=Paper= {{Paper |id=Vol-2616/paper31 |storemode=property |title=Method of Fractal Traffic Generation by a Model of Generator on the Graph |pdfUrl=https://ceur-ws.org/Vol-2616/paper31.pdf |volume=Vol-2616 |authors= Hanna Drieieva, Oleksii Smirnov, Oleksandr Drieiev, Yuliia Polishchuk, Rashit Brzhanov, Marek Aleksander |dblpUrl=https://dblp.org/rec/conf/coapsn/DrieievaSDPBA20 }} ==Method of Fractal Traffic Generation by a Model of Generator on the Graph== https://ceur-ws.org/Vol-2616/paper31.pdf
    Method of Fractal Traffic Generation by a Model of
                Generator on the Graph

       Hanna Drieieva 1 [0000-0002-8557-3443], Oleksii Smirnov 1,3 [0000-0001-9543-874X],
      Oleksandr Drieiev 1 [ 0000-0001-6951-2002], Yuliia Polishchuk 2 [0000-0002-0686-2328],
     Rashit Brzhanov 3 [0000-0001-8755-8207] and Marek Aleksander 4 [0000-0003-2619-1063]
         1
             Central Ukrainian National Technical University, Ukraine, Kropyvnytskyi
                         2
                      National Aviation University, Ukraine, Kyiv
                      3
                        Yessenov University, Aktau, Kazakhstan
       4
         Państwowa Wyższa Szkoła Zawodowa w Nowym Sączu, Nowy Sącz, Poland
        gannadreeva@gmail.com, dr.SmirnovOA@gmail.com,
        drey.sanya@gmail.com,polischuk.yu.ya@gmail.com



       Abstract. The problem of generating traffic with given fractal properties in or-
       der to use it in simulation processes of the computer network, which is carried
       out to predict the properties of the telecommunication system in the meantime
       delay of information packets and their likelihood of loss is dedicated in the pa-
       per. The subject of the research in the article is the method of generating fractal
       traffic using a generator model on the graph. The purpose of the research is to
       create a method for generating fractal traffic using a generator model on the
       graph. For this purpose, the following tasks were solved: defined fractal proper-
       ties of telecommunication traffic and the consequences of fractality; were de-
       fined the fractal dimension of the numerical series and the distribution density
       of the elements of the series were determined; the estimation of the fractal
       properties of the generated binary sequences is carried out; the management
       mode of the intensity of generated traffic; suggested the generator was adjusted
       to match the sample traffic. The result of the work is the implementation of the
       method of generating fractal traffic using a generator model on the graph, due
       to the application of the following steps: the relevance of the problem of creat-
       ing generators of fractal binary sequences without the use of infinite distribu-
       tions is identified; the generator of a fractal binary sequence given by the Mar-
       kov chain; the variability of the fractal dimension of the binary sequence and at
       different intensities τ is demonstrated; analytic expressions are derived for ob-
       taining generator parameters with a given output bits density with the control of
       their fractal dimension.

       Keywords: Network, Simulation, Traffic, Graph, Fractal, Qos, Markov Chain.


1      Introduction

In the process of developing the hardware and software components of telecommuni-
cation and computer network equipment, it is necessary to meet the requirements of

Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons Li-
cense Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on
Control, Optimisation and Analytical Processing of Social Networks
quality of service (QoS). In order to ensure that the equipment meets the requirements
of the quality of service of telecommunication equipment, it is necessary to have a
mathematical model of information transfer processes where QoS parameters have an
analytical estimate. Also, these estimates can be obtained as a result of simulation
based on mathematical models of the developed telecommunication equipment, in
case it is impossible to obtain analytical solutions.


