nj=1λj(1zj)+λh(1zh)].{1z2iBi[Nj=1λj(1zj)+λh(1zh)](Gi(z1,z2,...zi...,zN,zh)Gi(z1,z2,...zi...,zN,zh)|zi=0Gi(z1,z2,...zi...,zN,zh)|zi=1)+Gi(z1,z2,...zi...,zN,zh)|zi=0+Gi(z1,z2,...zi...,zN,zh)|zi=1},i=1,2,N (4)

    The state variables of the system at time tn+1 is represented by Eq (5).

    Gi + 1(z1,z2,,zN,zh)=limtE[Nj=1zjξj(n+1)zhξh(n+1)]=limtE[Nj=1zjξj(n)+ηj(vh)]=limtE[Nj=1zjξj(n)]E[Nj=1zjηj(vh)]=Gih(z1,z2,zN,Hh(Nk=1λk(1zk))) (5)

    where, Hh(s)=B(s+λh(1Hh(s))).

    The notations used in the text are shown in Table 2 (arranged in the order in which they appear in the text).

    Table 2.  main notation.
    notation connotation
    i site serial number
    h central site serial number
    γ conversion rate
    λ arrival rate
    λi arrival rate of common site i
    λh arrival rate of central site
    B(s) probability generating function of random variables in transmission service time
    β the mean of random variables in transmission service time
    v second-order moments of origin
    R(s) probability generating function of random variables with polling conversion time
    ξi(n) number of message groups stored at common site i at time tn
    ξh(n) number of message groups stored at the system central site at time tn
    ξh(n) number of messages grouped in the central site at time tn
    vi time for the server to perform transmission services for the grouping of messages in common site i
    vh time for the server to perform transmission services for the grouping of messages in the central site h
    ui query conversion time from site i to query central site h
    ηj(vi) number of message groupings entering within site j in time vi
    ηj(vh) number of message groupings entering within site j in time vh
    μj(ui) number of message groupings entering within site j in time ui
    Gi(z1,z2,...,zN,zh)Gih(z1,z2,...,zN,zh)Gi+1(z1,z2,...,zN,zh) the probability generating function of N + 1 dimensional random variables
    gih(h) average queue length at the central site
    θ average cycle time of the polling system
    T throughput of the polling system
    gi(i) average queue length at common sites
    E(w) average waiting delay for polling system site information grouping
    E(wi) average waiting delay of common sites
    E(wh) average waiting delay of central site

     | Show Table
    DownLoad: CSV

    Average queue length: At time tn, the server starts transmitting data to site i. The average number of packets stored in the memory of site j is gi(j), then:

    gi(j)=limz1,z2...,zi...,zN,zh1Gi(z1,z2,...,zi,...,zN,zh)zj  (6)

    The above Eqs (4)–(6) gives Eq (7), which represents the average queue length at the central site

    gih(h)=λhγi(1ρh)1ρhNρi (7)

    where, ρh=λhβh,ρi=λiβi.

    The query period of the system is the statistical average of the time taken by the server to complete a service for the N + 1 sites in the system according to the corresponding service policy, i.e. the average time taken by the server to query the same site twice. Therefore, the query period θ  of a continuous-time two-level polling system is shown in Eq (8).

    θ=Nγi1ρhNρi (8)

    System throughput is expressed as the number of packets of information that can be served by that system per unit of time, as shown in Eq (9).

    T=Nρi+ρh,where,ρi=λiβi,ρh=λhβh (9)

    Equations (10) and (11) represent the second order partial derivative of the system state probability generating function.

    gi(j,k)=limz1,z2...,zj,...,zk,..,zN,zh1 2Gi(z1,z2,...,zi,...,zN,zh)zjzk  (10)
    gih(j,k)=limz1,z2...,zj,...,zk,..,zN,zh1 2Gih(z1,z2,...,zi,...,zN,zh)zjzk  (11)

    The expressions (4) and (5) of the probability generating function can be substituted to calculate the second-order partial derivatives to obtain a system of second-order characteristic parametric equations, and after simplification, the second-order characteristic quantities gi(i) and gih(h,h) of the probability distribution of the length of the information group queue are obtained, as shown in Eqs (12) and (13).

    gi(i)=1λ2iγiθ+(2Nλ3iγ2i)2+Nλiρi.λ2i(λi+ρi)Nρi+Nρ2i{N2ρ3i+N2ρiγi+N3ρiγ2i(1+ρh)(1ρh)2+Nρiθ(2Nρiγi+Nρiβi+Nρi)(1ρh)2+N2ρiγi1ρh3Nγiθ+Nρiβ2hλhθ1ρh+Nβhλhγi[Nρi+Nρhβi+Nρhρi1ρh+2Nρiρ2h(1ρh)2+Nρiρhβh+Nρ2hρi)(1ρh)3+N2β2iβhλhθ(1+3ρh)1NρiNρhρi+2N2β2iβhλhρ2hθ(1NρiNρhρi)(1ρh)+N2β2iβhλhρ2hθ+N2β2iβ2hλhρhθ(1NρiNρhρi)(1ρh)2}+(λi+ρi)λ3iθλ2iγiθ+4Nλ6iγ4i+Nλiρi+Nλiλhγiβhβ3i (12)
    gih(h,h)=R"i(0)λ2hGi+2βiγiλ2h(GiGi0Gi1)+4βiλhgi(h)+B''i(0)λ2h(GiGi0Gi1)2βiλhgi0(h)2βiλhgi1(h)+gi(h,h) (13)

    gi(i) denotes the average queue length at the common site.

    In this paper, we study a continuous-time two-level polling control system, and by considering the literature [54], we can derive the average waiting delay in this polling control system for service according to the exhaustive service policy and the limited service policy as shown in Eqs (14) and (15).

    E(wE)=12{γ1+11Nρ[(N1)γ+(N1)ρ+Nλ(β2β)]+ρ1Nρ} (14)
    E(wL)=γ12+12[1Nλ(γ+β)[(N1)γ+(N1)ρ+2Nγρ+(Nλγ+ρ)+Nλ(β2β)+Nλ(γ2γ)] (15)

    In a two-level polling system, the time between when a message packet enters the site memory and when it is sent out is the waiting delay of the message packet. E(wi) is the average delay at the common site and E(wh) is the average delay at the central site. The average delay can be derived from the expressions calculated above.

