Method of Fractal Traffic Generation by a Model of Generator on the Graph Hanna Drieieva 1 [0000-0002-8557-3443], Oleksii Smirnov 1,3 [0000-0001-9543-874X], Oleksandr Drieiev 1 [ 0000-0001-6951-2002], Yuliia Polishchuk 2 [0000-0002-0686-2328], Rashit Brzhanov 3 [0000-0001-8755-8207] and Marek Aleksander 4 [0000-0003-2619-1063] 1 Central Ukrainian National Technical University, Ukraine, Kropyvnytskyi 2 National Aviation University, Ukraine, Kyiv 3 Yessenov University, Aktau, Kazakhstan 4 Państwowa Wyższa Szkoła Zawodowa w Nowym Sączu, Nowy Sącz, Poland gannadreeva@gmail.com, dr.SmirnovOA@gmail.com, drey.sanya@gmail.com,polischuk.yu.ya@gmail.com Abstract. The problem of generating traffic with given fractal properties in or- der to use it in simulation processes of the computer network, which is carried out to predict the properties of the telecommunication system in the meantime delay of information packets and their likelihood of loss is dedicated in the pa- per. The subject of the research in the article is the method of generating fractal traffic using a generator model on the graph. The purpose of the research is to create a method for generating fractal traffic using a generator model on the graph. For this purpose, the following tasks were solved: defined fractal proper- ties of telecommunication traffic and the consequences of fractality; were de- fined the fractal dimension of the numerical series and the distribution density of the elements of the series were determined; the estimation of the fractal properties of the generated binary sequences is carried out; the management mode of the intensity of generated traffic; suggested the generator was adjusted to match the sample traffic. The result of the work is the implementation of the method of generating fractal traffic using a generator model on the graph, due to the application of the following steps: the relevance of the problem of creat- ing generators of fractal binary sequences without the use of infinite distribu- tions is identified; the generator of a fractal binary sequence given by the Mar- kov chain; the variability of the fractal dimension of the binary sequence and at different intensities τ is demonstrated; analytic expressions are derived for ob- taining generator parameters with a given output bits density with the control of their fractal dimension. Keywords: Network, Simulation, Traffic, Graph, Fractal, Qos, Markov Chain. 1 Introduction In the process of developing the hardware and software components of telecommuni- cation and computer network equipment, it is necessary to meet the requirements of Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons Li- cense Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks quality of service (QoS). In order to ensure that the equipment meets the requirements of the quality of service of telecommunication equipment, it is necessary to have a mathematical model of information transfer processes where QoS parameters have an analytical estimate. Also, these estimates can be obtained as a result of simulation based on mathematical models of the developed telecommunication equipment, in case it is impossible to obtain analytical solutions. 2 Analysis of recent research and publications In case of the presence of fractal telecommunication traffic in computer networks, the simulation should take into account fractal capabilities, so are used as sources genera- tors of traffic on the basis of distributions with a “heavy tail” [1, p. 80]. Paper [1] presents the generation of the Method-Based Pareto-Modulated Poisson Processes (PMPP) based on the Pareto distribution. In this case, the research remains relevant and is considered in modern studies [2]. Modern telecommunication systems form increasingly complex structures, which leads to the unsuitability of analytical apparatus to optimize the parameters of tele- communication equipment. This leads to a lack of optimality of equipment and, con- sequently, deterioration in the quality of service on the requirements of QoS. To de- termine the optimal modes of operation of telecommunication equipment, simulation systems are used (in particular: OPNET, Emulab, NISTNET, NS, GTNeS, Dum- myNet, ModelNet, Ohio Network Emulator, ENDE, EMPOWER, NSE, NETWARS) that demonstrate the need for increasingly computational resources to optimize in- creasingly complex telecommunication systems [4-11]. Composite imitation systems are also simulators of the source of telecommunication traffic, which is divided by the properties into periodic, random and self-similar. The importance of