2      Analysis of recent research and publications

In case of the presence of fractal telecommunication traffic in computer networks, the
simulation should take into account fractal capabilities, so are used as sources genera-
tors of traffic on the basis of distributions with a “heavy tail” [1, p. 80]. Paper [1]
presents the generation of the Method-Based Pareto-Modulated Poisson Processes
(PMPP) based on the Pareto distribution. In this case, the research remains relevant
and is considered in modern studies [2].
   Modern telecommunication systems form increasingly complex structures, which
leads to the unsuitability of analytical apparatus to optimize the parameters of tele-
communication equipment. This leads to a lack of optimality of equipment and, con-
sequently, deterioration in the quality of service on the requirements of QoS. To de-
termine the optimal modes of operation of telecommunication equipment, simulation
systems are used (in particular: OPNET, Emulab, NISTNET, NS, GTNeS, Dum-
myNet, ModelNet, Ohio Network Emulator, ENDE, EMPOWER, NSE, NETWARS)
that demonstrate the need for increasingly computational resources to optimize in-
creasingly complex telecommunication systems [4-11]. Composite imitation systems
are also simulators of the source of telecommunication traffic, which is divided by the
properties into periodic, random and self-similar. The importance of reliable results of
the process of mathematical simulation of the work of the telecommunications net-
work of traffic generators has been confirmed by the consistent availability of reports
on this topic at the IEEE MASCOTS International Symposium (Simulation, Analysis
and Simulation of Computer and Telecommunication Systems) in the program. For
example, in 2018. The following report is included [5]. In modern simulation, the
following types of traffic sources are used [12-16]:

1. Poisson process - an example of a source of random traffic. These generators are
   well described analytically, which allows us to build analytical formulas for evalu-
   ating service quality indicators. Unfortunately, in modern systems this type of traf-
   fic is not widespread.
2. Generator of traffic based on the fractal Brownian motion [10].
3. Fractal Gaussian noise. Generation is based on the use of discrete wavelet trans-
   formation. Detailing wavelet coefficients at each of the levels are independent ran-
   dom variables with normal distribution. Approximation coefficients are the result
   of a fractal autoregression with a sliding middle process [9]. The advantages of
   models based on the fractal Brownian motion and the fractal Gaussian noise are the
   properties of self-sustainability and long-term dependence that are observed in ex-
   perimental data. There is also the possibility of their analytical interpretation. The
   disadvantages are insufficient means of selecting parameters for generating traffic
   with given properties. Therefore, these generators are not enough to generate plau-
   sible traffic.
4. Fractal movement Levy is a generalized Brownian motion, has a self-similar char-
   acter, forms distributions with «heavy tails». Among the drawbacks it is worth not-
   ing the need to take into account several parameters that determine the state of the
   model for which there is no direct method of evaluation.
5. Autoregressive models assume that the current value of the process is the sum of a
   constant, weighted sum of previous values and model error. Autoregressive models
   are relatively simple, but they are inherent in the lack of simulation of nonlineari-
   ties. They are characterized by a burdensome mathematical apparatus and, as a re-
   sult, the process of bringing to experimental traffic is time-consuming.
6. Neural network (NM) models are trained neural networks on experimental traffic
   in the prediction mode of a new element. The neural network contains several lay-
   ers with a nonlinear activation function and an output linear neuron. But neural
   networks require training, they have a complex analysis of the trained network, the
   choice of learning algorithm and network architecture in most cases is selected. Al-
   so, strict requirements for the training sample are set.
7. Use of Markov chains. The use of Markov chains allows us to create a very simple,
   compared with previous methods, model for generating discrete traffic with a wide
   range of properties. Experiments show good correspondence with real traffic of the
   telecommunication network. To set up the model you need to set only five parame-
   ters, often for process description only two probabilities of change between unit
   and zero states. The use of the generator on the Markov chains also allows for ana-
   lytical solutions that are a useful alternative to numerical simulation methods.

   In view of the generators of telecommunication traffic, it can be noted that in most
cases, the selection of the method of generating traffic is dependent on a particular
situation, but in general, Mark-based generation methods are distinguished by less
computational complexity and a wider range of applicability. Therefore, the task of
improving the analytical methods of approaching the source of traffic model to real
experimental data remains an urgent task that is solved in this article. Thus, the pur-
pose of this work is to create a method for generating fractal traffic using a generator
model on the graph.


3      Fractal properties of telecommunication traffic and the
       consequences of fractality

At the present stage of the development of the mathematical description of telecom-
munication processes, it is generally accepted to use fractal description of traffic,
which is visually accompanied by the presence of abnormally large, compared with
normal distribution, number of bursts [3].
                   Fig. 1. An example of pulsating multifractal traffic [3]

In most cases, such pulsating processes are described by Pareto distribution [1-3].