    Equation (16) is the average delay for a common site.

    E(wi)=1+Np(Nρ+Nρ2){βhλh(Nρ+Nρhβ)+2Nρ2hγβhλh+Nγρ+Nρ+N2ργ+N2ρρhγ(1ρh)+Nρ2hρβhλh+Nρρhβ2hλh(1ρh)2+N2βhλhρ2+4N2ρhρ2βhλh+Nβ2hλhρNργNργρh(1ρhNρi)+2Nρ2+N3ρ2γ+N3ρ2γρh+2N2βhρ2λhρ2h(1ρhNρi)(1ρh)+N2ρ2β+N2ρ2θ(1ρhNρi)2(1ρh)+N2β2hρ2λhρh+N2βhρ2λhρ2h(1ρhNρi)(1ρh)2λ(Nρ+Nρ2)Nρ+Nρ22θ(1+Np)} (16)

    Equation (17) is the average delay at the central site.

    E(wh)=gih(h,h)2λhgih(h)+λhB"h(0)2(1ρh)A"h(0)2λ2h(1+ρh) (17)

    The specific time delay can be found by substituting gih(h,h) and gih(h) in the above.

    Based on the above analysis and calculations, it can be seen that the limited model used in this paper is different in complexity from the other two models. Models on limited services require second-order derivation when solving for theoretical values of performance metrics such as average queue length, which makes the computation more difficult. In contrast, the exhaustive and gated services require only first-order derivation to find the length. The MATLAB2019b platform was used to carry out simulation experiments under the stable conditions of System Ni=1λiβi+λhβh=Ni=1ρi+ρh<1 to verify the feasibility of the theoretical analysis and the reliability of the system. The simulation experiment generates a Poisson distributed random sequence satisfying the arrival rates of λi and λh for the common and central sites respectively using the exprnd () function to simulate the number of message packets arriving per unit time at each site. The greater the arrival rate, the greater the number of packets of information that arrive. The more data that is queued up when keeping the channel transmission rate and processing capacity consistent. Service time and conversion time are used as important indicators of polling efficiency. Typically, the service time variable is used to record the cumulative time spent processing data in the system. For each unit of data reduction, the service time variable accumulates one service time. Use βi and βh to denote the service time between the common site and the central site, with larger βi and βh indicating weaker data processing capacity and lower throughput, and vice versa. For the transition time γi, the larger the γi, the longer the system takes to poll a cycle and the less efficient it is; the smaller the γi, the shorter the system takes to poll a cycle and the more efficient it is. In order to improve the accuracy of the model, the simulation experiment was set up for 100,000 Monte Carlo statistics, that is, a cycle count of 100,000. The simulation experiments were carried out according to the flow chart shown in Figure 4. During the simulation, all were in the ideal state, that is, all message packets were sent successfully with a packet loss and retransmission rate of 0.

    Figure 4.  Flow chart of the two-level polling control model.

    In the experiment, the arrival rate of information packets and the number of network stations were changed to analyze the changes in the average queue length, average delay, average cycle time and throughput of the two-level polling system. Figures 5 and 6 shows the variation pattern of average queue length and delay with load. The graph shows that the number of fixed network sites, service time and query time for both common sites and central sites, the theoretical values basically match the simulated values, the error is within a small range and the length and delay are positively correlated with the load, proving that the system is feasible. The two graphs are analyzed horizontally, the length and delay of the common site change in tandem, the longer the length, the greater the corresponding time delay. In the longitudinal view, the length and time delay of the common site are much larger than that of the central site. As the load increases, the distinction becomes increasingly clear. It shows that the model is able to differentiate between different priority services with significant results. From the control mechanism, it is clear that the two-level polling control model divides the N + 1 sites into N normal sites and one central site. When polling all sites, the central site is given N opportunities to use the exhaustive service policy service, and the normal site has only limited service. Thus, according to the number of services, the length and time delay of the common site are greater than that of the central site. Therefore, multiple times service central site, to ensure the quality of service of the central site, to meet the demand of real-time central site within the system.

    Figure 5.  Variation of average length with load.
    Figure 6.  Variation of average delay with load.

    The relationship between average cycle time and arrival rate is shown in Figure 7. The relationship between arrival rate and cycle time is explored by varying the number of sites. Regardless of the number of sites, the average cycle time of the system increases as the arrival rate increases. When the arrival rate and number of sites are small, the system takes less time to poll for a week, allowing access to all sites to be completed quickly, with better stability and faster cycle response characteristics. From the up and down distribution of the four curves, the four curves did not cross when the grouping of messages kept increasing. The period of the system was vertically distributed with the number of stations, i.e. the number of stations was also an important factor affecting the period, and when the arrival rate was certain, the larger the number of stations, the longer the period. Overall, the error between the theoretical and simulated values is small, indicating that the system is stable.

    Figure 7.  Cycle versus arrival rate.

    Figure 8 depicts the variation pattern between the system throughput and the arrival rate of grouped messages at a site. As shown in the figure, system throughput increases linearly with arrival rate. On the other hand, for increasing the arrival rate, the average delay also increases accordingly, so the delay performance should be used as a constraint while considering how to improve the throughput.

    Figure 8.  Throughput versus arrival rate.

    To further analyze the performance of a continuous-time exhaustive-limited (K = 2) two-level polling control system. The model in this paper is compared with the literature [54] one-level limited K = 2 model, the literature [55] one-level limited K = 1 model and the literature [56] one-level exhaustive model, as shown in Figures 9 and 10. The three models are set to have the same network size, that is, the same number of total station points. Looking at Figures 9 and 10, the relationship between length and delay can be seen in (a): one-level limited K = 1 > one-level limited K = 2 > two-level common site > two-level central site; The relationship between length and delay from (b): one-level exhaustive service > common site > central site. Therefore, with the same parameters, the average length and delay of the common site of this paper's model are smaller than those of the one-level model, which not only differentiates priorities, but also reduces the length and delay of the common site and improves the quality of service, indicating that the central site affects the performance of the two-level polling control system.

    Figure 9.  Trends in the one-level model and two-level model length.
    Figure 10.  Trend in the one-level model and the two-level model delay.