reliable results of the process of mathematical simulation of the work of the telecommunications net- work of traffic generators has been confirmed by the consistent availability of reports on this topic at the IEEE MASCOTS International Symposium (Simulation, Analysis and Simulation of Computer and Telecommunication Systems) in the program. For example, in 2018. The following report is included [5]. In modern simulation, the following types of traffic sources are used [12-16]: 1. Poisson process - an example of a source of random traffic. These generators are well described analytically, which allows us to build analytical formulas for evalu- ating service quality indicators. Unfortunately, in modern systems this type of traf- fic is not widespread. 2. Generator of traffic based on the fractal Brownian motion [10]. 3. Fractal Gaussian noise. Generation is based on the use of discrete wavelet trans- formation. Detailing wavelet coefficients at each of the levels are independent ran- dom variables with normal distribution. Approximation coefficients are the result of a fractal autoregression with a sliding middle process [9]. The advantages of models based on the fractal Brownian motion and the fractal Gaussian noise are the properties of self-sustainability and long-term dependence that are observed in ex- perimental data. There is also the possibility of their analytical interpretation. The disadvantages are insufficient means of selecting parameters for generating traffic with given properties. Therefore, these generators are not enough to generate plau- sible traffic. 4. Fractal movement Levy is a generalized Brownian motion, has a self-similar char- acter, forms distributions with «heavy tails». Among the drawbacks it is worth not- ing the need to take into account several parameters that determine the state of the model for which there is no direct method of evaluation. 5. Autoregressive models assume that the current value of the process is the sum of a constant, weighted sum of previous values and model error. Autoregressive models are relatively simple, but they are inherent in the lack of simulation of nonlineari- ties. They are characterized by a burdensome mathematical apparatus and, as a re- sult, the process of bringing to experimental traffic is time-consuming. 6. Neural network (NM) models are trained neural networks on experimental traffic in the prediction mode of a new element. The neural network contains several lay- ers with a nonlinear activation function and an output linear neuron. But neural networks require training, they have a complex analysis of the trained network, the choice of learning algorithm and network architecture in most cases is selected. Al- so, strict requirements for the training sample are set. 7. Use of Markov chains. The use of Markov chains allows us to create a very simple, compared with previous methods, model for generating discrete traffic with a wide range of properties. Experiments show good correspondence with real traffic of the telecommunication network. To set up the model you need to set only five parame- ters, often for process description only two probabilities of change between unit and zero states. The use of the generator on the Markov chains also allows for ana- lytical solutions that are a useful alternative to numerical simulation methods. In view of the generators of telecommunication traffic, it can be noted that in most cases, the selection of the method of generating traffic is dependent on a particular situation, but in general, Mark-based generation methods are distinguished by less computational complexity and a wider range of applicability. Therefore, the task of improving the analytical methods of approaching the source of traffic model to real experimental data remains an urgent task that is solved in this article. Thus, the pur- pose of this work is to create a method for generating fractal traffic using a generator model on the graph. 3 Fractal properties of telecommunication traffic and the consequences of fractality At the present stage of the development of the mathematical description of telecom- munication processes, it is generally accepted to use fractal description of traffic, which is visually accompanied by the presence of abnormally large, compared with normal distribution, number of bursts [3]. Fig. 1. An example of pulsating multifractal traffic [3] In most cases, such pulsating processes are described by Pareto distribution [1-3]. 