4      The fractal dimension of the numerical series and the
       distribution density of the elements of the series

To identify the fractal dimension one can use one of the definitions, namely the di-
mension in the interpretation of Minkowski (1), [4]:
                                           ln( N  )
                                  d  lim            .                           (1)
                                       0  ln()

where the notations are used:
─ ε is the size or diameter of the subset, which is covered by the set;
─ Nε is the minimum number of sets needed to cover the entire set.

    The binary set is not suitable for the direct application of formula (1), since its el-
ements are counted but not continuous, therefore it is not possible to direct ε to zero.
It is suggested to circumvent this restriction if the “width” of rectangles of height “1”
and “0” in the binary sequence is directed to zero.
    Therefore the coating will have an area S = 0, when 1 / ε of the elements of the
generated series have a value only of 1 or only of 0, otherwise the coating will have
an area S = 1 (Fig. 2).
    It is assumed that the implementation of the binary sequence can be continued in-
definitely, and then the mathematical expectation of the sum of partial squares S can
be expressed using statistics based on mathematical expectation.
    For this purpose we find the probability of obtaining a null covering p0(n) with n
experiments; then the probability of a single covering will be p1(n) =1-p0(n).
                     Fig. 2. Determination of the coverage area at 1 / ε = 3
Event p0(n) is possible in the case of a series of “1” or “0” implementations. We in-
troduce a system whose state depends on the previous state, similar to that used in the
PMPP system [1, p. 81, fig. 4.1] (Fig. 3).
                                            λ2
                             p                            p1
                                    0

                λ0              0                               1              λ3


                                                λ1

                        Fig. 3. Model of the generator of fractal traffic
The model uses a state that corresponds to the original generated value at the time.
The next value is obtained by random transitions, where λ1 and λ2 are responsible for
the probability of changing the state for the next quantum of time, and λ0 and λ3 are
the probability of maintaining the current state.
As a result, the probability of a unit series for n quanta of time is (1-λ2)n. But here it
is necessary to consider that the series begins with a single value that has the probabil-
ity p1. Therefore, the probability of a single series eventually has the following form:
p1(1-λ2)n. Similarly, the determination of the probability of obtaining a series of zero
values is performed: p0(1-λ1)n.
   The finite automaton on the basis of the graph (Figure 3) has two states “0” and
“1”, with the probability of transition from “0” to “1” and from “1” to “0” in the gen-
eral case may be different. For the probabilities of transitions λ must meet the follow-
ing requirements:
                                          0  1  1
                                                      ,                              (2)
                                         2   3  1
   Under the condition λ1=λ2, the graph becomes symmetric and the probability
p0=p1=0.5 with a long-term observation the system is equally likely in one of the
states. In this case, the mathematical expectation of the generated series is M=0.5, and
the dispersion is D=0.25. For rice fig. 3 the following differential equations with re-
spect to the probability of system states are true:
                       dp0 (t )
                       dt  1 p0 (t )   2 p1 (t )   0 p0 (t )   0 p0 (t ),
                                                                                              (3)
                        dp1 (t )  1 p0 (t )   2 p1 (t )  3 p1 (t )   3 p1 (t ).
                        dt
   If we take into account that finding a system in one of the states is a guaranteed
event p0+p1=1 and use the condition of stationarity of the process in time (when the
probabilities do not change their value and their derivatives are equal to zero), the
transformation of system (3) gives the following system:
                                       1 p0 (t )   2 p1 (t )  0,
                                       
                                        p0 (t )  p1 (t )  1.
  From the last system you can get the probability of staying the system in the states
«0» and «1» (4):
                                          2               1
                                 p0             ; p1           .                             (4)
                                        1   2        1   2
   Accordingly, traffic intensity τ will coincide with the probability of receiving «1»
at the output of the generator: τ=p1. If we take into account the symmetric condition
of the graph λ=λ1=λ2, then the probabilities can be expressed as follows (5):
                                                    