    Figures 11 and 12 explore the variation of this paper's model from the exhaustive-limited K = 1 model and the gated-exhaustive model. Keeping the wireless terminal N and service time the same, the length and latency of the exhaustive-limited K = 1 are greater than the exhaustive-limited K = 2 model for both the normal and central sites, indicating that increasing the qualified K value optimizes system performance. Looking at the gated- exhaustive service model, although the performance of the common site is better than the model in this paper, for the central site, gated-exhaustive > exhaustive-limited K = 1 > exhaustive-limited K = 2, indicating that the model in this paper has a higher priority.

    Figure 11.  Trends in the three models length.
    Figure 12.  Trends in the three models delay.

    Further analyzing the average length, the three two-level models basically overlap when the business volume is low (i.e., the arrival rate is low), at which point the desired requirements can be met regardless of which model is chosen. However, as the volume of service increases, the gap between the models slowly increases, at which point the ordinary site length of the gated- exhaustive service model and the exhaustive-limited K = 2 service model are essentially the same, with smaller enhancements. In contrast, the central site of the gated- exhaustive service model grows faster (i.e., the slope becomes larger) for the length as the volume of service increases. Analyzing Figure 12 average delay, it is clear that the delay of the exhaustive-limited K = 1 service model is much larger than the other two models (i.e., the system performance is much lower than that of the other two models), and therefore the model is generally not used, regardless of whether the business volume is large or small. Exhaustive-limited K = 2 service model where performance improves with the number of information groupings per service for the limited service. Observing the gated- exhaustive service and exhaustive-limited K = 2 service models, it can be seen that the arrival rate is less than 0.008, and the difference in delay between the two common sites is small. Common sites choose to limited services, improving the fairness of the whole system. At high business volumes, there is no situation where only one of the sites is served, leaving the others waiting for a long time. Conversely, the delay at the central site, because of the use of gated service, is greater than exhaustive service at the central site from start to finish. Although the performance of the model in this paper is slightly worse than the gated- exhaustive model at the common site, the overall improvement is more at the central site. In summary, it is better to choose the exhaustive-limited K = 2 service model proposed in this paper.

    With the increase in network size, dense site access and large amount of data acquisition, network deployment becomes more difficult. Therefore, a neural network is chosen to predict and analyze the performance of the system, which helps to reduce the difficulty of network deployment. In the above, a continuous-time exhaustive-limited K = 2 two-level model is proposed, the first-order and second-order characteristics are accurately resolved and simulations are carried out. Next, the performance of the system is predicted by building a LSTM +attention model to further validate the correctness and feasibility of the solution. In addition, data under known arrival rates are used to predict data under unknown arrival rates and observe the trends.

    For time series problems, it is difficult for traditional neural networks to make predictions on unknown data using known data, while RNN, as a kind of neural network with better processing effect on time series data, can effectively retain the information of the previous data step and continuously cycle the data. However, its performance in predicting longer sequences is often unsatisfactory, limited by the limitations of the RNN structure, with problems such as gradient disappearance, gradient explosion and long-term dependence during backpropagation calculations [57]. Then, as time accumulates, the residuals that need to be passed back in the network will fall exponentially, affecting the network weight update and failing to reflect the long-term memory effect of RNN. Therefore, in order to solve the above problems, a prediction model with LSTM + attention mechanism is proposed. the model of LSTM + attention mechanism is shown in Figure 13. One of the attention mechanism modules is shown in Figure 14.

    Figure 13.  LSTM and the attention mechanism model.
    Figure 14.  Attention mechanism module.

    At the heart of the LSTM neural network is the cell state. The LSTM differs from the RNN in that it adds a conveyor belt of information, and its branch less conveyor belt structure is designed so that the information remains largely unchanged as it passes through the entire cell. The LSTM consists of four major components: An oblivion gate, an input gate, an output gate and a memory storage unit. In this case, the forgetting, input and output gates implement the control of the cell state, selectively adding or removing information to the cell state. It works as follows:

    1) Determine the missing information. The forgetting gate controls the information passed through by the Sigmoid activation function, using the input xt at time t and the implicit layer state ht1 at time t1 to obtain a value of ft between 0 and 1, where 0 indicates complete forgetting and 1 indicates complete invariance. Finally, the information in Ct1 is determined based on the value of ft, as shown in Eq (18).

    ft=σ(wfht1+ufxt+bf) (18)

    In Eq (18), σ denotes the Sigmoid activation function, wf denotes the weight coefficient of ht1 in the forgetting gate and feature extraction process, uf denotes the weight coefficient of xt in the forgetting gate and feature extraction process and bf denotes the forgetting gate bias value.

    2) Determine the new information to be stored. First, the input gate determines the updated value; Finally, a new candidate value at is created using the tanh function, as shown in Eqs (19) and (20).

    it=σ(wiht1+uixt+bi) (19)
    at=tanh(waht1+uaxt+ba) (20)

    In Eqs (19) and (20), it denotes the value of the input gate, at denotes the temporary cell state, wi and wa denote the weight coefficients of ht1 in the input gate and feature extraction process, ui and ua denote the weight coefficients of xt in the input gate and feature extraction process, bi and ba denote the input gate bias values.

    3) Determine the old cell state to update. Updating the old cell state is the process of updating the cell state at time t1 to the current cell state. The updated cell state is obtained using the cell state at time t1 to determine the discarded information through the forgetting gate, plus the candidate values generated through the input gate, as shown in Eq (21).

    Ct=Ct1ft+atit (21)

    In Eq (21), Ct denotes the cell state at the current moment and denotes the vector product.

    4) Determine the LSTM output value. In two steps, the output value of the cell state is determined from the activation function; the current cell state is passed through the tanh function to obtain a value between –1 and 1; finally, it is multiplied by the output value, as shown in Eqs (22) and (23).

    Ot=σ(woht1+uoxt+bo) (22)
    ht=Ottanh(Ct) (23)

    In Eqs (22) and (23), Ot denotes the value of the output gate, ht denotes the output value at the current moment, wo denotes the weight coefficient of ht1 in the output gate and feature extraction process, uo denotes the weight coefficient of xt in the output gate and feature extraction process, bo denotes the output gate bias value.