4 The fractal dimension of the numerical series and the distribution density of the elements of the series To identify the fractal dimension one can use one of the definitions, namely the di- mension in the interpretation of Minkowski (1), [4]: ln( N  ) d  lim . (1)  0  ln() where the notations are used: ─ ε is the size or diameter of the subset, which is covered by the set; ─ Nε is the minimum number of sets needed to cover the entire set. The binary set is not suitable for the direct application of formula (1), since its el- ements are counted but not continuous, therefore it is not possible to direct ε to zero. It is suggested to circumvent this restriction if the “width” of rectangles of height “1” and “0” in the binary sequence is directed to zero. Therefore the coating will have an area S = 0, when 1 / ε of the elements of the generated series have a value only of 1 or only of 0, otherwise the coating will have an area S = 1 (Fig. 2). It is assumed that the implementation of the binary sequence can be continued in- definitely, and then the mathematical expectation of the sum of partial squares S can be expressed using statistics based on mathematical expectation. For this purpose we find the probability of obtaining a null covering p0(n) with n experiments; then the probability of a single covering will be p1(n) =1-p0(n). Fig. 2. Determination of the coverage area at 1 / ε = 3 Event p0(n) is possible in the case of a series of “1” or “0” implementations. We in- troduce a system whose state depends on the previous state, similar to that used in the PMPP system [1, p. 81, fig. 4.1] (Fig. 3). λ2 p p1 0 λ0 0 1 λ3 λ1 Fig. 3. Model of the generator of fractal traffic The model uses a state that corresponds to the original generated value at the time. The next value is obtained by random transitions, where λ1 and λ2 are responsible for the probability of changing the state for the next quantum of time, and λ0 and λ3 are the probability of maintaining the current state. As a result, the probability of a unit series for n quanta of time is (1-λ2)n. But here it is necessary to consider that the series begins with a single value that has the probabil- ity p1. Therefore, the probability of a single series eventually has the following form: p1(1-λ2)n. Similarly, the determination of the probability of obtaining a series of zero values is performed: p0(1-λ1)n. The finite automaton on the basis of the graph (Figure 3) has two states “0” and “1”, with the probability of transition from “0” to “1” and from “1” to “0” in the gen- eral case may be different. For the probabilities of transitions λ must meet the follow- ing requirements:   0  1  1  , (2)  2   3  1 Under the condition λ1=λ2, the graph becomes symmetric and the probability p0=p1=0.5 with a long-term observation the system is equally likely in one of the states. In this case, the mathematical expectation of the generated series is M=0.5, and the dispersion is D=0.25. For rice fig. 3 the following differential equations with re- spect to the probability of system states are true:  dp0 (t )  dt  1 p0 (t )   2 p1 (t )   0 p0 (t )   0 p0 (t ),  (3)  dp1 (t )  1 p0 (t )   2 p1 (t )  3 p1 (t )   3 p1 (t ).  dt If we take into account that finding a system in one of the states is a guaranteed event p0+p1=1 and use the condition of stationarity of the process in time (when the probabilities do not change their value and their derivatives are equal to zero), the transformation of system (3) gives the following system: 1 p0 (t )   2 p1 (t )  0,   p0 (t )  p1 (t )  1. From the last system you can get the probability of staying the system in the states «0» and «1» (4): 2 1 p0  ; p1  . (4) 1   2 1   2 Accordingly, traffic intensity τ will coincide with the probability of receiving «1» at the output of the generator: τ=p1. If we take into account the symmetric condition of the graph λ=λ1=λ2, then the probabilities can be expressed as follows (5):       1   2    p0  ; p1     p0  p1  0.5  . (    5) In accordance with the obtained probabilities (4), it is finally possible to obtain a zero coverage area with length n as the sum of two mutually exclusive events of the unit and zero series (6):  2 (1  1 )n  1 (1   2 )n p0 (n)  . (6) 1   2 The unit area is the opposite of an event and is expressed by (7):  (1  1 ) n  1 (1   2 ) n p1 (n)  1  2 . (7) 1   2 It is obvious that the mathematical expectation, which in this case corresponds to the average coverage area, can be expressed as follows (8):  (1  1 ) n  1 (1   2 ) n   (1  1 ) n  1 (1   2 ) n  M ( n)  0 2  1 1  2 , 1   2  1   2   2 (1  1 ) n  1 (1   2 ) n M ( n)  1  . (8) 1   2 As a result, the fractal dimension depends on the scale corresponding to the