                1   2    p0      ; p1        p0  p1  0.5  .
                                                                                       (
                                                                              5)
   In accordance with the obtained probabilities (4), it is finally possible to obtain a
zero coverage area with length n as the sum of two mutually exclusive events of the
unit and zero series (6):
                                         2 (1  1 )n  1 (1   2 )n
                           p0 (n)                                      .                      (6)
                                                   1   2
   The unit area is the opposite of an event and is expressed by (7):
                                        (1  1 ) n  1 (1   2 ) n
                         p1 (n)  1  2                                .                        (7)
                                                 1   2
   It is obvious that the mathematical expectation, which in this case corresponds to
the average coverage area, can be expressed as follows (8):
                         (1  1 ) n  1 (1   2 ) n      (1  1 ) n  1 (1   2 ) n 
              M ( n)  0 2                               1 1  2                           ,
                                 1   2                               1   2            
                                      2 (1  1 ) n  1 (1   2 ) n
                           M ( n)  1                                 .            (8)
                                                1   2
   As a result, the fractal dimension depends on the scale corresponding to the defini-
tion of the multifractal, and can be obtained from (1):
                 n1M (n1 )  C  n1d n1 M (n1 ) C  n1d
                                     ,                 , ln n1M (n1 )  d ln n1 .
                n2 M (n2 )  C  n2 n2 M (n2 ) C  n2
                                    d                  d
                                                              n2 M (n2 )       n2
                       d (n1 , n2 )  1  ln( M (n1 ) / M (n2 )) / ln(n1 / n2 ) .                             (9)
   Finally (10):
                                               2   2 (1  1 )n1  1 (1   2 )n1 
        d (n1 , n2 , 1 ,  2 )  1  ln  1                                          n2 
                                                                                             / ln( n1 / n2 ) (10)
                                            1   2   2 (1  1 )  1 (1   2 ) 
                                                                     n2


    However, a lot of parameters are used to determine the fractal dimension (10). It is
proposed to reduce the dimension of the dimensioning function (11):
                                                 2   2 (1  1 ) n1  1 (1   2 ) n1 
 lim d (n1 , n2 , 1 ,  2 )  1  lim ln  1                                             n2 
                                                                                                / ln(n1 / n2 ) (11)
                                              1   2   2 (1  1 )  1 (1   2 ) 
n1  n2                            n1  n2                              n2


   As a result of disclosing the boundary (11), we have the following expression for
the search for the fractal dimension, depending on the scale n:
                                    (1  1 ) n ln(1  1 )  1 (1   2 ) n ln(1   2 )
             d (n, 1 ,  2 )  1  2                                                       . (12)
                                        1   2   2 (1  1 ) n  1 (1   2 ) n
   The next step is to determine the properties of the sequence on individual elements
with n → 1, which eliminates the uncertainty of the choice of scaling (13):
                                      2 (1  1 )ln(1  1 )  1 (1   2 )ln(1   2 )
               d (1 ,  2 )  1                                                         .                  (13)
                                                          21 2
   As a result, for a multifractal traffic generator, the graph of which is shown in Fig.
3, the properties of the sequence are determined by the probabilities of transitions
between the states λ1, λ2, and their dimension is expressed by the formula (13).
   To simulate a real process with similar properties, for experimental data it is neces-
sary to estimate the probabilities λ1 and λ2. Sometimes real data in the form of the
probability of transitions λ1, λ2 to receive on the line is not possible, since the equip-
ment is able to receive only the number of received/transmitted packets per unit time.
In this case, it is possible to determine the intensity of traffic relative to the maximum
throughput of the channel τ=p1, and the probability of staying in the state of "0" (λ0 –
can be expressed in the probability of lack of packet transfer per unit time with the
known maximum number of information packets). The graph of the index of the frac-
tal dimension of the generated sequence, depending on the probabilities λ1, λ2, is
shown in Fig. 4.




       Fig. 4. The fractal dimension of the sequence, depending on the probabilities λ1, λ2
5       Estimation of the fractal properties of the generated binary
        sequences

In the case of a random process λ=λ1=λ2=0.5, formula (10) is simplified to (14)
                                                  ln((1  0.5n1 ) / (1  0.5n2 ))
          M (n)  1  0.5n ,   d (n1 , n2 )  1                                  . (14)
                                                           ln(n1 / n2 )
        However, there is a problem of choice for the values n1, n2. The influence of
the selected scaling factors n1, n2 is shown in Fig. 5:




    Fig. 5. Dependence of the estimation of the fractal dimension on the length of the samples