    5) Determine the output values for the entire model, as shown in Eq (24).

    ht=Attention(ht) (24)

    Average queue length and average delay are often used as important metrics to assess system performance, with smaller average length and lower delay indicating better system performance and more efficient service. To solve the polling system performance prediction problem. First, expand the scale of the experiment to obtain the average length and time delay as the arrival rate changes; second, abstract the relationship between arrival rate and length into a time series prediction problem, that is, the average length and time delay of customers under different business volumes are constituted into a series of discrete data in chronological order; finally, build a neural network model and perform statistical analysis on the known data series to achieve effective prediction. The experimental model was completed by building the TensorFlow framework in python 3.9 environment. Root mean square error (RMSE) was used in the experiments to assess the accuracy of the predicted data and the reliability of the model, and the calculation is shown in Eq (25).

    RMSE=1NNi=1(ytyp)2 (25)

    In Eq (25), N denotes the total number of data sets, yt denotes the true value and yp denotes the predicted value.

    To prevent overfitting, the Dropout strategy was used, i.e. some of the neurons in the hidden layer were randomly removed at each iteration, thus avoiding overfitting to a certain extent. During the training process, the first-order moment estimation and second-order moment estimation of Adaptive moment estimation (Adam) are used to update the weights of the network for the purpose of optimizing the network. The flow of this Adam algorithm is shown in Table 3.

    Table 3.  Adam algorithm flow.
    Steps Specific contents
    Step 1 Set step α=0.001
    Step 2 Set the moment estimation decay index to ρ1,ρ2[0,1], where, ρ1=0.9,ρ2=0.999
    Step 3 Set the stability constant to δ=108
    Step 4 Initialization parameter θ, First-order moment estimate s=0,
    Second-order moment estimate r=0, time step t=0
    Step 5 Under the condition that the stopping criterion is not satisfied, the following parameters are calculated:
    g1mΔθiL(f(x(i);θ),y(i));// Calculating gradients
    tt+1;
    sρ1s+(1ρ1)g;// Updating biased first-order moment estimates
    rρ2r+(1ρ2)gg;//Updating biased second-order moment estimates
    ss/(1ρt1);// Correction of deviations of first-order moments
    rr/(1ρt2);// Correction of deviations of second-order moments
    Δθ=α[s/r+δ];// Calculating update values
    θθ+Δθ;// Update parameters

     | Show Table
    DownLoad: CSV

    In order to simplify the network and improve the computational efficiency, the overall network structure is designed as one input layer, one hidden layer (the number of neurons in the hidden layer is 32), one fully connected layer, attention layer and one output layer, and the network structure is shown in Figure 15.

    Figure 15.  Network structure.

    The performance of polling systems is usually measured using first-order and second-order characteristics. One of the first-order characteristics is the average queue length and the second-order characteristic is the average delay. In communication, the system service volume is complex, and different service volumes correspond to different length and delay, and data sets with different length and delays can be obtained by varying the amount of service volume. As there are no readily available data sets for research analysis. Therefore, based on the mathematical analysis in 3.1–3.5 above, MATLAB was used to simulate the data set at different arrival rates. In practice, changes in arrival rates also affect changes in load, and the system load is denoted as ρ=λβ. When the service rate is certain, the system load capacity is limited, as shown by the length increasing with the load.

    In order to meet the actual communication effect, under the condition of system stability, the arrival rate is set to increase from small to large according to the step size of 0.0001, that is, the system traverses the three states of idle, balanced and blocked successively to improve the generalization ability of the model. In the experiments, 200 sets of data were used for prediction. The data processing was carried out in such a way that the arrival rate corresponded to the time series, that is, the data were represented as a time series M={m0,m1,...mT1}. mT denotes the value of time step T. For prediction, the data set was divided into training and test sets, with the division share being 75 and 25%. To improve the training efficiency and smooth out the solution process, the minmax function was used for normalization, scaling the data to between [0~1], Eq (26) is the normalized expression.

    ygyh=yyminymaxymin (26)

    In Eq (26), ygyh is the normalized value, y is the actual value, ymax is the maximum value in the data and ymin is the minimum value in the data.

    The two-level polling system prediction problem can be simply expressed as follows: the average length at arrival rate i+1 is y(i+1). N historical data (that is, the average length at the previous N arrival rates) is used as input and is represented by the matrix Q. As in Eq (27).

    Q=[y1y2yN]=[y1(iN+1)y1(iN+2)y1(i)y2(iN+1)y2(iN+2)y2(i)yN(iN+1)yN(iN+2)yN(i)] (27)

    Equation (28) is a time series representation of the matrix Q.

    Q=y={ym(iN+1),ym(iN+2),...ym(i)}m=Nm=1 (28)

    Predicting the next data from the known data is represented by Eq (29).

    y(i+1)=pred(y) (29)

    Furthermore, the performance prediction of a two-level polling control system based on LSTM and attention mechanisms for wireless sensor networks can be divided into five steps:

    Step 1: Data collection. Simulate a dataset of average queue length and average delay at different arrival rates.

    Step 2: Data processing. Import the collected data, divide the training set and test set, perform normalization, etc.

    Step 3: Modeling and parameter tuning. After data processing, the network model is built and the experimental parameters are dynamically adjusted.

    Step 4: Predictive analysis. The model is trained to make predictions on it, and then the known data is predicted on the unknown data by taking a sliding window operation.

    Step 5: Evaluate the model. The data is back-normalized and the prediction curves are compared with the simulation curves. Evaluate the predictive performance of the system and thus verify the feasibility.

    In the experiment, a dataset of 200 sets of average queue length and average delay was obtained by varying the arrival rate; second, the sample size was expanded for analysis and comparison, and the prediction results are shown in Figures 16 and 17.

    Figure 16.  Prediction curve of average length.
    Figure 17.  Prediction curve of average delay.

    From Figures 16 and 17, it can be seen that the prediction curves for the common site and the central site basically fit the simulation curves, and the error between the predicted and simulated values is small, indicating that the model can accurately predict the two-level polling system. As in the above analysis, both the length and the delay increase with the arrival rate, and the length and time delay of the central site are much less than those of the common site. Thus, the model is shown to be able to differentiate priorities well.