defini- tion of the multifractal, and can be obtained from (1):  n1M (n1 )  C  n1d n1 M (n1 ) C  n1d  ,  , ln n1M (n1 )  d ln n1 . n2 M (n2 )  C  n2 n2 M (n2 ) C  n2 d d n2 M (n2 ) n2 d (n1 , n2 )  1  ln( M (n1 ) / M (n2 )) / ln(n1 / n2 ) . (9) Finally (10):     2   2 (1  1 )n1  1 (1   2 )n1  d (n1 , n2 , 1 ,  2 )  1  ln  1 n2  / ln( n1 / n2 ) (10)  1   2   2 (1  1 )  1 (1   2 )  n2 However, a lot of parameters are used to determine the fractal dimension (10). It is proposed to reduce the dimension of the dimensioning function (11):     2   2 (1  1 ) n1  1 (1   2 ) n1  lim d (n1 , n2 , 1 ,  2 )  1  lim ln  1 n2  / ln(n1 / n2 ) (11)  1   2   2 (1  1 )  1 (1   2 )  n1  n2 n1  n2 n2 As a result of disclosing the boundary (11), we have the following expression for the search for the fractal dimension, depending on the scale n:  (1  1 ) n ln(1  1 )  1 (1   2 ) n ln(1   2 ) d (n, 1 ,  2 )  1  2 . (12) 1   2   2 (1  1 ) n  1 (1   2 ) n The next step is to determine the properties of the sequence on individual elements with n → 1, which eliminates the uncertainty of the choice of scaling (13):  2 (1  1 )ln(1  1 )  1 (1   2 )ln(1   2 ) d (1 ,  2 )  1  . (13) 21 2 As a result, for a multifractal traffic generator, the graph of which is shown in Fig. 3, the properties of the sequence are determined by the probabilities of transitions between the states λ1, λ2, and their dimension is expressed by the formula (13). To simulate a real process with similar properties, for experimental data it is neces- sary to estimate the probabilities λ1 and λ2. Sometimes real data in the form of the probability of transitions λ1, λ2 to receive on the line is not possible, since the equip- ment is able to receive only the number of received/transmitted packets per unit time. In this case, it is possible to determine the intensity of traffic relative to the maximum throughput of the channel τ=p1, and the probability of staying in the state of "0" (λ0 – can be expressed in the probability of lack of packet transfer per unit time with the known maximum number of information packets). The graph of the index of the frac- tal dimension of the generated sequence, depending on the probabilities λ1, λ2, is shown in Fig. 4. Fig. 4. The fractal dimension of the sequence, depending on the probabilities λ1, λ2 5 Estimation of the fractal properties of the generated binary sequences In the case of a random process λ=λ1=λ2=0.5, formula (10) is simplified to (14) ln((1  0.5n1 ) / (1  0.5n2 )) M (n)  1  0.5n , d (n1 , n2 )  1  . (14) ln(n1 / n2 ) However, there is a problem of choice for the values n1, n2. The influence of the selected scaling factors n1, n2 is shown in Fig. 5: Fig. 5. Dependence of the estimation of the fractal dimension on the length of the samples As can be seen from the graph (Fig. 5), with the increase of n1, n2, the calculated fractal dimension falls to a single value corresponding to the transformation of a large scale of a bounded band by a unit amplitude of the binary traffic graph into a one- dimensional line. The minimum values of n1, n2 correspond to the classical represen- tation, which is the logical confirmation of the decisions taken in the previous para- graph. Also, it is important that at λ1=λ2 the intensity of traffic is stored τ=0.5, which corresponds to the mathematical expectation of the received binary sequence. Also, for all λ1=λ2, the process variance is stored, and these values coincide with the ran- dom process, for which the «0» and «1» are 0.5. In practice, the appearance of these sequences is very different (Figures 6.a, 6.b, 6.c): а) λ1=λ2=0.95, a row is persistent b) λ1=λ2=0.5, a row is random с) λ1=λ2=0.05, a row is unpersistent Fig. 6. Examples of statistically identical series with different fractal dimension Accordingly, the graphs in Fig. 6, we can conclude that the generator, whose graph is shown in Fig. 3, capable of reproducing the fractal properties of the sequence. 6 Managing the intensity of generated traffic We use the definition of the intensity of traffic τ, as the probability of packet transfer in a given time slice and is measured from 0 to 1. In the previous paragraph, the traffic generator was considered for which the prob- ability of output «0» and «1» were equal, the traffic intensity was τ=0.5. For conduct- ing simulation experiments and theoretical searches it is necessary to be able to con- trol the intensity of the generated packets, that is, the probability of generating «1»: p1. Above was the probability values p1 and p0, which is written by the relations (4). Find the coefficients of the rice generator model (from Fig. 3): λ0, λ1, λ2, λ3. To do this we use the relations (4) and obtain the following system of equations:  2 1       , 1 2  (15)    1 .  