    As can be seen from the graph (Fig. 5), with the increase of n1, n2, the calculated
fractal dimension falls to a single value corresponding to the transformation of a large
scale of a bounded band by a unit amplitude of the binary traffic graph into a one-
dimensional line. The minimum values of n1, n2 correspond to the classical represen-
tation, which is the logical confirmation of the decisions taken in the previous para-
graph. Also, it is important that at λ1=λ2 the intensity of traffic is stored τ=0.5, which
corresponds to the mathematical expectation of the received binary sequence. Also,
for all λ1=λ2, the process variance is stored, and these values coincide with the ran-
dom process, for which the «0» and «1» are 0.5. In practice, the appearance of these
sequences is very different (Figures 6.a, 6.b, 6.c):




                                а) λ1=λ2=0.95, a row is persistent
                                b) λ1=λ2=0.5, a row is random




                             с) λ1=λ2=0.05, a row is unpersistent

       Fig. 6. Examples of statistically identical series with different fractal dimension

Accordingly, the graphs in Fig. 6, we can conclude that the generator, whose graph is
shown in Fig. 3, capable of reproducing the fractal properties of the sequence.


6      Managing the intensity of generated traffic

We use the definition of the intensity of traffic τ, as the probability of packet transfer
in a given time slice and is measured from 0 to 1.
   In the previous paragraph, the traffic generator was considered for which the prob-
ability of output «0» and «1» were equal, the traffic intensity was τ=0.5. For conduct-
ing simulation experiments and theoretical searches it is necessary to be able to con-
trol the intensity of the generated packets, that is, the probability of generating «1»:
p1. Above was the probability values p1 and p0, which is written by the relations (4).
Find the coefficients of the rice generator model (from Fig. 3): λ0, λ1, λ2, λ3. To do
this we use the relations (4) and obtain the following system of equations:
                                                2
                                    1       ,
                                               1     2
                                                                                       (15)
                                             1
                                                     .
                                          1   2
   However, the system does not have a single solution. For example, consider two
realizations of sequence generators (Fig. 7):
                                              λ2=0.1
                               p0                            p1
              λ0=0.2
                              0                              1              λ3=0.9


                                             λ1=0.8

          а) A variant of the generator with a high probability of changing the state

                                              λ2=0.05
                               p0                            p1
              λ0=0.6
                              0                              1              λ3=0.95


                                             λ1=0.4

            b) Option of the generator with reduced probability of change of state
           Fig. 7. Variants of generators of binary sequences of the same intensity
   As can be seen from Fig. 7, the intensity of the flow of single bits
τ=0.8/(0.8+0.1)=0.4/(0.4+0.05)=8/9. That is, the implementation of generators have
the same values of the probability of staying in a single state. However, the likelihood
of staying in the current state and the next step is greater in the implementation of the
generator b): 0.6>0.2, 0.95>0.9, respectively. Thanks to this, the generator b) gives
            1,2
out a more persistent series. Compare the work of generators by the results of the
constructed sequences (Figs. 8, 9):
             1




            0,8




            0,6




            0,4




            0,2




             0
                   0
                   2
                   4
                   6
                   8
                  10
                  12
                  14
                  16
                  18
                  20
                  22
                  24
                  26
                  28
                  30
                  32
                  34
                  36
                  38
                  40
                  42
                  44
                  46
                  48
                  50
                  52
                  54
                  56
                  58
                  60
                  62
                  64
                  66
                  68
                  70
                  72
                  74
                  76
                  78
                  80
                  82
                  84
                  86
                  88
                  90
                  92
                  94
                  96
                  98




                  Fig. 8. Generation result of 100 bits generator a), (τ = 8/9)
             1,2




              1




             0,8




             0,6




             0,4




             0,2




              0
                    0
                    2
                    4
                    6
                    8
                   10
                   12
                   14
                   16
                   18
                   20
                   22
                   24
                   26
                   28
                   30
                   32
                   34
                   36
                   38
                   40
                   42
                   44
                   46
                   48
                   50
                   52
                   54
                   56
                   58
                   60
                   62
                   64
                   66
                   68
                   70
                   72
                   74
                   76
                   78
                   80
                   82
                   84
                   86
                   88
                   90
                   92
                   94
                   96
                   98
                    Fig. 9. Generation result of 100 bits, generator b), (τ = 8/9)

   According to past examples of generation of sequences with intensity τ=0.5, two
consecutive bits depicted in Fig. 8 and 9, have the same traffic intensity, but have a
different fractal dimension.
   In general, the intensity of traffic, depending on the values of λ1, λ2 is shown in
Fig. 10:




                   Fig. 10. Intensity of traffic τ depending on probabilities λ1, λ2

   As a result, we can conclude that the generator is suitable for generating traffic of
given intensity and different fractal dimensions.