    Figures 18 and 19 show the loss function curves for the average queue length and average delay in a two-level polling control system. The loss function is used as a measure of how similar the predicted values of a model are to the simulated values. The larger the loss function, the less robust the model is and the worse the performance. As can be seen from Figure 18 and 19, the loss decreases rapidly from 0 to 25 epochs. From 25 to 50 epochs, the loss decreases slowly until it approaches 0. The losses in both length and delay converge around 0 for both normal and central sites, indicating that the experimentally set parameters are the best ones under the model.

    Figure 18.  Average captain loss function.
    Figure 19.  Average delay loss function.

    In order to assess the operational status of the model and the performance of the system, the network model is adjusted to predict future data using known data. Lengths and delays at low arrival rates are used to predict lengths and delays at high arrival rates, i.e., the output of the network is re-fed using loops. In the experiments, the average length and delay for an unknown step size of 50 was predicted, as shown in Figures 20 and 21. It can be seen that the unknown prediction trends for average length and delay are the same as the known data prediction trends, both increasing with increasing arrival rates and increasing differentiation, in line with the theoretical analysis. To some extent, the model has shown that it can predict two-level polling systems very well. The impact of load on system performance is generally fully considered when studying polling systems. The greater the arrival rate of message packets at a fixed service time, the greater the average queue length. Therefore, when encountering high traffic volumes in the design of specific communication systems, consider increasing the number of servers to ease the pressure on individual servers. Also, to evaluate system performance, network parameters can be deployed to record low traffic data to predict high traffic data.

    Figure 20.  Trend prediction of average length.
    Figure 21.  Trend prediction of average delay.

    To verify the generalizability and generalization of the model, the arrival rate was varied to obtain data of different sample sizes for prediction. As shown in Figures 22 and 23, the graphs represent the prediction curves at sample sizes of 200,254 and 381. It can be concluded that the prediction curves for different sample sizes follow the same trend as the simulation curves and the errors remain within manageable limits. The prediction errors under different sample models are shown in Table 4. The model fits well regardless of the increase in sample size, indicating that increasing the sample size does not affect the model's predictive effectiveness.

    Figure 22.  Prediction of average queue length for different sample sizes.
    Figure 23.  Prediction of average delay for different sample sizes.
    Table 4.  Prediction errors at different sample sizes.
    Sample size Site type Performance indicators Root Mean Square Error
    200 Common site Average queue length 0.0012
    average delay 0.0142
    Central site Average queue length 0.0001
    average delay 0.0023
    254 Common site Average queue length 0.0007
    average delay 0.0055
    Central site Average queue length 0.00009
    average delay 0.0012
    381 Common site Average queue length 0.0005
    average delay 0.0052
    Central site Average queue length 0.00012
    average delay 0.0014

     | Show Table
    DownLoad: CSV

    There are also many mainstream prediction models in machine learning, such as: BP neural networks, SVM, autoregressive sliding average ARMA models and informer neural networks. In order to accurately compare the prediction results of LSTM and attention mechanism, LSTM neural networks and BP neural networks were selected for comparison. Predictions were made using the same common site length dataset on different neural network models. The experiment shows that the LSTM + attention prediction error = 0.0012, while the LSTM network prediction error = 0.0055 and the BP network prediction error = 0.05125. The prediction error of LSTM + attention mechanism is the smallest, indicating that the introduction of attention mechanism can improve the accuracy of deep neural network models in predicting two-level polling systems. In summary, the LSTM +attention model not only fits the data well, but also accurately captures the trends of the two-level polling system.

    With the increase of network size and communication volume in the IoT, many different services are involved, and the importance of different services to the user is usually not consistent. When data is collected by wireless sensor networks, the data is not prioritized according to importance, which affects the user experience. Therefore, a continuous-time exhaustive-limited (K = 2) two-level polling system model that distinguishes between different priority levels is proposed to address this problem. In order to improve the computational efficiency and to quickly evaluate the performance of the polling system, we use LSTM + attention mechanism for performance prediction. A two-level mathematical model is built, performance metrics such as length, delay and period are analyzed and simulation experiments are carried out on MATLAB; the relationship between length and delay and arrival rate is abstracted into a time series problem and a network model is built for prediction; the sample size was varied to verify the generalizability of the model and to compare it with LSTM neural network and BP neural network. The results show that the simulated values are basically consistent with the expected values, the predicted curves are basically fitted with the simulated curves and the length and time delay of the common site are larger than those of the central site. It is shown that the new model is able to differentiate service priorities well and has better system performance, which is suitable for polling control mechanisms in wireless sensor networks. LSTM and attention mechanism are used to predict the performance of polling systems more accurately and can be applied as a new method to other polling system performance studies. In addition to performing two-level polling system predictions, future extensions to multi-level multidimensional polling systems and asymmetric polling systems can be pursued, build more applicable models.

    The polling system has been an important scheduling control method in the MAC layer of wireless sensor networks, as they can provide conflict-free access to information and provide delay guarantees for delay-sensitive services. Thus, traditional ultra-dense wireless sensor networks are recommended as a complement to cellular networks, 5G ultra-high cellular networks are proposed based on MIMO communication technology, and it is believed that the Exhaustive-Limited K = 2 two-level polling control system will certainly have a prominent role in 5G or 6G optimization and improvement. In addition, the TinyOS system can be used to design the acquisition MAC protocol based on polling control, and the wireless sensor network can be accessed to the cloud platform using WI-FI access to collect the data indicators of the surrounding environment and display them in real time.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The Wu Zhonghai Expert Workstation Project in Yunnan Province (Project No.202305AF150045), and Yang Zhijun's Industry Innovation Talents Project of Yunnan Xingdian Talents Support Plan (Certificate No.: YNWR-CYJS-2020-017).

    All authors declare no conflicts of interest in this paper.