1   2 However, the system does not have a single solution. For example, consider two realizations of sequence generators (Fig. 7): λ2=0.1 p0 p1 λ0=0.2 0 1 λ3=0.9 λ1=0.8 а) A variant of the generator with a high probability of changing the state λ2=0.05 p0 p1 λ0=0.6 0 1 λ3=0.95 λ1=0.4 b) Option of the generator with reduced probability of change of state Fig. 7. Variants of generators of binary sequences of the same intensity As can be seen from Fig. 7, the intensity of the flow of single bits τ=0.8/(0.8+0.1)=0.4/(0.4+0.05)=8/9. That is, the implementation of generators have the same values of the probability of staying in a single state. However, the likelihood of staying in the current state and the next step is greater in the implementation of the generator b): 0.6>0.2, 0.95>0.9, respectively. Thanks to this, the generator b) gives 1,2 out a more persistent series. Compare the work of generators by the results of the constructed sequences (Figs. 8, 9): 1 0,8 0,6 0,4 0,2 0 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 Fig. 8. Generation result of 100 bits generator a), (τ = 8/9) 1,2 1 0,8 0,6 0,4 0,2 0 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64 66 68 70 72 74 76 78 80 82 84 86 88 90 92 94 96 98 Fig. 9. Generation result of 100 bits, generator b), (τ = 8/9) According to past examples of generation of sequences with intensity τ=0.5, two consecutive bits depicted in Fig. 8 and 9, have the same traffic intensity, but have a different fractal dimension. In general, the intensity of traffic, depending on the values of λ1, λ2 is shown in Fig. 10: Fig. 10. Intensity of traffic τ depending on probabilities λ1, λ2 As a result, we can conclude that the generator is suitable for generating traffic of given intensity and different fractal dimensions. 7 Bring the generator to match the sample traffic Assume that as a result of experiments, we have a sample of sufficient traffic to eval- uate its statistical parameters with sufficient accuracy: τ is the traffic intensity (4), and the probability of obtaining a series of n quanta of time without having the packet transfer (6). As a result, we have a system of equations (16):   2 (1  1 ) n  1 (1   2 ) n  p0 ( n)  ,  1   2  (16)  1  .  1   2 After moving to the power equation, we have (17): f (1 )  (1  )(1  1 )n  1n (  1 (1  ))n  p0 (n); f (1 )  0 . (17) Unfortunately, the obtained equation for searching λ1 has no analytical solutions. But on the interval (0; 1) contains a root that can be found by numerical methods, which for almost all polynomials convergence is guaranteed. For example, you can use the tactile method: 1) λ1 = 0.5 2) λ1 := λ1 – f(λ1)/f’(λ1) To repeat the specified accuracy 2) 3) λ2 = λ1(1-τ)/τ It is also possible to use other numerical methods: As an example, in Fig. 11 shows a part of the graph of function (17) for parameters corresponding to the generation of the sequence at λ1=λ2=0.5. From the figure it can be seen that the graphic search for the root in the interval (0; 1) gives a single value λ1=0.5. Fig. 11. The graph f(λ1)106 at τ=0.5 and p0(10)=1/210 8 Conclusions To implement the method of generating fractal traffic using the generator model on the graph, the following tasks were solved: ─ the relevance of the problem of generators of fractal binary sequences without the use of infinite distributions is shown. ─ it is proposed to use a generator of the fractal binary sequence given by the Mar- kov chain. ─ variability of the fractal dimension of the binary sequence and at different intensi- ties τ is shown. ─ the analytical expressions are derived for obtaining generator parameters with a given output bits density with control of their fractal dimension. The work requires continuation, where it is necessary to prove the existence of a single real root of equation (17) at the interval (0; 1) and to determine numerical methods for guaranteed approximation to the desired root. In the case of multiple roots, determine the fundamental difference solutions and develop an algorithm for choosing a solution that meets the needs for generating traffic. References 1. Hae-Duck Joshua Jeong Modelling of self-similar teletraffic for simulation University of Canterbury, July 2002, 270 p. 2. Y. Raaijmakers, H. Albrecher, O. Boxma “The single server queue with mixing dependen- cies”, 2017, Available online, URL: http://www.hec.unil.ch/halbrech_files/QueueMixing.pdf 3. Bulakh V., Kirichenko L., Radivilova T. “Time Series Classification Based on Fractal Properties”. In Proceedings of the 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 21–25 August 2018; pp. 198–201, doi:10.1109/DSMP.2018.8478532 4. R. Odarchenko, V. Gnatyuk, S. Gnatyuk, A. Abakumova, Security Key Indicators As- sessment for Modern Cellular Networks, Proceedings of the 2018 IEEE First International Conference on System Analysis & Intelligent Computing (SAIC), Kyiv, Ukraine, October 8-12, 2018, pp. 1-7. 