7      Bring the generator to match the sample traffic

Assume that as a result of experiments, we have a sample of sufficient traffic to eval-
uate its statistical parameters with sufficient accuracy: τ is the traffic intensity (4), and
the probability of obtaining a series of n quanta of time without having the packet
transfer (6). As a result, we have a system of equations (16):
                                      2 (1  1 ) n  1 (1   2 ) n
                           p0 ( n)                                    ,
                                                1   2
                                                                                       (16)
                                                1
                                                      .
                                            1   2
  After moving to the power equation, we have (17):
         f (1 )  (1  )(1  1 )n  1n (  1 (1  ))n  p0 (n); f (1 )  0 .   (17)
   Unfortunately, the obtained equation for searching λ1 has no analytical solutions.
But on the interval (0; 1) contains a root that can be found by numerical methods,
which for almost all polynomials convergence is guaranteed. For example, you can
use the tactile method:
   1) λ1 = 0.5
   2) λ1 := λ1 – f(λ1)/f’(λ1)
   To repeat the specified accuracy 2)
   3) λ2 = λ1(1-τ)/τ
   It is also possible to use other numerical methods:

   As an example, in Fig. 11 shows a part of the graph of function (17) for parameters
corresponding to the generation of the sequence at λ1=λ2=0.5. From the figure it can
be seen that the graphic search for the root in the interval (0; 1) gives a single value
λ1=0.5.




                  Fig. 11. The graph f(λ1)106 at τ=0.5 and p0(10)=1/210
8      Conclusions

To implement the method of generating fractal traffic using the generator model on
the graph, the following tasks were solved:
─ the relevance of the problem of generators of fractal binary sequences without the
  use of infinite distributions is shown.
─ it is proposed to use a generator of the fractal binary sequence given by the Mar-
  kov chain.
─ variability of the fractal dimension of the binary sequence and at different intensi-
  ties τ is shown.
─ the analytical expressions are derived for obtaining generator parameters with a
  given output bits density with control of their fractal dimension.

   The work requires continuation, where it is necessary to prove the existence of a
single real root of equation (17) at the interval (0; 1) and to determine numerical
methods for guaranteed approximation to the desired root. In the case of multiple
roots, determine the fundamental difference solutions and develop an algorithm for
choosing a solution that meets the needs for generating traffic.