    [1] X. M. Wang, L. J. Du, Y. Zhang, X. Z. Zhao, X. Z. Cheng, Y. L. Tao, Priority queue-based polling mechanism on seismic equipment cluster monitoring, Cluster Comput., 20 (2017), 611–619. https://doi.org/10.1007/s10586-017-0726-6 doi: 10.1007/s10586-017-0726-6
    [2] G. Sudha, C. Tharini, Trust-based clustering and best route selection strategy for energy efficient wireless sensor networks, Automatika, 64 (2023), 634–641. https://doi.org/10.1080/00051144.2023.2208462 doi: 10.1080/00051144.2023.2208462
    [3] O. V. Semenova, D. T. Bui, The software package and its application to study the polling systems, Vestn. Tomsk. Gos. Univ. Upr. Vychislitelnaja Teh. Inform., 50 (2020), 106–113. https://doi.org/10.17223/19988605/50/13 doi: 10.17223/19988605/50/13
    [4] J. Y. Cao, W. X. Xie, Stability of a two-queue cyclic polling system with BMAPs under gated service and state-dependent time limited services disciplines, Queueing Syst., 85 (2017), 117–147. https://doi.org/10.1007/s11134-016-9504-z doi: 10.1007/s11134-016-9504-z
    [5] Z. Yang, Y. Sun, J. Gan, New polling scheme based on busy/idle queues mechanism, Int. J. Perform. Eng., 14 (2018), 2522–2531. https://doi.org/10.23940/ijpe.18.10.p28.25222531 doi: 10.23940/ijpe.18.10.p28.25222531
    [6] Y. X. Lv, Z. X. Liu, M. H. Bi, C. Hao, Y. R. Zhai, Selective polling and controlled contention based WLAN MAC scheme for low-latency applications, IEEE Commun. Lett., 27 (2023), 1050–1054. https://doi.org/10.1109/LCOMM.2023.3240191 doi: 10.1109/LCOMM.2023.3240191
    [7] B. R. Sathishkumar, An effectual spectrum sharing and battery utilization strategy using fuzzy enabled dynamic relay polling transmission in WSN, J. Intell. Fuzzy Syst., 44 (2023), 4907–4930. https://doi.org/10.3233/JIFS-223001 doi: 10.3233/JIFS-223001
    [8] M. F. Li, C. C. Fang, H. W. Ferng, On-demand energy transfer and energy-aware polling-based MAC for wireless powered sensor networks, Sensors, 22 (2022), 2476. https://doi.org/10.3390/s22072476 doi: 10.3390/s22072476
    [9] S. Siddiqui, A. A. khan, S. Ghani, Achieving energy efficiency in wireless sensor networks using dynamic channel polling and packet concatenation, China Commun., 18 (2021), 249–270. https://doi.org/10.23919/JCC.2021.08.018 doi: 10.23919/JCC.2021.08.018
    [10] Z. Yang, Y. Su, H. W. Ding, Analysis of two-level polling system characteristics of exhaustive service and asymmetrically gated service, Acta Automatica Sin., 44 (2018), 2228–2237.
    [11] Z. J. Han, H. W. Ding, L. Y. Bao, Z. J. Yang, Q. L. Liu, Analysis of new multi-priority P-CSMA of non-persistent type random multiple access ad hoc network in MAC protocol analysis, Int. J. Commun. Netw. Distr. Syst., 25 (2020), 57–77. https://doi.org/10.1504/IJCNDS.2020.108163 doi: 10.1504/IJCNDS.2020.108163
    [12] Z. Yang, L. Zhu, H. Ding, Z. Guan, A Priority-based parallel schedule polling MAC for wireless sensor networks, J. Commun., 11 (2016), 792–797. https://doi.org/10.12720/jcm.11.8.792-797 doi: 10.12720/jcm.11.8.792-797
    [13] A. Mercian, E. I. Gurrola, F. Aurzada, M. P. McGarry, M. Reisslein, Upstream polling protocols for flow control in PON/xDSL hybrid access networks, IEEE Trans. Commun., 64 (2016), 2971–2984. https://doi.org/10.1109/TCOMM.2016.2576450 doi: 10.1109/TCOMM.2016.2576450
    [14] H. Ding, C. Li, L. Bao, Z. Yang, L. Li, Q. Liu, Research on multi-level priority polling MAC protocol in FPGA tactical data chain, IEEE Access, 7 (2019), 33506–33516. https://doi.org/10.1109/ACCESS.2019.2902488 doi: 10.1109/ACCESS.2019.2902488
    [15] Z. Guan, Z. J. Yang, M. He, W. H. Qian, Analysis of time-delay characteristics of two-level polling control system relying on station states, J. Autom., 42 (2016), 1207–1214. https://doi.org/10.16383/j.aas.2016.c150226 doi: 10.16383/j.aas.2016.c150226
    [16] T. Jiang, X. Lu, L. Liu, J. Lv, X. Chai, Strategic behavior of customers and optimal control for batch service polling systems with priorities, Complexity, 2020 (2020). https://doi.org/10.1155/2020/6015372 doi: 10.1155/2020/6015372
    [17] W. H. Mu, L. Y. Bao, H. W. Ding, Y. F. Zhao, An exact analysis of discrete time two-level priority polling system based on multi-times gated service policy, Acta Electron. Sinica, 46 (2018), 276–280. https://doi.org/10.3969/j.issn.0372-2112.2018.02.003 doi: 10.3969/j.issn.0372-2112.2018.02.003
    [18] Z. J. Yang, L. Mao, H. W. Ding, Q. L. Kou, Research on two-level priority polling access control protocol based on continuous time, in 2020 IEEE 6th International Conference on Computer and Communications, (2020), 136–140. https://doi.org/10.1109/ICCC51575.2020.9345093
    [19] Z. J. Yang, Z. Liu, H. W. Ding, Research of continuous-time two-level polling system performance of exhaustive service and gated service, J. Comput. Appl., 39 (2019), 2019–2023. https://doi.org/10.11772/j.issn.1001-9081.2019010063 doi: 10.11772/j.issn.1001-9081.2019010063
    [20] R. Gupta, J. Gupta, Federated learning using game strategies: state-of-the art and future trends, Comput. Netw., 225 (2023), 109650. https://doi.org/10.1016/j.comnet.2023.109650 doi: 10.1016/j.comnet.2023.109650