5. Ushanov K.V., Simulation models of a Pa / M / 1, H2 / M / 1 type queuing system and study on their basis of the quality of service of a traffic with a complex structure, Control, communication and security systems. No. 4, pp.217-251, 2015. 6. Dobrovolsky E.V., Nechiporuk O.L. “Network traffic modeling using contextual meth- ods”, Scientific works ONAT them. O.S. Popov, № 1, pp.24-32, 2005. 7. Semenov S.G., Meleshko Ye.V., Ilyushko Ya.V. “Mathematical model of a multiservice communication channel based on an exponential GERT network”, Armament systems and military equipment, KhUAF № 3(27), pp. 64-67, 2011. 8. Kuchuk G. А., Mohammad A. S., Kovalenko A. A. “Method of redistributing bandwidth to reduce data transfer time in a wireless network”, Collection of scientific works of Kharkiv University of Air Forces, 2011, Vol. 3, P. 140-145. 9. Smirnov, O., Kuznetsov, A., Kavun, S., Babenko, B., Nakisko, O., Kuznetsova, K., “Mal- ware Correlation Monitoring in Computer Networks of Promising Smart Grids’, 2019 IEEE 6th International Conference On Energy Smart Systems (2019 IEEE ESS), Kyiv, Ukraine April 17-19, 2019 P. 347-352. 10. M. Zaliskyi, R. Odarchenko, S. Gnatyuk, Yu. Petrova. A. Chaplits, Method of traffic monitoring for DDoS attacks detection in e-health systems and networks, CEUR Work- shop Proceedings, Vol. 2255, pp. 193-204, 2018. 11. Smirnov A.A., Kuznetsov A.A., Danilenko D.A., Berezovsky A., “The statistical analysis of a network traffic for the intrusion detection and prevention systems”, Telecommunica- tions and Radio Engineering, Volume 74, Issue 1, Begel House Inc., 2015, Р. 61-78. 12. Al-Azzeh J.S., Al Hadidi M., Odarchenko R., Gnatyuk S., Shevchuk Z., Hu Z. “Analysis of self-similar traffic models in computer networks”, International Review on Modelling and Simulations, № 10(5), pp. 328-336, 2017. 13. Smirnov, O., Kuznetsov, A., Kiian, A., Zamula, A., Rudenko, S., Hryhorenko, V., “Vari- ance Analysis of Networks Traffic for Intrusion Detection in Smart Grids”, 2019 IEEE 6th International Conference on Energy Smart Systems (2019 IEEE ESS), Kyiv, Ukraine April 17-19, 2019, P. 353-358. 14. A. A. Kovalenko, G. A. Kuchuk, A. A. Mozhaev, Construction of exponential time scales when analyzing queues of multiservice networks”, Radio electronic and computer systems, 2010, No. 7, P. 257-262. 15. Mazin Al Hadidi, Jamil S. Al-Azzeh, R. Odarchenko, S. Gnatyuk, A. Abakumova, “Adap- tive Regulation of Radiated Power Radio Transmitting Devices in Modern Cellular Net- work Depending on Climatic Conditions”, Contemporary Engineering Sciences, Vol. 9, № 10, рр. 473-485, 2016. 16. Odarchenko R., Abakumova A., Polihenko O., Gnatyuk S. “Traffic offload improved method for 4G/5G mobile network operator”, Proceedings of 14th International Confer- ence on Advanced Trends in Radioelectronics, Telecommunications and Computer Engi- neering (TCSET-2018), pp. 1051-1054, 2018. 17. Fedushko S., Ustyianovych T.: Predicting Pupil’s Successfulness Factors Using Machine Learning Algorithms and Mathematical Modelling Methods. Advances in Intelligent Sys- tems and Computing series, ICCSEEA 2019, AISC 938, vol. 938, pp. 625-636 (2020). https://doi.org/10.1007/978-3-030-16621-2_58 18. Korobiichuk I., Syerov Y., Fedushko S.: The method of semantic structuring of virtual community content. Advances in Intelligent Systems and Computing, vol. 1044, pp. 11-18 (2020). https://doi.org/10.1007/978-3-030-29993-4_2 19. Shakhovska N., Holoshchuk R., Fedushko S., Kosar O., Danel R., Repka M.: The sequen- tial associative rules analysis of patient's physical characteristics. CEUR Workshop Pro- ceedings. Vol. 2255: Proceedings of the 1st International workshop on informatics & Data- driven medicine (IDDM 2018), pp.82-92. Lviv, Ukraine (2018). 20. Shakhovska N., Shakhovska K., Fedushko S.: Some Aspects of the Method for Tourist Route Creation. Proceedings of the International Conference of Artificial Intelligence, Medical Engineering, Education (AIMEE2018). Advances in Artificial Systems for Medi- cine and Education II series, vol. 902, pp. 527-537 (2020). https://doi.org/10.1007/978- 3-030-12082-5_48