References
 1. Hae-Duck Joshua Jeong Modelling of self-similar teletraffic for simulation University of
    Canterbury, July 2002, 270 p.
 2. Y. Raaijmakers, H. Albrecher, O. Boxma “The single server queue with mixing dependen-
    cies”, 2017, Available online, URL: http://www.hec.unil.ch/halbrech_files/QueueMixing.pdf
 3. Bulakh V., Kirichenko L., Radivilova T. “Time Series Classification Based on Fractal
    Properties”. In Proceedings of the 2018 IEEE Second International Conference on Data
    Stream Mining & Processing (DSMP), Lviv, Ukraine, 21–25 August 2018; pp. 198–201,
    doi:10.1109/DSMP.2018.8478532
 4. R. Odarchenko, V. Gnatyuk, S. Gnatyuk, A. Abakumova, Security Key Indicators As-
    sessment for Modern Cellular Networks, Proceedings of the 2018 IEEE First International
    Conference on System Analysis & Intelligent Computing (SAIC), Kyiv, Ukraine, October
    8-12, 2018, pp. 1-7.
 5. Ushanov K.V., Simulation models of a Pa / M / 1, H2 / M / 1 type queuing system and
    study on their basis of the quality of service of a traffic with a complex structure, Control,
    communication and security systems. No. 4, pp.217-251, 2015.
 6. Dobrovolsky E.V., Nechiporuk O.L. “Network traffic modeling using contextual meth-
    ods”, Scientific works ONAT them. O.S. Popov, № 1, pp.24-32, 2005.
 7. Semenov S.G., Meleshko Ye.V., Ilyushko Ya.V. “Mathematical model of a multiservice
    communication channel based on an exponential GERT network”, Armament systems and
    military equipment, KhUAF № 3(27), pp. 64-67, 2011.
 8. Kuchuk G. А., Mohammad A. S., Kovalenko A. A. “Method of redistributing bandwidth
    to reduce data transfer time in a wireless network”, Collection of scientific works of
    Kharkiv University of Air Forces, 2011, Vol. 3, P. 140-145.
 9. Smirnov, O., Kuznetsov, A., Kavun, S., Babenko, B., Nakisko, O., Kuznetsova, K., “Mal-
    ware Correlation Monitoring in Computer Networks of Promising Smart Grids’, 2019
    IEEE 6th International Conference On Energy Smart Systems (2019 IEEE ESS), Kyiv,
    Ukraine April 17-19, 2019 P. 347-352.
10. M. Zaliskyi, R. Odarchenko, S. Gnatyuk, Yu. Petrova. A. Chaplits, Method of traffic
    monitoring for DDoS attacks detection in e-health systems and networks, CEUR Work-
    shop Proceedings, Vol. 2255, pp. 193-204, 2018.
11. Smirnov A.A., Kuznetsov A.A., Danilenko D.A., Berezovsky A., “The statistical analysis
    of a network traffic for the intrusion detection and prevention systems”, Telecommunica-
    tions and Radio Engineering, Volume 74, Issue 1, Begel House Inc., 2015, Р. 61-78.
12. Al-Azzeh J.S., Al Hadidi M., Odarchenko R., Gnatyuk S., Shevchuk Z., Hu Z. “Analysis
    of self-similar traffic models in computer networks”, International Review on Modelling
    and Simulations, № 10(5), pp. 328-336, 2017.
13. Smirnov, O., Kuznetsov, A., Kiian, A., Zamula, A., Rudenko, S., Hryhorenko, V., “Vari-
    ance Analysis of Networks Traffic for Intrusion Detection in Smart Grids”, 2019 IEEE 6th
    International Conference on Energy Smart Systems (2019 IEEE ESS), Kyiv, Ukraine April
    17-19, 2019, P. 353-358.
14. A. A. Kovalenko, G. A. Kuchuk, A. A. Mozhaev, Construction of exponential time scales
    when analyzing queues of multiservice networks”, Radio electronic and computer systems,
    2010, No. 7, P. 257-262.
15. Mazin Al Hadidi, Jamil S. Al-Azzeh, R. Odarchenko, S. Gnatyuk, A. Abakumova, “Adap-
    tive Regulation of Radiated Power Radio Transmitting Devices in Modern Cellular Net-
    work Depending on Climatic Conditions”, Contemporary Engineering Sciences, Vol. 9,
    № 10, рр. 473-485, 2016.
16. Odarchenko R., Abakumova A., Polihenko O., Gnatyuk S. “Traffic offload improved
    method for 4G/5G mobile network operator”, Proceedings of 14th International Confer-
    ence on Advanced Trends in Radioelectronics, Telecommunications and Computer Engi-
    neering (TCSET-2018), pp. 1051-1054, 2018.
17. Fedushko S., Ustyianovych T.: Predicting Pupil’s Successfulness Factors Using Machine
    Learning Algorithms and Mathematical Modelling Methods. Advances in Intelligent Sys-
    tems and Computing series, ICCSEEA 2019, AISC 938, vol. 938, pp. 625-636 (2020).
    https://doi.org/10.1007/978-3-030-16621-2_58
18. Korobiichuk I., Syerov Y., Fedushko S.: The method of semantic structuring of virtual
    community content. Advances in Intelligent Systems and Computing, vol. 1044, pp. 11-18
    (2020). https://doi.org/10.1007/978-3-030-29993-4_2
19. Shakhovska N., Holoshchuk R., Fedushko S., Kosar O., Danel R., Repka M.: The sequen-
    tial associative rules analysis of patient's physical characteristics. CEUR Workshop Pro-
    ceedings. Vol. 2255: Proceedings of the 1st International workshop on informatics & Data-
    driven medicine (IDDM 2018), pp.82-92. Lviv, Ukraine (2018).
20. Shakhovska N., Shakhovska K., Fedushko S.: Some Aspects of the Method for Tourist
    Route Creation. Proceedings of the International Conference of Artificial Intelligence,
    Medical Engineering, Education (AIMEE2018). Advances in Artificial Systems for Medi-
    cine and Education II series, vol. 902, pp. 527-537 (2020). https://doi.org/10.1007/978-
    3-030-12082-5_48