    [21] P. Boobalan, S. P. Ramu, Q. V. Pham, K. Dev, S. Pandya, P. K. R. Maddikunta, et al., Fusion of federated learning and industrial Internet of Tings: A survey, Comput. Netw., 212 (2022), 109048. https://doi.org/10.1016/j.comnet.2022.109048 doi: 10.1016/j.comnet.2022.109048
    [22] I. Guarino, G. Aceto, D. Ciuonzo, A. Montieri, V. Persico, A. Pescapè, Contextual counters and multimodal Deep Learning for activity-level traffic classification of mobile communication apps during COVID-19 pandemic, Comput. Netw., 219 (2022), 109452. https://doi.org/10.1016/j.comnet.2022.109452 doi: 10.1016/j.comnet.2022.109452
    [23] J. Liu, Q. Wang, Y. Xu, AR-GAIL: adaptive routing protocol for FANETs using generative adversarial imitation learning, Comput. Netw., 218 (2022), 109382. https://doi.org/10.1016/j.comnet.2022.109382 doi: 10.1016/j.comnet.2022.109382
    [24] Y. H. Liu, X. Y. Zhang, W. Y. Liu, Y. Lin, F. Su, J. Cui, et al., Seismic vulnerability and risk assessment at the urban scale using support vector machine and GI science technology: a case study of the Lixia District in Jinan City, China, Geomat. Nat. Haz. Risk, 14 (2023), 1947–5705. https://doi.org/10.1080/19475705.2023.2173663 doi: 10.1080/19475705.2023.2173663
    [25] P. Bhatt, A. L. Maclean, Comparison of high-resolution NAIP and unmanned aerial vehicle (UAV) imagery for natural vegetation communities classification using machine learning approaches, Gisci. Remote Sens., 60 (2023), 2177448. https://doi.org/10.1080/15481603.2023.2177448 doi: 10.1080/15481603.2023.2177448
    [26] M. B. Haile, A. O. Salau, B. Enyew, A. J. Belay, Detection and classification of gastrointestinal disease using convolutional neural network and SVM, Cogent Eng., 9 (2022), 2084878. https://doi.org/10.1080/23311916.2022.2084878 doi: 10.1080/23311916.2022.2084878
    [27] Wang J., Zhao Y. L., Y. C. Fu, L. L. Xia, J. S. Chen, Improving LSMA for impervious surface estimation in an urban area, Eur. J. Remote Sens., 55 (2022), 37–51. https://doi.org/10.1080/22797254.2021.2018666 doi: 10.1080/22797254.2021.2018666
    [28] N. Ali, Z. Halim, S. F. Hussain, An artificial intelligence-based framework for data-driven categorization of computer scientists: a case study of world's Top 10 computing departments, Scientometrics, 128 (2022), 1513–1545. https://doi.org/10.1007/s11192-022-04627-9 doi: 10.1007/s11192-022-04627-9
    [29] B. Akyuz, S. Karatay, F. Erken, Comparison of the performance of the regression models in GPS-Total electron content prediction, Politeknik Dergisi, 26 (2022), 321–328. https://doi.org/10.2339/politeknik.1137658 doi: 10.2339/politeknik.1137658
    [30] X. Y. Li, X. S. Han, M. Yang, Day-Ahead optimal dispatch strategy for active distribution network based on improved deep reinforcement learning, IEEE Access, 10 (2022), 9357–9370. https://doi.org/10.1109/ACCESS.2022.3141824 doi: 10.1109/ACCESS.2022.3141824
    [31] S. Dudey, F. Olimov, M. A. Rafique, J. Kim, M. Jeon, Label-attention transformer with geometrically coherent objects for image captioning, Inform. Sci., 623 (2022), 812–831. https://doi.org/10.1016/j.ins.2022.12.018 doi: 10.1016/j.ins.2022.12.018
    [32] R. Inokuchi, M. Iwagami, Y. Sun, A. Sakamoto, N. Tamiya, Machine learning models predicting under-triage in telephone triage, Ann. Med., 54 (2022), 2990–2997. https://doi.org/10.1080/07853890.2022.2136402 doi: 10.1080/07853890.2022.2136402
    [33] S. Janizadeh, S. M. Bateni, C. Jun, J. Im, H. T. Pai, S. S. Band, et al., Combination four different ensemble algorithms with the generalized linear model (GLM) for predicting forest fire susceptibility, Geomat. Nat. Haz. Risk, 14 (2023), 2206512. https://doi.org/10.1080/19475705.2023.2206512 doi: 10.1080/19475705.2023.2206512
    [34] S. Latif, X. W. Fang, K. Arshid, A. Almuhaimeed, A. Imran, M. Alghamdi, Analysis of birth data using ensemble modeling techniques, Appl. Artif. Intell., 37 (2023), 2158273. https://doi.org/10.1080/08839514.2022.2158273 doi: 10.1080/08839514.2022.2158273
    [35] Y. W. Tang, F. Qiu, B. J. Wang, D. Wu, L. H. Jing, Z. C. Sun, A deep relearning method based on the recurrent neural network for land cover classification, Gisci. Remote Sens., 59 (2022), 1344–1366. https://doi.org/10.1080/15481603.2022.2115589 doi: 10.1080/15481603.2022.2115589
    [36] G. C. Habek, M. A. Tocoglu, A. Onan, Bi-directional CNN-RNN architecture with group-wise enhancement and attention mechanisms for cryptocurrency sentiment analysis, Appl. Artif. Intell., 36 (2022), 2145641. https://doi.org/10.1080/08839514.2022.2145641 doi: 10.1080/08839514.2022.2145641
    [37] L. Jin, S. Li, B. Hu, RNN models for dynamic matrix inversion: A control-theoretical perspective, IEEE Trans. Ind. Inform., 14 (2018), 189–199. https://doi.org/10.1109/TII.2017.2717079 doi: 10.1109/TII.2017.2717079
    [38] Y. S. Zhang, J. Zhang, Y. R. Jiang, G. J. Huang, R. Y. Chen, A text sentiment classification modeling method based on coordinated CNN-LSTM-Attention model, Chinese J. Electr., 28 (2019), 120–126. https://doi.org/10.1049/cje.2018.11.004 doi: 10.1049/cje.2018.11.004
    [39] D. Zhang, G. Lindholm, H. Ratnaweera, Use long short-term memory to enhance Internet of Things for combined sewer overflow monitoring, J. Hydrol., 556 (2018), 409–418. https://doi.org/10.1016/j.jhydrol.2017.11.018 doi: 10.1016/j.jhydrol.2017.11.018
    [40] Y. N. Zhou, S. Y. Wang, T. J. Wu, L. Feng, W. Wu, J. C. Luo, et al., For-backward LSTM-based missing data reconstruction for time-series Landsat images, Gisci. Remote Sens., 59 (2022), 410–430. https://doi.org/10.1080/15481603.2022.2031549 doi: 10.1080/15481603.2022.2031549
    [41] J. Sridhar, R. Gobinath, M. S. Kirgiz, Evaluation of artificial neural network predicted mechanical properties of jute and bamboo fiber reinforced concrete ALONG with silica fume, J. Nat. Fibers, 20 (2023), 2162186. https://doi.org/10.1080/15440478.2022.2162186 doi: 10.1080/15440478.2022.2162186
    [42] W. H. AlAlaween, O. A. Abueed, A. H. AlAlawin, O. H. Abdallah, N. T. Albashabsheh, E. S. AbdelAll, et al., Artificial neural networks for predicting the demand and price of the hybrid electric vehicle spare parts, Cogent Eng., 9 (2022), 2075075. https://doi.org/10.1080/23311916.2022.2075075 doi: 10.1080/23311916.2022.2075075
    [43] T. A. H. Alghamdi, O. T. E. Abdusalam, F. Anayi, M. Packianather, An artificial neural network based harmonic distortions estimator for grid-connected power converter-based applications, Ain Shams Eng. J., 14 (2022), 101916. https://doi.org/10.1016/j.asej.2022.101916 doi: 10.1016/j.asej.2022.101916
    [44] M. K. Wei, X. B. Hu, H. X. Yuan, Residual displacement estimation of the bilinear SDOF systems under the near-fault ground motions using the BP neural network, Adv. Struct. Eng., 25 (2021), 552–571. https://doi.org/10.1177/13694332211058530 doi: 10.1177/13694332211058530
    [45] H. X. Zhou, A. L. Che, X. H. Shuai, Y. Zhang, A spatial evaluation method for earthquake disaster using optimized BP neural network model, Geomat. Nat. Haz. Risk, 14 (2023), 1–26. https://doi.org/10.1080/19475705.2022.2160664 doi: 10.1080/19475705.2022.2160664
    [46] Z. B. Qiu, Z. J. Wu, Y. Song, Sphere gap breakdown voltage prediction based on ISSA optimized BP neural network and effective electric field feature set, IEE J. Trans. Electr., 18 (2022), 506–514. https://doi.org/10.1002/tee.23750 doi: 10.1002/tee.23750
    [47] J. W. Hou, Y. J. Wang, B. Hou, J. Zhou, Q. Tian, Spatial simulation and prediction of air temperature based on CNN-LSTM, Appl. Artif. Intell., 37 (2023), 2166235. https://doi.org/10.1080/08839514.2023.2166235 doi: 10.1080/08839514.2023.2166235
    [48] W. S. Zhang, W. W. Guo, X. Liu, Y. Liu, J. Zhou, B. Li, et al. LSTM-based analysis of industrial IoT equipment. IEEE Access, 6 (2018), 23551–23560. https://doi.org/10.1109/access.2018.2825538 doi: 10.1109/ACCESS.2018.2825538
    [49] X. B. Shu, L. Y. Zhang, Y. L. Sun, J. H. Tang, Host-parasite: Graph LSTM-in-LSTM for group activity recognition, IEEE Trans. Neural Netw. Learning Syst., 32 (2020), 663–674. https://doi.org/10.1109/TNNLS.2020.2978942 doi: 10.1109/TNNLS.2020.2978942
    [50] T. X. Shu, J. H. Chen, V. K. Bhargava, C. W. de Silva, An energy-efficient dual prediction scheme using LMS filter and LSTM in wireless sensor networks for environment monitoring, IEEE Int. Things J., 6 (2019), 6736–6747. https://doi.org/10.1109/JIOT.2019.2911295 doi: 10.1109/JIOT.2019.2911295
    [51] R. Okumura, K. Mizutani, H. Harada, Efficient polling communications for multi-hop networks based on receiver-initiated MAC protocol, Ieice Trans. Commun., E104-B (2021), 550–562. https://doi.org/10.1587/transcom.2020EBP3095 doi: 10.1587/transcom.2020EBP3095
    [52] J. L. Guo, F. F. Li, T. Wang, S. B. Zhang, Y. Q. Zhao, Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication, Int. J. Distrib. Sens. Netw., 17 (2021). https://doi.org/10.1177/15501477211007412 doi: 10.1177/15501477211007412
    [53] J. K. van Ommeren, A. Al Hanbali, R. J. Boucherie, Analysis of polling models with a self-ruling server, Queueing Syst., 94 (2020), 77–107. https://doi.org/10.1007/s11134-019-09639-6 doi: 10.1007/s11134-019-09639-6
    [54] Y. Y. Sun, Z. J. Yang, Analysis and research on polling system of wireless sensor network, Electr. Meas. Tech., 41 (2018), 100–104.
    [55] Z. J. Yang, Q. L. Kou, H. W. Ding, BSCP-MAC: A blockchain-based synchronous control polling MAC protocol for wireless sensor networks, J. Electr. Eng. Technol., 18 (2023), 3799–3810. https://doi.org/10.1007/s42835-023-01440-z doi: 10.1007/s42835-023-01440-z
    [56] J. Y. Ge, L. Y. Bao, H. W. Ding, X. Y. Ding, Performance analysis of the first-order characteristics of two-level priority polling system based on parallel gated and exhaustive services mode, in 2021 IEEE 4th International Conference on Electronic Information and Communication Technology (ICEICT), (2021), 10–13. https://doi.org/10.1109/ICEICT53123.2021.9531122
    [57] Z. H. Liu, Y. J. Li, J. Q. Yao, Z. N. Cai, G. B. Han, X. Y. Xie, Ultra-short-term forecasting method of wind power based on W-BiLSTM, in 2021 IEEE 4th International Electrical and Energy Conference (CIEEC), (2021), 1–6. https://doi.org/10.1109/CIEEC50170.2021.9511041
  • This article has been cited by:

    1. Dadang Rustandi, Mersi Kurniati, Sensus Wijonarko, Siddiq Wahyu Hidayat, Tatik Maftukhah, , A Control System for Pepper Submersion Tub Actuators, 2025, 2973, 1742-6588, 012009, 10.1088/1742-6596/2973/1/012009
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1494) PDF downloads(43) Cited by(1)

Figures and Tables

Figures(23)  /  Tables(4)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog